Current Search: Programming electronic computers (x)
View All Items
- Title
- TPL, A TUTORIAL PROGRAMMING LANGUAGE.
- Creator
- Huang, Chien-Jen, Florida Atlantic University, Hadlock, Frank O., Charles E. Schmidt College of Science, Department of Mathematical Sciences
- Abstract/Description
-
The object of this reaearch is to define and implement an experimental language, Tutorial Programming Language (TPL). Basic language concepts and definitions are introduced initially to provide the background for defining TPL, which is intended as a means to illustrate language concepts, and has Type-3 grammar as a data type. A formal definition of TPL is given in the form of an SLR(1) grammar. TPL is implemented by a syntax directed compiler and a hypothetical machine for which the compiler...
Show moreThe object of this reaearch is to define and implement an experimental language, Tutorial Programming Language (TPL). Basic language concepts and definitions are introduced initially to provide the background for defining TPL, which is intended as a means to illustrate language concepts, and has Type-3 grammar as a data type. A formal definition of TPL is given in the form of an SLR(1) grammar. TPL is implemented by a syntax directed compiler and a hypothetical machine for which the compiler provides code. The machine is emulated by a Pascal program, making TPL highly portable. It is also possible for the interested user to enhance the power of TPL by writing more functions for practical purposes.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14337
- Subject Headings
- Programming languages (Electronic computers)
- Format
- Document (PDF)
- Title
- BUSINESS SYSTEMS SIMULATION USING GPSS/360.
- Creator
- Sanford, Donald G., Florida Atlantic University, Stephenson, Samuel S.
- Abstract/Description
-
This thesis was prepared as an introductory text in business systems simulation using the General Purpose Simulation System/360 computer programming language. The material requires no background in computer programming or simulation. A knowledge of elementary probability and statistics and a course in operations research would be prerequisites. A number of examples illustrate an approach to simulation problems and the use of the computer language.
- Date Issued
- 1971
- PURL
- http://purl.flvc.org/fcla/dt/13420
- Subject Headings
- Computer simulation, Programming languages (Electronic computers)
- Format
- Document (PDF)
- Title
- Performance evaluation of blind equalization techniques in the digital cellular environment.
- Creator
- Boccuzzi, Joseph., Florida Atlantic University, Sudhakar, Raghavan
- Abstract/Description
-
This thesis presents simulation results evaluating the performance of blind equalization techniques in the Digital Cellular environment. A new method of a simple zero memory non-linear detector for complex signals is presented for various forms of Fractionally Spaced Equalizers (FSE). Initial simulations are conducted with Binary Phase Shift Keying (BPSK) to study the characteristics of FSEs. The simulations are then extended to complex case via $\pi/$4-Differential Quaterny Phase Shift...
Show moreThis thesis presents simulation results evaluating the performance of blind equalization techniques in the Digital Cellular environment. A new method of a simple zero memory non-linear detector for complex signals is presented for various forms of Fractionally Spaced Equalizers (FSE). Initial simulations are conducted with Binary Phase Shift Keying (BPSK) to study the characteristics of FSEs. The simulations are then extended to complex case via $\pi/$4-Differential Quaterny Phase Shift Keying ($\pi/$4-DQPSK) modulation. The primary focus in this thesis is the performance of this complex case when operating in Additive White Gaussian Noise (AWGN) and Rayleigh Multipath Fading channels.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14859
- Subject Headings
- Equalizers (Electronics), Computer algorithms, Data transmission systems, Programming electronic computers
- Format
- Document (PDF)
- Title
- Teaching Methodology Using Audio-Programmed Instructional System for Ten-Key Adding Machine.
- Creator
- Bruce, Margaret Irma M., Florida Atlantic University, Sullivan, John W.
- Abstract/Description
-
Purpose: To conduct an experimental comparison to determine if operating instructions for ten-key business machines can be presented as effectively by an audio-programmed system as by the traditional method. Method and Sources: Two levels of students, secondary and post secondary, were divided into equal-sized control and experimental groups. The control groups followed the traditional method; the experimental groups were instructed by specially prepared audio instructional tapes with a...
Show morePurpose: To conduct an experimental comparison to determine if operating instructions for ten-key business machines can be presented as effectively by an audio-programmed system as by the traditional method. Method and Sources: Two levels of students, secondary and post secondary, were divided into equal-sized control and experimental groups. The control groups followed the traditional method; the experimental groups were instructed by specially prepared audio instructional tapes with a correlated program folder of examples, exercises, and evaluations . All groups were given an achievement test evaluating speed and accuracy in addition and efficiency in applicable business problems. Findings: Experimental groups achieved higher mean scores. At the .05 level of significance, there was a significant difference in achievement in favor of the experimental group at the high school level. Students liked the audio method. There was indication that both student and teacher productivity increased.
Show less - Date Issued
- 1971
- PURL
- http://purl.flvc.org/fcla/dt/13462
- Subject Headings
- Computers--Programmed instruction, Electronic office machines--Programmed instruction
- Format
- Document (PDF)
- Title
- Massively parallel computation and porting of EPIC research hydro code on Cray-T3D.
- Creator
- Dutta, Arindum., Florida Atlantic University, Tsai, Chi-Tay
- Abstract/Description
-
The objective of the work is to verify the feasibility of converting a large FEA code into a massively parallel FEA code in terms of computational speed and cost. Sequential subroutines in the Research EPIC hydro code, a Lagrangian finite element analysis code for high velocity elastic-plastic impact problems, are individually converted into parallel code using Cray Adaptive Fortran (CRAFT). The performance of massively parallel subroutines running on 32 PEs on Cray-T3D is faster than their...
Show moreThe objective of the work is to verify the feasibility of converting a large FEA code into a massively parallel FEA code in terms of computational speed and cost. Sequential subroutines in the Research EPIC hydro code, a Lagrangian finite element analysis code for high velocity elastic-plastic impact problems, are individually converted into parallel code using Cray Adaptive Fortran (CRAFT). The performance of massively parallel subroutines running on 32 PEs on Cray-T3D is faster than their sequential counterparts on Cray-YMP. At next stage of the research, Parallel Virtual Machine (PVM) directives is used to develop a PVM version of the EPIC hydro code by connecting the converted parallel subroutines running on multiple PEs of T3D to the sequential part of the code running on single PE. With an incremental increase in the massively parallel subroutines into the PVM EPIC hydro code, the performance with respect to speedup of the code increased accordingly. The results indicate that significant speedup can be achieved in the EPIC hydro code when most or all of the subroutines are massively parallelized.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15249
- Subject Headings
- Parallel processing (Electronic computers), Computer programs, coding theory, Supercomputers
- Format
- Document (PDF)
- Title
- A new approach to the inverse kinematic analysis of redundant robots.
- Creator
- Dutta, Partha Sarathi., Florida Atlantic University
- Abstract/Description
-
A new approach has been developed for inverse kinematic analysis of redundant robots. In case of redundant robots inverse kinematics is complicated by the non-square nature of the Jacobian. In this method the Jacobian and inverse kinematic equation are reduced based on the rank of the Jacobian and the constraints specified. This process automatically locks some joints of the robot at various trajectory points. The reduced inverse kinematic equation is solved by an iterative procedure to find...
Show moreA new approach has been developed for inverse kinematic analysis of redundant robots. In case of redundant robots inverse kinematics is complicated by the non-square nature of the Jacobian. In this method the Jacobian and inverse kinematic equation are reduced based on the rank of the Jacobian and the constraints specified. This process automatically locks some joints of the robot at various trajectory points. The reduced inverse kinematic equation is solved by an iterative procedure to find joint variable values for known task description. The results of computer simulation of the inverse kinematics applied on a redundant planar robot and a redundant moving base robot proved the method to be efficient, and the results can be found within a few iterations with excellent accuracy.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14433
- Subject Headings
- Parallel processing (Electronic computers), Computer programs, coding theory, Supercomputers
- Format
- Document (PDF)
- Title
- Progress towards push button verification for business process execution language artifacts.
- Creator
- Vargas, Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic...
Show moreWeb Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369386
- Subject Headings
- Electronic commerce, Computer programs, Computer network architectures, Expert systems (Computer science), Web servers, Management, Computer systems, Verification
- Format
- Document (PDF)
- Title
- Patterns for web services standards.
- Creator
- Ajaj, Ola, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to...
Show moreWeb services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927300
- Subject Headings
- Computational grids (Computer systems), Computer systems, Verification, Expert systems (Computer science), Computer network architectures, Web servers, Management, Electronic commerce, Computer programs
- Format
- Document (PDF)
- Title
- Concurrent linear predictive coding.
- Creator
- McLean, William Gregory., Florida Atlantic University, Erdol, Nurgun, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis describes a software model of a Linear Predictive Coding (L.P.C.) that is written in the Ada language. The novel feature of this program is that it attempts to execute the maximum possible number of concurrent arithmetic operations in the L.P.C. algorithm. Each arithmetic operation is implemented by an active process which is the "task" construct in the Ada language. The computational part of the algorithm is implemented as a wavefront array of computing tasks. These computational...
Show moreThis thesis describes a software model of a Linear Predictive Coding (L.P.C.) that is written in the Ada language. The novel feature of this program is that it attempts to execute the maximum possible number of concurrent arithmetic operations in the L.P.C. algorithm. Each arithmetic operation is implemented by an active process which is the "task" construct in the Ada language. The computational part of the algorithm is implemented as a wavefront array of computing tasks. These computational arrays are driven by a driver task which coordinates the flow of data into and out of the computing surfaces. If the inter process communications time between tasks is small, then this model shows a potential for speed-up. If this be the case, one may conclude that this model is an appropriate implementation for a linear predictive coding.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/14498
- Subject Headings
- Signal processing--Digital techniques, Signal processing, Programming languages (Electronic computers)
- Format
- Document (PDF)
- Title
- An intelligent approach to system identification.
- Creator
- Saravanan, Natarajan, Florida Atlantic University, Duyar, Ahmet, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
System identification methods are frequently used to obtain appropriate models for the purpose of control, fault detection, pattern recognition, prediction, adaptive filtering and other purposes. A number of techniques exist for the identification of linear systems. However, real-world and complex systems are often nonlinear and there exists no generic methodology for the identification of nonlinear systems with unknown structure. A recent approach makes use of highly interconnected networks...
Show moreSystem identification methods are frequently used to obtain appropriate models for the purpose of control, fault detection, pattern recognition, prediction, adaptive filtering and other purposes. A number of techniques exist for the identification of linear systems. However, real-world and complex systems are often nonlinear and there exists no generic methodology for the identification of nonlinear systems with unknown structure. A recent approach makes use of highly interconnected networks of simple processing elements, which can be programmed to approximate nonlinear functions to identify nonlinear dynamic systems. This thesis takes a detailed look at identification of nonlinear systems with neural networks. Important questions in the application of neural networks for nonlinear systems are identified; concerning the excitation properties of input signals, selection of an appropriate neural network structure, estimation of the neural network weights, and the validation of the identified model. These questions are subsequently answered. This investigation leads to a systematic procedure for identification using neural networks and this procedure is clearly illustrated by modeling a complex nonlinear system; the components of the space shuttle main engine. Additionally, the neural network weights are determined by using a general purpose optimization technique known as evolutionary programming which is based on the concept of simulated evolution. The evolutionary programming algorithm is modified to include self-adapting step sizes. The effectiveness of the evolutionary programming algorithm as a general purpose optimization algorithm is illustrated on a test suite of problems including function optimization, neural network weight optimization, optimal control system synthesis and reinforcement learning control.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12371
- Subject Headings
- Neural networks (Computer science), System identification, Nonlinear theories, System analysis, Space shuttles--Electronic equipment, Algorithms--Computer programs
- Format
- Document (PDF)
- Title
- Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study.
- Creator
- Ortiz-Villajos, Jose M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to...
Show moreThe IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to face the task of making these new networks secure against threats and real attacks that were not a part of the previous generation of networks. We present the IMS and other competing frameworks, we analyze the security issues, we present the topic of Security Patterns, we introduce several new patterns, including the basis for a Generic Network pattern, and we apply these concepts to designing a security architecture for a fictitious 3G operator using IMS for the control core.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186763
- Subject Headings
- Electronic digital computers, Programming, Computer networks, Security measures, TCP/IP (Computer network protocol), Security measures, Internet Protocol Multimedia Subsystem (IMS), Security measures, Multimedia communications, Security measures
- Format
- Document (PDF)