5,514 research outputs found

    Automated software development workstation

    Get PDF
    Engineering software development was automated using an expert system (rule-based) approach. The use of this technology offers benefits not available from current software development and maintenance methodologies. A workstation was built with a library or program data base with methods for browsing the designs stored; a system for graphical specification of designs including a capability for hierarchical refinement and definition in a graphical design system; and an automated code generation capability in FORTRAN. The workstation was then used in a demonstration with examples from an attitude control subsystem design for the space station. Documentation and recommendations are presented

    A real-time, dual processor simulation of the rotor system research aircraft

    Get PDF
    A real-time, man-in-the loop, simulation of the rotor system research aircraft (RSRA) was conducted. The unique feature of this simulation was that two digital computers were used in parallel to solve the equations of the RSRA mathematical model. The design, development, and implementation of the simulation are documented. Program validation was discussed, and examples of data recordings are given. This simulation provided an important research tool for the RSRA project in terms of safe and cost-effective design analysis. In addition, valuable knowledge concerning parallel processing and a powerful simulation hardware and software system was gained

    Systems Technology Laboratory (STL) compendium of utilities

    Get PDF
    Multipurpose programs, routines and operating systems are described. Data conversion and character string comparison subroutine are included. Graphics packages, and file maintenance programs are also included

    Optimal Jet Finder

    Get PDF
    We describe a FORTRAN 77 implementation of the optimal jet definition for identification of jets in hadronic final states of particle collisions. We discuss details of the implementation, explain interface subroutines and provide a usage example. The source code is available from http://www.inr.ac.ru/~ftkachov/projects/jets/Comment: version to appear in Comp. Phys. Commun., 36 page

    EasyUC: using EasyCrypt to mechanize proofs of universally composable security

    Get PDF
    We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols within the universally composable (UC) security framework. This allows, for the first time, the mechanization and formal verification of the entire sequence of steps needed for proving simulation-based security in a modular way: Specifying a protocol and the desired ideal functionality; Constructing a simulator and demonstrating its validity, via reduction to hard computational problems; Invoking the universal composition operation and demonstrating that it indeed preserves security. We demonstrate our methodology on a simple example: stating and proving the security of secure message communication via a one-time pad, where the key comes from a Diffie-Hellman key-exchange, assuming ideally authenticated communication. We first put together EasyCrypt-verified proofs that: (a) the Diffie-Hellman protocol UC-realizes an ideal key-exchange functionality, assuming hardness of the Decisional Diffie-Hellman problem, and (b) one-time-pad encryption, with a key obtained using ideal key-exchange, UC-realizes an ideal secure-communication functionality. We then mechanically combine the two proofs into an EasyCrypt-verified proof that the composed protocol realizes the same ideal secure-communication functionality. Although formulating a methodology that is both sound and workable has proven to be a complex task, we are hopeful that it will prove to be the basis for mechanized UC security analyses for significantly more complex protocols and tasks.Accepted manuscrip

    A simulation model for wind energy storage systems. Volume 2: Operation manual

    Get PDF
    A comprehensive computer program (SIMWEST) developed for the modeling of wind energy/storage systems utilizing any combination of five types of storage (pumped hydro, battery, thermal, flywheel, and pneumatic) is described. Features of the program include: a precompiler which generates computer models (in FORTRAN) of complex wind source/storage/application systems, from user specifications using the respective library components; a program which provides the techno-economic system analysis with the respective I/O the integration of system dynamics, and the iteration for conveyance of variables; and capability to evaluate economic feasibility as well as general performance of wind energy systems. The SIMWEST operation manual is presented and the usage of the SIMWEST program and the design of the library components are described. A number of example simulations intended to familiarize the user with the program's operation is given along with a listing of each SIMWEST library subroutine

    A computer aided machining system for the manufacture of three-dimensional surfaces

    Get PDF
    Includes bibliographical references.This thesis describes the design of a computerised system for machining three-dimensional surfaces, more specifically "sculptured surfaces", using an IBM PC and a Bridgeport 3 axis Computer Numerically Controlled (CNC) Milling Machine. There was a twofold objective to the project: To design and develop a milling system; To provide a teaching tool for undergraduate students who wish to further their studies in the concepts of Computer Aided Design and Manufacture (CAD/CAM). Five broad areas are covered: 1. The development of a mathematical algorithm to approximate a sculptured surf ace represented by a set, of surface datapoints in the form of XYZ coordinates. 2. The development of an algorithm to calculate the toolpath to machine the sculptured surface. 3. The development of an algorithm to display the surface and toolpath in three dimensions on the computer screen. 4. The development of an algorithm (the postprocessor) which translates the toolpath into a program suitable for use with the CNC milling machine. 5. The development of a communications algorithm for the direct transmission of the CNC program from the IBM microcomputer to the memory of the CNC computer
    • …
    corecore