WorldWideScience

Sample records for jvm addistant jvm

  1. RHE: A JVM Courseware

    Science.gov (United States)

    Liu, S.; Tang, J.; Deng, C.; Li, X.-F.; Gaudiot, J.-L.

    2011-01-01

    Java Virtual Machine (JVM) education has become essential in training embedded software engineers as well as virtual machine researchers and practitioners. However, due to the lack of suitable instructional tools, it is difficult for students to obtain any kind of hands-on experience and to attain any deep understanding of JVM design. To address…

  2. File list: NoD.Bld.10.AllAg.JVM-2 [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available NoD.Bld.10.AllAg.JVM-2 hg19 No description Blood JVM-2 ERX297415,ERX297446,ERX29740...5,ERX297432,ERX297429,ERX297413,ERX297439 http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/assembled/NoD.Bld.10.AllAg.JVM-2.bed ...

  3. File list: NoD.Bld.50.AllAg.JVM-2 [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available NoD.Bld.50.AllAg.JVM-2 hg19 No description Blood JVM-2 ERX297405,ERX297432,ERX29741...5,ERX297446,ERX297429,ERX297413,ERX297439 http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/assembled/NoD.Bld.50.AllAg.JVM-2.bed ...

  4. Automated Smoke Testing on the JVM with Geb

    CERN Document Server

    CERN. Geneva

    2015-01-01

    to prevent catastrophic failures from reaching the production environment. We will show how we have leveraged Geb -- a browser automation tool built on top of Selenium -- to develop a full suite of smoke tests for CERN's Electronic Document Handling (EDH) system -- a large web application with over 1 million lines of Java code, in production since 1998. Though the tool is aimed for use on the JVM, the concepts that will be presented can be applied in other languages that have wrappers for Selenium. In particular, patterns that can be used to better describe and structure functional/smoke tests, as well as how to integrate these tests with continuous integration systems, such as Atlassian Bamboo, using headless browsers (e.g. PhantomJS) or virtual frame buffers.

  5. Omega 3 fatty acids increase the chemo-sensitivity of B-CLL-derived cell lines EHEB and MEC-2 and of B-PLL-derived cell line JVM-2 to anti-cancer drugs doxorubicin, vincristine and fludarabine.

    Science.gov (United States)

    Fahrmann, Johannes F; Hardman, W Elaine

    2013-03-16

    B-Cell chronic lymphocytic leukemia (CLL) is the most common form of leukemia in the United States. Clinical treatment of CLL is often limited due to drug resistance and severe therapy-induced toxicities. We hypothesized that the omega 3 (n-3) fatty acids, eicosapentaenoic acid (EPA) and/or docosahexaenoic acid (DHA), would increase the sensitivity of malignant B-lymphocytes to anti-cancer drugs doxorubicin, vincristine and/or fludarabine in vitro and that increased sensitivity is achieved by alterations in cell-cycle progression leading to growth inhibition and/or enhanced cell death. We further postulate that enhanced sensitivity is dependent on the formation of lipid peroxides and to the generation of reactive oxygen species (ROS). In the present study, B-CLL-derived leukemic cell lines EHEB and MEC-2 and the B-Prolymphocytic leukemic-derived (PLL) cell line JVM-2 were tested for in vitro sensitivity against doxorubicin, vincristine or fludarabine in the presence or absence of vehicle, arachidonic acid (omega 6), EPA or DHA. Cell cycle analysis and Annexin-V assays were performed to determine cell cycle progression and % apoptotic cells, respectively. Assays for malondialdehyde, a measure of lipid peroxidation, and DCF fluorescence assays, a measure of intracellular ROS, were performed to determine if enhanced sensitivity of cells to the drugs by n-3 was dependent on the formation of ROS. Our results indicated that: 1) EPA and DHA differentially sensitized B-leukemic cell lines EHEB, JVM-2 and MEC-2 to doxorubicin, vincristine and fludarabine in vitro; 2) n-3 alone and with drug treatment increased cell death and induced G2/M arrest in a cell-type specific manner; 3) lipid peroxidation increased in the presence of n-3; 4) there was higher lipid peroxidation in MEC-2 cells in presence of DHA and doxorubicin than with either alone; 5) n-3 increased generation of ROS in MEC-2, and 6) the addition of vitamin-E abrogated the increase in ROS generation and chemo

  6. Optimizing Hash-Array Mapped Tries for Fast and Lean Immutable JVM Collections

    NARCIS (Netherlands)

    M.J. Steindorfer (Michael); J.J. Vinju (Jurgen)

    2015-01-01

    textabstractThe data structures under-pinning collection API (e.g. lists, sets, maps) in the standard libraries of programming languages are used intensively in many applications. The standard libraries of recent Java Virtual Machine languages, such as Clojure or Scala, contain scalable and

  7. Optimizing Hash-Array Mapped Tries for Fast and Lean Immutable JVM Collections

    NARCIS (Netherlands)

    Steindorfer, M.; Vinju, J.J.

    2015-01-01

    The data structures under-pinning collection API (e.g. lists, sets, maps) in the standard libraries of programming languages are used intensively in many applications. The standard libraries of recent Java Virtual Machine languages, such as Clojure or Scala, contain scalable and well-performing immu

  8. Virtual File System Mounting amp Searching With Network JVM For LAN

    Directory of Open Access Journals (Sweden)

    Nikita Kamble

    2015-08-01

    Full Text Available Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and other mobile devices that share resources such as printer or network storage. A LAN is contrasted in principle to a wide area networkWANwhich covers a larger geographic distance and may involve leased telecom circuits while the media for LANs are locally managed. Ethernet are twisted pair cabling amp Wi-Fi are the two most common transmission technologies in use for LAN. The rise of virtualization has fueled the development of virtual LANWLANwhich allows network administrator to logically group network nodes amp partition their networks without the need for major infrastructure changes. In some situations a wireless LAN or Wi-Fi maybe preferable to a wired LAN because of its flexibility amp cost. Companies are asserting WLANs as a replacement for their wired infrastructure as the number of smart phones tablets amp other mobile devices proliferates.

  9. Analysis on the Advantage and Shortcoming in JVM%JVM优点与缺点的深入分析

    Institute of Scientific and Technical Information of China (English)

    兰斌

    2013-01-01

    Java虚拟机是Java程序必不可少的运行环境,并且是Java语言实现跨平台的基础。本文以Java虚拟机的发展历程和使用情况为角度,讨论了Java虚拟机的优点和缺点。%Java virtual machine is essential for the running of Java program environment,and the basis of the cross-platform Java language. This paper is from the angle in the course of development and use of the Java Virtual Machine,to discuss the advantages and disadvantages of the Java Virtual Machine.

  10. Fast and Lean Immutable Multi-Maps on the JVM based on Heterogeneous Hash-Array Mapped Tries

    NARCIS (Netherlands)

    M.J. Steindorfer (Michael); J.J. Vinju (Jurgen)

    2016-01-01

    textabstractAn immutable multi-map is a many-to-many thread-friendly map data structure with expected fast insert and lookup operations. This data structure is used for applications processing graphs or many-to-many relations as applied in static analysis of object-oriented systems. When

  11. One of JIT Compiler's Implementation in JVM%Java虚拟机即时编译器的一种实现原理

    Institute of Scientific and Technical Information of China (English)

    闫伟; 谷建华

    2007-01-01

    深入分析了Kaffe虚拟机的JIT(Just-In-Time)实现原理,以及在JIT中如何利用Trampoline技术来作为跳板达到提高Kaffe虚拟机的执行性能,并通过在i386上结合实例来具体了解Trampoline的实现.最后深入分析了作为JIT核心的翻译器在JIT中如何将字节码映射成为中间码,并翻译成为本地代码的实现原理.

  12. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    that transforms JVM bytecode into Static Single Assignment Form (SSA) and thereby propagates definitions directly to uses. Type checking at control flow merge points can then be performed in a single pass. Our prototype implementation of the new algorithm is faster than the standard JVM bytecode verifier. It has...

  13. Untyped Memory in the Java Virtual Machine

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    We have implemented a virtual execution environment that executes legacy binary code on top of the type-safe Java Virtual Machine by recompiling native code instructions to type-safe bytecode. As it is essentially impossible to infer static typing into untyped machine code, our system emulates...... untyped memory on top of Java’s type system. While this approach allows to execute native code on any off-the-shelf JVM, the resulting runtime performance is poor. We propose a set of virtual machine extensions that add type-unsafe memory objects to JVM. We contend that these JVM extensions do not relax...... Java’s type system as the same functionality can be achieved in pure Java, albeit much less efficiently....

  14. Programming Scala Scalability = Functional Programming + Objects

    CERN Document Server

    Wampler, Dean

    2009-01-01

    Learn how to be more productive with Scala, a new multi-paradigm language for the Java Virtual Machine (JVM) that integrates features of both object-oriented and functional programming. With this book, you'll discover why Scala is ideal for highly scalable, component-based applications that support concurrency and distribution. Programming Scala clearly explains the advantages of Scala as a JVM language. You'll learn how to leverage the wealth of Java class libraries to meet the practical needs of enterprise and Internet projects more easily. Packed with code examples, this book provides us

  15. WCET Analysis of Java Bytecode Featuring Common Execution Environments

    DEFF Research Database (Denmark)

    Luckow, Kasper Søe; Thomsen, Bent; Frost, Christian

    2011-01-01

    We present a novel tool for statically determining the Worst Case Execution Time (WCET) of Java Bytecode-based programs called Tool for Execution Time Analysis of Java bytecode (TetaJ). This tool differentiates itself from existing tools by separating the individual constituents of the execution...... environment into independent components. The prime benefit is that it can be used for execution environments featuring common embedded processors and software implementations of the JVM. TetaJ employs a model checking approach for statically determining WCET where the Java program, the JVM, and the hardware...

  16. WCET Analysis of Java Bytecode Featuring Common Execution Environments

    DEFF Research Database (Denmark)

    Luckow, Kasper Søe; Thomsen, Bent; Frost, Christian

    2011-01-01

    environment into independent components. The prime benefit is that it can be used for execution environments featuring common embedded processors and software implementations of the JVM. TetaJ employs a model checking approach for statically determining WCET where the Java program, the JVM, and the hardware...... are modelled as Networks of Timed Automata (NTA) and given as input to the state-of-the-art UPPAAL model checking tool. The tool is evaluated through a case study based on the classic text-book example of a hard real-time control system in a mine pump. The system is hosted on an execution environment featuring...

  17. VMKit

    DEFF Research Database (Denmark)

    Geoffray, Nicolas; Thomas, Gaël; Lawall, Julia

    2010-01-01

    Managed Runtime Environments (MREs), such as the JVM and the CLI, form an attractive environment for program execution, by providing portability and safety, via the use of a bytecode language and automatic memory management, as well as good performance, via just-in-time (JIT) compilation. Neverth...

  18. Code Specialization for Memory Efficient Hash Tries

    NARCIS (Netherlands)

    Steindorfer, M.; Vinju, J.J.

    2014-01-01

    The hash trie data structure is a common part in standard collection libraries of JVM programming languages such as Clojure and Scala. It enables fast immutable implementations of maps, sets, and vectors, but it requires considerably more memory than an equivalent array-based data structure. This hi

  19. Efficient Immutable Collections

    NARCIS (Netherlands)

    Steindorfer, M.J.

    2017-01-01

    This thesis proposes novel and efficient data structures, suitable for immutable collection libraries, that carefully balance memory footprint and runtime performance of operations, and are aware of constraints and platform co-design challenges on the Java Virtual Machine (JVM). Collection data stru

  20. A new Java Thread model for concurrent programming of real-time systems

    NARCIS (Netherlands)

    Hilderink, Gerald; Broenink, Jan; Bakkers, André

    1998-01-01

    The Java ™ Virtual Machine (JVM) provides a high degree of platform independence, but being an interpreter, Java has a poor system performance. New compiler techniques and Java processors will gradually improve the performance of Java, but despite these developments, Java is still far from real-time

  1. A new Java Thread model for concurrent programming of real-time systems

    NARCIS (Netherlands)

    Hilderink, G.H.; Broenink, Johannes F.; Bakkers, André

    1998-01-01

    The Java ™ Virtual Machine (JVM) provides a high degree of platform independence, but being an interpreter, Java has a poor system performance. New compiler techniques and Java processors will gradually improve the performance of Java, but despite these developments, Java is still far from

  2. JaVa Applet编程技巧

    Institute of Scientific and Technical Information of China (English)

    吴建明

    1999-01-01

    @@ 1 Java Applet概述 Java程序分为两类:Java小程序(Applet)和Java应用程序(Application).Java Applet嵌入WWW的页面,作为页面的组成部分被下载,并能运行在实现Java虚拟机(JVM)的Web浏览器中.

  3. Evaluating real-time Java for mission-critical large-scale embedded systems

    Science.gov (United States)

    Sharp, D. C.; Pla, E.; Luecke, K. R.; Hassan, R. J.

    2003-01-01

    This paper describes benchmarking results on an RT JVM. This paper extends previously published results by including additional tests, by being run on a recently available pre-release version of the first commercially supported RTSJ implementation, and by assessing results based on our experience with avionics systems in other languages.

  4. HVM-TP: A Time Predictable, Portable Java Virtual Machine for Hard Real-Time Embedded Systems

    DEFF Research Database (Denmark)

    Luckow, Kasper Søe; Thomsen, Bent; Korsholm, Stephan Erbs

    2014-01-01

    We present HVMTIME; a portable and time predictable JVM implementation with applications in resource-constrained hard real-time embedded systems. In addition, it implements the Safety Critical Java (SCJ) Level 1 specification. Time predictability is achieved by a combination of time predictable...

  5. Streaming Pool: reuse, combine and create reactive streams with pleasure

    CERN Document Server

    CERN. Geneva

    2017-01-01

    When connecting together heterogeneous and complex systems, it is not easy to exchange data between components. Streams of data are successfully used in industry in order to overcome this problem, especially in the case of "live" data. Streams are a specialization of the Observer design pattern and they provide asynchronous and non-blocking data flow. The ongoing effort of the ReactiveX initiative is one example that demonstrates how demanding this technology is even for big companies. Bridging the discrepancies of different technologies with common interfaces is already done by the Reactive Streams initiative and, in the JVM world, via reactive-streams-jvm interfaces. Streaming Pool is a framework for providing and discovering reactive streams. Through the mechanism of dependency injection provided by the Spring Framework, Streaming Pool provides a so called Discovery Service. This object can discover and chain streams of data that are technologically agnostic, through the use of Stream IDs. The stream to ...

  6. Hardware Objects for Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Thalinger, Christian; Korsholm, Stephan

    2008-01-01

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... an underlying middleware is an attractive architecture. When running the JVM on bare metal, we need access to I/O devices from Java; therefore we investigate a safe and efficient mechanism to represent I/O devices as first class Java objects, where device registers are represented by object fields. Access...... to those registers is safe as Java’s type system regulates it. The access is also fast as it is directly performed by the bytecodes getfield and putfield. Hardware objects thus provide an object-oriented abstraction of low-level hardware devices. As a proof of concept, we have implemented hardware objects...

  7. Hardware Objects for Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Thalinger, Christian; Korsholm, Stephan

    2008-01-01

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... an underlying middleware is an attractive architecture. When running the JVM on bare metal, we need access to I/O devices from Java; therefore we investigate a safe and efficient mechanism to represent I/O devices as first class Java objects, where device registers are represented by object fields. Access...... to those registers is safe as Java’s type system regulates it. The access is also fast as it is directly performed by the bytecodes getfield and putfield. Hardware objects thus provide an object-oriented abstraction of low-level hardware devices. As a proof of concept, we have implemented hardware objects...

  8. An abstract class loader for the SSP and its implementation in TL.

    Energy Technology Data Exchange (ETDEWEB)

    Wickstrom, Gregory Lloyd; Winter, Victor Lono (University of Nebraska at Omaha, Omaha, NE); Fraij, Fares (University of Texas at El Paso, El Paso, TX); Roach, Steve (University of Texas at El Paso, El Paso, TX); Beranek, Jason (University of Nebraska at Omaha, Omaha, NE)

    2004-08-01

    The SSP is a hardware implementation of a subset of the JVM for use in high consequence embedded applications. In this context, a majority of the activities belonging to class loading, as it is defined in the specification of the JVM, can be performed statically. Static class loading has the net result of dramatically simplifying the design of the SSP as well as increasing its performance. Due to the high consequence nature of its applications, strong evidence must be provided that all aspects of the SSP have been implemented correctly. This includes the class loader. This article explores the possibility of formally verifying a class loader for the SSP implemented in the strategic programming language TL. Specifically, an implementation of the core activities of an abstract class loader is presented and its verification in ACL2 is considered.

  9. Program Synthesizes UML Sequence Diagrams

    Science.gov (United States)

    Barry, Matthew R.; Osborne, Richard N.

    2006-01-01

    A computer program called "Rational Sequence" generates Universal Modeling Language (UML) sequence diagrams of a target Java program running on a Java virtual machine (JVM). Rational Sequence thereby performs a reverse engineering function that aids in the design documentation of the target Java program. Whereas previously, the construction of sequence diagrams was a tedious manual process, Rational Sequence generates UML sequence diagrams automatically from the running Java code.

  10. A new Java Thread model for concurrent programming of real-time systems

    OpenAIRE

    Hilderink, G.H.; Broenink, Johannes F.; Bakkers, André

    1998-01-01

    The Java ™ Virtual Machine (JVM) provides a high degree of platform independence, but being an interpreter, Java has a poor system performance. New compiler techniques and Java processors will gradually improve the performance of Java, but despite these developments, Java is still far from real-time. We propose the Communicating Java Threads (CJT) model, which eliminates several shortcomings, such as Java's non-deterministic behavior, Java's monitor weakness, and lack of reactiveness for real...

  11. Development of Dynamic Coupling Measurement of Distributed Object Oriented Software Based on Trace Events

    Directory of Open Access Journals (Sweden)

    S. Babu

    2012-02-01

    Full Text Available Software metrics are increasingly playing a central role in the planning and control of softwaredevelopment projects. Coupling measures have important applications in software development andmaintenance. Existing literature on software metrics is mainly focused on centralized systems, while workin the area of distributed systems, particularly in service-oriented systems, is scarce. Distributed systemswith service oriented components are even more heterogeneous networking and execution environment.Traditional coupling measures take into account only “static” couplings. They do not account for“dynamic” couplings due to polymorphism and may significantly underestimate the complexity of softwareand misjudge the need for code inspection, testing and debugging. This is expected to result in poorpredictive accuracy of the quality models in distributed Object Oriented systems that utilize static couplingmeasurements. In order to overcome these issues, we propose a hybrid model in Distributed ObjectOriented Software for measure the coupling dynamically. In the proposed method, there are three stepssuch as Instrumentation process, Post processing and Coupling measurement. Initially the instrumentationprocess is done. In this process the instrumented JVM that has been modified to trace method calls. Duringthis process, three trace files are created namely .prf, .clp, .svp. In the second step, the information in thesefile are merged. At the end of this step, the merged detailed trace of each JVM contains pointers to themerged trace files of the other JVM such that the path of every remote call from the client to the server canbe uniquely identified. Finally, the coupling metrics are measured dynamically. The implementation resultsshow that the proposed system will effectively measure the coupling metrics dynamically.

  12. Java EE 7 handbook

    CERN Document Server

    Pilgrim, Peter A

    2013-01-01

    Java EE 7 Handbook is an example based tutorial with descriptions and explanations.""Java EE 7 Handbook"" is for the developer, designer, and architect aiming to get acquainted with the Java EE platform in its newest edition. This guide will enhance your knowledge about the Java EE 7 platform. Whether you are a long-term Java EE (J2EE) developer or an intermediate level engineer on the JVM with just Java SE behind you, this handbook is for you, the new contemporary Java EE 7 developer!

  13. Infraestructura para la comunicación entre componentes Java en el estilo arquitectónico C2

    OpenAIRE

    Soriano Salvador, Enrique; Muñoz Fernandez, María Isabel; Pérez Martínez, Jorge Enrique

    2004-01-01

    En este trabajo se describe el diseñno y la implementación de una infraestructura para la comunicación entre componentes que sigan el estilo arquitectóonico C2 sobre una plataforma Java. Un requisito de esta infraestructura es que componentes y conectores se ejecuten cada uno en su propia máquina virtual (JVM) en el mismo nodo o en nodos diferentes. Se ha diseñado un conjunto de clases que proporcionan mecanismos para la comunicación entre componentes y conectores C2. Como parte del trabajo, ...

  14. Moralidade e homicídio: um estudo sobre a motivação do transgressor Morality and homicide: a study on the motivation of the transgressor

    Directory of Open Access Journals (Sweden)

    Luciana Souza Borges

    2006-01-01

    Full Text Available Investigamos os juízos de representação da realidade (JRR e de valor moral (JVM de 20 homens homicidas (30 a 49 anos, acerca da razão do crime, à época do homicídio e no momento atual. Realizamos entrevistas individuais e verificamos que: o JRR mais apontado, no presente e no passado, foi a agressão física sofrida, justificada no presente principalmente pelo fato de o agressor ter-se sentido humilhado e, no passado, pelo fato de ter querido vingar-se e pelas características próprias, dele ou da vítima; o JVM mais mencionado no passado foi o de que as razões estavam certas, devido a características dos entrevistados ou das vítimas, pelas humilhações sofridas ou porque precisavam defender uma vida, ao passo que no presente o juízo mais citado pelos entrevistados foi o de que estavam errados os motivos, em face das conseqüências negativas do crime para eles e dos argumentos religiosos.We investigated the judgment of representation of reality (JRR, and the judgment of moral value (JVM of 20 homicidal subjects (30 to 49 as to the reasons of the crime, at the time of the homicide and at the present moment. Individual interviews were carried out. We verified that the most indicated JRR, in the present and in the past, was the physical aggression suffered by the aggressor, justified in the present because the aggressor felt humiliated and, in the past, for having wished to take revenge due to his or the victim's characteristics; the most mentioned JVM in the past was that that their reasons were right due to the characteristics of the interviewees or those of the victims, for the humiliations suffered or because they needed to defend a life, whereas in the present, the most cited judgment was that their motives were wrong, in face of the negative consequences, and religious arguments.

  15. HVMTP: A time predictable and portable java virtual machine for hard real-time embedded systems

    DEFF Research Database (Denmark)

    Luckow, Kasper Søe; Thomsen, Bent; Korsholm, Stephan

    2016-01-01

    We present HVMTP, a time predictable and portable Java virtual machine (JVM) implementation with applications in resource-constrained, hard real-time embedded systems, which implements all levels of the safety critical Java (SCJ) specification. Time predictability is achieved by a combination...... can be obtained using the tool TETASARTSJVM. The timing model readily integrates with the rest of the TETASARTS tool set for temporal verification of SCJ systems. We will also show how a complete timing scheme in terms of safe worst-case execution times and best-case execution times of the Java...

  16. DSF: A Common Platform for Distributed Systems Research and Development

    Science.gov (United States)

    Tang, Chunqiang

    This paper presents Distributed Systems Foundation (DSF), a common platform for distributed systems research and development. It can run a distributed algorithm written in Java under multiple execution modes—simulation, massive multi-tenancy, and real deployment. DSF provides a set of novel features to facilitate testing and debugging, including chaotic timing test and time travel debugging with mutable replay. Unlike existing research prototypes that offer advanced debugging features by hacking programming tools, DSF is written entirely in Java, without modifications to any external tools such as JVM, Java runtime library, compiler, linker, system library, OS, or hypervisor. This simplicity stems from our goal of making DSF not only a research prototype but more importantly a production tool. Experiments show that DSF is efficient and easy to use. DSF's massive multi-tenancy mode can run 4,000 OS-level threads in a single JVM to concurrently execute (as opposed to simulate) 1,000 DHT nodes in real-time.

  17. An Optimized Technique of Increasing the Performance of Network Adapter on EML Layer

    Directory of Open Access Journals (Sweden)

    Prashanth L

    2012-08-01

    Full Text Available Simple Network Adapter initially which acts as an interface between the Transaction server and Network Elements communicates over the channel through tcppdu. Presently the disadvantage being involved in tcppdu is to maintain the channel contention, reservation of channel bandwidth. The disadvantage being involved is certain features, version of network elements communicates by receiving the xml over the socket. So, it’s not possible to change the entire framework, but by updating the framework an XML Over Socket(XOS formation should be supported. The XOS implementation is being performed using Java language through mainly in JVM. Such that by this deployment machines would become easier and form a good communication gap between them. This simple network adapter being developed should support operations of the North bounded server and gives an established authorized, secured, reliable portal. The interface being developed should provide a good performance in meeting the network demands and operated conversions of respective objects

  18. Isabelle/PIDE as Platform for Educational Tools

    CERN Document Server

    Wenzel, Makarius; 10.4204/EPTCS.79.9

    2012-01-01

    The Isabelle/PIDE platform addresses the question whether proof assistants of the LCF family are suitable as technological basis for educational tools. The traditionally strong logical foundations of systems like HOL, Coq, or Isabelle have so far been counter-balanced by somewhat inaccessible interaction via the TTY (or minor variations like the well-known Proof General / Emacs interface). Thus the fundamental question of math education tools with fully-formal background theories has often been answered negatively due to accidental weaknesses of existing proof engines. The idea of "PIDE" (which means "Prover IDE") is to integrate existing provers like Isabelle into a larger environment, that facilitates access by end-users and other tools. We use Scala to expose the proof engine in ML to the JVM world, where many user-interfaces, editor frameworks, and educational tools already exist. This shall ultimately lead to combined mathematical assistants, where the logical engine is in the background, without obstruc...

  19. A Java-based control system for the Orsay tandem accelerator

    Indian Academy of Sciences (India)

    Dominique Delbourg; Gérard Penillault; Tran Khan Tuong; Martial Decourt; Nicole Borome; Henri Harroch; Bertrand Lessellier; Bernard Waast; Jean Pierre Mouffron

    2002-12-01

    A new control system was designed for the tandem MP-9 at Orsay. Because of the existing devices located on high voltage platforms and the lack of space inside the accelerator, in-house electronic cards based on micro-controllers and an optical fieldbus were developed to collect data. VME processors under VxWorks, a real time operating system, manage the fieldbus, concentrate the accelerator information and transmit it to the supervisory software through the ethernet network. This software consists of a collection of Java virtual machines (JVM) running on several Unix work-stations and PCs under Windows. Some of the Java virtual machines manage apparatus, instruments, local display and connections to an object database and VME concentrators. Others manage general synoptics. JVMs communicate between themselves with RMI protocol and JRPC with VME concentrators. So the supervisory software can be spread over several control stations throughout the network.

  20. Towards High Performance Processing In Modern Java Based Control Systems

    CERN Document Server

    Misiowiec, M; Buttner, M

    2011-01-01

    CERN controls software is often developed on Java foundation. Some systems carry out a combination of data, network and processor intensive tasks within strict time limits. Hence, there is a demand for high performing, quasi real time solutions. Extensive prototyping of the new CERN monitoring and alarm software required us to address such expectations. The system must handle dozens of thousands of data samples every second, along its three tiers, applying complex computations throughout. To accomplish the goal, a deep understanding of multithreading, memory management and interprocess communication was required. There are unexpected traps hidden behind an excessive use of 64 bit memory or severe impact on the processing flow of modern garbage collectors. Tuning JVM configuration significantly affects the execution of the code. Even more important is the amount of threads and the data structures used between them. Accurately dividing work into independent tasks might boost system performance. Thorough profili...

  1. Dependable software through higher-order strategic programming.

    Energy Technology Data Exchange (ETDEWEB)

    Winter, Victor Lono (University of Nebraska at Omaha); Fraij, Fares (University of Texas at El Paso); Roach, Steve (University of Texas at El Paso)

    2004-03-01

    Program transformation is a restricted form of software construction that can be amenable to formal verification. When successful, the nature of the evidence provided by such a verification is considered strong and can constitute a major component of an argument that a high-consequence or safety-critical system meets its dependability requirements. This article explores the application of novel higher-order strategic programming techniques to the development of a portion of a class loader for a restricted implementation of the Java Virtual Machine (JVM). The implementation is called the SSP and is intended for use in high-consequence safety-critical embedded systems. Verification of the strategic program using ACL2 is also discussed.

  2. Java Dynamic Class Loading Mechanism Analysis and Its Application%Java动态类加载机制分析及其应用①

    Institute of Scientific and Technical Information of China (English)

    崔行臣; 赵佟

    2013-01-01

    In order to load Java class file during the Java application runtime and without affecting the normal operation of other functional modules, the realization of Java dynamic class loading method is given based on the java virtual machine (JVM) mechanism. Java Class Loader architecture, theory of dynamic class loading mechanism, the implementation process are analyzed, and which are applied to the file release module of web site management platform system. The file release module is designed to make static web pages and website management system linked. Through the custom loader to loading encryption of Java class files. In a hot swap way to implement the deployment of secondary website, enhance the site management platform's flexibility and expansibility.%  Java 虚拟机(JVM)中的类加载机制可以在 Java 应用程序运行期间动态加载类文件,而不影响其它功能模块的正常运行。通过对 Java 类加载器的层次体系结构,动态类加载机制原理、实现过程进行分析,将Java动态类加载机制应用到高校网站管理平台的文件发布模块中,使得设计好的静态网页和后台管理系统相关联,通过自定义加载器来加载加密过的 Java 类文件。这样以可插拔的方式快速的部署二级网站,增强了网站管理平台的灵活性和可扩展性。

  3. Runtime Engine for Dynamic Profile Guided Stride Prefetching

    Institute of Scientific and Technical Information of China (English)

    Qiong Zou; Xiao-Feng Li; Long-Bing Zhang

    2008-01-01

    Stride prefetching is recognized as an important technique to improve memory access performance. The prior work usually profiles and/or analyzes the program behavior offtine, and uses the identified stride patterns to guide the compilation process by injecting the prefeteh instructions at appropriate places. There are some researches trying to enable stride prefetching in runtime systems with online profiling, but they either cannot discover cross-procedural prefetch opportunity, or require special supports in hardware or garbage collection. In this paper, we present a prefetch engine for JVM (Java Virtual Machine). It firstly identifies the candidate load operations during just-in-time (JIT) compilation,and then instruments the compiled code to profile the addresses of those loads. The runtime profile is collected in a trace buffer, which triggers a prefetch controller upon a protection fault. The prefetch controller analyzes the trace to discover any stride patterns, then modifies the compiled code to inject the prefetch instructions in place of the instrumentations.One of the major advantages of this engine is that, it can detect striding loads in any virtual code places for both regul arand irregular code, not being limited with plain loop or procedure scopes. Actually we found the cross-procedural patterns take about 30% of all the prefetchings in the representative Java benchmarks. Another major advantage of the engine is that it has runtime overhead much smaller (the maximal is less than 4.0%) than the benefits it brings. Our evaluation with Apache ttarmony JVM shows that the engine can achieve an average 6.2% speed-up with SPECJVM98 and DaCapo on Intel Pentium 4 platform, in spite of the runtime overhead.

  4. Building a High Performance Metadata Broker using Clojure, NoSQL and Message Queues

    Science.gov (United States)

    Truslove, I.; Reed, S.

    2013-12-01

    In practice, Earth and Space Science Informatics often relies on getting more done with less: fewer hardware resources, less IT staff, fewer lines of code. As a capacity-building exercise focused on rapid development of high-performance geoinformatics software, the National Snow and Ice Data Center (NSIDC) built a prototype metadata brokering system using a new JVM language, modern database engines and virtualized or cloud computing resources. The metadata brokering system was developed with the overarching goals of (i) demonstrating a technically viable product with as little development effort as possible, (ii) using very new yet very popular tools and technologies in order to get the most value from the least legacy-encumbered code bases, and (iii) being a high-performance system by using scalable subcomponents, and implementation patterns typically used in web architectures. We implemented the system using the Clojure programming language (an interactive, dynamic, Lisp-like JVM language), Redis (a fast in-memory key-value store) as both the data store for original XML metadata content and as the provider for the message queueing service, and ElasticSearch for its search and indexing capabilities to generate search results. On evaluating the results of the prototyping process, we believe that the technical choices did in fact allow us to do more for less, due to the expressive nature of the Clojure programming language and its easy interoperability with Java libraries, and the successful reuse or re-application of high performance products or designs. This presentation will describe the architecture of the metadata brokering system, cover the tools and techniques used, and describe lessons learned, conclusions, and potential next steps.

  5. Long-term storage and long-distance transportation of hydrogen by use of catalyst-addisted decalin dehydrogenation/naphthalene hydrogenation pair; Dekarin dassuiso/nafutarensuisoka shokubai hannotai wo mochiiru suiso no chokikan chozo/chokyori yuso

    Energy Technology Data Exchange (ETDEWEB)

    Liu, C.; Sakaguchi, M.; Saito, Y. [Scince Univ.of Tokyo, Tokyo (Japan)

    1997-06-01

    To enable taking in and out hydrogen with little energy consumption, it is sufficient if decalin is dehydrogenated to naphthalene under moderate heating condition. It is found that carbon supporting metal catalyst in liquid film state shows extremely high dehydrogeno-aromatization activity of decalin. The result of comparison with liquid hydrogen or metal hydride as media for hydrogen storage and transportation media is reported. The platinum-tungsten composite metal catalyst is prepared from an aqueous solution of K2PtC16 and Li2WO4 in the ratio of 1 to 1 so as to achieve 5wt-metal% carbon supporting. When hydrogen and naphthalene are discharged from the liquid phase reaction medium to the vapor phase and solid phase, respectively, under boiling and refluxing conditions, hydrogen is produced steadily by heating at 200 to 210degC. If economical efficiency is ignored, development of an inter-season energy storage system is desired to be developed which can be used in the season between summertime when sufficient hydrogen is obtained by photovoltaic power generation and electrolysis of water and wintertime when heat source is obtained by catalytic combustion of hydrogen. 11 refs., 4 figs., 4 tabs.

  6. Towards a Certified Lightweight Array Bound Checker for Java Bytecode

    Science.gov (United States)

    Pichardie, David

    2009-01-01

    Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These dynamic checks are however expensive and several static analysis techniques have been proposed to eliminate explicit bounds checks. Such analyses require advanced numerical and symbolic manipulations that 1) penalize bytecode loading or dynamic compilation, 2) complexify the trusted computing base. Following the Foundational Proof Carrying Code methodology, our goal is to provide a lightweight bytecode verifier for eliminating array bound checks that is both efficient and trustable. In this work, we define a generic relational program analysis for an imperative, stackoriented byte code language with procedures, arrays and global variables and instantiate it with a relational abstract domain as polyhedra. The analysis has automatic inference of loop invariants and method pre-/post-conditions, and efficient checking of analysis results by a simple checker. Invariants, which can be large, can be specialized for proving a safety policy using an automatic pruning technique which reduces their size. The result of the analysis can be checked efficiently by annotating the program with parts of the invariant together with certificates of polyhedral inclusions. The resulting checker is sufficiently simple to be entirely certified within the Coq proof assistant for a simple fragment of the Java bytecode language. During the talk, we will also report on our ongoing effort to scale this approach for the full sequential JVM.

  7. State of security in Elasticsearch

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Security is an often understated problem in high growth emerging branches of IT like big data and IoT. Elasticsearch is a great example because support for security not only came late, but it's a quite convoluted, non-open, and very expensive solution. Learn how Simone Scarduzio lead his Open Source project ReadonlyREST to become the solution of choice for many. From hackathon hustlers to Fortune500 corporates. ReadonlyREST is simple yet powerful because it leverages the concept of access control list (yes, like firewalls). We'll go through some creative use cases and business concepts made possible by the creative use of ReadonlyREST and its configuration model. About the speaker Simone Scarduzio has a 8 years background in software engineering, spanning from mobile messaging clusters to Cloud-first startups. He wrote the first book about Vert.x, a JVM micro services framework. Recently, he helped Thomson Reuters re-architect legacy back ends into secure, polyglot, resilient distributed systems. Today, ...

  8. Isabelle/PIDE as Platform for Educational Tools

    Directory of Open Access Journals (Sweden)

    Makarius Wenzel

    2012-02-01

    Full Text Available The Isabelle/PIDE platform addresses the question whether proof assistants of the LCF family are suitable as technological basis for educational tools. The traditionally strong logical foundations of systems like HOL, Coq, or Isabelle have so far been counter-balanced by somewhat inaccessible interaction via the TTY (or minor variations like the well-known Proof General / Emacs interface. Thus the fundamental question of math education tools with fully-formal background theories has often been answered negatively due to accidental weaknesses of existing proof engines. The idea of "PIDE" (which means "Prover IDE" is to integrate existing provers like Isabelle into a larger environment, that facilitates access by end-users and other tools. We use Scala to expose the proof engine in ML to the JVM world, where many user-interfaces, editor frameworks, and educational tools already exist. This shall ultimately lead to combined mathematical assistants, where the logical engine is in the background, without obstructing the view on applications of formal methods, formalized mathematics, and math education in particular.

  9. On models of the genetic code generated by binary dichotomic algorithms.

    Science.gov (United States)

    Gumbel, Markus; Fimmel, Elena; Danielli, Alberto; Strüngmann, Lutz

    2015-02-01

    In this paper we introduce the concept of a BDA-generated model of the genetic code which is based on binary dichotomic algorithms (BDAs). A BDA-generated model is based on binary dichotomic algorithms (BDAs). Such a BDA partitions the set of 64 codons into two disjoint classes of size 32 each and provides a generalization of known partitions like the Rumer dichotomy. We investigate what partitions can be generated when a set of different BDAs is applied sequentially to the set of codons. The search revealed that these models are able to generate code tables with very different numbers of classes ranging from 2 to 64. We have analyzed whether there are models that map the codons to their amino acids. A perfect matching is not possible. However, we present models that describe the standard genetic code with only few errors. There are also models that map all 64 codons uniquely to 64 classes showing that BDAs can be used to identify codons precisely. This could serve as a basis for further mathematical analysis using coding theory, for example. The hypothesis that BDAs might reflect a molecular mechanism taking place in the decoding center of the ribosome is discussed. The scan demonstrated that binary dichotomic partitions are able to model different aspects of the genetic code very well. The search was performed with our tool Beady-A. This software is freely available at http://mi.informatik.hs-mannheim.de/beady-a. It requires a JVM version 6 or higher.

  10. Research on dynamic update transaction for Java classes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shi; HUANG Linpeng

    2007-01-01

    Dynamic software updating is critical for many systems that must provide continuous service.In addition,the Java language is gaining increasing popularity in developing distributed systems.Most previous works on updating are concerned with safely updating one class every time.It has many limitations on updating classes,such as not allowing deleting methods invoked in other classes.In this paper,the update transaction is purposed to dynamically update the class set,and some of its properties are discussed,such as atomicity,consistency,isolation,and durability (ACID).Then the property of type-safety is proven formally.In order to update without changing the Java Virtual Ma chine (JVM) and the Java programming language,this paper proposes a new implementation method.The method makes use of the Java class loading mechanism and reflection mechanism.We also present how to design an updatable Java program and a Java updating program.At the end of the paper,an experiment is made for analysis.

  11. Using Akka Platform in Unidentified Falling Object Detection on the LHC.

    CERN Document Server

    Motesnitsalis, Evangelos

    2013-01-01

    During my participation in the CERN Summer Student Program 2013, I worked under the Technology Department of CERN and, more specifically, in the Machine Protection and Electrical Integrity (MPE) Group. The MPE Group supports LHC operation and maintains state‐of‐the art technology for magnet circuit protection and interlock systems for the present and future accelerators, magnet test facilities and CERN hosted experiments. Within this context, we developed an application that parallelizes the Unidentified Falling Object Detection Algorithm on the LHC Operational Data Analysis Software. For this reason, we used a JVM-based toolkit, named Akka, which parallelizes the execution by creating a number of actors that run simultaneously. The results of the new approach are presented on the last part of this report. They tend to be quite interesting and promising as we managed to reduce the execution time of the analysis by a factor of 10 on a local machine and the first attempts to execute the program on a cluster...

  12. Model Checking Real Time Java Using Java PathFinder

    Science.gov (United States)

    Lindstrom, Gary; Mehlitz, Peter C.; Visser, Willem

    2005-01-01

    The Real Time Specification for Java (RTSJ) is an augmentation of Java for real time applications of various degrees of hardness. The central features of RTSJ are real time threads; user defined schedulers; asynchronous events, handlers, and control transfers; a priority inheritance based default scheduler; non-heap memory areas such as immortal and scoped, and non-heap real time threads whose execution is not impeded by garbage collection. The Robust Software Systems group at NASA Ames Research Center has JAVA PATHFINDER (JPF) under development, a Java model checker. JPF at its core is a state exploring JVM which can examine alternative paths in a Java program (e.g., via backtracking) by trying all nondeterministic choices, including thread scheduling order. This paper describes our implementation of an RTSJ profile (subset) in JPF, including requirements, design decisions, and current implementation status. Two examples are analyzed: jobs on a multiprogramming operating system, and a complex resource contention example involving autonomous vehicles crossing an intersection. The utility of JPF in finding logic and timing errors is illustrated, and the remaining challenges in supporting all of RTSJ are assessed.

  13. Terra Harvest software architecture

    Science.gov (United States)

    Humeniuk, Dave; Klawon, Kevin

    2012-06-01

    Under the Terra Harvest Program, the DIA has the objective of developing a universal Controller for the Unattended Ground Sensor (UGS) community. The mission is to define, implement, and thoroughly document an open architecture that universally supports UGS missions, integrating disparate systems, peripherals, etc. The Controller's inherent interoperability with numerous systems enables the integration of both legacy and future UGS System (UGSS) components, while the design's open architecture supports rapid third-party development to ensure operational readiness. The successful accomplishment of these objectives by the program's Phase 3b contractors is demonstrated via integration of the companies' respective plug-'n'-play contributions that include controllers, various peripherals, such as sensors, cameras, etc., and their associated software drivers. In order to independently validate the Terra Harvest architecture, L-3 Nova Engineering, along with its partner, the University of Dayton Research Institute, is developing the Terra Harvest Open Source Environment (THOSE), a Java Virtual Machine (JVM) running on an embedded Linux Operating System. The Use Cases on which the software is developed support the full range of UGS operational scenarios such as remote sensor triggering, image capture, and data exfiltration. The Team is additionally developing an ARM microprocessor-based evaluation platform that is both energy-efficient and operationally flexible. The paper describes the overall THOSE architecture, as well as the design decisions for some of the key software components. Development process for THOSE is discussed as well.

  14. APINetworks Java. A Java approach to the efficient treatment of large-scale complex networks

    Science.gov (United States)

    Muñoz-Caro, Camelia; Niño, Alfonso; Reyes, Sebastián; Castillo, Miriam

    2016-10-01

    We present a new version of the core structural package of our Application Programming Interface, APINetworks, for the treatment of complex networks in arbitrary computational environments. The new version is written in Java and presents several advantages over the previous C++ version: the portability of the Java code, the easiness of object-oriented design implementations, and the simplicity of memory management. In addition, some additional data structures are introduced for storing the sets of nodes and edges. Also, by resorting to the different garbage collectors currently available in the JVM the Java version is much more efficient than the C++ one with respect to memory management. In particular, the G1 collector is the most efficient one because of the parallel execution of G1 and the Java application. Using G1, APINetworks Java outperforms the C++ version and the well-known NetworkX and JGraphT packages in the building and BFS traversal of linear and complete networks. The better memory management of the present version allows for the modeling of much larger networks.

  15. Protocolos de Descubrimiento de Servicio

    Directory of Open Access Journals (Sweden)

    José G Palacio Velásquez

    2011-01-01

    Full Text Available Resumen:Los servicios se pueden definir como aplicaciones que se encuentran disponibles para que otras aplicaciones llamadas clientes pueden hacer usos de las funciones de dicho servidor, para la comunicación con dichos servidores se hace necesario que los clientes sepan cuáles de los equipos que se encuentran disponibles brindan servicios y cual servicio brinda cada uno, esto exige la configuración del cliente para que este puede realizar la comunicación con el respectivo servidor. Este tipo de configuración exige conocer que servicios se están brindando en la red y quien los brinda, pero qué sucede si los clientes no saben quiénes son los servidores y peor aún qué sucedería si los clientes no saben qué servicios se están prestando, en este caso aparecen unos sistemas que permiten descubrir qué servicios se encuentran disponibles en una red. Los protocolos de descubrimiento de servicios están pensados precisamente para poder llevar a cabo estas actividades, buscando generar redes que se configuren de manera automática. Protocolos como el SDP usado por el sistema Bluetooth, Jini de Sun Microsystem, Universal Plug and Play de Microsoft son ejemplos claros de dichos protocolos, los cuales abarcaremos en este artículo.Palabras claves:Protocolos de Descubrimiento de Servicios, Bluetooth, Jini, UPnP, Salutation, SDP, SLP, SSDP, TCP/IP, RMI, JVM, RPC, HTTPU, HTTPMU.Abstract:The services can be defined as applications that are available for other applications called customers can use the functions of a server, for communicating with those servers is necessary for customers to know which of the teams that provide services are available and what each service provides, this requires client configuration so that this can make communication with the respective server. This configuration requires knowing what services are being provided on the network and who offers them, but what happens if customers do not know who the servers and even

  16. Proper design of silica nanoparticles combines high brightness, lack of cytotoxicity and efficient cell endocytosis

    Science.gov (United States)

    Rampazzo, Enrico; Voltan, Rebecca; Petrizza, Luca; Zaccheroni, Nelsi; Prodi, Luca; Casciano, Fabio; Zauli, Giorgio; Secchiero, Paola

    2013-08-01

    Silica-based luminescent nanoparticles (SiNPs) show promising prospects in nanomedicine in light of their chemical properties and versatility. In this study, we have characterized silica core-PEG shell SiNPs derivatized with PEG moieties (NP-PEG), with external amino- (NP-PEG-amino) or carboxy-groups (NP-PEG-carbo), both in cell cultures as well as in animal models. By using different techniques, we could demonstrate that these SiNPs were safe and did not exhibit appreciable cytotoxicity in different relevant cell models, of normal or cancer cell types, growing either in suspension (JVM-2 leukemic cell line and primary normal peripheral blood mononuclear cells) or in adherence (human hepatocarcinoma Huh7 and umbilical vein endothelial cells). Moreover, by multiparametric flow cytometry, we could demonstrate that the highest efficiency of cell uptake and entry was observed with NP-PEG-amino, with a stable persistence of the fluorescence signal associated with SiNPs in the loaded cell populations both in vitro and in vivo settings suggesting this as an innovative method for cell traceability and detection in whole organisms. Finally, experiments performed with the endocytosis inhibitor Genistein clearly suggested the involvement of a caveolae-mediated pathway in SiNP endocytosis. Overall, these data support the safe use of these SiNPs for diagnostic and therapeutic applications.Silica-based luminescent nanoparticles (SiNPs) show promising prospects in nanomedicine in light of their chemical properties and versatility. In this study, we have characterized silica core-PEG shell SiNPs derivatized with PEG moieties (NP-PEG), with external amino- (NP-PEG-amino) or carboxy-groups (NP-PEG-carbo), both in cell cultures as well as in animal models. By using different techniques, we could demonstrate that these SiNPs were safe and did not exhibit appreciable cytotoxicity in different relevant cell models, of normal or cancer cell types, growing either in suspension (JVM-2

  17. Model Checker for Java Programs

    Science.gov (United States)

    Visser, Willem

    2007-01-01

    Java Pathfinder (JPF) is a verification and testing environment for Java that integrates model checking, program analysis, and testing. JPF consists of a custom-made Java Virtual Machine (JVM) that interprets bytecode, combined with a search interface to allow the complete behavior of a Java program to be analyzed, including interleavings of concurrent programs. JPF is implemented in Java, and its architecture is highly modular to support rapid prototyping of new features. JPF is an explicit-state model checker, because it enumerates all visited states and, therefore, suffers from the state-explosion problem inherent in analyzing large programs. It is suited to analyzing programs less than 10kLOC, but has been successfully applied to finding errors in concurrent programs up to 100kLOC. When an error is found, a trace from the initial state to the error is produced to guide the debugging. JPF works at the bytecode level, meaning that all of Java can be model-checked. By default, the software checks for all runtime errors (uncaught exceptions), assertions violations (supports Java s assert), and deadlocks. JPF uses garbage collection and symmetry reductions of the heap during model checking to reduce state-explosion, as well as dynamic partial order reductions to lower the number of interleavings analyzed. JPF is capable of symbolic execution of Java programs, including symbolic execution of complex data such as linked lists and trees. JPF is extensible as it allows for the creation of listeners that can subscribe to events during searches. The creation of dedicated code to be executed in place of regular classes is supported and allows users to easily handle native calls and to improve the efficiency of the analysis.

  18. 三氧化二砷诱导套细胞淋巴瘤细胞株凋亡及机制研究%Effect of Arsenic Trioxide on Induction of Apoptosis in MCL Cell Line and Its Possible Mechanisms

    Institute of Scientific and Technical Information of China (English)

    费爱梅; 毛朝明; 刘静静; 诸江; 糜坚青

    2010-01-01

    本研究旨在探讨三氧化二砷(ATO)诱导套细胞淋巴瘤(MCL)细胞株凋亡的效应及其机制.以不同浓度的ATO处理细胞,再通过MTT法检测细胞MCL细胞株(jeko-1,mino,JVM-2)增殖;用Annexin V-FITC/PI双染流式细胞术检测jeko-1细胞的凋亡;用DiOC6(3)染色流式细胞术检测jeko-1细胞的线粒体跨膜电位丢失;用Western blot检测细胞周期蛋白D1(cyclin D1)及凋亡相关蛋白MCL-1,BCL-2,PUMA,NOXA,cCaspase-3,cCaspase-9,cPARP在ATO处理前后的表达变化.结果表明:ATO抑制MCL细胞增殖,诱导MCL细胞凋亡,并且引起MCL细胞线粒体跨膜电位丢失,引起MCL-1,PUMA,cyclin D1蛋白表达水平降低,cPARP,cCaspase-3,eCaspase-9表达水平增加,不影响BCL-2,NOXA表达.结论:ATO能有效抑制MCL细胞增殖,诱导MCL细胞株凋亡,其中细胞凋亡的线粒体途径起着重要的作用.

  19. WCET可预测的Java指令集硬件实现%Hardware Implementation of WCET-predictable Java Instruction Set

    Institute of Scientific and Technical Information of China (English)

    杨帆; 高振华; 柴志雷

    2012-01-01

    In order to execute Java bytecode of CISC structure in hardware, instruction set for 32-bit embedded real-time Java platform JPOR-32 (Java Processor Optimized for RTSJ) is designed. By analyzing the function and implementation principle of Java bytecode in the JVM specification, variation of signals and data of Java processor data path is set up. Complex instructions are executed using micro-instructions and simple instructions are executed directly, so that JPOR-32 set of instructions has a RISC feature. The results of Java code execution verify the correctness and Worst Case Execution Time(WCET) predictability of the instruction set.%为能以硬件方式直接执行CISC结构的Java字节码,设计并实现适用于32位嵌入式实时Java平台的JPOR-32指令集.分析Java虚拟机规范中各Java字节码的功能和实现原理,设定执行每条指令时信号和数据在Java处理器数据通路上的变化,采用微指令方式执行复杂指令,简单指令直接执行,从而使JPOR-32的指令集具有RISC特性.实验结果验证了指令集的正确性及其最坏情况执行时间(WCET)的可预测性.

  20. Java芯片系统中的混合地址转换技术研究%HYBRID ADDRESS TRANSLATION TECHNOLOGY IN JAVA CHIP SYSTEM

    Institute of Scientific and Technical Information of China (English)

    陈虎; 戴葵; 杨晓东; 胡守仁

    2001-01-01

    Based on the analysis of memory management of JVM(Java VirtualMachine), the concepts of object address, segmented address and physical address are defined. Their relationship in Java Chip system is also presented here. After the discussion of current address translation schemes, a novel address translation technology, which hybridizes the segment scheme and segment-page scheme, is presented. A perfect tradeoff will be gained among the object accessing performance, the memory utilization and the Java chip system simplicity. The hardware architecture to implement address translation and the algorithm to allocate physical memory are presented too. At the end of paper, the performance evaluation of these algorithms is given.%本文首先定义了Java芯片系统中的地址结构:对象地址、段式地址和物理地址.针对现有地址转换方法的不足,提出了一种结合段式和段页式的混合转换方法.该方法使访问对象的速度、存储空间利用率和设备复杂度等方面得到合理的折衷.文中还给出了该方法在Java芯片系统中的硬件实现方法和相关的物理存储空间分配算法,并对其进行了性能评价.

  1. IQM: an extensible and portable open source application for image and signal analysis in Java.

    Science.gov (United States)

    Kainz, Philipp; Mayrhofer-Reinhartshuber, Michael; Ahammer, Helmut

    2015-01-01

    Image and signal analysis applications are substantial in scientific research. Both open source and commercial packages provide a wide range of functions for image and signal analysis, which are sometimes supported very well by the communities in the corresponding fields. Commercial software packages have the major drawback of being expensive and having undisclosed source code, which hampers extending the functionality if there is no plugin interface or similar option available. However, both variants cannot cover all possible use cases and sometimes custom developments are unavoidable, requiring open source applications. In this paper we describe IQM, a completely free, portable and open source (GNU GPLv3) image and signal analysis application written in pure Java. IQM does not depend on any natively installed libraries and is therefore runnable out-of-the-box. Currently, a continuously growing repertoire of 50 image and 16 signal analysis algorithms is provided. The modular functional architecture based on the three-tier model is described along the most important functionality. Extensibility is achieved using operator plugins, and the development of more complex workflows is provided by a Groovy script interface to the JVM. We demonstrate IQM's image and signal processing capabilities in a proof-of-principle analysis and provide example implementations to illustrate the plugin framework and the scripting interface. IQM integrates with the popular ImageJ image processing software and is aiming at complementing functionality rather than competing with existing open source software. Machine learning can be integrated into more complex algorithms via the WEKA software package as well, enabling the development of transparent and robust methods for image and signal analysis.

  2. Visualization of Vgi Data Through the New NASA Web World Wind Virtual Globe

    Science.gov (United States)

    Brovelli, M. A.; Kilsedar, C. E.; Zamboni, G.

    2016-06-01

    GeoWeb 2.0, laying the foundations of Volunteered Geographic Information (VGI) systems, has led to platforms where users can contribute to the geographic knowledge that is open to access. Moreover, as a result of the advancements in 3D visualization, virtual globes able to visualize geographic data even on browsers emerged. However the integration of VGI systems and virtual globes has not been fully realized. The study presented aims to visualize volunteered data in 3D, considering also the ease of use aspects for general public, using Free and Open Source Software (FOSS). The new Application Programming Interface (API) of NASA, Web World Wind, written in JavaScript and based on Web Graphics Library (WebGL) is cross-platform and cross-browser, so that the virtual globe created using this API can be accessible through any WebGL supported browser on different operating systems and devices, as a result not requiring any installation or configuration on the client-side, making the collected data more usable to users, which is not the case with the World Wind for Java as installation and configuration of the Java Virtual Machine (JVM) is required. Furthermore, the data collected through various VGI platforms might be in different formats, stored in a traditional relational database or in a NoSQL database. The project developed aims to visualize and query data collected through Open Data Kit (ODK) platform and a cross-platform application, where data is stored in a relational PostgreSQL and NoSQL CouchDB databases respectively.

  3. IQM: an extensible and portable open source application for image and signal analysis in Java.

    Directory of Open Access Journals (Sweden)

    Philipp Kainz

    Full Text Available Image and signal analysis applications are substantial in scientific research. Both open source and commercial packages provide a wide range of functions for image and signal analysis, which are sometimes supported very well by the communities in the corresponding fields. Commercial software packages have the major drawback of being expensive and having undisclosed source code, which hampers extending the functionality if there is no plugin interface or similar option available. However, both variants cannot cover all possible use cases and sometimes custom developments are unavoidable, requiring open source applications. In this paper we describe IQM, a completely free, portable and open source (GNU GPLv3 image and signal analysis application written in pure Java. IQM does not depend on any natively installed libraries and is therefore runnable out-of-the-box. Currently, a continuously growing repertoire of 50 image and 16 signal analysis algorithms is provided. The modular functional architecture based on the three-tier model is described along the most important functionality. Extensibility is achieved using operator plugins, and the development of more complex workflows is provided by a Groovy script interface to the JVM. We demonstrate IQM's image and signal processing capabilities in a proof-of-principle analysis and provide example implementations to illustrate the plugin framework and the scripting interface. IQM integrates with the popular ImageJ image processing software and is aiming at complementing functionality rather than competing with existing open source software. Machine learning can be integrated into more complex algorithms via the WEKA software package as well, enabling the development of transparent and robust methods for image and signal analysis.

  4. TIM, a ray-tracing program for METATOY research and its dissemination

    Science.gov (United States)

    Lambert, Dean; Hamilton, Alasdair C.; Constable, George; Snehanshu, Harsh; Talati, Sharvil; Courtial, Johannes

    2012-03-01

    TIM (The Interactive METATOY) is a ray-tracing program specifically tailored towards our research in METATOYs, which are optical components that appear to be able to create wave-optically forbidden light-ray fields. For this reason, TIM possesses features not found in other ray-tracing programs. TIM can either be used interactively or by modifying the openly available source code; in both cases, it can easily be run as an applet embedded in a web page. Here we describe the basic structure of TIM's source code and how to extend it, and we give examples of how we have used TIM in our own research. Program summaryProgram title: TIM Catalogue identifier: AEKY_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEKY_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License No. of lines in distributed program, including test data, etc.: 124 478 No. of bytes in distributed program, including test data, etc.: 4 120 052 Distribution format: tar.gz Programming language: Java Computer: Any computer capable of running the Java Virtual Machine (JVM) 1.6 Operating system: Any; developed under Mac OS X Version 10.6 RAM: Typically 145 MB (interactive version running under Mac OS X Version 10.6) Classification: 14, 18 External routines: JAMA [1] (source code included) Nature of problem: Visualisation of scenes that include scene objects that create wave-optically forbidden light-ray fields. Solution method: Ray tracing. Unusual features: Specifically designed to visualise wave-optically forbidden light-ray fields; can visualise ray trajectories; can visualise geometric optic transformations; can create anaglyphs (for viewing with coloured "3D glasses") and random-dot autostereograms of the scene; integrable into web pages. Running time: Problem-dependent; typically seconds for a simple scene.

  5. Neuropsychiatric Inventory data in a Belgian sample of elderly persons with and without dementia

    Directory of Open Access Journals (Sweden)

    Squelard GP

    2012-10-01

    Full Text Available Gilles P Squelard,1 Pierre A Missotten,1 Louis Paquay,2 Jan A De Lepeleire,2 Frank JVM Buntinx,2 Ovide Fontaine,1 Stephane R Adam,1 Michel JD Ylieff11Clinical Psychology of Ageing, Qualidem Research Project, University of Liège (ULg, Liège, Belgium; 2KU Leuven, Department of Public Health and Primary Care, Leuven, BelgiumBackground/aims: This study assesses and compares prevalence of psychological and behavioral symptoms in a Belgian sample of people with and without dementia.Methods: A total of 228 persons older than 65 years with dementia and a group of 64 non-demented persons were assessed using the Neuropsychiatric Inventory (NPI in 2004.Results: Within the group without dementia, the most frequent symptoms were depression, agitation, and irritability. Within the group with dementia, the most common symptoms were depression, irritability, apathy, and agitation. Prevalence of delusions (P < 0.05, hallucinations (P < 0.05, anxiety (P < 0.05, agitation (P < 0.05, apathy (P < 0.01, aberrant motor behavior (P < 0.01, and eating disorders (P < 0.05 were significantly higher in the group with dementia.Conclusion: Depression, elation, irritability, disinhibition, and sleeping disorders are not specific to dementia. Agitation, apathy, anxiety, and delusions are more frequent in dementia but were not specific to the dementia group because their prevalence rates were close to 10% in the group without dementia. Hallucinations, aberrant motor behavior, and eating disorders are specific to dementia. The distinction between specific and nonspecific symptoms may be useful for etiological research on biological, psychological, and environmental factors.Keywords: behavior, behavior disorders, epidemiology, dementia, psychiatric symptoms, neuropsychiatry

  6. Design Dynamic Coupling Measurement of Distributed Object Oriented Software Using Trace Events

    Directory of Open Access Journals (Sweden)

    S. Babu

    2011-01-01

    Full Text Available Problem statement: A common way to define and measure coupling is through structural properties and static code analysis. However, because of polymorphism, dynamic binding and the common presence of unused code in commercial software, the resulting coupling measures are imprecise as they do not perfectly reflect the actual coupling taking place among classes at run-time. For example, when using static analysis to measure coupling, it is difficult and sometimes impossible to determine what actual methods can be invoked from a client class if those methods are overridden in the subclasses of the server classes. Approach: Coupling measurement has traditionally been performed using static code analysis, because most of the existing work was done on non-object oriented code and because dynamic code analysis is more expensive and complex to perform. We refer to this type of coupling as dynamic coupling. In this study we propose a dynamic and efficient measurement technique over object oriented software. Result: We propose a hybrid model to measure the dynamic coupling present in distributed object oriented software. The proposed method has three steps; they are instrumentation process, post process and coupling measurement. First, the instrumentation process is performed. In this process, to trace method calls, a modified instrumented JVM has been used. During this process, three trace files, .prf, .clp and .svp are created. In the second step, the information present in these files, are merged. At the end of this step, the merged detailed trace of each Jvms contains pointers to the merged trace files of the other JVM’s such that the path of each remote call from the client to the server can be uniquely identified. Conclusion: Finally, the coupling metrics are measured dynamically. The proposed system was implemented in JAVA.The implementation results show that the proposed system effectively measures the dynamic coupling.

  7. VISUALIZATION OF VGI DATA THROUGH THE NEW NASA WEB WORLD WIND VIRTUAL GLOBE

    Directory of Open Access Journals (Sweden)

    M. A. Brovelli

    2016-06-01

    Full Text Available GeoWeb 2.0, laying the foundations of Volunteered Geographic Information (VGI systems, has led to platforms where users can contribute to the geographic knowledge that is open to access. Moreover, as a result of the advancements in 3D visualization, virtual globes able to visualize geographic data even on browsers emerged. However the integration of VGI systems and virtual globes has not been fully realized. The study presented aims to visualize volunteered data in 3D, considering also the ease of use aspects for general public, using Free and Open Source Software (FOSS. The new Application Programming Interface (API of NASA, Web World Wind, written in JavaScript and based on Web Graphics Library (WebGL is cross-platform and cross-browser, so that the virtual globe created using this API can be accessible through any WebGL supported browser on different operating systems and devices, as a result not requiring any installation or configuration on the client-side, making the collected data more usable to users, which is not the case with the World Wind for Java as installation and configuration of the Java Virtual Machine (JVM is required. Furthermore, the data collected through various VGI platforms might be in different formats, stored in a traditional relational database or in a NoSQL database. The project developed aims to visualize and query data collected through Open Data Kit (ODK platform and a cross-platform application, where data is stored in a relational PostgreSQL and NoSQL CouchDB databases respectively.

  8. 云计算编程模型中Java应用研究%Java Application Research in Programming Model of the Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    陈虹君; 吴雪琴

    2013-01-01

    Cloud computing is a computing model in the future;the market prospect is very broad. Cloud computing is divided into three categories according to the type of services:IaaS, PaaS, SaaS. A variety of applications are deployed on the PAAS which also provide self-management. Analyze PAAS programming model;and then analyze the main PAAS which support Java cloud applica?tions and also their respective advantages and disadvantages;lastly, discuss how to develop, run, and test the Java cloud applica?tions in GAE. The JVM packaged mechanisms ensure that Java applications isolated from each other, which provode Java applica?tions security.%云计算是未来的计算模式,其市场前景十分广阔.云计算按提供的服务类别分为三类:IaaS、PaaS、SaaS.各种应用部署在PAAS上,并由PAAS提供自主管理.在对PAAS提供的编程模型做了分析后;接着分析了支持Java云应用的主流PAAS,并分析了它们各自的优点和缺点;最后讨论了Java云应用在GAE中的开发、运行和测试的方法.JVM和打包机制也保证了Java应用的相互隔离,提供了Java运用的安全保障.

  9. Articular cartilage repair and the evolving role of regenerative medicine

    Directory of Open Access Journals (Sweden)

    Pieter K Bos

    2010-10-01

    Full Text Available Pieter K Bos1, Marloes L van Melle1, Gerjo JVM van Osch1,21Department of Orthopaedic Surgery, Erasmus MC, Rotterdam, the Netherlands; 2Department of Otorhinolaryngology, Erasmus MC, Rotterdam, the NetherlandsAbstract: Among the growing applications of regenerative medicine, clinical articular cartilage repair has now been used for 2 decades and forms a successful example of translational medicine. Cartilage is characterized by a limited intrinsic repair capacity following injury. Articular cartilage defects cause symptoms, are not spontaneously repaired, and are generally believed to result in early osteoarthritis. Marrow stimulation techniques, osteochondral transplantation, and cell-based therapies, such as autologous chondrocyte implantation (ACI and use of mesenchymal stem cells (MSCs, are used for tissue regeneration, symptom relief, and prevention of further joint degeneration. The exact incidence of cartilage defects and the natural outcome of joints with these lesions are unclear. Currently available cartilage repair techniques are designed for defect treatment in otherwise healthy joints and limbs, mostly in young adults. The natural history studies presented in this review estimated that the prevalence of cartilage lesions in this patient group ranges from 5% to 11%. The background and results from currently available randomized clinical trials of the three mostly used cartilage repair techniques are outlined in this review. Osteochondral transplantation, marrow stimulation, and ACI show improvement of symptoms with an advantage for cell-based techniques, but only a suggestion that risk for joint degeneration can be reduced. MSCs, characterized by their good proliferative capacity and the potential to differentiate into different mesenchymal lineages, form an attractive alternative cell source for cartilage regeneration. Moreover, MSCs provide a regenerative microenvironment by the secretion of bioactive factors. This trophic activity

  10. SciSpark: Highly Interactive and Scalable Model Evaluation and Climate Metrics

    Science.gov (United States)

    Wilson, B. D.; Palamuttam, R. S.; Mogrovejo, R. M.; Whitehall, K. D.; Mattmann, C. A.; Verma, R.; Waliser, D. E.; Lee, H.

    2015-12-01

    Remote sensing data and climate model output are multi-dimensional arrays of massive sizes locked away in heterogeneous file formats (HDF5/4, NetCDF 3/4) and metadata models (HDF-EOS, CF) making it difficult to perform multi-stage, iterative science processing since each stage requires writing and reading data to and from disk. We are developing a lightning fast Big Data technology called SciSpark based on ApacheTM Spark under a NASA AIST grant (PI Mattmann). Spark implements the map-reduce paradigm for parallel computing on a cluster, but emphasizes in-memory computation, "spilling" to disk only as needed, and so outperforms the disk-based ApacheTM Hadoop by 100x in memory and by 10x on disk. SciSpark will enable scalable model evaluation by executing large-scale comparisons of A-Train satellite observations to model grids on a cluster of 10 to 1000 compute nodes. This 2nd generation capability for NASA's Regional Climate Model Evaluation System (RCMES) will compute simple climate metrics at interactive speeds, and extend to quite sophisticated iterative algorithms such as machine-learning based clustering of temperature PDFs, and even graph-based algorithms for searching for Mesocale Convective Complexes. We have implemented a parallel data ingest capability in which the user specifies desired variables (arrays) as several time-sorted lists of URL's (i.e. using OPeNDAP model.nc?varname, or local files). The specified variables are partitioned by time/space and then each Spark node pulls its bundle of arrays into memory to begin a computation pipeline. We also investigated the performance of several N-dim. array libraries (scala breeze, java jblas & netlib-java, and ND4J). We are currently developing science codes using ND4J and studying memory behavior on the JVM. On the pyspark side, many of our science codes already use the numpy and SciPy ecosystems. The talk will cover: the architecture of SciSpark, the design of the scientific RDD (sRDD) data structure, our

  11. Java virtual machine memory management and optimization strategy%Java虚拟机内存管理与优化策略

    Institute of Scientific and Technical Information of China (English)

    杨文超

    2013-01-01

    Over the years, people use tools to complete tasks,until recently our tools to become smarter, and connect with each other. The microprocessor has appeared in many daily use items,and contact network has more and more.J2ME goal is in a 16-bit or 32-bit processor and the amount is not less than 128 KB of memory of tiny devices running on the JAVA program. But due to restrictions in terms of the hardware and software,in order to as much as possible to the application of space and resources to make the application on the virtual machine run smooth and steady,so need to this kind of optimized embedded JAVA virtual machine,in order to improve its performance.For the division of generation in the JVM heap,the determination of the root set and space allocation and recovery of the new algorithm can optimize the virtual machine,increase its efficiency.%多年以来,人们使用工具来完成任务,直到最近我们的工具才开始变得越来越聪明,并且互相连接起来。微处理器已经出现在很多日常使用的物品中,并且越来越多地和网络有了联系。J2ME目标是在具有16位或32位处理器和总量不少于约128KB的存储器的微型设备上运行JAVA程序。但由于硬件和软件方面的限制,为了给应用程序尽可能的空间和资源,让应用程序在虚拟机上流畅、稳定地运行,因而需要对这类嵌入式JAVA虚拟机进行优化处理,以提高其性能。对于JVM中代的划分、根集的确定和堆空间的分配、回收的新算法无疑能够优化虚拟机,提高其效率。

  12. Dr TIM: Ray-tracer TIM, with additional specialist scientific capabilities

    Science.gov (United States)

    Oxburgh, Stephen; Tyc, Tomáš; Courtial, Johannes

    2014-03-01

    We describe several extensions to TIM, a raytracing program for ray-optics research. These include relativistic raytracing; simulation of the external appearance of Eaton lenses, Luneburg lenses and generalised focusing gradient-index lens (GGRIN) lenses, which are types of perfect imaging devices; raytracing through interfaces between spaces with different optical metrics; and refraction with generalised confocal lenslet arrays, which are particularly versatile METATOYs. Catalogue identifier: AEKY_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEKY_v2_0.html Program obtainable from: CPC Program Library, Queen’s University, Belfast, N. Ireland Licencing provisions: GNU General Public License No. of lines in distributed program, including test data, etc.: 106905 No. of bytes in distributed program, including test data, etc.: 6327715 Distribution format: tar.gz Programming language: Java. Computer: Any computer capable of running the Java Virtual Machine (JVM) 1.6. Operating system: Any, developed under Mac OS X Version 10.6 and 10.8.3. RAM: Typically 130 MB (interactive version running under Mac OS X Version 10.8.3) Classification: 14, 18. Catalogue identifier of previous version: AEKY_v1_0 Journal reference of previous version: Comput. Phys. Comm. 183(2012)711 External routines: JAMA [1] (source code included) Does the new version supersede the previous version?: Yes Nature of problem: Visualisation of scenes that include scene objects that create wave-optically forbidden light-ray fields. Solution method: Ray tracing. Reasons for new version: Significant extension of the capabilities (see Summary of revisions), as demanded by our research. Summary of revisions: Added capabilities include the simulation of different types of camera moving at relativistic speeds relative to the scene; visualisation of the external appearance of generalised focusing gradient-index (GGRIN) lenses, including Maxwell fisheye, Eaton and Luneburg lenses; calculation of

  13. 翅片螺距对锯齿螺旋翅片换热管特性的影响%Effects of fin pitch on heat transfer and flow resistance of serrated spiral-finned-tube banks

    Institute of Scientific and Technical Information of China (English)

    马有福; 袁益超; 陈昱; 刘海磊; 康明

    2011-01-01

    Serrated spiral-finned-tube, developed from solid spiral-finned-tube, has been widely applied in large-scale heat-exchange facility due to its advantages such as easier manufacture, more extended heat transfer surfaces, higher heat transfer coefficient and fin efficiency. For the effects of fin pitch on heat transfer and flow resistance of serrated spiral-finned-tube banks (SSBs) , nine SSBs with staggered layouts in terms of various fin pitch were tested based on the analysis on its influencing mechanism. The experimental results are as follows. At the same fin-side Re, Nu increases 19% and Eu decreases 8% with the fin pitch increased from 3. 831mm to 4.167mm. The effect of fin pitch on fin-side JVm becomes little when the fin pitch is larger than 4 mm since the gas penetrates the fin-gap more easily and fully flushes the fin-surface. The comprehensive heat transfer performance index j/f (ratio of Colburn heat transfer factor and friction factor) of fin-side first increases and then decreases as Re increases, with higher j/f in Re = 7000-10000. At the same fin-side Re, the index j/f is higher as the fin pitch is larger, increased about 28% with the fin pitch increased from 3. 831 mm to 4. 167 mm. The experimental results were compared with the correlations in literature. The correlations for Nu and Eu on SSBs with staggered layouts,which take fin pitch? Transverse pitch and longitudinal pitch of tube banks into accounts* were presented for engineering applications.%在连续螺旋翅片管基础上发展而来的锯齿螺旋翅片管具有易于制造、翅化比大,传热系数和翅片效率更高等优点,已广泛应用于各类大型气体换热设备中.为获得翅片螺距对锯齿螺旋翅片换热管特性的影响,在分析其影响机理的基础上对5个锯齿螺旋翅片管错列管束进行了实验研究.实验结果表明:在实验研究的翅片螺距范围(3.831~4.167 mm),相同Re下随翅片螺距增大,管束翅侧Nu增大19%,Eu减小8

  14. Detection of JNI Memory Leaks Based on Extended Bytecode%基于中间语言的 JNI内存泄漏检查

    Institute of Scientific and Technical Information of China (English)

    蒋挺宇; 王鹏; 杨述; 褥震; 董渊; 王生原; 嵇智源

    2015-01-01

    JNI技术支持Java与本地C/C++的相互调用,在Android等混合语言实现的系统中有着广泛应用,但语言之间的安全特性差异使其成为安全薄弱环节,现有的分析方法难以处理多语言相互调用产生的安全缺陷。以JNI调用中易产生的内存泄漏为例,开展Java/C++JNI跨语言分析的研究。采用扩展的Java Bytecode(Bytecode倡)指令作为C++语义的解释来消除跨语言分析的障碍。围绕JNI调用中内存泄漏的问题,做了以下3方面工作:1)定义兼容Java/C++语言的分块内存模型;2)基于LLVM/LLJVM ,设计实现了C++到Bytecode倡的翻译策略;3)建立方法调用图,提取方法摘要,利用过程间分析方法检测JNI调用中的内存泄漏。针对具有典型内存泄漏特征的JNI实例翻译检测表明,该工作能够准确检测出Java/C++混合语言中的内存泄漏,对于JNI混合语言编程的理解和漏洞分析具有重要价值。%The Java native interface(JNI)enables Java code running in a Java virtual machine(JVM ) to be called by native code ,but the difference of security features between languages makes it a security weakness ,which cannot be detected by existing analysis methods .Commonly used detection methods are mainly based on the analysis of intermediate language ,w hich is invalid in this JNI case ,since the lack of an intermediate representation to bridge Java and C+ + .This paper analyzes JNI from a Java/C+ + cross‐language perspective and focuses on memory leaks which frequently occur in JNI calls .In order to overcome language barriers ,this paper proposes extended Bytecode (Bytecode* ) instructions as interpretation of C+ + semantics .Our contributions are described as follows :1)Define a block memory model which is compatible with both Java and C+ + ;2) Design translation rules from C+ +to extended Java Bytecode based on LLVM/LLJVM ;3)Construct a method call graph ,extract

  15. MonALISA: An agent based, dynamic service system to monitor, control and optimize distributed systems

    Science.gov (United States)

    Legrand, I.; Newman, H.; Voicu, R.; Cirstoiu, C.; Grigoras, C.; Dobre, C.; Muraru, A.; Costan, A.; Dediu, M.; Stratan, C.

    2009-12-01

    The MonALISA (Monitoring Agents in a Large Integrated Services Architecture) framework provides a set of distributed services for monitoring, control, management and global optimization for large scale distributed systems. It is based on an ensemble of autonomous, multi-threaded, agent-based subsystems which are registered as dynamic services. They can be automatically discovered and used by other services or clients. The distributed agents can collaborate and cooperate in performing a wide range of management, control and global optimization tasks using real time monitoring information. Program summaryProgram title: MonALISA Catalogue identifier: AEEZ_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEEZ_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Caltech License - free for all non-commercial activities No. of lines in distributed program, including test data, etc.: 147 802 No. of bytes in distributed program, including test data, etc.: 2 5913 689 Distribution format: tar.gz Programming language: Java, additional APIs available in Java, C, C++, Perl and python Computer: Computing Clusters, Network Devices, Storage Systems, Large scale data intensive applications Operating system: The MonALISA service is mainly used in Linux, the MonALISA client runs on all major platforms (Windows, Linux, Solaris, MacOS). Has the code been vectorized or parallelized?: It is a multithreaded application. It will efficiently use all the available processors. RAM: for the MonALISA service the minimum required memory is 64 MB; if the JVM is started allocating more memory this will be used for internal caching. The MonALISA client requires typically 256-512 MB of memory. Classification: 6.5 External routines: Requires Java: JRE or JDK to run. These external packages are used (they are included in the distribution): JINI, JFreeChart, PostgreSQL (optional). Nature of problem: To monitor and control

  16. E2GPR - Edit your geometry, Execute GprMax2D and Plot the Results!

    Science.gov (United States)

    Pirrone, Daniele; Pajewski, Lara

    2015-04-01

    can be employed to import synthetic data created by GprMax using the binary-format option into MATLAB, in order to be processed and/or visualized. Further MATLAB procedures for the visualization of GprMax synthetic data have been developed within the COST Action TU1208 [2] and are available for free public download on www.GPRadar.eu. The current version of GprMax3D is compiled with OpenMP, supporting multi-platform shared memory multiprocessing which allows GprMax3D to take advantage of multiple cores/CPUs. GprMax2D, instead, exploits a single core when executed. E2GPR is a new software tool, available free of charge for both academic and commercial use, conceived to: 1) assist in the creation, modification and analysis of GprMax2D models, through a Computer-Aided Design (CAD) system; 2) allow parallel and/or distributed computing with GprMax2D, on a network of computers; 3) automatically plot A-scans and B-scans generated by GprMax2D. The CAD and plotter parts of the tool are implemented in Java and can run on any Java Virtual Machine (JVM) regardless of computer architecture. The part of the tool devoted to supporting parallel and/or distributed computing, instead, requires the set up of a Web-Service (on a server emulator or server); in fact, it is currently configured only for Windows Server and Internet Information Services (IIS). In this work, E2GPR is presented and examples are provided which demonstrate its use. The tool can be currently obtained by contacting the authors. It will soon be possible to download it from www.GPRadar.eu. Acknowledgement This work is a contribution to the COST Action TU1208 'Civil Engineering Applications of Ground Penetrating Radar.' The authors thank COST for funding the Action TU1208. References [1] A. Giannopoulos, 'Modelling ground penetrating radar by GprMax,' Construction and Building Materials, vol. 19, pp. 755-762, 2005. [2] L. Pajewski, A. Benedetto, X. Dérobert, A. Giannopoulos, A. Loizos, G. Manacorda, M. Marciniak, C