Design and Implementation of High-Level Numerical Analysis Functions Based on Computational Arrays for Applications in Engineering

Author(s):  
Harry H. Cheng ◽  
Xudong Hu ◽  
Bin Lin

Abstract This paper presents the design and implementation of high-level numerical analysis functions in CH, a superset of C language developed for the convenience of scientific and engineering computations. In CH, complex number is treated as a built-in data type, so that the syntaxes of complex arithmetic, relational operations, and built-in mathematical functions are the same as those for real numbers. The variable number of arguments is used in the built-in mathematical functions to simplify the computation of different branches of multi-valued complex functions. The computational arrays are introduced to handle the arrays in the numerical computations. Passing arrays of variable length by arrays of deferred-shape and arrays of assumed-shape to functions are discussed. These methods allow the arrays to be passed with their rank, dimensions and data types. A list of high-level numerical functions and two examples of the applications in the scientific and engineering are given in the paper.

1993 ◽  
Vol 2 (3) ◽  
pp. 77-106 ◽  
Author(s):  
Harry H. Cheng

The handling of complex numbers in the CHprogramming language will be described in this paper. Complex is a built-in data type in CH. The I/O, arithmetic and relational operations, and built-in mathematical functions are defined for both regular complex numbers and complex metanumbers of ComplexZero, Complexlnf, and ComplexNaN. Due to polymorphism, the syntax of complex arithmetic and relational operations and built-in mathematical functions are the same as those for real numbers. Besides polymorphism, the built-in mathematical functions are implemented with a variable number of arguments that greatly simplify computations of different branches of multiple-valued complex functions. The valid lvalues related to complex numbers are defined. Rationales for the design of complex features in CHare discussed from language design, implementation, and application points of views. Sample CHprograms show that a computer language that does not distinguish the sign of zeros in complex numbers can also handle the branch cuts of multiple-valued complex functions effectively so long as it is appropriately designed and implemented.


1988 ◽  
Vol 12 (6) ◽  
pp. 331-340
Author(s):  
Thomas Bemmerl ◽  
Franz Huber ◽  
Robert Stampfl

2018 ◽  
Vol 9 (4) ◽  
pp. 711-719 ◽  
Author(s):  
Huiying Liu ◽  
Vivian W Q Lou

Abstract Although ecological momentary assessment (EMA) has been used in youth and adult populations, very few of the studies provided evidence of the feasibility and utility of smartphone-based EMA protocols to collect biopsychosocial data from aging populations. This study aimed to describe the design and implementation of a smartphone-based EMA protocol, and to evaluate the feasibility and utility of this EMA protocol among community-dwelling late-middle-aged and older Chinese. A sample of 78 community-dwelling Chinese aged between 50 and 70 years was trained to participate in a 1-week EMA data collection, during which each participant carried an Android smartphone loaded with a researcher-developed EMA application and a smartphone-based electrocardiogram (ECG) monitor to provide psychosocial (e.g., daily activities, social interaction, affect) data and ECG recordings six times daily. Adherence was demonstrated with a total response rate of 91.5% of all scheduled assessments (n = 3,822) and a moderately high level of perceived feasibility. Female participants reported higher compliance to the study and rated the overall experience as more pleasant and interesting than male participants. Our study provided the first evidence of the feasibility and utility of smartphone-based EMA protocols among late-middle-aged and older Chinese. Key areas for improvement in future design and implementation of mobile-based EMA include the incorporation of usable technology, adequate and training, and timely assistance.


2021 ◽  
Vol 4 ◽  
pp. 78-87
Author(s):  
Yury Yuschenko

In the Address Programming Language (1955), the concept of indirect addressing of higher ranks (Pointers) was introduced, which allows the arbitrary connection of the computer’s RAM cells. This connection is based on standard sequences of the cell addresses in RAM and addressing sequences, which is determined by the programmer with indirect addressing. Two types of sequences allow programmers to determine an arbitrary connection of RAM cells with the arbitrary content: data, addresses, subroutines, program labels, etc. Therefore, the formed connections of cells can relate to each other. The result of connecting cells with the arbitrary content and any structure is called tree-shaped formats. Tree-shaped formats allow programmers to combine data into complex data structures that are like abstract data types. For tree-shaped formats, the concept of “review scheme” is defined, which is like the concept of “bypassing” trees. Programmers can define multiple overview diagrams for the one tree-shaped format. Programmers can create tree-shaped formats over the connected cells to define the desired overview schemes for these connected cells. The work gives a modern interpretation of the concept of tree-shaped formats in Address Programming. Tree-shaped formats are based on “stroke-operation” (pointer dereference), which was hardware implemented in the command system of computer “Kyiv”. Group operations of modernization of computer “Kyiv” addresses accelerate the processing of tree-shaped formats and are designed as organized cycles, like those in high-level imperative programming languages. The commands of computer “Kyiv”, due to operations with indirect addressing, have more capabilities than the first high-level programming language – Plankalkül. Machine commands of the computer “Kyiv” allow direct access to the i-th element of the “list” by its serial number in the same way as such access is obtained to the i-th element of the array by its index. Given examples of singly linked lists show the features of tree-shaped formats and their differences from abstract data types. The article opens a new branch of theoretical research, the purpose of which is to analyze the expe- diency of partial inclusion of Address Programming in modern programming languages.


2000 ◽  
Vol 349 (1) ◽  
pp. 323-332 ◽  
Author(s):  
François-Xavier BOITTIN ◽  
Frédéric COUSSIN ◽  
Jean-Luc MOREL ◽  
Guillaume HALET ◽  
Nathalie MACREZ ◽  
...  

Localized Ca2+-release signals (puffs) and propagated Ca2+ waves were characterized in rat ureteric myocytes by confocal microscopy. Ca2+ puffs were evoked by photorelease of low concentrations of Ins(1,4,5)P3 from a caged precursor and by low concentrations of acetylcholine; they were also observed spontaneously in Ca2+-overloaded myocytes. Ca2+ puffs showed some variability in amplitude, time course and spatial spread, suggesting that Ins(1,4,5)P3-gated channels exist in clusters containing variable numbers of channels and that within these clusters a variable number of channels can be recruited. Immunodetection of Ins(1,4,5)P3 receptors revealed the existence of several spots of fluorescence in the confocal cell sections, supporting the existence of clusters of Ins(1,4,5)P3 receptors. Strong Ins(1,4,5)P3 photorelease and high concentrations of acetylcholine induced Ca2+ waves that originated from an initiation site and propagated in the whole cell by spatial recruitment of neighbouring Ca2+-release sites. Both Ca2+ puffs and Ca2+ waves were blocked selectively by intracellular applications of heparin and an anti-Ins(1,4,5)P3-receptor antibody, but were unaffected by ryanodine and intracellular application of an anti-ryanodine receptor antibody. mRNAs encoding for the three subtypes of Ins(1,4,5)P3 receptor and subtype 3 of ryanodine receptor were detected in these myocytes, and the maximal binding capacity of [3H]Ins(1,4,5)P3 was 10- to 12-fold higher than that of [3H]ryanodine. These results suggest that Ins(1,4,5)P3-gated channels mediate a continuum of Ca2+ signalling in smooth-muscle cells expressing a high level of Ins(1,4,5)P3 receptors and no subtypes 1 and 2 of ryanodine receptors.


The previous chapter overviewed big data including its types, sources, analytic techniques, and applications. This chapter briefly discusses the architecture components dealing with the huge volume of data. The complexity of big data types defines a logical architecture with layers and high-level components to obtain a big data solution that includes data sources with the relation to atomic patterns. The dimensions of the approach include volume, variety, velocity, veracity, and governance. The diverse layers of the architecture are big data sources, data massaging and store layer, analysis layer, and consumption layer. Big data sources are data collected from various sources to perform analytics by data scientists. Data can be from internal and external sources. Internal sources comprise transactional data, device sensors, business documents, internal files, etc. External sources can be from social network profiles, geographical data, data stores, etc. Data massage is the process of extracting data by preprocessing like removal of missing values, dimensionality reduction, and noise removal to attain a useful format to be stored. Analysis layer is to provide insight with preferred analytics techniques and tools. The analytics methods, issues to be considered, requirements, and tools are widely mentioned. Consumption layer being the result of business insight can be outsourced to sources like retail marketing, public sector, financial body, and media. Finally, a case study of architectural drivers is applied on a retail industry application and its challenges and usecases are discussed.


Author(s):  
Basman M. Alhafidh ◽  
William H. Allen

The process used to build an autonomous smart home system based on cyber-physical systems (CPS) principles has recently received increased attention from researchers and developers. However, there are many challenges to be resolved before designing and implementing such a system. In this chapter, the authors present a high-level design approach that simulates a smart home system by implementing three levels of the 5C architecture used in CPS modeling and uses well-known machine learning algorithms to predict future user actions. The simulation demonstrates how users will interact with the smart home system to make more efficient use of resources. The authors also present results from analyzing real-world user data to validate the accuracy of prediction of user actions. This research illustrates the benefits of considering CPS principles when designing a home autonomous system that reliably predicts a user's needs.


Sign in / Sign up

Export Citation Format

Share Document