Abstract:
Systems and methods are provided to facilitate architectural modeling. In one aspect, a modeling system is provided. This includes a processor configured to generate remodeled images associated with one or more architectural structures. A procedural model is configured to integrate an approximate model from aerial images of the architectural structures and a three-dimensional (3D) reconstruction model from ground-level images of the architectural structures.
Abstract:
A control method, system and function entity for reporting a bearer event of a signaling IP flow are provided. Flow identifier information such as a 5-tuple is generated for a signaling IP flow and a media IP flow so as to unify a mechanism for reporting a signaling path status and a mechanism for reporting a bearer event of a media IP flow, so that the mechanism for reporting a signaling path status is not limited by the parameter of Flow Usage, the PDP context with a signaling tag, thereby establishing corresponding PCC rules for signaling and the association between a signaling IP flow and a bearer. A method for reporting a signaling path status is further provided in the invention. In the method, for a default PDP context or a PDP context of a signaling IP flow, the predefined PCC rules are activated or signaling PCC rules generated in accordance with an Application Function address are installed, thereby an IP signaling path status is reported in accordance with rule names of the predefine PCC rules or the signaling PCC rules.
Abstract:
A method and a system of realizing event detection are provided, which detect a status of an Internet Protocol (IP) connectivity access network (IP-CAN) bearer corresponding to a policy and charging control (PCC) rule by binding an Event-Trigger parameter to the PCC rule, thereby realizing small-granularity detection for the specific PCC rule and reducing the load of the system. Furthermore, a status of the IP-CAN bearer or an IP flow is realized by binding the Event-Trigger parameter to an IP-CAN identifier (ID) or an IP flow ID, so as to avoid the problem about too large granularity of the binding of event detection and IP-CAN session and reduce the burden of the IP-CAN bearer detection and message exchange.
Abstract:
Systems, methods and computer products for implementing shadow versioning to improve data dependence analysis for instruction scheduling. Exemplary embodiments include a method to identify loops within the code to be compiled, for each loop a dependence initializing a matrix, for each loop shadow identifying symbols that are accessed by the loop, examining dependencies, storing, comparing and classifying the dependence vectors, generating new shadow symbols, replacing the old shadow symbols with the new shadow symbols, generating alias relationships between the newly created shadow symbols, scheduling instructions and compiling the code.
Abstract:
A mounting apparatus for mounting a data storage device that has a protrusion protruding from a sidewall thereof includes a mounting board, and a bracket. The mounting board includes a depressed portion for holding the data storage device. The depressed portion includes a first side wall. The bracket includes a leg member with an end pivotably mounted to the first side wall of the depressed portion of the mounting board. A first receiving slot for receiving the protrusion of the data storage device is defined in a bottom of the leg member. A drive portion is formed at a side of the receiving slot away from the end of the leg member, for cooperating with a corresponding protrusion of the data storage device when installing the data storage device.
Abstract:
An on-line fault detection and avoidance method is provided for industrial control systems that include multiple interacting process controllers. The method addresses the problem that not all faults can be determined and removed at the time of system design and testing. When a fault translates into a time-out condition in one or more controllers, symptoms are identified, persistence is measured, other involved controllers are identified, the fault condition is identified and control laws are reconfigured to avoid the fault condition in the future.
Abstract:
A computer-implemented method for generating a description of a component of an automation system comprises describing the component as a plurality of inputs and outputs, generating a vendor-independent component description file based on a description of the component as the plurality of inputs and outputs, updating the vendor-independent component description file to include vendor-specific hardware information and hardware control logic, and creating the component based on an updated vendor-specific component description.
Abstract:
Computer implemented method, system and computer program product for aligning vectors to be processed by SIMD code. A pair of vectors to be aligned at runtime and having a known relative alignment at compile time is identified. A modified second memory reference is generated by modifying an address of the second memory reference to be in a same congruence class as the first memory reference, wherein the congruence class is mod V and wherein V is SIMD byte width. A first SIMD load located at the modified second memory reference and a next adjacent SIMD load located at a third memory reference corresponding to the modified second memory reference address plus V are loaded, and the first SIMD load and the next adjacent SIMD load are concatenated to generate a resultant vector of length 2V. The resultant vector is left shifted by an amount corresponding to a difference between the addresses of the first memory reference and the second memory reference mod V, and the leftmost V bytes of the resultant vector are retained to align the first and second vectors.
Abstract:
A method for analyzing data reordering operations in Single Issue Multiple Data source code and generating executable code therefrom is provided. Input is received. One or more data reordering operations in the input are identified and each data reordering operation in the input is abstracted into a corresponding virtual shuffle operation so that each virtual shuffle operation forms part of an expression tree. One or more virtual shuffle trees are collapsed by combining virtual shuffle operations within at least one of the one or more virtual shuffle trees to form one or more combined virtual shuffle operations, wherein each virtual shuffle tree is a subtree of the expression tree that only contains virtual shuffle operations. Then code is generated for the one or more combined virtual shuffle operations.