Explore chapters and articles related to this topic
Hardware and Implementation
Published in Naim A. Kheir, Systems Modeling and Computer Simulation, 2018
Sajjan G. Shiva, Mahmoud Mohadjer
Operations, such as selecting the appropriate compiler, loading the object code into the memory, starting and stopping the execution, accounting of the computer system usage, and resource (memory, peripheral, and others) and usage managment, are automatically done by the computer system. A set of supervisory programs that perform these operations is usually provided by the machine manufacturer. This set of programs is called the operating system of the machine. The operating system receives the commands from the user through a command language and manages the overall operation of the computer system. Figure 12.3 is a simple rendering of the complete hardware and software environment of a general-purpose digital computer system.
Performance Modeling and Analysis Using VHDL and SystemC
Published in Wai-Kai Chen, Computer Aided Design and Design Automation, 2018
Robert H. Klenke, Jonathan A. Andrews, James H. Aylor
As discussed previously, a command language was developed to allow the user to program the actions of the Trigger and Driver. This command language is read by the Trigger and Driver at the beginning of the simulation. Constructs are available within the command language to allow waiting on events of various signals and driving values or series of values on various signals, either asynchronously, or synchronous with a specified clock signal. In addition, several looping and go-to constructs are available to implement complex behaviors more easily. A summary of the syntax of the command language constructs is shown in Table 12.4.
CACE Software Implementation Using Ada
Published in Derek A. Linkens, CAD for Control Systems, 2020
The GE-MEAD project involves the integration of several CACE packages under a supervisor which coordinates the execution of these packages with a database manager and an advanced user interface. The database and the user interface were based on proprietary database languages and user-interface management systems (UIMS), respectively. The GE-MEAD supervisor was implemented in Ada and consists of a full command-language interpreter with procedural/macro capabilities, and a datadriven translator from generic GE-MEAD commands to specific commands for the supported CACE packages (see Refs. 4 and 5 for more information on the GE-MEAD program itself).
Development of a CNC interpretation service with good performance and variable functionality
Published in International Journal of Computer Integrated Manufacturing, 2022
In addition to the off-the-shelf compilation tools, general software development tools are utilized to build G code interpreters. For example, Liu et al. developed a G code interpreter using C language with the syntax rules described in the extended BNF (EBNF) by tool command language (TCL) (Liu et al. 2007). Hong et al. proposed a legal word table and a conditional statement-based syntax detection mechanism to implement lexical and syntactic analysis based on which designed a G code interpreter using C language (Hong et al. 2010). Besides, C++ language is often used to develop G code interpreters that the lexical and syntax rules are usually described by the regular expression provided by GRETA library (Zhang and Yao 2010; Ma and Liu 2012; Cheng, Zhao, and Sun 2016). In contrast to these common programming languages, Latif et al. used LabVIEW to develop a G code interpreter whose analysis part is implemented based on a data extraction mechanism (Yusof and Latif 2015). That is, machining data, such as position, feedrate, spindle speed, etc., is extracted from an input NC program. And they extended this interpreter to handle both G code and STEP-NC (Yusof and Latif 2016).
Development of testbed for cyber-manufacturing security issues
Published in International Journal of Computer Integrated Manufacturing, 2020
Mingtao Wu, Jinwoo Song, Snehav Sharma, Jupeng Di, Benliu He, Ziming Wang, Jingkai Zhang, Long Wang Lucas Lin, Emily Ann Greaney, Young Moon
Shellshock is a security bug known as the bash bug (Mary 2015) in Unix bash shell. Shell is used for executing commands and acts as a command language interpreter. Shellshock’s impact is similar to the race condition: it allows an attacker to gain control over the computer with elevated privilege.