61270
61270
https://ebookultra.com/download/embedded-systems-handbook-second-
edition-embedded-systems-design-and-verification-richard-zurawski/
https://ebookultra.com/download/embedded-linux-hardware-software-and-
interfacing-r-hardware-software-and-interfacing-hollabaugh/
https://ebookultra.com/download/multi-core-embedded-systems-embedded-
multi-core-systems-1st-edition-georgios-kornaros/
https://ebookultra.com/download/embedded-systems-handbook-1st-edition-
richard-zurawski/
https://ebookultra.com/download/fuzzy-logic-for-embedded-systems-
applications-first-edition-embedded-technology-ahmad-ibrahim/
https://ebookultra.com/download/testing-complex-and-embedded-
systems-1st-edition-kim-h-pries/
https://ebookultra.com/download/real-world-multicore-embedded-
systems-1st-edition-bryon-moyer/
https://ebookultra.com/download/real-time-concepts-for-embedded-
systems-1st-edition-qing-li/
Java Software and Embedded Systems 1st Edition Mattis
Hayes Digital Instant Download
Author(s): Mattis Hayes; Isaiah Johansen
ISBN(s): 9781611225099, 1611225094
Edition: 1
File Details: PDF, 21.11 MB
Year: 2010
Language: english
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook
COMPUTER SCIENCE, TECHNOLOGY AND APPLICATIONS SERIES
No part of this digital document may be reproduced, stored in a retrieval system or transmitted in any form or
by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no
expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No
liability
Java Software and Embedded is assumed
Systems, edited by for incidental
Mattis Hayes, andor consequential
Isaiah damages
Johansen, Nova Sciencein connection
Publishers, with or2010.
Incorporated, arising out of information
ProQuest
COMPUTER SCIENCE, TECHNOLOGY AND
APPLICATIONS SERIES
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
COMPUTER SCIENCE, TECHNOLOGY AND APPLICATIONS SERIES
MATTIS HAYES
AND
ISAIAH JOHANSEN
EDITORS
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Copyright © 2010 by Nova Science Publishers, Inc.
All rights reserved. No part of this book may be reproduced, stored in a retrieval system or
transmitted in any form or by any means: electronic, electrostatic, magnetic, tape, mechanical
photocopying, recording or otherwise without the written permission of the Publisher.
For permission to use material from this book please contact us:
Telephone 631-231-7269; Fax 631-231-8175
Web Site: http://www.novapublishers.com
Independent verification should be sought for any data, advice or recommendations contained in
this book. In addition, no responsibility is assumed by the publisher for any injury and/or damage
to persons or property arising from any methods, products, instructions, ideas or otherwise
contained in this publication.
This publication is designed to provide accurate and authoritative information with regard to the
subject matter covered herein. It is sold with the clear understanding that the Publisher is not
engaged in rendering legal or any other professional services. If legal or any other expert
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
CONTENTS
Preface vii
Chapter 1 Java in Ambient Intelligence Applications 1
J.A. Tejedor, Jose J. Durán, Miguel A. Patricio, J. García,
A. Berlanga and José M. Molina
Chapter 2 The Power of Reflection: Combining Semantics in Service 45
Oriented Architectures for Dynamic Intelligent Invocation
P. Cabezas, S. Arrizabalaga, A. Salterain and J. Legarda
Chapter 3 Architecture of Embedded Tunable Circular Microstrip Antenna 69
Tapas Chakravarty, Salil K. Sanyal and Asok De
Chapter 4 A New Development Environment for Embedded Control 89
Systems Design and Interactive Optimization Methodologies
for Robust Calibration of Automotive Engines
Alessandro Casavola, Ferdinando De Cristofaro
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
PREFACE
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
viii Mattis Hayes and Isaiah Johansen
development of an additional semantic layer based on OWL. This allows new technical
approaches, adding capabilities with the development of software agents that make use of this
new information.
These capabilities cover the search of services according to certain terms in shared
common ontologies, providing concepts and values by the client that are used in the searching
and invocation process, the download of services including possible dependencies, remote
invocation, and so on. Thanks to the conjugation of this semantic layer with software libraries
such as the Java Reflection API, the client does not need to know any detail behind the public
façade in the framework. Instead, intelligent software agents manage the existing and
arranged catalogue of services in an absolutely transparent way.
In Chapter 3, the authors outline a method to tune a conventional (regular shaped)
microstrip antenna. An analytical method to express the resonant frequency in terms of the
lumped component values is elaborated.
The development of embedded control systems for automotive applications is an
emerging field in the technical literature. There is, consequently, a lack of methodologies and
tools that support the various development phases, starting from the early architectural design
and ending with the calibration and validation processes. In Chapter 4, a new development
framework for embedded control systems and engine calibration (F.I.R.E.—Functional
Implementation Re-usability Environment) is presented, which supports the modelling of
such systems at a high abstraction level and provides tools for the design and validation
activities. The F.I.R.E. tool enables control engineers and software developers to focus on
control system aspects instead of platform ones. This is achieved by means of an automation
procedure of some necessary transformations during the development process. Two
application examples are reported to prove the tool capabilities to allow a timing analysis and
to detect a bad task scheduling before the production code is generated.
The tool also provides a set of support functions to the embedded system design process,
calibration and validation phases which are always crucial aspects in the overall development
cycle. This consideration is particularly true for engine control systems, because their
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Preface ix
design pattern, software architecture, design process and architecture for ubiquitous space. In
the first section, this chapter explains simple design patterns that are used in the software
architecture. The design patterns are known as efficient methods for implementation to be
composed of the software architecture. Secondly, the authors describe the software
architecture such as Model View Control (MVC) and Dependency Injection (DI). The
architectures as framework that are pattern-oriented architecture are used in web application
and the software application. In the design process section, the authors discuss methods for
software construction to implement required system, and the design process is considered in
order to build distributed system for ubiquitous space.
Java is heavily used in a variety of research applications, due to its ease of use,
maintainability, and portability. In Chapter 6, the use of Java in robotics and artificial
intelligence is discussed, accompanied by examples of Java-based research in these areas. The
authors have developed software architectures for research in robotics and artificial
intelligence using Java, specifically for two autonomous polar robots, which were deployed in
Greenland and Antarctica to support radar remote sensing missions. Such environments
require both reliable and robust software to minimize possible failures during autonomous
operation. Also, a team of low-cost exploration and mapping mobile robots has been built,
utilizing Java Sun SPOTs as the means of wireless robot communication and coordination,
and a custom inertial measurement unit (IMU) for keeping track of robot pose. As part of this
development, Java was additionally used to implement a portion of the Joint Architecture for
Unmanned Systems (JAUS) communication protocol. Currently, research involving
collaborative multi-agent machine learning is being performed with the Java-based WEKA
machine learning suite and additional Java wrapper software. These applications illustrate that
Java has a wide range of research applications in the fields of robotics and artificial
intelligence.
The Java environment is composed of two main parts: the Java language and the Java
virtual machine. It is designed with the assumption that no software entity is to be trusted and,
therefore, that each needs to be checked. The first success of Java was the inception of Java
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Applets, which enabled fully untrusted code provided by unknown Web sites to be executed
in a browser. This feature demonstrated the isolation brought by the Java Virtual Machine
(JVM) between the applications and the underlying operating system. However, the evolution
of Java systems from mono-application to multi-component systems induce new
vulnerabilities developers are not aware of. This requires that additional security mechanisms
be used to support secure Java environments.
This survey presents an overview of the security issues for the Java language and Virtual
Machine. The default security model is defined and explained. Its three main components are
the Java language itself, the Bytecode validation at load time and modularity supports such as
the class loaders and permission domains. Known vulnerabilities are presented. They
originate either in the JVM or in the code of applications. Two approaches exist for
describing code vulnerabilities: source code and Bytecode. This duality enables us to identify
them both during development through manual code review and tools, and in an automated
manner during code deployment or installation. Security extensions for the Java Execution
Environment and tools for writing secure Java code are presented. They are of three types:
platform extensions, static analysis approaches and behavior injection. Platform extensions
consist in strengthening the isolation between components (beans, etc.) and providing support
for resource consumption accounting and control. Static analysis is often performed through
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
x Mattis Hayes and Isaiah Johansen
generic tools that improve the code quality and thus reduce the number of exploitable bugs in
the Java code. Some of these tools, such as FindBugs, encompass security-specific bugs, and
some, as JSLint are dedicated to security analysis. Bytecode injection enables us to introduce
security checks in the core of the code. It can be performed with the developers involved, for
instance through aspect-oriented programming, or transparently, through Bytecode injection
or meta-programming.
An overview of the existing protection mechanisms for Java systems according to the
life-cycle moment they are enforced and to the development overhead they imply concludes
Chapter 7.
As explained in Chapter 8, interfaces and delegation are fundamental concepts in OO
languages. Although both concepts have been shown to be beneficial in software
development, sometimes their implementation is cumbersome. Both result in numbers of
forwarding methods or numbers of empty methods for respective classes. These trivial
methods distract the user from non-trivial methods the class comprises. This increases
complexity and decreases maintainability. In its current form, Java does not provide sufficient
mechanisms to avoid this boilerplate code. Instead, all the methods that are empty or only
forward calls have to be coded manually. In this paper, the authors introduce a new
lightweight mechanism, that improves the implementation of interface-based and delegation-
based programs. The authors show, though this mechanism is very simple, it solves these
problems that are well-known in object-oriented software development. In three open-source
Java programs of up to over 25,000 lines of source code, the authors show how they use this
mechanism to generate up to 5.7% of all methods per case study that were empty or only
forwarding calls.
The advent of high speed ubiquitous embedded systems and embedded operating systems
with features normally expected in conventional operating systems provide developers with
new found system flexibility and versatility. These features are keen to the advancement of
mechatronic and embedded systems such as robotic systems, sensor networks, distributed
embedded computing, structural health monitoring, first respond systems, supervisory control
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Preface xi
of view is that of aware users of an infrastructure, rather than of R&D competitors. This is the
case of the project presented in the following, representing a success story in which the
discussion between a research group and a small enterprise led to the identification of the
requirements and the joined development of a common software infrastructure. When the
project started in 2004, both partners, i.e. the Autonomous robotic systems and control group
of CNR-ISSIA and Green Project Srl, had to substitute the obsolete platforms of their marine
robots and marking machines for casting products in steelworks with a stable software and
hardware infrastructure able of transparently integrating technological improvements while
remaining compatible with the past (backward compatibility). On the basis of considerations,
discussed below, about system reliability, development and maintenance costs (including
human resources), foreseen compatibility and general technical soundness, the choice was to
verify the possibility of using standard GNU/Linux for embedded real-time applications. The
result is the main technical contribution of this chapter, i.e. the practical demonstration of the
possibility of using standard GNU/Linux for implementing embedded real-time control
systems working up to a sampling frequency of at most 2 Khz. Furthermore, four years later,
the developed system is still demonstrating its capabilities transparently integrating
technological improvements and increasing more and more its performance thanks to the new
realtime properties of the Linux kernel.
A first operative release of the platform was completed in 2005 and integrated with the
CNR-ISSIA Charlie unmanned surface vehicle (USV) for robotics research. A second
application was the porting to the platform of the software of the control system of Hammer,
a steelwork industrial machine used for marking continuous casting products, developed by
Greenproject s.r.l.
At the moment, the platform is supporting the development of the ALANIS (Aluminium
Autonomous Navigator for Intelligent Sampling) USV1 for surface and underwater coastal
monitoring. Moreover, the integration with generic field buses and image acquisition systems
is being carried out.
After an introduction reporting a summary of related research in the field and a
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
discussion of the platform requirements, the key points of the followed methodology for
making GNU/Linux real-time will be presented. Finally, two applications, a research one and
an industrial one, pointing out the basic real-time structures that the platform is required to
implement, will be described in Chapter 10.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
In: Java Software and Embedded Systems ISBN: 978-1-60741-661-6
Editors: M. Hayes and I. Johansen, pp. 1-43 © 2010 Nova Science Publishers, Inc.
Chapter 1
Abstract
Wireless communications technologies are the platform to develop user-centric systems in a
multi-device platform that allows mobility and user-friendly interaction. The development of a
multi-device platform requires a common language as Java. In this chapter, two different
works related with Bluetooth and GPS-GSM communication has been selected to illustrate the
capacity of Java language to develop applications that need wireless communications.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Introduction
Computational resources are every time closer to all the people because of the
development of devices such as Personal Digital Assistants and mobile phones which have
gained a lot of popularity in these days and are increasingly being networked (e.g., Bluetooth,
IEEE 802.11). The use of this technology gave birth to a new concept: mobile computing.
Mobile computing field is having an increasing attention as many systems are designed
towards this direction. Most of them are desired to be context aware with the aim of
optimizing and automating the distribution of their services in the right time and in the right
place. Context aware computing is a paradigm was firstly defined by (Shilit, 1995). This
paradigm studies methods for modelling and utilizing contextual information. A more widely
and used definition of what context is, was given by (Dey et al., 2001) where he defines
context as: “any information that characterizes a situation related to the interaction between
humans, applications, and the surrounding environment.” There are also some other
categories described by Chen and Kotz (Chen and Kotz, 2000) which classify context in a
more fine- grained categories.
1
E-mail address: [email protected].
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
2 J.A. Tejedor, Jose J. Durán, Miguel A. Patricio et al.
Accordingly, there are several approaches developing mobile systems such as platforms,
frameworks and applications for offering context-aware services. The Context Toolkit
proposed by (Dey et al., 2001) assist for instance developers by providing them with
abstractions enabling them to build context-aware applications. The Context Fusion Networks
(Chen et al., 2004) was introduced by Chen and Kotz in 2004. It allows context-aware
applications to select distributed data sources and compose them with customized data fusion
operators into an information fusion graph. The graph represents how an application
computes high level understandings of its execution context from low-level sensory data. The
Context Fabric (Hong, 2002) is another toolkit which facilitates the development of privacy-
sensitive, ubiquitous computing applications. There is another platform Gaia (Schmidt et al.,
1999), which was developed by Roman et al. in 2002 and was designed to support also the
development and execution of applications for ubiquitous computing spaces in which users
interact with several devices and services at the same time. RCSM is another middleware
proposed by (Yau and Karim, 2004) designed to provide the properties of context-awareness
and ad-hoc communications to the applications. It provides an object-based framework for
supporting context-sensitive applications similar to CORBA (OMG, 2000) or TAO (Gokhale
and Schmidt, 1999) for fixed networks. There are previous approaches like Entree (Burke et
al., 1996) which uses a knowledge base and case-based reasoning to recommend restaurant or
for instance Cyberguide (Abowd et al., 1997) project which provides user with context-aware
information about the projects performed at GVU center in Atlanta. With TV remote
controllers throughout the building to detect users locations and provide them with a map that
highlights the project demos available in the neighboring area of the user. A recent one is
Appear which is a context-aware platform designed to provide contextual information to users
in particular and well defined domains (Sanchez-Pi et al., 2007).
The final goal of the ambient intelligence (AmI) is to construct intelligent environments
that facilitate a ubiquitous access with independence of the physical location. This ubiquity
need has produced the growing use of wireless devices (especially handheld devices) in
recent years. Wireless networks are location independent; provide a wide range of coverage
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Java in Ambient Intelligence Applications 3
have develop in Java a generic Bluetooth Java component to integrate mechanical user
interface (an example with Wiimote2 will be explained) to manage an ambient assist living
scenario.
GPRS uses a packet-switched system which provides data transfer services on mobile
phone networks. UMTS is a universal mobile telecommunications system that operates in the
2 GHz frequency band and emphasizes the compatibility. Location with this technology gives
a great uncertainty (usual several Km), but the integration of GPS receivers could be useful to
increase the accuracy up to meters. We have developed a Java component based on the
Location API for Java ME (Java Platform, Micro Edition) JSR-179 and applied to deploy it in
Nokia Mobile Phones to access the GPS and to obtain the location position.
the ability to send raw data throw the connection. Based on this one protocol are
defined the other ones Bluetooth protocols.
• SDP (Service Discovery Protocol): this protocol is in charge of offering services of a
device at petition, telling which services are available and its properties. This
protocol is really important, because it is intended to support the main capability of
Bluetooth, the offering of services.
• OBEX (OBject EXchange): this other protocol is used between devices to help
sending formatted messages between them, helping to offer a robust framework,
where the communication limitations can be negotiated between devices, and
messages can be refused before been received, but knowing about their attributes.
This protocol is widely used in mobile devices, mainly to be able to exchange image
and audio files between them, independently of the platform of the device, for
example in a printer and a photo camera.
This list of protocols can be expanded, so new protocols can use these ones to help define
the functionality, so a protocol that helps to create a chat application will use OBEX features
2
The primary controller for Nintendo's Wii console.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
4 J.A. Tejedor, Jose J. Durán, Miguel A. Patricio et al.
to send messages, or a video streamer will use L2CAP to send data flow between devices,
using its capabilities to send raw data asynchronously. A standard service created in top of
OBEX is OBEX object push, which helps to send files, between devices, using OBEX
capabilities to send messages, and saving later that file into the mobile device file system.
The acronym JSR-82 comes from Java Specification Request, which is a proposed
specification for Java that defines a series of classes and functions to be able to create
wirelessly connections over Bluetooth to a mobile device.
The first application of that technology is inside mobile phones, because that
specification is only implemented by the mobile phone sector, became it’s usage in personal
computer really complex, because it is necessary to use libraries from third-party companies
to get access to Bluetooth from Java, that is because it is need to use some operative system
exclusive functionalities, needing to use JNI when developing for a personal computer.
To be able to use JSR-82, it is needed to select which kind of device the application will
be oriented for, because them it will be necessary to select what is the most appropriate
implementation of the specification:
− Mobile phone To be able to use this library in a mobile phone, it should be inside the
mobile using the implementation of JSR-82 in the J2ME virtual machine, but it
depends of the device as the manufacturer, because someone creates their own
implementations of the library, or creates their own one Bluetooth library to support
Bluetooth access, been incompatible with JSR-82.
− Personal computer The use of that specification in a computer is really powerful,
but, it has some inconvenient been the first one the requirement to use external
libraries which normally do not offer full support of JSR-82, but permits to use the
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
In this chapter we will take a view of using Bluetooth in a personal computer using
Bluecove. Bluecove is an implementation of the JSR-82 bluetooth stack for Java, in different
operative systems, like Windows, Linux or MacOS, helping developers to use the JSR-82 in
any computer that have almost one of those operative systems and a Bluetooth device.
To be able to work with Bluetooth it is necessary to access to a group of functionalities,
been the more basic ones and the most important searching devices and querying them about
services, been able to use them later (JSR-82 webpage) to offer and using services between
mobile devices.
This package is divided among a collection of interfaces and classes, but we will take a
review of the most important ones that are used in this chapter:
3
http://bluecove.org/.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Java in Ambient Intelligence Applications 5
Interfaces:
L2CAPConection interface offers the primitives needed to interact with this protocol.
This kind of connection will work totally like a socket, been able to send an
undetermined amount of information in a one-way connection. This connection is
used in the Wiimote example that is explained further.
o boolean ready(): Tells if the connection is ready to send data.
o int receive(byte[] inBuf): Put in the buffer the received data, and tells about how
many data is received.
o void send(byte[] data): Send all the data in the vector.
• ServiceRecord : Offers access to service information, and defines some constants for
standard id’s about attributes. This class is intended to help devices to negotiate each
other about services and its restrictions, like authentication.
o int[] getAttributeIDs(): Received attributes.
o DataElement getAttributeValue(int attrID) : returns information about a desired
attribute.
o String getConnectionURL(int requiredSecurity,boolean mustBeMaster): creates a
connection string to the desired service, with the auntethication options implicit.
o RemoteDevice getHostDevice(): Get the RemoteDevice object associated with the
service.
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
6 J.A. Tejedor, Jose J. Durán, Miguel A. Patricio et al.
o boolean populateRecord(int[] attrIDs): fills the attribute list with the ones from the
list, if able, so the value of the attribute can be set.
o boolean setAttributeValue(int attrID, DataElement attrValue): changes an attribute
value.
o void setDeviceServiceClasses(int classes): set the device service classes, so the
device will be able to be recognized as one of a list of generic devices.
• ClientSession: Permits to use OBEX (OBject EXchange) primitives in a session
between mobile devices. As mentioned above, OBEX is a communications protocol
that facilitates the exchange of binary objects between devices. This connection is
similar as the one between a web client and a server, were the server sends a file to
the client telling about how is the file, and the file itself. The example of service
search uses this protocol as example of communication between devices, in this case
to be able to retrieve an image file.
o HeaderSet connect(HeaderSet headers): Creates a connection between devices throw
an OBEX service, with the desired information.
o HeaderSet createHeaderSet(): Creates a predefined HeaderSet with the information
needed for the service, and the attributes that are needed.
o HeaderSet disconnect(HeaderSet headers): Disconnects from the other device,
releasing the service.
o Operation get(HeaderSet headers): Creates a reception operation, to retrieve data
from the other device. The parameter is fill with connection properties.
o Operation put(HeaderSet headers): Creates a sending operation, been able to send
the announced data.
• HeaderSet : Contains the meta-information of the communication using OBEX,
defining the object attributes and authentication.
o void createAuthenticationChallenge(String realm, boolean userID, boolean access):
Creates a security mechanism, based in the realm pass prhase.
o Object getHeader(int headerID): return an attribute header. Normally it is an String,
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Classes:
Java Software and Embedded Systems, edited by Mattis Hayes, and Isaiah Johansen, Nova Science Publishers, Incorporated, 2010. ProQuest
Other documents randomly have
different content
“But does not the world need revolutionizing,” he said,
“according to your own principles?”
“We do what we can, at least we endeavor to do so, as far as we
are able.”
“Are you sure even of that?” he replied. “Are you sure it is not
mammon that you really worship, and not Christ? But I will say no
more. You are but mortal men as we were; and man is fallible and
weak, and our knowledge is but half-knowledge at best, and our
love and faith have but feeble wings to lift us above the earth on
which we dwell. Look upon us, therefore, as you would be looked
upon yourselves, and be not too stern on our shortcomings. We had
our vices and faults and deficiencies as you have yours, but we had
also our virtues, and were on the whole as high of purpose, as self-
sacrificing, as pure even as you; but man neither then nor now has
led an ideal life.
“But to return to what we were saying about our treatment of
Christians. Let me add in my own justification that I for myself never
had any hand in persecutions, either of Christians or of others, nor
was I ever aware that they were persecuted. I knew that persons
who happened to be Christians were punished for political offenses;
and that was all, I think, that happened. Believe me, my soul was
averse from all such things, nor would I ever allow even my enemies
to be persecuted, much less those who merely differed from me on
moral and philosophical theses. Nay, I may say they differed little
from me even on these points, as you may well see if you read my
letters on the subject of the proper treatment of one’s enemies,
written to Lucius Verus, or if you will refer to that little diary of mine
in Pannonia, wherein I was not so base as to lie to myself.”
“Indeed,” I cried; “that book is a precious record of the purest
and highest morality.”
“’Tis a poor thing,” he answered, “but sincere. I strove to act up
to my best principles; but life is difficult, and man is not wise, and
our opinions are often incorrect. Still, I strove to act according to my
nature; to do the things which were fit for me, and not to be
diverted from them by fear of any blame; to keep the divine part in
me tranquil and content; and to look upon death and life, honor and
dishonor, pain and pleasure, as neither good nor evil in themselves,
but only in the way in which we receive them. For fame I sought
not; for what is fame but a smoke that vanishes, a river that runs
dry, a lamp that soon is extinguished—a tale of a day, and scarcely
even so much? Therefore, it benefits us not deeply to consider it,
but to pass on through the little space assigned to us conformably to
nature, and in content, and to leave it at last grateful for what we
have received, just as an olive falls off when it is ripe, blessing
nature which produced it, and thanking the tree on which it grew.
So, also, it is our duty not to defile the divinity in our breast, but to
follow it tranquilly and obediently as a god, saying nothing contrary
to truth, and doing nothing contrary to justice. For our opinions are
but running streams, flowing in various ways; but truth and justice
are ever the same, and permanent, and our opinions break about
them as the waves round a rock, while they stand firm forever. For
every accident of life there is a corresponding virtue to exercise; and
if we consult the divine within us, we know what it is. As we cannot
avoid the inevitable, we should accept it without murmuring; for we
cannot struggle against the gods without injuring ourselves. For the
good we do to others, we have our immediate reward; for the evil
that others do to us, if we cease to think of it, there is no evil to us.
It is by accepting an offense, and entertaining it in our thoughts,
that we increase it, and render ourselves unhappy, and veil our
reason, and disturb our senses. As for our life, it should be given to
proper objects, or it will not be decent in itself; for a man is the
same in quality as the object that engages his thoughts. Our whole
nature takes the color of our thoughts and actions. We should also
be careful to keep ourselves from rash and premature judgments
about men and things; for often a seeming wrong done to us is a
wrong only through our misapprehension, and arising from our fault.
And so, making life as honest as possible and calmly doing our duty
in the present, as the hour and the act require, and not too curiously
considering the future beyond us, standing ever erect, and believing
that the gods are just, we may make our passage through this life
no dishonor to the Power that placed us here. Throughout the early
portion of my life, my father, Antoninus Pius,—I call him my father,
for he was ever dear to me, and was like a father,—taught me to be
laborious and assiduous, to be serene and just, to be sober and
kind, to be brave and without envy or vanity; and on his death-bed,
when he felt the shadow coming over him, he ordered the captain of
the guard to transfer to me the golden statuette of Fortune, and
gave him his last watchword of ‘Equanimity.’ From that day to the
day when, in my turn, I left the cares of empire and of life, I ever
kept that watchword in my heart—equanimity; nor do I know a
better one for any man.”
“Oh, tell me, for you know,” I cried, “what is there behind this
dark veil which we call death? You have told me of your opinions
and thoughts and principles of life, here; but of that life hereafter
you have not said a word. What is it?”
There was a blank silence. I looked up—the chair was empty!
That noble figure was no longer there.
“Fool that I was!” I cried; “why did I discuss with him these
narrow questions belonging to life and history, and leave that
stupendous question unasked which torments us all, and of which he
could have given the solution?”
I rose from my chair, and after walking up and down the room
several minutes, with the influence of him who had left me still filling
my being as a refined and delicate odor, I went to the window,
pushed wide the curtains, and looked out upon the night. The clouds
were broken, and through a rift of deep, intense blue, the moon was
looking out on the earth. Far away, the heavy and ragged storm was
hovering over the mountains, sullen and black, and I recalled the
words of St. Paul to the Romans:—
“When the Gentiles, which have not the law, do by nature the
things contained in the law, these, having not the law, are a law
unto themselves;” and “the doers of the law shall be justified.”
DISTORTIONS OF THE ENGLISH
STAGE AS INSTANCED IN
“MACBETH.”
Art is art because it is not nature, is the motto of the Idealisti;
Art is but the imitation of nature, say the Naturalisti. The truth lies
between the two. Art is neither nature alone, nor can it do without
nature. No imitation, however accurate, for imitation’s sake makes a
good work of art in any other than a mechanical sense. And every
work of art in which the objects represented are inaccurately or
imperfectly imitated is in so far deficient. But art works by
suggestion as well as by imitation. Whatever is untrue to the
imagination fails to produce its proper effect, however true it be to
the fact. The most absolute realism will not answer the higher
demand of the imagination for ideal truth. Art is not simply the
reproduction of nature, but nature as modified and colored by the
spirit of the artist. It is a crystallization out of nature of all elements
and facts related by affinity to the idea intended to be embodied.
These solely it should eliminate and draw to itself, leaving the rest as
unessential. A literal adherence to all the accidents of nature is not
only not necessary in art, but may even be fatal. The enumeration of
all the leaves in a tree does not reproduce a tree to the imagination,
while a whole landscape may be compressed into a single verse.
Between the ideal and the natural school there is a perpetual
struggle. Under the purely ideal treatment art becomes vague and
insipid; under the purely natural treatment it becomes literal and
prosaic. The Pre-Raphaelites, in protesting against weak
sentimentalism and vague generalization, and demanding an honest
study of nature, have fallen into the error of exaggerating the
importance of minute detail, and, by insisting too strongly on literal
truth, have sometimes lost sight of that ideal truth which is of higher
worth. But their work was needed, and it has been bravely done.
They have roused the age out of that dull conventionalism in which
it had fallen asleep. They have stimulated thought, revivified
sentiment, and reasserted with word and deed the necessity of
nature as a true basis of art.
As in the arts of painting and sculpture, so in the drama and on
the stage a strong reaction is taking place against the stilted
conventionalism and elaborate artifice of the last generation. Such
plays as the “Nina Sforza” of Mr. Troughton, the “Legend of
Florence” of Mr. Leigh Hunt, and the “Blot in the ‘Scutcheon” and
“Colombe’s Birthday” of Mr. Browning, are vigorous protests against
the feeble pretensions and artificial tragedies of the previous
century. The poems and plays of Mr. Browning breathe a new life;
and if as yet they have only found “fit audience though few,” they
are stimulating the best thought of this age, and slowly infusing a
new life and spirit into it.
But the traditions of the stage are very strong in England, and
are not easily to be rooted out. The English public has become
accustomed to certain traditional and conventional modes of acting,
which interfere with the freedom of the actor, and cramp his genius
within artificial forms. There is almost no attempt on the English
stage to represent life as it really is. Tradition and convention stand
in the stead of nature. From the moment an actor puts his foot on
the stage he is taught to mouth and declaim. He studies rather to
make telling points than to give a consistent whole to the character
he represents. His utterance and action are false and “stagey.” In
quiet scenes he is pompous and stilted; in tragic scenes, ranting and
violent. He never forgets his audience, but, standing before the
footlights, constantly addresses himself to them as if they were
personages in the play. Habit at last becomes a second nature; his
taste becomes corrupted, and he ceases to strive to be simple and
natural. There is, in a word, no defect against which Hamlet warns
the actor which is not a characteristic feature of English acting. It
never “holds the mirror up to nature,” but is always “overdone,”
without “temperance,” full of mouthing, strutting, bellowing, and
noise. It “tears a passion to tatters, to very rags, to split the ears of
the groundlings.” And “there be players that I have seen play, and
heard others praise, and that highly, not to speak it profanely, that,
having neither the accent of Christians nor the gait of Christian,
pagan, nor Turk, have so strutted and bellowed, that I have thought
some of Nature’s journeymen had made men, and not made them
well, they imitated humanity so abominably;” and this needs to be
reformed altogether.
These words of Shakespeare show that even in his time the
inflated, pompous, and artificial style still in vogue on the English
stage was a national characteristic. We have scarcely improved,
since old traditions cling and hold the stage in mortmain. Reform
moves slowly everywhere in England; but the two institutions which
oppose to it the most obstinate resistance are the church and the
theatre. In both of these tradition stands for nearly as much as
revelation. Each adheres to its old forms, as if they contained its true
essence; each believes that those forms once broken, the whole
spirit would be lost; just as if they were phials which contained a
precious liquid, and must be therefore preserved at all costs. The
idea that the liquid can be quite as well, and perhaps better, kept in
different phials has never occurred to them. They will die for the
phial.
Still it is plain that a strong reaction against this bigoted
admiration of traditional and conventional forms is now perceptible.
The facilities of travel and intercourse with other nations have
engendered new notions and modified old ones. It is impossible to
compare the French and Italian stage with the English, and not
perceive the vast inferiority of the latter. In the one we see nature,
simplicity, and life; in the other, the galvanism of artificial
convention. It cannot be denied that the recent acting of Hamlet by
Fechter was to the English mind a daring and doubtful innovation. It
was something so utterly different in spirit and style from that to
which we have been accustomed that it created a sensation; and
while it found many ardent admirers, it found quite as many
vehement opposers. The public ranged themselves in two parties;
the one insisting that the traditional and artificial school, as
represented by Garrick, the elder Kean, and Cooke, was the only
safe guide for the tragic actor; and the other arguing that as the
true function of the stage was to hold up the mirror to nature, acting
should be as much like life and as little like acting as possible. The
former, at the head of which were the friends of Mr. Charles Kean,
made a public demonstration in his behalf, and scouted these
newfangled French notions of acting. Was it to be supposed that any
school of acting could be superior to that created and established in
England by the genius of such actors as Garrick, the elder Kean, and
Cooke? Should foreigners presume to teach us how to interpret and
represent plays which had been the study of the English people for
centuries? To this it was opposed that, however mortifying to us, it
was a fact that the Germans had led the way to a profounder and
more metaphysical study of Shakespeare, and had taught us in
many ways how to understand his plays, and that therefore there
was no reason why foreigners might not teach us how to act them.
The very fact that their eyes were not blinded, nor their tongues tied
by traditional conventions, enabled them to study Shakespeare with
more freedom and directness. There was no deep rut of ancient
usage out of which they were forced to wrench themselves. And,
besides, it was affirmed, and with truth, that the English stage is the
jeer of the world, and needs thorough reform.
We have indeed made little progress in reforming the stage. Mr.
Charles Kean has devoted his talents to improving the wardrobe and
scenery, and has so far done good service; but in the essential
matter of acting we are nearly where we were in the past century.
While the background and dresses are reformed, and the bag-wig in
which Garrick played Hamlet is thrown aside, we have carefully
preserved all the old points, all the stage-tricks, and all the stilted
intonations of the artificial school; and the consequence is, that the
sole reality is in that which is the least essential. The attention is
thus withdrawn from the actor to the scenery, and we have a
spectacle instead of a tragedy. The background is real, but the actor
is conventional; the blanket has usurped the prominent place, and
Shakespeare has retired behind it. The bursts of genius with which
Garrick startled the house, and made the audience forget his bag-
wig, are wanting, but all his tricks are preserved; the corpse is still
there, but the spirit he put into it is gone.
In comedy there is as little resemblance to real life as in tragedy;
humor and wit are travestied by buffoonery and grimace. Instead of
pictures of life as it is, we have grotesque daubs and caricatures, so
exaggerated and farcical in their character as to “make the judicious
grieve.” The actor and the audience react upon each other. The
audience are generally uneducated, and for the most part agree with
Partridge in his comment on “Hamlet:” “Give me the king for my
money,” says he. The actors must bow to this low taste,—
“For they who live to please must please to live.”
But tradition has worse sins to answer for. It has not only ruined
our national acting, but in some cases has overshadowed the drama
itself, and perverted the meaning of some of the greatest plays of
Shakespeare. Hamlet is not Hamlet on the English stage; he is the
tall, imposing figure of John Kemble; dark, melodramatic, and
dressed in black velvet. Strive as we will, we cannot imagine him as
the light-haired Dane, easy and dreamy of temperament, “fat and
scant of breath,” essentially metaphysical, hating physical action,
and wanting energy to put his thoughts into deeds. The whole spirit
of the acted Hamlet is southern; that of the real Hamlet is purely
northern. We have indeed broken through an old tradition, according
to which, incredible as it may seem, Shylock used to be acted as a
comic character, though we are still far from a real understanding of
his character. But of all the plays of Shakespeare none is so grossly
misunderstood as “Macbeth.” Nor is this misapprehension confined
to the stage; it prevails even among those who have zealously
studied and admired Shakespeare. As John Kemble stands for
Hamlet in our imaginations, so does Mrs. Siddons for Lady Macbeth.
She has completely transformed this wonderful creation of
Shakespeare’s, distorted its true features, and so stamped upon it
her own individuality, that when we think of one we have the figure
of the other in our minds. The Lady Macbeth of Mrs. Siddons is the
only Lady Macbeth we know and believe in. She is the imperious,
wicked, cruel wife of Macbeth, urging on her weak and kindhearted
husband to abominable crimes solely to gratify her own ambitious
and evil nature. She is without heart, tenderness, or remorse.
Devilish in character, violent in purpose, she is the soul of the whole
play; the plotter and instigator of all its horrors; a fiend-like creature,
who, having a complete mastery over Macbeth, works him to
madness by her taunts, and relentlessly drives him on against his
will to the commission of his terrible crimes. We hate her, as we pity
Macbeth. He is weak of purpose, amiable of disposition, “full of the
milk of human kindness,” an unwilling instrument of all her evil
designs, who, wanting force of will and strength of character, yields
reluctantly to her infernal temptations.
Nothing could more clearly prove the great genius of Mrs.
Siddons, than that she has been able so to stamp upon the public
mind this amazing misconception, that, despite all the careful study
which of late years has been given to Shakespeare, this notion of
the character of Lady Macbeth and Macbeth should still prevail. Yet
so deeply is it rooted, and so universal, that whoever attempts to
eradicate it will find his task most difficult. But, believing it to be an
utter distortion of the characters as Shakespeare drew them, and so
at variance with the interior thought, conduct, and development of
the play as not only entirely to obscure its real meaning, but to
obliterate all its finest and most delicate features, we venture to
enter upon this difficult task.
Macbeth and his wife, so far from being the characters above
described, are their direct opposites. He is the villain, who can never
satiate himself with crimes. She, having committed one crime, dies
of remorse. She is essentially a woman—acts suddenly and violently,
and then breaks down, and wastes her life and thoughts in bitter
repentance. He is, on the contrary, essentially a man—who resolves
slowly and with calculation, but once determined and entered upon
a course of action, obstinately pursues it to the end, haunted by no
remorse for his crimes, and agitated by no regrets and doubts, so
long as his wicked plans do not miscarry. The spring of his nature is
28
ambition; and in working out his ends he is cruel, pitiless, and
bloody. He is without a single good trait of character; and from the
beginning to the end of the play, at every step, he develops deeper
abysses of cruelty and inhumanity in his nature. When he is first
presented to us, we, in common with Lady Macbeth, are completely
unaware of his baseness. He is a thorough hypocrite, and deceives
us, as he deceived her. We see that he has a grasping ambition, but
we believe that he is amiable and weak of purpose, for so Lady
Macbeth tells us; but as the play goes on, his character develops
itself, and at last we find that he has neither heart nor tenderness
for anybody or anything; that his will is unconquerable; that he is
utterly without moral sense, is hopelessly selfish, and wickedly cruel.
All he loves is power. His ambition is insatiable. It grows by what it
feeds on. The more he has, the more he desires, and he is ready to
commit every kind of horror for the sake of attaining his object. He
is restrained by no scruples of honor, by no claims of friendship, by
no sensitiveness of conscience. He murders his sovereign, from
whom he has just received large gifts and honors in his own house;
and then instantly compasses the death of his nearest friend and
guest, Banquo. Not content with this, he then seeks the life of
Macduff; and, enraged because he has fled, savagely and in cold
blood puts the whole of his family to the sword. There is a steady
growth of evil in his character from the beginning to the end, or
rather a steady development of his evil nature.
Malcolm and Macduff, who at first were his friends and
companions, afterwards, when they had learned to “know” him, call
him “treacherous” and “devilish.” So far from agreeing in the
character given of him by Lady Macbeth, they say,—
“Macduff. Not in the legions
Of horrid hell can come a devil more damned
In evil to top Macbeth.
So, too, when Macduff tells him that he was “not of woman born,”
awed for a moment by his superstitious fears, he cries,—
“Accursed be that tongue that tells me so,
For it hath cow’d my better part of man!
... I’ll not fight with thee.”
* * * * *
O, I could play the woman with my eyes.”
But when Macbeth is told of the death of his wife, he makes a little
poem, full of alliterations and conceits. It is an answer to the
question, What is life like? What can we say about it now?
“To-morrow, and to-morrow, and to-morrow,
Creeps in this petty pace from day to day,
To the last syllable of recorded time;
And all our yesterdays have lighted fools
The way to dusty death. Out, out, brief candle!
Life’s but a walking shadow; a poor player,
That struts and frets his hour upon the stage,
And then is heard no more: it is a tale
Told by an idiot, full of sound and fury,
Signifying nothing.
Enter a Messenger.
Thou com’st to use thy tongue; thy story quickly.”
Has this any relation to true feeling? Do men of any feeling, whose
hearts are touched, fall to improvising poems like this, filled with
fanciful images, when great sorrows come upon them? This speech
is full of “sound and fury, signifying nothing.” There is no accent
from the heart in it. It is elaborate, poetic, cold-blooded. “Life is a
candle,” “a poor player,” “a walking shadow,” “a tale told by an idiot.”
We have his customary alliterations: “petty pace,” “dusty death,”
“day to day;” his love of repeating the same word, “to-morrow, and
to-morrow, and to-morrow,” just as we have “If it were done when
’tis done, then ’twere well it were done quickly;” and his “Sleep no
more, Macbeth does murder sleep,—sleep, that knits up,” etc.;
“Sleep no more! Glamis hath murdered sleep; and therefore Cawdor
shall sleep no more, Macbeth shall sleep no more.” He cannot forget
himself enough to cease to be ingenious in his phrases. As a poem
this speech is striking; as an expression of feeling it is perfectly
empty. At the end of it he has quite forgotten the death of his wife;
he is only employed in piling up figure after figure to personify life.
What renders the unreality of this still more striking is the sudden
change which comes over him upon the entrance of the messenger.
In an instant he stops short in his poem, and his tone becomes at
once decided and harsh; his wife’s death has passed utterly out of
his mind. When the messenger tells him that Birnam Wood is
beginning to move, with a sudden burst of rage he turns upon him,
calls him liar and slave, and threatens to hang him alive till famine
cling him, if his report prove to be incorrect. This is the real
Macbeth. From this time forward he never alludes to Lady Macbeth;
but, in a strange condition of superstitious fear and soldierly
courage, he calls his men to arms, and goes out crying,—
“Blow, wind! come, wrack!
At least we’ll die with harness on our back.”
Then, after some questions about killing his guest, his kinsman, his
king, which would seem honest, but for what comes after and for
the utter reckless immorality which has gone before these words, his
imagination excites itself, and runs into a wild and extravagant figure
which means nothing. Duncan’s virtues, he says,—
“Will plead like angels trumpet-tongued against
The deep damnation of his taking-off.”
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookultra.com