One of the major problems in constructing knowledge-based systems is so-called verification, i.e. ensuring the system's knowledge is correct in some sense. This problem is felt particularly acutely in safety criti...
详细信息
One of the major problems in constructing knowledge-based systems is so-called verification, i.e. ensuring the system's knowledge is correct in some sense. This problem is felt particularly acutely in safety critical systems, where of course inclusion of incorrect knowledge may threaten life. The safety of a new chemical plant is ensured by an extensive review of its design, control and operability called a Hazard and Operability (HAZOP) Study. This means that design data which has been reviewed through the HAZOP study can be regarded as conforming with the safe operation of the plant. This paper discusses an automatic method of extracting knowledge from the results of the HAZOP study for use in knowledge-based systems. Although additional knowledge (for example more general knowledge of physics or fault diagnosis) may be required to build a complete application, the method in effect provides verification 'for free' of a substantial part of the knowledge base.< >
The Delta-4 project, carried out within the framework of the European Strategic Programme for Research in Information Technology (ESPRIT), has defined an open, fault-tolerant distributed computing architecture for use...
详细信息
The Delta-4 project, carried out within the framework of the European Strategic Programme for Research in Information Technology (ESPRIT), has defined an open, fault-tolerant distributed computing architecture for use in application areas such as computer-integrated manufacturing, process control and office automation. The project has demonstrated its architecture via Unix-based implementations running demonstration applications at Credit Agricole (a credit card authorisation system) and Renault (a process control application within an integrated manufacturing cell). The Delta-4 approach to fault-tolerance is based upon the replication of software components on distinct host computers using a range of different replication strategies. The author presents an overview of the Delta-4 architecture, and of the facilities which it provides for supporting the requirements of real-time systems with respect to throughput and response. The problems of replica divergence are discussed, and a solution based on message selection and pre-emption synchronisation messages is proposed.< >
Acumen is a collaborative research project whose goal is to define the requirements of an applications platform which will support the integration of software products in process and manufacturing industry thereby enh...
详细信息
Acumen is a collaborative research project whose goal is to define the requirements of an applications platform which will support the integration of software products in process and manufacturing industry thereby enhancing the useability and effectiveness of such products. A prototype applications platform is produced and demonstrated. The object oriented paradigm has been adopted throughout the project, with P. Cood and E. Yourdon's (1991) methodology being used for analysis and design. The applications platform itself is implemented in C/sub ++/ in a Unix environment. The authors described the basic architecture of the applications platform and discuss some of the constraints upon its design.< >
The FLAMES environment fully utilises state-of-the-art graphics hardware to provide the user with a powerful and highly versatile multi-platform scenario evaluation capability. The environment is multi-faceted, and ad...
详细信息
The FLAMES environment fully utilises state-of-the-art graphics hardware to provide the user with a powerful and highly versatile multi-platform scenario evaluation capability. The environment is multi-faceted, and addresses both the training and simulation aspects of cooperative networked system implementation and usage. Although originally designed for the evaluation of military scenarios, by virtue of its generic framework and modular structure, the FLAMES environment has numerous application areas, from military air, land and naval simulation, through civil air traffic control simulation and emergency planning, to the closed loop training of personnel interacting with such systems. To explain the widescale applicability of the FLAMES environment, the author addresses both the modelling objectives and the potential application areas for the environment. Particular emphasis is placed on identifying analogous modelling specifications in both the military and commercial arenas. This has been done in order to highlight commercial applications which may not be as apparent as their military counterparts.< >
The author gives an insight into BT's experience in the interconnection of LANs used to support its own internal commercial computingapplications. He describes the current drivers for change and explains the curr...
详细信息
The author gives an insight into BT's experience in the interconnection of LANs used to support its own internal commercial computingapplications. He describes the current drivers for change and explains the current strategic developments. The paper focuses on the wide area networking issues created by the need to provide a large number of remote LANs with access to nationwide computing resources.< >
The documentation needed by users of computer systems is always a problem, particularly if their system is to be applied in real time or interactive applications. The iee have produced a guide to help users to make su...
详细信息
The documentation needed by users of computer systems is always a problem, particularly if their system is to be applied in real time or interactive applications. The iee have produced a guide to help users to make sure that they ask for and are provided with the software documentation that they need. The authors consider The Guidelines for the Documentation of Computer Software for Real Time and Interactive Systems which provides users with comprehensive guidelines for the documentation of software over the life cycle of the required system.< >
There is now a significant effort to apply electronic engineering, information technology and telecommunications to develop alternative approaches to improve the overall efficiency of the vehicle, its driver and passe...
详细信息
There is now a significant effort to apply electronic engineering, information technology and telecommunications to develop alternative approaches to improve the overall efficiency of the vehicle, its driver and passengers. This is a very new market with little hard commercial evidence of the demand for the various services that could be provided. The initial systems are addressing specific requirements (e.g. road tolls) and engineered for the minimum cost to achieve a specific function. The applications are tightly coupled to the chosen communications system. Several incompatible implementations of the same functionality emerge. However, as the number of services available increases the user may want access to several such services packaged into a single terminal.< >
With current RISC performances being matched or even surpassed by CISC processors like the MC68040, the future direction for RISC lies in the concept of multiple execution machines where multiple instructions are exec...
详细信息
With current RISC performances being matched or even surpassed by CISC processors like the MC68040, the future direction for RISC lies in the concept of multiple execution machines where multiple instructions are executed per clock. Although, the basic tenets of RISC design of fixed instruction length, regular decoding, and non-destructive data operations offer a big advantage over CISC architectures in implementing such designs, there are still several problems to overcome. The ease of solution is frequently dependent on architectural decisions made early in its implementation. The author examines the Motorola MC88100 processor architecture and explains why certain key features were implemented and their benefit to later generations like the forthcoming MC88110 in breaking the one instruction per clock barrier. Topics discussed include data dependency between instructions and some suggested optimising techniques, pipeline control and its importance, condition evaluation, and a brief overview of the MC88110.< >
Concerns how British Telecom has undertaken an ambitious program of modernisation in its telecommunications network. In order to derive full service and cost benefits from modernisation and exploit the opportunities f...
详细信息
Concerns how British Telecom has undertaken an ambitious program of modernisation in its telecommunications network. In order to derive full service and cost benefits from modernisation and exploit the opportunities for monitoring and control of the network provided by network digitalisation British Telecom has adopted a strategy known as Total Network Management. The object of Total Network Management is to maximise its effectiveness by co-ordinating activities related to its utilisation and serviceability. These activities include performance monitoring of transmission systems, scheduling of repairs for transmission and switching systems, monitoring of equipment utilisation, prediction of equipment failure, allocation of transmission equipment with available capacity to meet urgent network demands and future planning of extensions to network capacity. One of the objectives of the MAIN project at BTRL is to explore possible applications of distributed artificial intelligence to support the objectives of Total Network Management.< >
The manipulation of components by a robot in an automatic manufacturing process (AMP) requires knowledge about each component's location and orientation. A 3-D representation of the robot's workspace is thus r...
详细信息
The manipulation of components by a robot in an automatic manufacturing process (AMP) requires knowledge about each component's location and orientation. A 3-D representation of the robot's workspace is thus required. In the work presented the 3-D representation is built up using information obtained from robot mountable CCD cameras positioned around the workspace. Each camera is connected to a transputer which is responsible for preprocessing the extracted data before its subsequent use. The process of extracting the information from the cameras is separated from the processes that use this information. This separation of information provider from information user enables the software that controls the cameras (and even the cameras themselves) to be upgraded with no corresponding changes to the information user software. The paper outlines the procedure whereby the model of the workspace is constructed and subsequently used to locate the components within it.< >
暂无评论