This paper will be a joint presentation on an issue for both Academic Computing Support (ACS, the user services group at Clemson) and the Division of Administrative programming Services (DAPS, the administrative data ...
详细信息
Abstract We describe a program for verifying that a set of rules in an expert system eomprehensively spans the knowledge of a specialized domain. The program has been devised and tested within the context of the ONCOC...
Abstract We describe a program for verifying that a set of rules in an expert system eomprehensively spans the knowledge of a specialized domain. The program has been devised and tested within the context of the ONCOCIN System, a rule-based consultant for clinical oncology The stylized format of ONCOCIN's rules has allowed the automatic detection of a number of common errors as the knowledge base has been developed This capability suggests a general mechanism for correcting many problems with knowledge base completeness and consistency before they can cause performance errors
Summary Eurisko is an AI program that learns by discovery We are applying Eurisko to the task of inventing new kinds of three-dimensional microelectronic devices that can then be fabricated using recently developed la...
Summary Eurisko is an AI program that learns by discovery We are applying Eurisko to the task of inventing new kinds of three-dimensional microelectronic devices that can then be fabricated using recently developed laser recrystallization techniques Three experiments have been conducted, and some novel designs and design rules have emerged.
One of the most serious problems encountered in Naval steam plants following World War II was the unreliable performance of boiler and main feedpump pneumatic control systems. In addition to control component and syst...
One of the most serious problems encountered in Naval steam plants following World War II was the unreliable performance of boiler and main feedpump pneumatic control systems. In addition to control component and system design deficiencies, these control systems suffered from inadequate methods to measure and adjust system alignment. This paper describes the development of a set of procedures for on-line alignment verification (OLV) of pneumatic main boiler and feedpump control systems. The procedures are designed for use by N avy control system technicians and, in addition to on-line alignment verification, provide guidance for troubleshooting and for performing system alignment. Procedure static checks measure steady state steaming performance and OLV procedure dynamic checks measure the ability of the boiler and control systems to respond to load changes. The paper describes typical control system characteristics that influence OLV procedure content and the supporting analysis that was used to establish alignment criteria ranges that satisfy both steady state and transient performance requirements. Also described is the alignment criteria tolerance analysis along with the steps involved in a typical OLV check procedure development. Descriptions of the various OLV checks, troubleshooting procedures and alignment procedures are provided. Typical shipboard implementation requirements are described and experience to date with the procedures is provided along with a status report on OLV procedure implementations.
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substi...
详细信息
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substitution, to authenticate system users, to authenticate data, and to provide digital signatures using a nonpublic key encryption algorithm. Key notarization facilities give users the capability of exercising a set of commands for key management as well as for data encryption functions. The facilities perform notarization which, upon encryption, seals a key or password with the identities of the transmitter and intended receiver. Thus, in order to decrypt a message, the receiver must authenticate himself and supply the correct identity of the transmitter. This feature eliminates the threat of key substitution which must be protected against to attain a high level of security.
A method is described for cartographically illustrating interstate flows of federal monies within the contiguous United States, using as data the differences between government collections and expenditures by state. I...
A method is described for cartographically illustrating interstate flows of federal monies within the contiguous United States, using as data the differences between government collections and expenditures by state. It is assumed that movements between surplus and deficit areas are governed by a potential field, for which the driving potential can be interpreted as political “strength.'’Resulting computer-drawn maps reveal Frostbelt-Sunbelt flows as well as flows toward New England and Washington state. The cumulated total movement, or flux, yields a 48-by-48 table of interstate transfers. These are likewise mapped by computer, the state centroids being connected by arrows whose width is proportional to the magnitude of flows.
Cities have become increasingly interdependent. Yet we continue to think of the urban landscape in terms of mutually exclusive, monocentric regions. Data from New England suggest a richer, overlapping geography of met...
Cities have become increasingly interdependent. Yet we continue to think of the urban landscape in terms of mutually exclusive, monocentric regions. Data from New England suggest a richer, overlapping geography of metropolitan-area commuting fields. New ways of conceptualizing flow-based systems are needed to understand urban settlement patterns better.
作者:
HARTLEY, SFCalifornia State University
Hayward Corresponding Author: Shirley Foster Hartley is Professor and former Chair of the Department of Sociology California State University Hayward. Books published include: Population: Quantity vs. Quality (Prentice-Hall) and Illegitimacy (University of California Press). Articles published and research interests vary from micro-analyses of interpersonal attraction role conflicts among clergy wives and marital satisfaction to macro studies of the status of women in various societies and population growth and development. ∗An earlier draft was prepared in conjunction with William J. Beaver whose expertise in computer programming greatly facilitated this analysis. The report on our pilot study was presented at the American Association for the Advancement of Science Pacific Division San Francisco CA June 13 197
暂无评论