Adjustable speed drive systems using AC‐machines are often fed by voltage‐source inverters. This paper presents a new strategy to control the line‐side converter. State‐space and fuzzy methods are combined to achi...
This paper describes the implementation of transmission-line matrix (TLM) method algorithms on a massively parallel computer (DECmpp 12000), the technique of distributed computing in the UNIX environment, and the comb...
详细信息
This paper describes the implementation of transmission-line matrix (TLM) method algorithms on a massively parallel computer (DECmpp 12000), the technique of distributed computing in the UNIX environment, and the combination of TLM analysis with Prony's method as well as with autoregressive moving average (ARMA) digital signal processing for electromagnetic field modelling. By combining these advanced computation techniques, typical electromagnetic field modelling of microwave structures by TLM analysis can be accelerated by a few orders of magnitude.
Contents and implementation of a computer laboratory for undergraduate electromagnetics are described. The laboratory consists of four 3-hour sessions covering vector calculus, Maxwell's equations (integral and di...
Contents and implementation of a computer laboratory for undergraduate electromagnetics are described. The laboratory consists of four 3-hour sessions covering vector calculus, Maxwell's equations (integral and differential forms), wave propagation in materials, and wave behavior at planar interfaces. Each session contains theory (in the Help file), animations (where relevant) and a quiz. The program runs on IBM compatible 486-based PCs in a Windows environment and uses the Borland C ++ 4.0 compiler.
作者:
Karam, GeraldTRIO
Telecommunications Software Methods Project Real-time and Distributed Systems Group Department of Systems and Computer Engineering Carleton University 1125 Colonel By Drive Ottawa Ontario CANADA K1S 5B6
A timeline is a linear, graphical visualization of events over time. For example, in concurrent application, events would represent state changes for some system object (such as a task or variable). A timeline display...
详细信息
ISBN:
(纸本)9780897916837
A timeline is a linear, graphical visualization of events over time. For example, in concurrent application, events would represent state changes for some system object (such as a task or variable). A timeline display generator creates the graphical visualization from some record of events. This paper reports on a model for timeline display generators based on a formal model of event history and the objectives of timeline visualization. In this model, any timeline display generator is completely described through the definition of a set of mathematical functions. The exact characteristics and flexibility of a particular implementation of a timeline display generator, depends on the way in which these functions have been implemented. The current prototype, xtg, (Timeline Display Generator for X-windows) serves as an example implementation of these ideas. Characteristics of xtg are presented, and its use in the analysis of a real-world client-server application is discussed. Xtg has been applied to several other applications to-date and is being applied by several telecommunications companies to areas ranging from software process analysis to call trace data analysis.
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their u...
详细信息
ISBN:
(纸本)9780897917322
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their use also presents a serious security problem because a command script from a sender may access/modify receiver's private files or execute applications on receiver's behalf. Existing solutions to the problem either severely restrict I/O capability of scripts, limiting the range of applications that can be supported over computational e-mail, or permit all I/O to scripts, potentially compromising the security of the receiver's files. Our model, called the intersection model of security, permits I/O for e-mail from trusted senders but without compromising the security of private files. We describe two implementations of our security model: an interpreter-level implementation and an operating systems-level implementation. We discuss the tradeoffs between the two implementations and suggest directions for future work.
The ability to share synchronized views of interactions with an application is critical to supporting synchronous collaboration. This paper suggests a simple synchronous collaboration paradigm in which the sharing of ...
详细信息
A corner is modelled as the intersection of two lines. A corner point is that point on an input digital arc whose a posteriori probability of being a corner is the maximum among all the points on the arc. The performa...
详细信息
A corner is modelled as the intersection of two lines. A corner point is that point on an input digital arc whose a posteriori probability of being a corner is the maximum among all the points on the arc. The performa...
详细信息
A corner is modelled as the intersection of two lines. A corner point is that point on an input digital arc whose a posteriori probability of being a corner is the maximum among all the points on the arc. The performance of the corner detector is characterized by its false alarm rate, misdetection rate, and the corner location error all as a function of the noise variance, the included corner angle, and the arc length. Theoretical expressions for the quantities compare well with experimental results.< >
Domain based testing (DBT) is a test generation method based on two concepts from software reuse, domain analysis and domain modeling. We applied DBT to command-based systems where the domain model represents the synt...
详细信息
Domain based testing (DBT) is a test generation method based on two concepts from software reuse, domain analysis and domain modeling. We applied DBT to command-based systems where the domain model represents the syntax and semantics of the command language. The domain model drives the generation of test cases. The test generation process consists of three stages: scripting; command template generation; and parameter value selection. Because it is based on ideas from software reuse, DBT also provides a good structure for test case reuse. Production use of the DBT tool Sleuth to generate system tests for an automated robot tape library confirms that DBT provides a wide variety of test case reuse scenarios.< >
This paper describes the software Technology Risk Advisor (STRA), a knowledge-based softwareengineering tool that provides assistance in identifying and managing software technology risks. The STRA contains a knowled...
详细信息
This paper describes the software Technology Risk Advisor (STRA), a knowledge-based softwareengineering tool that provides assistance in identifying and managing software technology risks. The STRA contains a knowledge base of software product and process needs, satisfying capabilities and capability maturity factors. After a user ranks the importance of relevant needs to his or her project, the STRA automatically infers risk areas by evaluating disparities between project needs and technology maturities. Identified risks are quantitatively prioritized and the user is given risk reduction advice and rationale for each conclusion. This paper presents methods used in the STRA, along with discussions of knowledge acquisition experimental results, current status, and related work.< >
暂无评论