A recently introduced baseband digital technique for electric power line communication using power signal waveform modification is discussed, and its error probability performance is studied as a function of critical ...
详细信息
A recently introduced baseband digital technique for electric power line communication using power signal waveform modification is discussed, and its error probability performance is studied as a function of critical parameters of the technique and signal-to-noise ratio. The technology, which is insensitive to fluctuations in power signal amplitude, frequency, and waveshape, is a generalized form of amplitude shift keying, dubbed partial amplitude shift keying.< >
The appeal of Object Oriented systems and methodologies is that they provide conceptually simple and powerful tools to represent the real-world. The essential elements of object orientation include: information hiding...
详细信息
Modern CAD environments for controlsystemsengineering have begun to support substantial functionality beyond modeling, numerical analysis, and simulation. Three major areas that have emerged in the last five years a...
详细信息
Modern CAD environments for controlsystemsengineering have begun to support substantial functionality beyond modeling, numerical analysis, and simulation. Three major areas that have emerged in the last five years are advanced user interfaces, data-base management, and expert-systems support ("expert aiding"), In addition, there has been a steady thrust to integrate more completely the various functionalities and software that comprise computer-aided controlengineering (CACE). These trends have produced CACE environments which have relatively modest improvements in numerical quality but a vastly different "feel" in terms of integration, support, and "user friendliness. The basic considerations and requirements for a CACE user interface (UI), data-base manager (DBM), and expert aicling are discussed in detail. In many cases, these will be illustrated by examples based on various CACE software suites including the new GE MEAD CACE environment; the basic thrust will be to define needs and show how these can be met. The GE MEAD Project involves the integration of powerful CACE packages under a supervisor which coordinates the execution of these packages with a modern UI, a CACE-oriented DBM, and an expert system. The user interface is designed to facilitate access to the CACE package capabilities by users with widely different levels of familiarity with the environment. The data-base manager keeps track of system models that evolve over time and associates each analysis or design result with the correct model instance. The expert system supplies the machinery for expert aiding complicated or heuristic procedures to free the user from low-level detail and tedium. This system thus exemplifies the trends mentioned above
A telegraphic technique for electronic-mail correspondence between industry-standard PC facilities equipped with a writing tablet is described. Algorithms for encoding graphical information into the fixed-word format ...
详细信息
A telegraphic technique for electronic-mail correspondence between industry-standard PC facilities equipped with a writing tablet is described. Algorithms for encoding graphical information into the fixed-word format used in the common message-handling architectures are discussed. It is proposed to adopt differential chain encoding which allows an efficient representation of graphics as strings of ASCII-compatible bytes. telematic service that is feasible with this PC networking approach is compared to standard facsimile transmission of compound documents with text and graphics.
Maximum-likelihood soft-decision decoding of linear block codes is addressed. A binary multiple-check generalization of the Wagner rule is presented, and two methods for its implementation, one of which resembles the ...
详细信息
Maximum-likelihood soft-decision decoding of linear block codes is addressed. A binary multiple-check generalization of the Wagner rule is presented, and two methods for its implementation, one of which resembles the suboptimal Forney-Chase algorithms, are described. Besides efficient soft decoding of small codes, the generalized rule enables utilization of subspaces of a wide variety, thereby yielding maximum-likelihood decoders with substantially reduced computational complexity for some larger binary codes. More sophisticated choice and exploitation of the structure of both a subspace and the coset representatives are demonstrated for the (24, 12) Golay code, yielding a computational gain factor of about 2 with respect to previous methods. A ternary single-check version of the Wagner rule is applied for efficient soft decoding of the (12, 6) ternary Golay code.< >
This paper describes a Fault Explanation System (FES) that AIDS in the diagnosis of failures in discrete event systems such as certain manufacturing processes. These systems are characterized by the use of programmabl...
详细信息
To increase task flexibility in a robotic assembly environment, a hierarchical planning and execution system is being developed which will map user-specified 3D part assembly tasks into various target robotic work cel...
详细信息
Research in artificial neural networks has generally emphasized homogeneous architectures. In contrast, the nervous systems of natural animals exhibit great heterogeneity in both their elements and patterns of interco...
Research in artificial neural networks has generally emphasized homogeneous architectures. In contrast, the nervous systems of natural animals exhibit great heterogeneity in both their elements and patterns of interconnection. This heterogeneity is crucial to the flexible generation of behavior which is essential for survival in a complex, dynamic environment. It may also provide powerful insights into the design of artificial neural networks. In this paper, we describe a heterogeneous neural network for controlling the walking of a simulated insect. This controller is inspired by the neuroethological and neurobiological literature on insect locomotion. It exhibits a variety of statically stable gaits at different speeds simply by varying the tonic activity of a single cell. It can also adapt to perturbations as a natural consequence of its design.
A system for the automatic dimensional inspection of machined industrial parts is under development. Key attributes of the system are its use of design knowledge, i.e. the CAD (computer-aided design) description of th...
详细信息
A system for the automatic dimensional inspection of machined industrial parts is under development. Key attributes of the system are its use of design knowledge, i.e. the CAD (computer-aided design) description of the part to be inspected and the strategic use of diverse sensors to generate geometric descriptions of the actual part being inspected as well as the designer's conception of the part. Inspection reduces to the simple comparison of all components of the two models with a correct interpretation of the designer's specified tolerances. Sensors are used in a strategic manner, low-cost sensors, such as those for vision, are used for low-tolerance measurements, and higher-cost sensors, such as coordinate-measuring machines or surface probes, are used to refine object features until all object features have been compared between the CAD model and the actual object being inspected.< >
A bus structured local area network for distributed process controlsystems is introduced. The general requirements for such a local area network are listed. The features of the network are introduced and the arbitrat...
详细信息
A bus structured local area network for distributed process controlsystems is introduced. The general requirements for such a local area network are listed. The features of the network are introduced and the arbitration methods are discussed. Two arbitration methods in order to achieve the best use of the bandwidth of the network are implemented. On the one hand cyclic transmission of data, on the other hand event driven transmission is used. Two arbitration methods for event driven transmission are shown: a solution which uses event polling and a solution which uses collision detection and collision resolution to resolve concurrent bus requests. Both solutions are discussed. The expected performance of the solutions are shown.
暂无评论