[1991 Proceedings] The Twenty-Third Southeastern Symposium on System Theory

10-12 March 1991

Filter Results

Displaying Results 1 - 25 of 121
  • Proceedings. The Twenty-Third Southeastern Symposium on System Theory

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (452 KB)
    Freely Available from IEEE
  • Representation of a curved boundary

    Publication Year: 1991, Page(s):84 - 88
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB)

    A method of representing a boundary curve is presented. The proposed method first partitions a boundary into segments by curvature zero-crossings. Inflection points on the boundary are extracted as curvature zero-crossings using the convexity/concavity of points with respect to their neighbor points. Each segment is then approximated by a parametric cubic polynomial, and the boundary curve is repr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fiber-optic components for LANs and data communications

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (34 KB)

    Summary form only given. Fiber optic local area networking (FOLAN) is rapidly becoming a reality. It has gone from an engineering curiosity to a commercially available product within the last few years thanks to the emerging standards and general acceptance of fiber optics. FOLANs are ideal for high-speed data transport. They eliminate ground loop problems; the media does not require shielding and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposed automated data analysis for nuclear waste vitrification at SRS: a case study

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (58 KB)

    Summary form only given. The Savannah River Site (SRS), in operation since the early 1950s, produces plutonium and tritium. About 70 million gallons of radioactive waste have been generated and stored on the site in tanks. The Defense Waste Processing Facility (DWPF) will immobilize this high-level radioactive waste by converting it into a stable borosilicate glass waste form suitable for long ter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A student modeling system for ITCDD: an intelligent tutor for CMOS digital design

    Publication Year: 1991, Page(s):373 - 378
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Modeling the state of knowledge a student has during a problem solving process is one of the most difficult tasks in intelligent tutoring systems (ITS) research. The paper describes the implementation of an ITS that teaches CMOS digital circuit design. The overall goal is to teach circuit design at the undergraduate level, while the specific aim is to design a student modeling module (SMM) that ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The integrated management of measurement entities distributed over interconnected networks

    Publication Year: 1991, Page(s):524 - 528
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Presents the design of a simple application layer protocol, the framework of which permits the implementation of management functions is providing the integrated management of measurement entities distributed over interconnected networks. High performance passive monitors examine all traffic on their individual network segments and learn relevant information necessary to provide LAN standards to o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical radiograph classification by pattern recognition

    Publication Year: 1991, Page(s):70 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Labrador retrievers can be affected by a syndrome that is characterized by ocular and skeletal dysplasia. The skeletal dysplasia takes the form of bone lesions that are confined to the appendicular skeleton. These lesions are characterized by shortened and abnormally shaped bones, and abnormal joint morphology. Elimination of the abnormal gene from the breed would require the identification of car... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust analysis of optimal flow control for reducing fluid transients

    Publication Year: 1991, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    In this paper, the control robustness of the optimal flow control for eliminating nonlinear fluid transients is analyzed to assure that the control system can still perform transients reduction when the system is subjected to uncertainty. Effects of the system uncertainties on the control stability and accuracy are studied. For conducting quantitative analysis, disturbances were imposed to represe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the nature of the instabilities of bistable electron devices

    Publication Year: 1991, Page(s):369 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    The intrinsic bistability in resonant tunneling devices and its application for multilevel logic devices is examined. The results indicate that commonly accepted bistability is actually a tristability. The third stable configuration could have a major effect in the operation of high speed logic devices. Furthermore, the nature of the third state in a bistable system results in a better understandi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security requirements and models in open systems

    Publication Year: 1991, Page(s):518 - 523
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Provides a pragmatic overview of design requirements that are dictated in official documents regarding the security in standardized open computer systems. The main focus is on publicized military and commercial security requirements. However, some commonly discussed security modes meeting these requirements are placed into context View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I/O interfacing for the transputer

    Publication Year: 1991, Page(s):488 - 495
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    As transputer-based parallel computing networks are cast into more diverse and demanding roles, one requirement remains unchanged-the need to communicate with traditional I/O devices. Applications requiring high-volume multistream I/O communications demand superior resource management. Therefore, a capability must exist in hardware that allows the operating system to perform dynamic load balancing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation application in facility expansion decision-making

    Publication Year: 1991, Page(s):65 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    A manufacturing company wanted to expand its capacity to produce plastic parts. The expansion could cost several million dollars. To decide how many plastic molding presses should be purchased, a computer simulation study was conducted. The object of the study was to find the quantity and type of equipment needed to satisfy production requirements in a just-in-time environment. The model of the pl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Existence of linear feedback control for certain types of global stability

    Publication Year: 1991, Page(s):46 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Deals with a class of nonlinear control systems of the form x'=Ax+f(x)+Bu where the nonlinear term f(x) is quadratic and has the orthogonality property xTf(x)=0 for all x. In the context of Lyapunov's second method, the existence of a linear feedback control u=Kx is examined. Sufficient conditions are discussed for the system to be controlled to a system with the origin as a global asym... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAD tool integration for ASIC design: an end-users perspective

    Publication Year: 1991, Page(s):363 - 368
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The increasing complexity of VLSI design and the demand for quick-turnaround ASICs has forced the designer to choose the best CAD tools available from different vendors and integrate them into a customized and comprehensive CAD system. Vendors have developed comprehensive but open systems, called CAD frameworks, to ease the process of CAD tool integration. This paper describes the ASIC development... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer viruses

    Publication Year: 1991, Page(s):513 - 517
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    This paper presents an overview of the main categories of malicious programs known as Trojan horses, viruses, bacteria, worms, and logic bombs. The focus is on their general behavior and the properties seen in their implementations rather than the ultimate effects or their intended destructive behavior. Possible preventive measures are also discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LSIM: a parallel programming environment for large-scale numerical computations

    Publication Year: 1991, Page(s):483 - 487
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    This paper presents the work done in developing a Common LISP programming environment, to aid applications programmers solving large-scale numerical problems on hypercube architectures. The power of abstraction of Common LISP along with the speed of C programming language have been combined to develop this environment. The inherent parallelism and asynchronous operation of data-flow graphs are put... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations in the use of a dedicated VLSI DSP chip for real time signal processing

    Publication Year: 1991, Page(s):106 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Considers the hardware, software and the system architecture of the Motorola DSP56001. A Macintosh IIx is the `Host' computer system used in software development. The possible potential of the DSP56001ADS as an instrument for teaching and as a research tool are investigated. Much of the discussion focuses on the DSP56001 VLSI DSP chip, on the available software tools and how they facilitate system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel structure for recursively updating the covariance matrix for real-time image processing applications

    Publication Year: 1991, Page(s):123 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The paper presents a time optimal parallel architecture for the inversion of a special class of Range-Hermitian matrices. In particular, the paper derives recursive equations for the computation of the covariance matrices, which are a sub-class of Range-Hermitian matrices. The derived recursive equations update the covariance matrix and its inverse taking into account all the previous parameters. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A state space approach to determining solutions to Maxwell's equations for a one-dimensional dispersive medium

    Publication Year: 1991, Page(s):410 - 413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    The problem of propagation in linear dispersive medium with initial conditions is a problem that is incompletely treated. The authors discuss five different methods for solving this problem using a linear system approach. It is shown that the Fourier transform is not a proper tool for solving this problem. The Laplace transform is then shown to work for one type of linear system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RKH space methods for factoring the covariance operator

    Publication Year: 1991, Page(s):319 - 322
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Given discrete versions of the noise and response covariance functions for a linear hereditary system, an algorithm is presented to obtain an approximation to the system input/output operator. In order that the algorithm apply to a given covariance function, certain mild assumptions have to be made on the input/output operator and the noise process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time neural networks: conjunctoid parallel implementation

    Publication Year: 1991, Page(s):597 - 601
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    Conjunctoids are model-based neural networks for categorical data, having features that include: generality, with special cases ranging from simple perceptron-like linear versions to full-blown versions that account for all possible associations among external variables; continuous learning and performance, with provisions for optimal updating as each new datum is received, based on Bayes decision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time design of an acoustic signal detection algorithm using the AT&T DSP32 development system

    Publication Year: 1991, Page(s):385 - 388
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    Presents a real-time signal processing system which incorporates a pattern recognition system for detecting narrowband and broadband signals in the presence of noise. The system-based on the AT&T Bell Laboratories DSP32 microprocessor-detects and classifies signals by extracting parameters of the power spectrum. From the extracted shape description, decisions are made on the presence/no presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereo image databases for flight simulators

    Publication Year: 1991, Page(s):80 - 83
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    One of the goals of a computer vision system is to recover the three dimensional shape of a surface from its image intensities. One of the ways in which this goal can be achieved is by matching certain feature points in stereo images. Since a sparse depth map is obtained from this process, surface interpolation is also required. The authors describe an algorithm to generate a three dimensional ter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive disturbance-accommodation

    Publication Year: 1991, Page(s):60 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    The current theory of disturbance-accommodation control (DAC) does not allow for disturbances that may unpredictably change their dynamic characteristics in real-time. In this paper, a new version of DAC theory, called adaptive disturbance-accommodating control (ADAC), is developed for a broad class of uncertain disturbances that may change their dynamic characteristics unpredictably in real-time.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of DS/SSMA: a comparison of simulation results with bit error probability bounds

    Publication Year: 1991, Page(s):16 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    In this paper, a binary direct-sequence spread-spectrum multiple-access (DS/SSMA) communication system with an additive white Gaussian noise channel and a correlation receiver are considered. The signature sequences are m-sequences or random sequences when the number of users is small and are random sequences, Gold sequences, or Kasami sequences when the number of users is large. Simulation result... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.