Southeastcon '91., IEEE Proceedings of

7-10 April 1991

Filter Results

Displaying Results 1 - 25 of 285
  • Coherent optical BPSK detection

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (69 KB)

    Summary form only given. A coherent phase-locked synchronous oscillator (CPSO) was created by adding a feedforward and a feedback loop to the SO. An optically excited CPSO network was formed using a 4.3-GHz AVANTEK oscillator. Before the CPSO loop was formed, the oscillator was tuned near the subcarrier frequency with the DC bias in the loop filter. When the oscillator was tuned to within +/-3 MHz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Proceedings of SOUTHEASTCON '91 (Cat. No.91CH2998-3)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Conversion of a rule based to an object oriented expert system

    Publication Year: 1991, Page(s):751 - 754 vol.2
    Cited by:  Papers (3)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The conversion of the NETHELP system from a rule-based system to an object-oriented system is described. Specifically, conversion was from the rule-based system written using Teknowledge's M.1 expert System Shell to the Object Oriented Nexpert Object Tool. The conversion progressed from a straightforward one-for-one conversion to a systematized use of the object and class mechanisms. The straightf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the spoked ring performance using the slotted ring protocol

    Publication Year: 1991, Page(s):541 - 542 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Issues such as the delay associated with the length of the spoke, network partial performance due to the reduced redundancy introduced by the spoke, and the network throughput with stations having various message lengths and operating under the slotted ring protocol are addressed. The results show that there is no significant change in the throughput of the spoked ring when compared to the regular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NETHELP user friendly interface

    Publication Year: 1991, Page(s):746 - 750 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The authors describe the interface for the NETHELP system, an advisory expert system used as an aid in diagnosing end user problems in the network control center at Federal Express. Extra effort has been expended in developing a user-friendly interface for the NETHELP diagnostic expert system so that acceptance will be enhanced. The features of this interface go beyond just support for the expert ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VLSI DSP chip for real time iterative deconvolution

    Publication Year: 1991, Page(s):70 - 73 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The design of a CMOS VLSI chip to perform real-time iterative deconvolution is presented. A bit-level systolic array architecture for convolution, multiplication, and addition is used to implement the circuit. A brief introduction to the iterative deconvolution problem is also given. Simulations done to data have shown that the systolic array portions of the chip will yield satisfactory throughput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facility preparation for an interactive education environment for lecture, laboratory, and computer activities

    Publication Year: 1991, Page(s):537 - 540 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The author describes the development of a special classroom for an interactive educational environment with consideration to student/faculty comfort for eight hour per day classes that extend for periods of several weeks. These descriptions were prepared to aid others in the planning of such special-purpose engineering classrooms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A controller based on the energy function to improve convergence of a neural network

    Publication Year: 1991, Page(s):741 - 745 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The feedback (Hopfield) model of a neural network is enhanced by the addition of a controller. This controller selectively chooses responses in the feedback loop to improve the performance of the recall operation. The process of selection is based on finding the response with the lowest (deepest) energy at each step of iteration. Results of computer simulations are presented. The recall improvemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of analog and digital signal conditioning filters on signal to noise ratio

    Publication Year: 1991, Page(s):65 - 69 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Digital processing of analog signals involves sampling and analog-to-digital (A/D) conversion. A prefilter may be inserted in analog implementation prior to sampling, or in digital form after A/D conversion. The effects on signal-to-noise (S/N) ratio of these alternative forms of prefiltering are studied. Significant differences in S/N ratio may result, depending upon the relative spectral charact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industry/university-developed telecommunication continuing education program issues

    Publication Year: 1991, Page(s):532 - 536 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    It is pointed out that university-run telecommunications continuing education programs for the telecommunications industry have unique problems which must be addressed by both the university and the industry during the development phase of the program. The authors examine five areas (contracting, costing, students, instructors, and technical content) and provide suggestions as to how some of these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of a cognitron type neural network

    Publication Year: 1991, Page(s):736 - 740 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    Optimization studies on a recognition neural network based on K. Fukushima's cognitron (1975) are presented. The goal was to increase the selectivity and robustness of the network, which was used as the final stage identifier in an integrated vision network invariant to translation, rotation, and scaling. Unlike the original cognitron, different inhibitory parameters were introduced for differenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay time performance of multihop networks utilizing finite-length buffers

    Publication Year: 1991, Page(s):657 - 663 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The impact of the buffer size of a terminal on network performance is presented. Most multihop radio network models investigated so far have assumed an infinite buffer in a terminal instead of finite capacity, which increases the probability of encountering full buffers in a practical system. The inability to receive a packet when buffers are full has an obvious impact on network performance. With... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum enclosing rectangles: a comparative investigation of two optimizing criteria (reprise)

    Publication Year: 1991, Page(s):60 - 64 vol.1
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    The minimum enclosing rectangle problem for convex polygons has been studied and solved for both area and perimeter as optimality criterion. A specialized problem instance based on the square is known to admit different solutions for each criterion. The lack of empirical data relating solutions to the two problems when problem instances were generated at random served as impetus to experiments rep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A test for the existence of solutions in ill-conditioned power systems

    Publication Year: 1991, Page(s):444 - 448 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    A complete analytical study of the invariant manifolds for the Newton-Raphson solution of the power flow equations is presented. Based on these results, a new test is developed to reduce the computational effort of finding the solutions to ill-conditioned power systems. A detailed study of some well-known test systems clearly indicates that the new method is at least 50% more efficient than the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Example industry/university-developed telecommunications continuing education program

    Publication Year: 1991, Page(s):529 - 531 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    Some of the lessons learned in preparing and presenting a continuing education technical program known as the leading edge education program to telecommunications professionals of South Central Bell are presented. The organization of the program is discussed, with emphasis given to issues which the instructor has to address during the presentation of the program. These issues are classified into t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assignable interconnects for multiprocessor systems

    Publication Year: 1991, Page(s):1189 - 1192 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    The situation with compute node interconnection is briefly reviewed, the most immediate benefits of assignable interconnect are presented, and a method for assignable interconnect is described. In its early form, the assignable interconnect may result in raw performance, which is lower than with static interconnect; but lower system cost, increased flexibility, and potential for further developmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hand written zip code recognition by back propagation neural network

    Publication Year: 1991, Page(s):731 - 735 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    A technique of recognizing zip codes by using the back-propagation neural network (BPN) with different structures is presented. The differences between the structures are the number of units in the hidden layers and the number of hidden layers. One of the structures mimics the Neocognitron structure. There are two hidden layers in this structure. The weights between the hidden layers are fixed lik... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data path reroute time investigation: in a multiport bridge interconnected network

    Publication Year: 1991, Page(s):652 - 656 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Wide-area networks are used to interconnect clusters of computers and user devices connected by local area networks. Hybrids of local and wide area networks can provide high performance data channels with good connectivity. Bridges are currently used to interconnect islands of different data communication protocols in heterogeneous environments. The author describes a bridge connected network, wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation for a loosely coupled parallel processing environment

    Publication Year: 1991, Page(s):201 - 204 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    The advantages and limitations of distributed shared memory (DSM) in a loosely coupled parallel processing environment are examined. The method of examination is to evaluate the performance of parallel algorithms. The approach was to adapt sequential applications for a simulated parallel processing environment and at some future time be able to use the applications in the target DSM environment wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A representation scheme and a searching algorithm for repetitions in a string

    Publication Year: 1991, Page(s):55 - 59 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    A representation scheme and a searching algorithm for all repetitions of the form xx in a finite string are presented. The algorithm is based on a careful arrangement of comparisons of adjacent substrings, with several important considerations to eliminate unnecessary steps. A divide-and-conquer strategy is used to reduce the problem size significantly. The run-time is O(n View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAP-to-Data Highway implementation using MMS

    Publication Year: 1991, Page(s):442 - 443 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    It is noted that, as users migrate to MAP (Manufacturing Automation Protocol)-based factory automation solutions, the problem of communicating with devices on proprietary networks must be addressed. A service for device message passing, manufacturing message specification (MMS), was used to develop an application program. MMS is a tool that resides in the application layer of the MAP seven-layer p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey of industry and university telecommunication continuing education programs

    Publication Year: 1991, Page(s):525 - 528 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    The author surveys existing telecommunications continuing education programs, namely the South Central Bell leading edge education (LEE) program presented by the University of Alabama at Birmingham and by BELLCORE and the BELLCORE-sponsored program presented by Carnegie-Mellon University. He also reviews BellSouth Services plans for a new strategic professional development (SPD) program that combi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel approach in switchbox routing

    Publication Year: 1991, Page(s):1184 - 1188 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    A parallel algorithm, called PARALLEX, has been developed for the switchbox routing problem. The algorithm can be easily implemented on a shared-memory multiprocessor system. Since the algorithm is general-purpose in nature, it can be applied to a variety of routing problems. The number of processes is equal to the number of nets; each process has its own net to be routed. All the nets routed by i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern recognition using neural networks with a binary partitioning approach

    Publication Year: 1991, Page(s):726 - 730 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    The authors introduce a binary partitioned approach to classification which is applied to talker identification using neural networks. It was shown experimentally that the time required to train a single network to perform N-way classification is nearly proportional to the exponential of N. In contrast, the binary partitioned approach requires training times on the order of N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of static locking in replicated distributed database systems

    Publication Year: 1991, Page(s):698 - 701 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    A technique that combines simulation and analysis is used to describe the impact of deadlock and evaluate the performance of a replicated distributed database with both shared and exclusive locks. The proposed approach is an extension of a technique presented by S.-C. Shyu and V.O.K. Li (1990). The authors use the proposed method to evaluate the effect of the number of data items, the number of da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.