Proceedings of the IEEE

Issue 12 • Dec. 1985

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover and table of contents]

    Publication Year: 1985, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (479 KB)
    Freely Available from IEEE
  • A note from the editor

    Publication Year: 1985, Page(s): 1699
    Request permission for commercial reuse | |PDF file iconPDF (103 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scanning the issue

    Publication Year: 1985, Page(s): 1700
    Request permission for commercial reuse | |PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • The special section on personal computer software for professional engineering applications

    Publication Year: 1985, Page(s):1701 - 1702
    Request permission for commercial reuse | |PDF file iconPDF (236 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct methods for transient stability analysis of power systems: Recent results

    Publication Year: 1985, Page(s):1703 - 1715
    Cited by:  Papers (154)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1358 KB)

    Transient stability analysis of a power system is concerned with the system's ability to remain in synchronism following a disturbance. In utility planning, transient stability is studied by numerical simulation. The long CPU run times for simulation preclude their use for on-line security analysis. Interest has therefore shifted toward the Lyapunov direct method of stability analysis. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultrasonics in nondestructive evaluation

    Publication Year: 1985, Page(s):1716 - 1755
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (5792 KB)

    The use of ultrasonic waves in nondestructive evaluation is reviewed. Perspective is provided by a summary of the role played by nondestructive evaluation in the manufacture and utilization of structural components. Included are discussions of the methodologies for predicting part serviceability and of the constraints placed on the nondestructive measurement process by the mechanical designs and f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology assessment

    Publication Year: 1985, Page(s):1756 - 1763
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (960 KB)

    An account is given of the evolution and use of the "minimum-linewidth method" for assessing competing integrated circuit technologies, beginning with its use in evaluating thin magnetic-film memory devices in the early 1960s and ending with its use in assessing Josephson-junction devices some twenty years later. From this account, general rules are derived for conducting successful technology ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dice, entropy, and likelihood

    Publication Year: 1985, Page(s):1764 - 1770
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (660 KB)

    We show that a famous die experiment used by E. T. Jaynes as intuitive justification of the need for maximum entropy (ME) estimation admits, in fact, of solutions by classical, Bayesian estimation. The Bayesian answers are the maximum probable (m.a.p.) and posterior mean solutions to the problem. These depart radically from the ME solution, and are also much more probable answers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software innovations for the texas instruments explorer computer

    Publication Year: 1985, Page(s):1771 - 1790
    Cited by:  Patents (42)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2545 KB)

    Explorer is a LISP Machine from Texas Instruments. Its software starts with a vast body of software developed at MIT. Texas Instruments has stabilized that software and added more packages and utilities. This paper describes certain innovations in Texas Instrument's software for the Explorer. TI's software innovations were in two areas: increasing the learnability of this sophisticated system and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint and declarative languages for engineering applications: The TK!Solver contribution

    Publication Year: 1985, Page(s):1791 - 1806
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1724 KB)

    The rapid proliferation of personal computers has brought a new class of users, the so-called non-computer professionals, into the world of computing. These users are typically well versed in their respective professions, such as engineering, science, financial analysis, teaching, and research, but may lack the programming skills necessary to take full advantage of the power of computers. They wou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-aided design/drafting on personal computers

    Publication Year: 1985, Page(s):1807 - 1816
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (972 KB)

    In the past few years, Computer-Aided Drafting (CAD) capabilities have become available on personal computer systems. The popularity of personal computer-based (PC-based) CAD is not only due to low cost but also ease of use; improved accuracy over manual drafting; cleaner, more professional output; and the ease of making changes, all of which aid creative expression. This paper gives a brief overv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MATRIXx/PC: Modeling, simulation, and optimization on personal computers

    Publication Year: 1985, Page(s):1817 - 1825
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (823 KB)

    MATRIXx/PCTMallows engineers to rapidly build system models interactively and graphically on personal computers and to simulate and optimize system characteristics based on these models. The complete model can be developed by modeling each aspect or component of a system and the manner in which these components interact. Performance may be evaluated under nominal and off-desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal processing and engineering analysis on personal computers

    Publication Year: 1985, Page(s):1826 - 1837
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1473 KB)

    Initially, the ability of personal computers to perform signal processing or multivariate analysis was severely limited by small memory address space and lack of scientific language support. Recently, however, this situation has changed, with large memory sizes common and with the availability of mainframe languages such as FORTRAN-77 to support complex and double-precision expressions. Today, per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of personal computer software in Japan

    Publication Year: 1985, Page(s):1838 - 1850
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (911 KB)

    This paper presents a survey of personal computer software in Japan, conducted by JEIDA (Japan Electronic Industry Development Association) for the period 1982-1984. The paper begins with a description of software houses in Japan, including information on their capital, employees, and sales. Next, the paper covers the types of software packages available, including the distribution device for each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Fields at the tip of an elliptic cone"

    Publication Year: 1985, Page(s):1857 - 1858
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (202 KB)

    Electromagnetic fields near the tip of an elliptic cone can be represented by a sum over a set of vector wave functions. Only the leading terms of this sum contribute to the near field. A useful classification of these terms based on symmetry and periodicity properties of the eigenfunctions of the problem is presented. This classification suggests that there must be a second magnetic field singula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exact sensitivities for nonreciprocal two-port power elements

    Publication Year: 1985, Page(s):1858 - 1859
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (194 KB)

    A novel method is presented to calculate exact first-order sensitivity formulas for nonreciprocal two-port power elements using the short-circuit admittance description. The method exploits an augmented Tellegen's theorem and is applied to an elegant adjoint transformer model to evaluate sensitivities with respect to control parameters of phase-shifting transformers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple derivation of the Fresnel diffraction formula

    Publication Year: 1985, Page(s):1859 - 1860
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (184 KB)

    In contrast with the conventional technique of deriving the Fresnel diffraction formula using Green's functions and the integral theorem of Helmholtz and Kirchhoff, we present a simple direct derivation of Fresnel diffraction by starting out from the scalar wave equation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection in impulsive environments

    Publication Year: 1985, Page(s):1861 - 1862
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (196 KB)

    The detection of a constant signal in additive noise is considered for independent and correlated impulsive noise environments. Suboptimum detector structures which estimate the occurrences of impulses and eliminate those data points are shown, through example, to yield performance close to that of systems which are given the indices of the data contaminated by the impulses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "The fast Hartley transform"

    Publication Year: 1985, Page(s):1862 - 1863
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (153 KB)

    In the above paper, Bracewell presents a new timing diagram for the computation of the DHT. We present here an in-place version of the Fast Hartley Transform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of the time involved in computing fast Hartley and fast Fourier transforms

    Publication Year: 1985, Page(s):1863 - 1864
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (190 KB)

    It is shown that the DFT of a real sequence, formed via the Fast Hartley Transform, can be computed at most only 2 times faster than by using a complex Fast Fourier Transform. However, more sophisticated FFT algorithms exist which give the same speedup factor. A simple FHT subroutine is presented to illustrate the similarity of the FHT and FFT butterflies in their simplest forms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to "Delta-I noise specification for a high-performance computing machine"

    Publication Year: 1985, Page(s): 1864
    Request permission for commercial reuse | |PDF file iconPDF (126 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured system programming

    Publication Year: 1985, Page(s): 1865
    Request permission for commercial reuse | |PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Turing's man: Western culture in computer age

    Publication Year: 1985, Page(s):1865 - 1866
    Request permission for commercial reuse | |PDF file iconPDF (266 KB)
    Freely Available from IEEE
  • Book alert

    Publication Year: 1985, Page(s):1866 - 1867
    Request permission for commercial reuse | |PDF file iconPDF (269 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 1985, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (3333 KB)
    Freely Available from IEEE

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University