Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Southeastcon '92, Proceedings., IEEE

12-15 April 1992

Filter Results

Displaying Results 1 - 25 of 188
  • Proceedings. IEEE SOUTHEASTCON '92 (Cat. No.92CH3094-0)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • A tutorial comparison of three multivariable stability margins

    Publication Year: 1992, Page(s):67 - 70 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB)

    The authors compare the utilization of three multivariable stability margins for stability analysis of multivariable linear and nonlinear dynamical systems. The three margins considered are those developed by R.W. Bass (1956, 1983), J.C. Doyle (1982) and M.G. Safonov and are commonly represented by rho , mu , and K/sub m/, respectively. These margins provide the analyst with varying degrees of bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi criteria optimization in multi connected systems of automatic control

    Publication Year: 1992, Page(s):795 - 798 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Linear systems of automatic control with interconnected subsystems are considered. The behavior of each subsystem is characterized by a quadratic integral criterion. The problem of multicriteria optimization in such systems is formulated and solved. The solution is obtained on the basis of the principle of proportional damages, which ensures the following properties: the control of law is synthesi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A testable design to test pattern sensitive faults efficiently for semiconductor RAM

    Publication Year: 1992, Page(s):339 - 342 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The authors present a testable design to test pattern sensitive faults efficiently for semiconductor random access memories to reduce test time and hence test cost. Testability was achieved by including additional hardware. The additional hardware is composed of a special mode counter, an error checker, a modified column decoder, and one extra control pinout. The functional test procedure proposed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic fault isolation techniques for digital systems

    Publication Year: 1992, Page(s):335 - 338 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    An automatic fault isolation technique to minimize fault isolation cost in digital systems is presented. Since the technique is implemented by additional hardware design instead of traditional software diagnostic procedures, the computation time and memory space required for fault isolation are eliminated. Two algorithms are developed, which specify the implementation of the design of the automati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A power MOSFET current switch for driving a pulsed hollow cathode discharge

    Publication Year: 1992, Page(s):586 - 588 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    A current-controlled high power MOSFET switch for pulsing a hollow cathode discharge is presented. Dual current settings are provided, a low current for DC standby operation and a higher main discharge current. The performance of the switch was evaluated for both resistive and discharge loads. Limitations of other switching techniques are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interface information marketing: a vital aspect of a customer-oriented corporate strategy

    Publication Year: 1992, Page(s):331 - 334 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    There are many areas within an organization where the application of the marketing concept is appropriate. The authors deal with one such area emphasizing internal interfaces in an organization. Specifically, they deal with adopting a marketing perspective in the management of information generated as a result of interaction among functional or divisional units in an organization. It is suggested ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fourier transform approach to acoustooptic interaction of curved, CW ultrasonic waves and optical beams with arbitrary profiles

    Publication Year: 1992, Page(s):566 - 569 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Starting from the coupled wave equations for the scattered optical fields in the acoustooptic cell, a Fourier transform technique is used to express the interaction in the spatial frequency domain. The sound field is assumed to be a CW wave with curved wavefronts. Two coupled differential equations, which describe the interaction between the optical and sound fields in the Bragg regime, can be obt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial neural networks and their application to power system industry

    Publication Year: 1992, Page(s):354 - 357 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    A method to apply neural-network technology to the study of transient stability of electric power systems is presented. During the training phase the network is presented with a set of input and output data obtained from an offline study. After the network has obtained the ability to compute the desired output, the network is presented with the data representing different operating conditions for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scaling procedure for Domino CMOS logic

    Publication Year: 1992, Page(s):580 - 585 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The area required by domino CMOS gates to support a specific response-time performance and capacitive load can be substantially reduced by scaling the NFET chain. A scaling procedure that requires little execution time is described and illustrated by its application to AND, AOI, and OAI Domino CMOS gates. The scaling procedure has resulted in scaled NFET widths very close to those obtained by Mont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated post-allocation translator for parallel dynamic system simulation

    Publication Year: 1992, Page(s):327 - 330 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The authors describe the post-allocation translator developed at the University of Alabama to transform allocation and modeling data into the source-level files necessary to execute parallel dynamic simulations within a multi-transputer-based computer architecture. Parallel multiple-instruction-multiple-data (MIMD) processing of large-scale dynamic system simulations can provide levels of performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Canonical representation of multivalued logic functions

    Publication Year: 1992, Page(s):242 - 246 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    The authors discuss multivalued logic functions. They introduce a multivalued algebraic structure, define its properties, consider the multivalued logic function and its base, and the different canonical representations and decompositions of a multivalued logic function. The decompositions of multivalued logic functions will facilitate the derivations of test vectors for multivalued logic combinat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal greedy algorithms for indifference graphs

    Publication Year: 1992, Page(s):144 - 149 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Investigates the class of indifference graphs that models the notion of indifference relation arising in social sciences and management. The authors examine algorithmic properties of indifference graphs. Recently it has been shown that indifference graphs are characterized by a very special ordering on their sets of vertices. It is shown that this linear order can be exploited in a natural way to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DQDB: slot reuse and preuse

    Publication Year: 1992, Page(s):283 - 285 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The authors propose a simple modification to the existing distributed queue dual bus (DQDB) protocol to improve the channel utilization. The network throughput does not degrade appreciably when the channel speed and physical distance of the network increase on the current DQDB-based network. However, as the bus length of the DQDB is increased, the slot usage becomes a problem. Since the slot is us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gain enhancement of circular waveguide antennas using dielectric disc

    Publication Year: 1992, Page(s):310 - 313 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    The directivity of a circular waveguide antenna has been enhanced by utilizing a dielectric disc in front of its aperture. The effect of different parameters on the antenna directivity was investigated. The waveguide is considered with or without a conducting flange. The analysis was carried out numerically using the method of moments to solve the surface integral equations for the unknown equival... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization studies of deep levels in silicon doped copper diffused GaAs and their significance for bulk GaAs switches

    Publication Year: 1992, Page(s):171 - 174 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Deep-level characterization studies have been carried out for silicon-doped copper-compensated gallium arsenide (GaAs:Si:Cu) which is used to fabricate bulk optically controlled semiconductor switches. A photoinduced current transient spectroscopy technique has been used to identify various deep levels present in GaAs:Si:Cu, and from the findings probable models for the copper-related complexes in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calculation of refractive index around a hypersonic vehicle with infrared sensors

    Publication Year: 1992, Page(s):562 - 565 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    The disturbed gas envelope around a hypersonic vehicle which carries an infrared sensor is shown. The envelope contains a compressed hot gas and plasma produced by the ionization of the gas constituents. Both gas and plasma surrounding the sensors have high densities, resulting in a sharp density gradient at the shock wave in front of the vehicle. The density gradients inside the envelope act like... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical issues in managing technical personnel

    Publication Year: 1992, Page(s):40 - 45 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Achieving balance between the need for positive group work and superior independent work is harder if the managers and technologists do not have access to the information on the critical issues facing similar personnel in other technology-intensive organizations. The authors surveyed material in the engineering management area to identify these critical issues. They summarize and clarify these iss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement techniques to reveal arrester MOV response during steep-front impulsing

    Publication Year: 1992, Page(s):350 - 353 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Steep-front, high current tests have been performed on 10 kV and 15 kV MOV (metal oxide varistor) and gapped SiC (silicon carbide) distribution arresters. Arrester voltage responses to steep-front, nearly rectangular current pulses exhibited a large voltage overshoot or initial spike. A considerable part of this overshoot voltage was the induced voltage in the voltage divider due to time-changing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The N-queens problem and genetic algorithms

    Publication Year: 1992, Page(s):262 - 267 vol.1
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The authors determined how well the operators of genetic algorithms handled very difficult combinatorial and constraint satisfaction problems. The N-queens problem is a complex combinatorial problem. Genetic algorithms are efficient and robust search algorithms that can solve the N-queens problem. To derive a problem, the genetic algorithm treats the problem as an ordering or seq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability test of interconnections using electrical noise measurement

    Publication Year: 1992, Page(s):576 - 579 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The excess electrical noise in aluminum and aluminum alloy thin films were measured. The magnitude and frequency exponent for noise spectra of 1/fα were measured as a function of the sample temperature and current density. Two different regions in plots of normalized 1/fα noise magnitude, with α between 1.2 and 2.2. versus inverse temperatu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probe acquisition for the MSPARC hybrid monitor

    Publication Year: 1992, Page(s):323 - 326 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The MSPARC multicomputer uses processor-based monitoring hardware and probe acquisition software for instrumentation purposes. The authors give an overview of the monitor system and design considerations regarding the probe software. Each node of the mesh connected MSPARC consists of a numerical element and a communications board used to pass messages via custom routers located on a backplane. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subarrays, spatial dither and coherent interference rejection

    Publication Year: 1992, Page(s):238 - 241 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Spatial dithering of subarrays is a technique that allows the array to continue to function with coherent interference. Spatial dithering of subarrays yields a cascade array structure. It is shown that it is not necessary to sacrifice array aperture when using dithering. A formula for the resultant SINR (signal-to-interference-and-noise-ratio) is derived. Only one array was used to compute the out... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single row routing with indifference graphs on the DAP

    Publication Year: 1992, Page(s):137 - 143 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The distributed array of processors (DAP) is a commercially available massively parallel machine which is often applied to numerically intensive problems which exploit its matrix manipulation abilities. It is shown that the DAP can be efficiently used to solve non-numerical problems as well. Specifically, a heuristic solution to the well-known single row routing problem in a VLSI is proposed. Inst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic protocol for token ring network with unbalanced load

    Publication Year: 1992, Page(s):10 - 13 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    An attempt was made to develop a protocol, which will use both single packet and arbitrary-gated service schemes. in which the token-holding-time (THT) of a station depends on its buffer occupancy or queue length. If the buffer occupancy is less than a preassigned threshold value, the station will hold the token for only one packet service time. If the buffer occupancy is greater, then the THT wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.