Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Physical Sciences and Mathematics

Knowledge-Based Safety Training System (Kbsts): A Prototype Implementation, Venky Shankararaman, B. S. Lee Dec 1994

Knowledge-Based Safety Training System (Kbsts): A Prototype Implementation, Venky Shankararaman, B. S. Lee

Research Collection School Of Computing and Information Systems

A computer-based safety training system for process operators must be able to make effective presentation of textual material, test the trainee's understanding through quizzes and facilitate plant simulation. The general framework of such a system is presented in an earlier paper (Computers in Industry, Vol. 17, 1991, pp. 349–358). In this paper, we discuss the development and implementation of a prototype Knowledge-Based Safety Training System based on the framework. The design philosophy, system architecture and the plant modelling methodology are described.


A Load Distribution Through Competition For Workstation Clusters, Kam Hong Shum, Muslim Bozyigit Nov 1994

A Load Distribution Through Competition For Workstation Clusters, Kam Hong Shum, Muslim Bozyigit

Research Collection School Of Computing and Information Systems

The aim of this work is to develop a competition driven solution approach for load distribution in distributed computing system (DCS) environments. The subject DCS is composed of a set of workstation clusters. The study deals with concurrent applications, but assumes the existence of the independent tasks executing on individual workstations as well. Akin to conventional load balancing algorithms, the approach considers two phases; the partitioning phase and the mapping phase. Each phase is based on the application and the DCS data which is translated into market data, mainly price. The price is governed by the demand and supply of …


Performance Of Combined Diversity Reception And Convolutional Coding For Qdpsk Land Mobile Radio, Huafei Zhou, Robert H. Deng, T. T. Tjhung Aug 1994

Performance Of Combined Diversity Reception And Convolutional Coding For Qdpsk Land Mobile Radio, Huafei Zhou, Robert H. Deng, T. T. Tjhung

Research Collection School Of Computing and Information Systems

Diversity reception and error correction coding are powerful techniques to combat multipath fading encountered in mobile radio communications. In order to improve the transmission performance of the ?/4-shift QDPSK signal in mobile radio channels, the authors propose a new scheme of combined coding and diversity reception, i.e., combination of diversity reception employing code combining (CC) and convolutional coding employing error-and erasure correction Viterbi decoding. They also consider another combination scheme, i.e., combination of diversity reception employing postdetection maximal ratio combining (MRC) and convolutional coding employing hard decision Viterbi decoding. They theoretically analyze the performance of the schemes taking into account …


Optimum Symbol-By-Symbol Detection Of Uncoded Digital Data Over The Gaussian Channel With Unknown Carrier Phase, Pooi Yuen Kam, Seng Siew Ng, Tock Soon Ng Aug 1994

Optimum Symbol-By-Symbol Detection Of Uncoded Digital Data Over The Gaussian Channel With Unknown Carrier Phase, Pooi Yuen Kam, Seng Siew Ng, Tock Soon Ng

Research Collection School Of Computing and Information Systems

A theory of optimum receiver design for symbol-by-symbol detection of an uncoded digital data sequence received over the Gaussian channel with unknown carrier phase is presented. Linear suppressed-carrier modulation is assumed. The work here aims at laying a conceptual foundation for optimum symbol-by-symbol detection, and rectifies existing approaches to the problem. The optimum receiver structure is obtained explicitly for an arbitrary carrier phase model, but its computational requirements are too heavy in general for any practical implementation. In one important special case, namely, the case in which the carrier phase can be treated as a constant over some K+1 symbol …


Automated Manpower Rostering: Techniques And Experience, C. M. Khoong, Hoong Chuin Lau, L. W. Chew Jul 1994

Automated Manpower Rostering: Techniques And Experience, C. M. Khoong, Hoong Chuin Lau, L. W. Chew

Research Collection School Of Computing and Information Systems

We present ROMAN, a comprehensive, generic manpower rostering toolkit that successfully handles a wide spectrum of work policies found in service organizations. We review the use of various techniques and methodologies in the toolkit that contribute to its robustness and efficiency, and relate experience gained in addressing manpower rostering problems in industry.


Production And Decay Of D1 (2420)0 And D2* (2460)0, Avery, P.; Et Al., M. Thulasidas Jun 1994

Production And Decay Of D1 (2420)0 And D2* (2460)0, Avery, P.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


The Myriad Federated Database Prototype, San-Yih Hwang, Ee Peng Lim, H. R. Yang, S. Musukula, K. Mediratta, M. Ganesh, D. Clements, J. Stenoien, Jaideep Srivastava May 1994

The Myriad Federated Database Prototype, San-Yih Hwang, Ee Peng Lim, H. R. Yang, S. Musukula, K. Mediratta, M. Ganesh, D. Clements, J. Stenoien, Jaideep Srivastava

Research Collection School Of Computing and Information Systems

Myriad is a federated database system (FDBS) prototype being developed at the University of Minnesota. The main objective behind this prototyping effort is to provide "enterprise-wide" information by integrating independently developed databases while preserving the local autonomy of the component DBMSs and applications. In Myriad, multiple federations can be formed. A federation consists of an integrated database whose schema is represented as a set of integrated relations derived from the export relations provided by the component DBMSS. SQL, mainly due to its simplicity and popularity among database users and vendors, has been adopted to express global queries as well as …


Managing Memory For Real-Time Queries, Hwee Hwa Pang, Michael J. Carey, Miron Livny May 1994

Managing Memory For Real-Time Queries, Hwee Hwa Pang, Michael J. Carey, Miron Livny

Research Collection School Of Computing and Information Systems

The demanding performance objectives that real-time database systems (RTDBS) face necessitate the use of priority resource scheduling. This paper introduces a Priority Memory Management (PMM) algorithm that is designed to schedule queries in RTDBS. PMM attempts to minimize the number of missed deadlines by adapting both its multiprogramming level and its memory allocation strategy to the characteristics of the offered workload. A series of simulation experiments confirms that PMM's admission control and memory allocation mechanisms are very effective for real-time query scheduling.


Automating Output Size And Reuse Metrics In A Repository-Based Computer-Aided Software Engineering (Case) Environment, R. D. Banker, Robert J. Kauffman, C. Wright, D. Zweig Mar 1994

Automating Output Size And Reuse Metrics In A Repository-Based Computer-Aided Software Engineering (Case) Environment, R. D. Banker, Robert J. Kauffman, C. Wright, D. Zweig

Research Collection School Of Computing and Information Systems

Measurement of software development productivity is needed in order to control software costs, but it is discouragingly labor-intensive and expensive. Computer-aided software engineering (CASE) technologies-especially repository-based, integrated CASE-have the potential to support the automation of this measurement. We discuss the conceptual basis for the development of automated analyzers for function point and software reuse measurement for object-based CASE. Both analyzers take advantage of the existence of a representation of the application system that is stored within an object repository, and that contains the necessary information about the application system. We also discuss metrics for software reuse measurement, including reuse leverage, …


A Measurement Of B(D+S → Φl+Ν) B(D+S → Φπ+), Cleo Collaboration, F. Butler, Manoj Thulasidas Mar 1994

A Measurement Of B(D+S → Φl+Ν) B(D+S → Φπ+), Cleo Collaboration, F. Butler, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

Using the CLEO II detector at CESR, we have measured the ratio of branching fractions B(D → φlν) B(D → φπ) = 0.54 ± 0.05 ± 0.04. We use this measurement to obtain a model dependent estimate of B(D → φπ). © 1994.


Managing Risks In Information Technology Projects, Boon Siong Neo, Kwong Sin Leong Jan 1994

Managing Risks In Information Technology Projects, Boon Siong Neo, Kwong Sin Leong

Research Collection School Of Accountancy

The development and implementation of IT (Information Technology) projects are plagued with problems of cost and time overruns. technical inadequacy, inability to meet user requirements. lack of utilization. and failure to achieve anticipated benefits. These problems occur to some projects and not to others because I) IT projects have different profiles of risk. and 2) IT project risks have been managed more or less effectively. This paper synthesizes the literature into four classes of risks. and applies it to evaluate TradeNet. an EDLbased trading system implemented in Singapore in I989. Through a case study of TradeNet. we derived a typology …


On The Equivalence Of Mceliece's And Niederreiter's Public-Key Cryptosystems, Y. X. Li, Robert H. Deng, X. M. Wang Jan 1994

On The Equivalence Of Mceliece's And Niederreiter's Public-Key Cryptosystems, Y. X. Li, Robert H. Deng, X. M. Wang

Research Collection School Of Computing and Information Systems

It is shown that McEliece's and Niederreiter's public-key cryptosystems are equivalent when set up for corresponding choices of parameters. A security analysis for the two systems based on this equivalence observation, is presented


Identifying Faces Using Multiple Retrievals, Jian Kang Wu, Arcot Desai Narasimhalu Jan 1994

Identifying Faces Using Multiple Retrievals, Jian Kang Wu, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

During a police investigation, officers often have to sort through hundreds of photographs to identify a suspect. To aid this task, we at the Institute of Systems Science developed and implemented a flexible database system that can retrieve faces using personal information, fuzzy and free-text descriptors, and classification trees.


A Semantic Framework For Understanding The Behavior Of Modules And Classes In Programming Languages, Mahesh Dodani, Benjamin Kok Siew Gan Jan 1994

A Semantic Framework For Understanding The Behavior Of Modules And Classes In Programming Languages, Mahesh Dodani, Benjamin Kok Siew Gan

Research Collection School Of Computing and Information Systems

Recent trends in programming language design and implementation are aimed at integrating the two most important constructs to combat complexity: modules and classes. Both constructs provide encapsulation, a cornerstone of reliable programming. These constructs differ in their approach to building hierarchies: modules define visibility of components while classes define visibility of functionality. How can modules and classes be effectively integrated within a simple programming language? This question captures the essence of developing semantics of these constructs to ensure that they interact in a meaningful way. This paper develops a formal denotational semantic framework for understanding the interaction between classes and …


Measurement Of The Branching Fraction For D+K-++, Balest, R.; Et Al., M. Thulasidas Jan 1994

Measurement Of The Branching Fraction For D+K-++, Balest, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Using the CLEO II detector at the Cornell Electron Storage Ring we have measured the ratio of branching fractions, B(D+K-++)/(D0K-+)=2.350.160.16. Our recent measurement of scrB(D0K-+) then gives scrB(D+K-++)=(9.30.60.8)%.


Precision Measurement Of The Ds*+-Ds+ Mass Difference, Brown, D.; Et Al., M. Thulasidas Jan 1994

Precision Measurement Of The Ds*+-Ds+ Mass Difference, Brown, D.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

We have measured the vector-pseudoscalar mass splitting M(D*+s)-M(D+s)=144.22±0.47±0.37 MeV significantly more precisely than the previous world average. We minimize the systematic errors by also measuring the vector-pseudoscalar mass difference M(D*0)-M(D0) using the radiative decay D*0→D0γ, obtaining [M(D*+s)-M(D+s)]-[M(D*0)-M(D0)] =2.09±0.47±0.37 MeV. This is then combined with our previous high-precision measurement of M(D*0)-M(D0), which used the decay D*0→D0π0. We also measure the mass difference M(D+s)-M(D+)=99.5±0.6±0.3 MeV, using the φπ+ decay modes of the D+s and D+ mesons.


Observation Of Inclusive B Decays To The Charmed Baryons C++ And C0, Procario, M.; Te Al., M. Thulasidas Jan 1994

Observation Of Inclusive B Decays To The Charmed Baryons C++ And C0, Procario, M.; Te Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


Study Of The Five-Charged-Pion Decay Of The Τ Lepton, D. Gibaut, Manoj Thulasidas Jan 1994

Study Of The Five-Charged-Pion Decay Of The Τ Lepton, D. Gibaut, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

The branching fractions for the five-charged-particle decays of the τ lepton have been measured in e+e− annihilations using the CLEO II detector at the Cornell Electron Storage Ring. Assuming all charged particles to be pions, the results are B(3π−2π+≥0 neutrals ντ)=(0.097±0.005±0.011)%, B(3π−2π+ντ)=(0.077±0.005 ±0.009)%, B(3π−2π+π0ντ)=(0.019±0.004±0.004)%, and B(3π−2π+2π0ντ)B(3π−2π−π0ντ) is measured for the first time by exclusive π0 reconstruction. The results are compared with the predictions from the partially conserved-axial-current and conserved-vector-current hypotheses assuming isospin invariance.


Measurement Of Cabibbo-Suppressed Decays Of The Τ Lepton, Battle, M.; Et Al., M. Thulasidas Jan 1994

Measurement Of Cabibbo-Suppressed Decays Of The Τ Lepton, Battle, M.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


Measurement Of The Cross Section For Γγ→Pp̄, Artuso, M.; Et Al., M. Thulasidas Jan 1994

Measurement Of The Cross Section For Γγ→Pp̄, Artuso, M.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


Observation Of A New Charmed Strange Meson, Kubota, Y.; Et Al., M. Thulasidas Jan 1994

Observation Of A New Charmed Strange Meson, Kubota, Y.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


Resolving Attribute Incompatibility In Database Integration: An Evidential Reasoning Approach, Ee-Peng Lim, Shashi Shekhar Jan 1994

Resolving Attribute Incompatibility In Database Integration: An Evidential Reasoning Approach, Ee-Peng Lim, Shashi Shekhar

Research Collection School Of Computing and Information Systems

Resolving domain incompatibility among independently developed databases often involves uncertain information. DeMichiel (1989) showed that uncertain information can be generated by the mapping of conflicting attributes to a common domain, based on some domain knowledge. The authors show that uncertain information can also arise when the database integration process requires information not directly represented in the component databases, but can be obtained through some summary of data. They therefore propose an extended relational model based on Dempster-Shafer theory of evidence (1976) to incorporate such uncertain knowledge about the source databases. They also develop a full set of extended relational operations …


Exclusive Hadronic B Decays To Charm And Charmonium Final States, Alam, M.; Et Al., M. Thulasidas Jan 1994

Exclusive Hadronic B Decays To Charm And Charmonium Final States, Alam, M.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

We have fully reconstructed decays of both B¯0 and B− mesons into final states containing either D, D*, D**, ψ, ψ’, or χc1 mesons. This allows us to obtain new results on many physics topics including branching ratios, tests of the factorization hypothesis, color suppression, resonant substructure, and the B−−B¯0 mass difference.