Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 6631 - 6660 of 6717

Full-Text Articles in Physical Sciences and Mathematics

Measurement Of Charmless Semileptonic Decays Of B Mesons, Bartelt; J.; Et Al., M. Thulasidas Jan 1993

Measurement Of Charmless Semileptonic Decays Of B Mesons, Bartelt; J.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


Version And Transaction Management In Osmagic: An Object-Oriented Database Implementation Of The Magic Vlsi Layout Design Tool, Gary M. Lightner Dec 1992

Version And Transaction Management In Osmagic: An Object-Oriented Database Implementation Of The Magic Vlsi Layout Design Tool, Gary M. Lightner

Theses and Dissertations

The goal of this thesis was to study the feasibility of using an object-oriented database management system to provide the functionality and performance needed to support a complex computer-aided design tool. We do this by modifying OSMagic, a prototype system of the Magic very large scale integrated (VLSI) circuit design tool implemented on the ObjectStore object- oriented database management system. OSMagic was changed to support three different interfaces to ObjectStore and to work in a networking environment. We then designed and examined the use of version and transaction management models as a means of addressing the weaknesses of the prototype …


Automated Logistics Information Systems: A Case Study, James E. Hogue Dec 1992

Automated Logistics Information Systems: A Case Study, James E. Hogue

Theses and Dissertations

A change within the Air Force has shifted management responsibilities within the logistics community. Formerly diverse functions have come under the purview of a single manager-the Logistics Group Commander-who has inherited information systems that may riot be able to provide consolidated information for informed and accurate decision making. The purpose of this thesis was to describe the current and potential ability for three logistics information management systems to share data: Standard Base Supply System, Consolidated Aircraft Management System, and On-Line Vehicle Information Management System. A systems model was synthesized from the literature review to determine what components of a system …


Entity-Relationship Versus Object-Oriented Modeling And The Underlying Dbms, Kevin J. Routhier Dec 1992

Entity-Relationship Versus Object-Oriented Modeling And The Underlying Dbms, Kevin J. Routhier

Theses and Dissertations

Despite the impressive accomplishments in relational database research, greater support is needed for persistence of the new types of data encountered with object-oriented programming. The concept of object-orientation is not new in the realm of programming; however, its utilization in database management systems is still immature. Regardless of this fact, there is an urgency for object-oriented database technology. With this increase in demand for the next generation databases comes the need to examine object-oriented data modeling versus the conventional entity-relationship modeling of relational database design. This thesis objective is to analyze both paradigms to determine if object-oriented modeling can significantly …


Lecture Notes For Nscp-Funded Short Course - Remote Sensing Training For Resource Officers And Farmers, Western Australian Department Of Agriculture Nov 1992

Lecture Notes For Nscp-Funded Short Course - Remote Sensing Training For Resource Officers And Farmers, Western Australian Department Of Agriculture

Soil conservation survey collection

The aim of this course is to provide an introduction to remote sensing, and knowledge and practice in image processing techniques for the extraction of information from remotely sensed data. Aerial photography is the original form of earth remote sensing, and is still a widely used and important data source for many purposes. This course is directed principally at the analysis of digital image data recorded by satellite or airborne platforms. Remote sensing is considered to be the methodology of collecting and interpreting target information over a broad range of the electromagnetic spectrum.


Performance Analysis Of Queueing Systems With Synchronous Server, Wonmu Hur Oct 1992

Performance Analysis Of Queueing Systems With Synchronous Server, Wonmu Hur

Theses

The performance measures are derived for a queueing system which is characterized by its synchronous server operations. This property is the one which normal queueing systems lack. A system of this nature contains a single common server to which multiple number of buffers are connected in parallel, where the server operates only when all system buffers are occupied.

In this thesis, the analysis is carried out focusing on the simplest system involving only two buffers. Throughout the analysis, a symmetricity of the system is assumed (i.e., system is symmetrical in terms of arriving customer statistics.). Also assumed are the Poisson …


Porting Cosmos Expert System From Unix To Dos, Ching-Jeng Chiu Oct 1992

Porting Cosmos Expert System From Unix To Dos, Ching-Jeng Chiu

Theses

COSMOS is an object-oriented Knowledge Based System building Tools (KBSTs) to solve problem in engineering industry. COSMOS stands for C++ Object-oriented System Made for expert System development.

In order to provide more people those who don't have a Sun workstation to use this expert system, our task is porting COSMOS form UNIX to DOS.

Because the differents of workstation environment, the user interface and structure of original COSMOS no longer can be used, therefore we made some necessary change before we porting it to IBM Personal Computer.

In stead of X Window system®, we implemented ObjectWindows® runs on Microsoft WindowsTM. …


Character Recognition Using String Matching, Xiaozhi Ye Oct 1992

Character Recognition Using String Matching, Xiaozhi Ye

Theses

To handle noisy and distorted pattern is the use of similarity or distance measures. A similarity or distance measure can be defined between a representation of an unknown pattern and a representation of a prototype pattern. Recognition of the unknown pattern can be carried out on the basis of the maximum-similarity or minimum distance criterion (Bunke 1990) This approach is proposed to recognize the noisy or distorted character image. In this work, a directly string representation of the pattern ( prototype as well as unknown input) using the histogram method, a decision procedure for classification is the well known Levenshtein …


Domain Analysis Within The Gensif Framework, Heiko Thimm Oct 1992

Domain Analysis Within The Gensif Framework, Heiko Thimm

Theses

The GenSIF framework which is targeted towards very large, distributed, and complex software systems recently has been proposed to accomplish a form of systems engineering and systems development in which the issue of systems integration is considered from the beginning on.

One of the components of GenSIF is domain analysis. Domain analysis leads to the design of a domain model. The specific needs GenSIF has in that area were investigated with an emphasis on domain modeling. Main points addressed in that investigation were the issue regarding the relevant information for the domain modeling process and the required type of domain …


Design And Implementation Of Two Text Recognition Algorithms, Madhumathi Yendamuri Oct 1992

Design And Implementation Of Two Text Recognition Algorithms, Madhumathi Yendamuri

Theses

This report presents two algorithms for text recognition. One is a neural-based orthogonal vector with pseudo-inverse approach for pattern recognition. A method to generate N orthogonal vectors for an N-neuron network is also presented. This approach converges the input to the corresponding orthogonal vector representing the prototype vector. This approach can restore an image to the original image and thus has error recovery capacility. Also, the concept of sub-networking is applied to this approach to enhance the memory capacity of the neural network. This concept drastically increases the memory capacity of the network and also causes a reduction of the …


Abduction In Annotated Logic Programming, Krishnaprasad Thirunarayan Oct 1992

Abduction In Annotated Logic Programming, Krishnaprasad Thirunarayan

Kno.e.sis Publications

The author investigates techniques to make the logic programming paradigm more expressive for knowledge representation, while simultaneously retaining the computational advantages of efficiency and simplicity. He extends the annotated language of K. Thirunarayan and K. Kifer (1989) in various directions to obtain an enriched representation language. In particular, rule bodies are permitted to be a conjunction of literals, and the rules to be recursive. A class of annotated logic programs called the stratified programs is identified which can be given a unique supported minimal Herbrand model as their meaning. Abductive reasoning is integrated into this annotated logic framework. The notion …


Using Flexible Transactions To Support Multisystem Telecommunication Applications, Mansoor Ansari, Linda Ness, Marek Rusinkiewicz, Amit P. Sheth Aug 1992

Using Flexible Transactions To Support Multisystem Telecommunication Applications, Mansoor Ansari, Linda Ness, Marek Rusinkiewicz, Amit P. Sheth

Kno.e.sis Publications

Service order provisioning is an important telecommunication application that automates the process of providing telephone services in response to the customer requests. It is an example of a multi-system application that requires access to multiple, independently developed application systems and their databases. In this paper, we describe the design and implementation of a prototype system1 that supports the execution of the Flexible Transactions and its use to develop the service order provisioning application. We argue that such approach may be used to support the development of multi-system, flow-through processing applications in a systematic and organized manner. Its advantages include fast …


Algorithms For Structural Schema Integration, James Geller, Ashish Mehra, Yehoshua Perl, Erich Neuhold, Amit P. Sheth Jun 1992

Algorithms For Structural Schema Integration, James Geller, Ashish Mehra, Yehoshua Perl, Erich Neuhold, Amit P. Sheth

Kno.e.sis Publications

Current view and schema integration methodologies are driven by semantic considerations, and allow integration of objects only if that is valid from semantic and structural viewpoints. We had introduced a new integration technique called structural integration. It permits integration of objects that have structural similarities, even if they differ semantically. This technique uses the object-oriented Dual Model which separates the representation of structure and semantics.

In this paper we introduce algorithms for structural integration. We apply these algorithms to integrate two views of a large university database schema which had significant structural similarities but differed semantically.


An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand May 1992

An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand

Theses

The concepts in this thesis discuss and evaluate the need for systems integration. As a conceptual architecture, the OSCATM architecture is investigated. A prototype of the CS Department distributed information system is built following the guidelines and standards of this conceptual architecture. This prototype is implemented in 'C'. RPC (remote procedure call) is used for the communication channel to implement the distributed environment. Conclusions and results that were achieved by implementing this prototype are presented. The main outcome of this thesis is the introduction of the infrastructure to the GenSIF framework.


New Algorithms For Mid-Crack Codes In Image Processing, Wai-Tak Wong May 1992

New Algorithms For Mid-Crack Codes In Image Processing, Wai-Tak Wong

Theses

The chain code is a widely-used description for a contour image. Recently, a mid-crack code algorithm has been proposed as another more precise method for image representation. New algorithms using this new mid-crack code for image representation, restoration, and skeletonization are developed. The efficiency and accuracy can be increased obviously.

Firstly, the conversion of a binary image with multiple regions into the mid-crack codes is presented. A fast on-line implementation can be achieved using tables look-up. The input binary image may contain several object regions and their mid-crack codes can be extracted at the same time in a single-pass row-by-row …


Graphical Image Persistence And Code Generation For Object Oriented Databases, Subrata Chatterjee May 1992

Graphical Image Persistence And Code Generation For Object Oriented Databases, Subrata Chatterjee

Theses

Attached is the detailed description of the design and implementation of graphical image persistence and code generation for object oriented databases. Graphical image persistent is incorporated into a graphics editor called OODINI. OODINI creates and manipulates graphical schemas for object-oriented databases. This graphical image on secondary storage is then translated into an abstract, generic code for dual model databases. This abstract code, DAL can then be converted into different dual model database languages. We provide an example by generating code for the VODAK Data Modeling language. It is also possible to generate a different abstract language code, OODAL from a …


Decomposition Of Geometric-Shaped Structuring Elements And Optimization On Euclidean Distance Transformation Using Morphology, Hong Wu May 1992

Decomposition Of Geometric-Shaped Structuring Elements And Optimization On Euclidean Distance Transformation Using Morphology, Hong Wu

Theses

Mathematical morphology which is based on geometric shape, provides an approach to the processing and analysis of digital images. Several widely-used geometric-shaped structuring elements can be used to explore the shape characteristics of an object. In first chapter, we present a unified technique to simplify the decomposition of various types of big geometric-shaped structuring elements into dilations of smaller structuring components by the use of a mathematical transformation. Hence, the desired morphological erosion and dilation are equivalent to a simple inverse transformation over the result of operations on the transformed decomposable structuring elements. We also present a strategy to decompose …


Development Of A Flight Information System Using The Structured Method, Yeong-Lae Kwak Mar 1992

Development Of A Flight Information System Using The Structured Method, Yeong-Lae Kwak

Theses and Dissertations

This thesis documents the development of a database system for the Flight Information System (FIS) of the Korean Air Force. The scope of the FIS is too large to be covered by this thesis. Thus, this thesis covers only the core part of the FIS due to the limitation of time and man-power. This thesis uses the structured method. Structured analysis and structured design techniques are mainly used two techniques. This thesis focused not only the development of the FIS but also the application of the software development method, the structured method, and its tools such as DFD, DD, ERD, …


Ada In The Soviet Union, Peter Wolcott Feb 1992

Ada In The Soviet Union, Peter Wolcott

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Over the last decade and a half, the Ada programming language has aroused more financial, technical, political, and emotional forces than any other programming language. Because the language is a product of more than just technical factors, its progress is heavily influenced by the surrounding social, economic, and political environment. Judging by the technical characteristics of the language and the goals for its use, one would expect that Ada would be the subject of intense development by the USSR, as well as by the USA. In practice, the Ada experiences in these countries differ considerably. We examine the state of …


Searching For Orthogonal States Of Neural Networks, Heng Wang Jan 1992

Searching For Orthogonal States Of Neural Networks, Heng Wang

Theses

Two approaches to find orthogonal states of neural network are presented in the paper. The first approach is a recursive one, it builds N orthogonal vectors based on N /2 orthogonal vectors. The second approach is a formula approach, in which orthogonal vectors can be obtained using a formula. Using these approaches, orthogonal states of neural network are found. Some properties of the neural network built on these orthogonal vectors are presented in Appendix A and some examples are given in Appendix B.


Real-Tv : Rtp/L3'S Visual Monitor, Richard Czop Jan 1992

Real-Tv : Rtp/L3'S Visual Monitor, Richard Czop

Theses

Today many real-world activities are being monitored and controlled by some type of micro-processor based system. Emphasis is placed on manufacturing and controlling through the use of computers. The inherent nature of these real-world applications makes them difficult to control and monitor. They must be built meeting strict timing constraints and must be predictable. We need to develop simplistic, reliable, and cost effective methods for building, evaluating, monitoring and controlling these complex systems. These tools should provide the user with system insight. At the New Jersey Institute of Technology Real-Time Computing Laboratory, we are building a system that will provide …


A Machine Entity For A Coordinate Measurement Machine : The Generic Workcell Project, Richard C. Meyer Jan 1992

A Machine Entity For A Coordinate Measurement Machine : The Generic Workcell Project, Richard C. Meyer

Theses

The Center for Manufacturing Systems (CMS) department at New Jersey Institute of Technology and Siemens Corporate Research located in Princeton have agreed to jointly implement a research project in generic workcell control architectures. This paper discusses the module, called a Machine Entity, developed by the author that interfaces the Brown & Sharpe Coordinate Measurement Machine located on the CMS factory floor with the cell control software. The module has been designed in such a manner to simplify the development of future Machine Entities, thereby reducing the time required to integrate the CMS factory floor.


Dynamic Machine Scheduling, Expansion, And Control Of A Generic Workcell, Peter A. Murray Jan 1992

Dynamic Machine Scheduling, Expansion, And Control Of A Generic Workcell, Peter A. Murray

Theses

Factory automation has come a long way since the invention of the automatic flour mill. A workcell is a group of machines (robots) working together to produce a product. In the past workcells have been hard wired using methods such as Programmable Logic Controllers (PLCs). To change a part of this system would require reprogramming the entire system.

The Generic Work Cell (GWC) is a dynamic architecture which allows a workcell to be modified on the fly. The architecture enables the generation of new cells with minimal effort, and the modification of the system without reprogramming the entire system. The …


Executing Multidatabase Transactions, Mansoor Ansari, Marek Rusinkiewicz, Linda Ness, Amit P. Sheth Jan 1992

Executing Multidatabase Transactions, Mansoor Ansari, Marek Rusinkiewicz, Linda Ness, Amit P. Sheth

Kno.e.sis Publications

In a multidatabase environment, the traditional transaction model has been found to be too restrictive. Therefore, several extended transaction models have been proposed in which some of the requirements of transaction, such as isolation or atomicity, are optional. The authors describe one of such extensions, the flexible transaction model and discuss the scheduling of transactions involving multiple autonomous database systems managed by heterogeneous DBMS.

The scheduling algorithm for flexible transactions is implemented using L.0, a logically parallel language which provides a framework for concisely specifying the multidatabase transactions and for scheduling them. The key aspects of a flexible transaction specification, …


A Case For The Use Of Application Generators In The Creation Of Software For The Hotel Industry, Peter O'Connor, Ciaran Mcdonnell Jan 1992

A Case For The Use Of Application Generators In The Creation Of Software For The Hotel Industry, Peter O'Connor, Ciaran Mcdonnell

Conference papers

The article makes the case for the use of Program Generators in producing software for the Hotel and Catering Industry


Some Developments In Information Technology In The Irish Hotel And Catering Industry, Sean Connell, Elaine Sunderland, Ciaran Mcdonnell Jan 1992

Some Developments In Information Technology In The Irish Hotel And Catering Industry, Sean Connell, Elaine Sunderland, Ciaran Mcdonnell

Conference papers

This paper describes the current and potential future use of computers in the Hospitality Industry in Ireland. It briefly outlines two research projects which are being carried out in the Dublin College of Catering in the application of computers to the Industry.


Application Of Expert System Techniques For Award Implementation, Seng-Choon Yeoh Jan 1992

Application Of Expert System Techniques For Award Implementation, Seng-Choon Yeoh

Theses : Honours

This paper describes a pilot expert system project, PESWEA, developed in conjunction with The Western Australian Government Railways Commission (Westrail), to locate and implement an expert system pilot solution to the problems and complexities of the awards. The paper will outline the process used to develop and implement a solution to a business requirement. In particular, the methodologies for the project, shell selection, and knowledge acquisition will be presented and discussed. The fundamentals of expert systems will be discussed to provide the reader an insight into the technology. In addition, this paper reviews the literature relevant to the research questions. …


Measurement Of The Tau Lepton Electronic Branching Fraction, D. Akerib, M. Thulasidas Jan 1992

Measurement Of The Tau Lepton Electronic Branching Fraction, D. Akerib, M. Thulasidas

Research Collection School Of Computing and Information Systems

The tau lepton electron branching fraction has been measured with the CLEO II detector at the Cornell Electron Storage Ring as Be=0.1749±0.0014±0.0022, with the first error statistical and the second systematic. The measurement involves counting electron-positron annihilation events in which both taus decay to electrons, and normalizing to the number of tau-pair decays expected from the measured luminosity. Detected photons in these events constitute a definitive observation of tau decay radiation.


Query Optimization In Oodb, Hwee Hwa Pang, Hongjun Lu, Beng Chin Ooi Jan 1992

Query Optimization In Oodb, Hwee Hwa Pang, Hongjun Lu, Beng Chin Ooi

Research Collection School Of Computing and Information Systems

In object-oriented databases, relationships are generally maintained explicitly. The partial result of a retrieved object can be used to efficiently retrieve related objects. Instead of optimizing joins as in relational database systems, pointer chasing is optimized in object-oriented database systems. Further, semantics inherent in the object-oriented database, like superclass-subclass relationships and composite-component relationships between object classes, must be realised. In this paper, we describe our initial result in query optimization in an object-oriented database system. Semantic query transformation is used to preprocess the query. semantically optimized query is then translated into a query evaluation plan which comprises method invocations that …


Electronic Branching Ratio Of The Lepton, R. Ammar, Manoj Thulasidas Jan 1992

Electronic Branching Ratio Of The Lepton, R. Ammar, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

Using data accumulated by the CLEO I detector operating at the Cornell Electron Storage Ring, we have measured the ratio R=Γ(τ→eν¯eντ)Γ1 where Γ1 is the τ decay rate to final states with one charged particle. We find R=0.2231±0.0044±0.0073 where the first error is statistical and the second is systematic. Together with the measured topological one-charged-particle branching fraction, this yields the branching fraction of the τ lepton to electrons, Be=0.192±0.004±0.006.