Wang Guoren, Yu Ge, Zhou Yunfeng, Shan Jidi, Zheng Huaiyuan
{"title":"DODBMS/CIM: a distributed object-oriented database management system for CIM applications","authors":"Wang Guoren, Yu Ge, Zhou Yunfeng, Shan Jidi, Zheng Huaiyuan","doi":"10.1109/TENCON.1993.319988","DOIUrl":"https://doi.org/10.1109/TENCON.1993.319988","url":null,"abstract":"With the coming of advanced database applications such as CIM (computer integrated manufacturing), the conventional database systems (e.g. relational, network and hierarchical) are no longer adequate for the new requirements. One of the most promising approaches is the object-orientation concept. We present DODBMS/CIM (Distributed Object-oriented Database Management System for CIM applications). We adopt OSAM* (Object-oriented and Semantic Association data Model) as its global data model to support the rich semantics and complex data elements in CIM. Also, we adopt an open architecture and flexible transaction processing. In this paper, we present the system architecture, the global data model and language, and the implementation techniques of global transaction management and global query optimization.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115352937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A videotex system under network environment","authors":"Sun Yi, Yu Jun, Wang Keyu","doi":"10.1109/TENCON.1993.328005","DOIUrl":"https://doi.org/10.1109/TENCON.1993.328005","url":null,"abstract":"An information service system of a two layer topological architecture, based on a LAN, under a network environment is presented. The upper network is used to implement the sharing of resources by the workstations. The lower one is used for mutual communication and the management of user terminals. The system is designed to the videotex technical standard and is compatible with both Chinese and English.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"404 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115992871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Manufacturing Message Specification services and protocol using ISO Development Environment","authors":"R. Cheah, Bu-Sung Lee, Long Lim","doi":"10.1109/TENCON.1993.320049","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320049","url":null,"abstract":"The Manufacturing Message Specification (MMS) is an OSI application layer standard designed to support messaging communications to and from programmable devices in a computer integrated manufacturing (CIM) environment. This paper describes how the ISO Development Environment (ISODE) can be employed to implement MMS. ISODE is a non-proprietary implementation of the upper layers of the OSI protocol suite. The experience should be useful to those contemplating using ISODE to implement OSI application entities and application programs.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust pole-assignment design for perturbed discrete time-delay systems","authors":"Chuan-Guey Huang, T. Su","doi":"10.1109/TENCON.1993.320538","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320538","url":null,"abstract":"The sufficient condition to guarantee robust pole location within a prescribed circular region for perturbed discrete time-delay systems via a state feedback controller is introduced. By the sufficient condition, the tolerable parametric perturbation bounds that ensure all the poles of perturbed discrete time-delay systems to remain inside the desired disk D(e, f), centered at (e, 0) with radius f<1 and |e|+f<1, can be estimated. The stability radius of matrix is employed to investigate the problem, and the result obtained by the presented sufficient condition is a significant improvement over the method reported by Lee et al. Finally, our result is demonstrated by an example.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The simulation of machine-network interaction in multi-machine power systems","authors":"Sun Dechang, Huang Jiayu","doi":"10.1109/TENCON.1993.320620","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320620","url":null,"abstract":"This paper presents a newly developed machine-network interaction transient simulation program. This program is especially useful in calculation of the transient shaft torque of turbine-generating units caused by various kinds of faults and switching operations. It can also be used for other purposes such as calculation of transient voltages and currents for harmonic analysis. In the program, most of the important power system elements such as generators, transmission lines, circuit breakers, transformers, shunt/series compensators, infinite buses, shafts of turbine generating units, excitation systems and power system stabilizers are modeled. Great efforts have been made to enhance the simulation speed. The implicit trapezoidal rule of integration is adopted to solve the differential equations and the critical damping method is used to eliminate the numerical oscillations caused by switching operations.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"703 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116426841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A backward protocol verification method","authors":"Chung-Ming Huang, Duen-Tay Huang","doi":"10.1109/TENCON.1993.320039","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320039","url":null,"abstract":"Using the formal Communication Finite State Machine (CFSM) model, a communication protocol consists of several communicating entities which can be represented in some CFSMs. Global state reachability analysis is one of the most straightforward ways to automatically detect logical errors in a communication protocol specified in the CFSM model. Global state reachability analysis generates all of the reachable global states and checks the correctness one by one. Even though communication protocols are error free, global state reachability analysis still needs to be executed completely. We propose a new verification method which is called the backward protocol verification method, to detect logical errors. By analyzing the properties of deadlock error, unspecified reception error, and channel overflow error, some candidate erroneous global states are generated. Then, each candidate global state is checked whether there is a path, i.e., a global state sequence connects to the original initial global state. If there is a path, then the candidate global state is really an erroneous global state and the communication protocol does have some logical errors. Otherwise, if there is no candidate global state or none of the candidate global state has a path, then the communication protocol is error free.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new representation for programmable logic arrays to facilitate testing and logic design","authors":"Jing-Jou Tang, Kuen-Jong Lee, Bin-Da Liu","doi":"10.1109/TENCON.1993.320051","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320051","url":null,"abstract":"Presents a new graph model and an associated set of operations for representing programmable logic arrays (PLAs). Through this graph model, most realistic PLA faults, including crosspoint, stuck-at, break and bridging faults, can be modeled. The work of diagnosis and test generation is thus simplified. Also, many logic design problems, such as folding, minimization and decomposition, can be done using this representation.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123018004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power system protection based on personal computer","authors":"Z. Muda, A. Zin","doi":"10.1109/TENCON.1993.320639","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320639","url":null,"abstract":"This investigation centres on the practical advantages of microcomputer based replacements for parts of the conventional electromechanical and static protective relays used in power system protection. Incremental instantaneous protection, in which a trip decision is made on the basis of the rate of change of current, has only become a practical proposition with the advent of fast microcomputers. With the correct choice of current transformer ratio, and preset values in the software, a 12 bit analog-to-digital system is shown to be adequate. Software is also developed to implement the inverse definite minimum time trip function, with satisfactory results.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"82 7-8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new approach to digital control implementation of continuous-time systems","authors":"Yuan Kui, Wang Cong-qing","doi":"10.1109/TENCON.1993.320513","DOIUrl":"https://doi.org/10.1109/TENCON.1993.320513","url":null,"abstract":"A transformation method which is based on block-pulse functions (BPF) expansion is proposed. Using this transformation method, an approximate solution of the continuous-time system under consideration can be obtained, and the control laws of the continuous-time system can also be discretized to get digital control algorithms. A case study of a model reference adaptive control system is described and the problem of how to reduce the amount of computations for a high order system is also discussed.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"249 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuen-Cherng Chen, Tang Ku, Jhing-Fa Wang, Jau-Yien Lee
{"title":"An adaptive implementation of the MPEG encoder","authors":"Chuen-Cherng Chen, Tang Ku, Jhing-Fa Wang, Jau-Yien Lee","doi":"10.1109/TENCON.1993.328070","DOIUrl":"https://doi.org/10.1109/TENCON.1993.328070","url":null,"abstract":"Due to the huge amount of data contained in digital video signals, the compression of video signals becomes crucial and important when the storage and transmission of digital video information are required. Most compression algorithms use motion compensated predictive coding to remove temporal redundancy and transformation coding to remove spatial redundancy. Additional entropy coding algorithms are also used to further reduce the amount of data in representing the compressed video information. With such a structure, a MPEG standard for video compression has been established by the International Standard Organization (ISO). The same compression techniques can be easily generalized to encode high definition (HD) video. In the paper, the authors propose a novel structure for encoding HD video, which provides an adaptive coding structure without any additional computations than those conventionally used. Since the temporal correlation is utilized during the encoding process to remove temporal redundancy, it is expected to produce a savings of bit rate in the reconstructed HD video.<<ETX>>","PeriodicalId":110496,"journal":{"name":"Proceedings of TENCON '93. IEEE Region 10 International Conference on Computers, Communications and Automation","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114388274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}