The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] object-orient(72hit)

61-72hit(72hit)

  • Modeling Contact Erosion Using Object-Oriented Technology

    Kunio OHNO  

     
    PAPER-Simulation and AI-Technology

      Vol:
    E77-C No:10
      Page(s):
    1606-1613

    The prediction of a relay contact's life is still very important for support and maintenance of the Crossbar Switching Systems. It was found through surveys and experiments that the protected shower arc is the main reason for switching-relay contact erosion at existing Crossbar Switching Systems, if the contacts were not heavily activated. If the contacts were heavily activated, a long sustained steady arc might occur and severely erode the contacts. This paper proposes an arch energy estimation method for the prediction of contact erosion using object-oriented simulation technology when a steady arc occurs at protected contacts. The arc energy is expressed in a simulation model through analysis, and the model was confirmed through experimentation. The simulation model was used for building block programs of an expert system to predict the life span of switching relays in the existing Crossbar Switching Systems.

  • Implication Problems for Specialization Constraints on Databases Supporting Complex Objects

    Minoru ITO  Michio NAKANISHI  

     
    PAPER-Algorithms, Data Structures and Computational Complexity

      Vol:
    E77-A No:9
      Page(s):
    1510-1519

    For a complex object model, a form of range restriction called specialization constraint (SC), has been proposed, which is associated not only with the properties themselves but also with property value paths. The domain and range of an SC, however, were limited to single classes. In this paper, SCs are generalized to have sets of classes as their domains and ranges. Let Σ be a set of SCs, where each SC in Σ has a set of classes as its domain and a non-empty set of classes as its range. It is proved that an SC is a logical consequence of Σ if and only if it is a finite logical consequence of Σ. Then a sound and complete axiomatization for SCs is presented. Finally, a polynomial-time algorithm is given, which decides whether or not an SC is a logical consequence of Σ.

  • A Method for Contract Design and Delegation in Object Behavior Modeling

    Hirotaka SAKAI  

     
    PAPER-Software Theory

      Vol:
    E76-D No:6
      Page(s):
    646-655

    Behavior modeling of objects is critical in object-oriented design. In particular, it is essential to preserve integrity constraints on object behavior in application environments where objects of various classes dynamically interact with each other. In order to provide a stable design technique, a behavior model using the notion of the life cycle schema of a class is proposed. To model the aspect of behavioral abstraction of objects, the notion of schema refinement together with a diagrammatic representation technique is also defined. In this framework, a formalization of behavior constraints on objects which interact with each other is proposed together with its graphical representation. Verification rules of consistency of behavior constraints are also discussed. In order to perform certain functions, several partner objects of the same or different classes should collaborate establishing client-server relationships. The contract of a class is defined as a collection of responsibilities of a server class to a client class where each responsibility is specified in the form of the script. To achieve a high degree of systems integrity, a procedure to derive scripts from behavior constraints on collaborating partners is developed. It is also critical to evenly distribute responsibilities to partner objects. A delegation is placing a whole or a part of responsibilities of an object in charge of other objects. Based on the design principle delegation along the aggregation hierarchy,' a unified design approach to delegation that enables to reorganize scripts in constraints preserving way is proposed.

  • Optical Cable Network Operation in Subscriber Loops

    Norio KASHIMA  Toshinao KOKUBUN  Masaharu SAO  Yoshikazu YAMAMOTO  

     
    PAPER

      Vol:
    E76-B No:4
      Page(s):
    391-401

    We propose an integrated smart cable operation system and its architecture for the future cable network. In the proposed architecture, an application programs and various modules are loosely coupled using a cable operation system platform. We anticipate the task flows for the future optical cable network operation in order to realize the proposed system and architecture. Each task flow is broken down into "atomic tasks." The task flow can be changed easily by combining these atomic tasks. We use an object-oriented design for designing the cable operation system platform. As a first step towards the construction of the proposed system a pre-prototype system was constructed and the results are shown.

  • An Access Control Mechanism for Object-Oriented Database Systems

    Tadashi ARAKI  Tetsuya CHIKARAISHI  Thomas HARDJONO  Tadashi OHTA  Nobuyoshi TERASHIMA  

     
    PAPER

      Vol:
    E76-A No:1
      Page(s):
    112-121

    The security problems of object-oriented database system are investigated and security level assignment constraints and an access control mechanism based on the multilevel access control security policy are proposed. The proposed mechanism uses the Trusted Computing Base. A unique feature of the mechanism is that security levels are assigned not only to data items (objects), but also to methods and methods are not shown to the users whose security level is lower than that of the methods. And we distinguish between the security level of a variable in a class and that in an instance and distinguish between the level of an object when it is taken by itself and it is taken as a variable or an element of another complex object. All of this realizes the policy of multilevel access control.

  • A New Indexing Technique for Nested Queries on Composite Objects

    Yong-Moo KWON  Yong-Jin PARK  

     
    PAPER-Databases

      Vol:
    E75-D No:6
      Page(s):
    861-872

    A new indexing technique for rapid evaluation of nested query on composite object is propoced, reducing the overall cost for retrieval and update. An extended B+ tree is introduced in which object identifier (OID) to be searched and path information usud for update of index record are stored in leaf node and subleaf node, respectively. In this method, the retrieval oeration is applied only for OIDs in the leaf node. The index records of both leaf and subleaf nodes are updated in such a way that the path information in the subleaf node and OIDs in the leaf node are reorganized by deleting and inserting the OIDs. The techniaue presented offers advantages over currently related indexing techniques in data reorganization and index allocation. In the proposed index record, the OIDs to be reorganized are always consecutively provided, and thus only the record directory is updated when an entire page should be removed. In addition, the proposed index can be allocate to a path with the length greater than 3 without splitting the path. Comparisons under a variety of conditions are given with current indexing techniques, showing improved performance in cost, i.e., the total number of pages accessed for retrieval and update.

  • Functional Elements for Switching Software Based on Object-Oriented Paradigm with UPT as an Example

    Fumito SATO  Motoo HOSHI  Yuji INOUE  

     
    PAPER

      Vol:
    E75-B No:10
      Page(s):
    1052-1060

    As the telecommunications network provides a greater variety of services and more rapidly incorporates new technologies, it has become important to ensure modular functional growth of the network. As a part of the endeavor toward this goal, this paper discusses the functional architecture of a network, which defines the functional elements and the interfaces between them. Object-oriented paradigm is applied to develop this architecture. Because the objects which will be made in the software will become too numerous to manage, it is proposed to make a functional element out of a set of objects, grouped together on the basis of functional affinity, plus an interface object. A functional element communicates with other functional elements only via its interface object. The physical location of each functional element can be hidden from other functional elements by the support of distributed processing environment. To secure real-time performance, communications between functional elements are classified into two classes: direct and indirect communications. In order to examine technical feasibility an evaluate the various alternatives of functional architecture, and experimental system called EONS (Experimental Object-oriented Nodal System) was developed. The hardware equipment of EONS consists of a switching unit and workstations. The functional architecture implemented in the EONS is structured in two layers: hardware-independent, logical control layer and hardware-dependent, resource control layer. As an example of service application, universal personal telecommunication (UPT) service has been implemented.

  • Verification of Switching Software by Knowledge Processing Technology

    Mitsuaki KAKEMIZU  Yasuo IWAMI  Yoshiharu SATO  Shimmi HATTORI  

     
    PAPER

      Vol:
    E75-B No:10
      Page(s):
    1008-1014

    To develop highly reliable switching software efficiently, a more powerful computer-aided verification system is needed. In this paper, we present an object-oriented switching software verification system, focusing on the basic concept and verification method. The system consists of three basic functions: a model of the switching system, a simulation control mechanism, and a verification mechanism. We also give our evaluation of this system.

  • Net-Oriented Analysis and Design

    Shinichi HONIDEN  Naoshi UCHIHIRA  

     
    INVITED PAPER

      Vol:
    E75-A No:10
      Page(s):
    1317-1325

    Net-Oriented Analysis and Design (NOAD) is defined as three items: (1) Various nets are utilized as an effective modeling method. (2) Inter-relationships among verious nets are determined. (3) Verification or analysis methods for nets are provided and they are implemented based on the mathematical theory, that is Net theory. Very few methods have been presented to satisfy these three items. For example, the Real-Time SA method covers item (1) only. The Object-Oriented Analysis and Design method (OOA/OOD) covers items (1) and (2). NOAD can be regarded as an extension to OOA/OOD. This paper discusses how effectively various nets have been used in actual software development support metnods and tools and evaluates such several methods and tools from the NOAD viewpoint.

  • Object-Oriented Switching Software Technology

    Katsumi MARUYAMA  

     
    INVITED PAPER

      Vol:
    E75-B No:10
      Page(s):
    957-968

    Public switching systems are intensively realtime and multi-processing, very large, long-lived, and frequently modified. Programs that control switching systems are therefore required not only to have run-time efficiency but also to be easy to maintain and extend. This paper proposes a Concurrent Object Model and an Object-Oriented Switching Program Structure. The Concurrent Object Model ensures simple and efficient real-time multi-processing. This model allows logical switching components to be implemented as "objects" in software, and the structure of the program coincides with the structure of the logical model. The program structure proposed here uses distributed call processing, which allows building-block-structured switching systems. A prototype switching program proved the effectiveness of this approach and showed that the static and dynamic overheads are within the capacity of present VLSI technology.

  • A Nested Report Composition Scheme for Object-Oriented Database Systems

    Kunitoshi TSURUOKA  

     
    PAPER

      Vol:
    E75-D No:5
      Page(s):
    681-689

    The problem of presentation view generation over external/conceptual view is discussed for database systems. The presentation view is expressed by a format of a report which is generated as the result of a database query. A new presentation format generation scheme for composite reports is proposed for object-oriented databae systems. The reports can have nested (extended non-first-normal-form) formats. The presentation format should vary at run time, depending on repeating groups and data arrangement. The proposed scheme is based on the idea of dynamic co-referring objects, which uses an object-oriented data model extended to the presentation layer. As important features, various composite reports can be easily derived from databases, and dynamic format modification is possible interactively, even after retrieving the data. The scheme is useful for database applications which require a wide variety of formats for casual queries, where the report generation programming cost will be greatly reduced.

  • Design of Generalized Document Viewer Using Object Chain Representation

    Nobuhiro AJITOMI  

     
    PAPER

      Vol:
    E75-D No:5
      Page(s):
    690-696

    This paper proposes the GDV system, which provides a format-independent interface with which to access documents in various formats. It also proposes a new approach for document representation to be used in the GDV system. In this approach, a document is represented by a chain of objects, each of which belongs to a certain class and transforms access operations according to the class-specific transformation rule. A user's request is interpreted as a request to the uppermost object of the chain, transformed by objects in the chain successively, and executed by the lowermost object in the chain. The initial state of a document is an object chain containing an unidentified object. As the unidentified object identifies and divides itself, classification (and chain generation) proceeds step by step.

61-72hit(72hit)