Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

It describes the blacklist language as well as its usage in IFS

Table of Contents

Contents

  • 1 Introduction
  • 2 The Blacklist language 
    • 2.1 Variables
      • 2.1.1 Report characteristics
      • 2.1.2 Model/first guess characteristics
      • 2.1.3 Observation characteristics
    • 2.2 Keywords
    • 2.3 Statements and operators
      • 2.3.1 IF-statement syntax
      • 2.3.2 List of the simple operators
      • 2.3.3 List of more complex operators
    • 2.4 Built-in functions
    • 2.5 Actions
    • 2.6 Variable declaration
  • 3 Operational and experimental use of blacklist
    • 3.1 Location of blacklist files
    • 3.2 Some guidelines
  • 4 Creating new blacklist file
    • 4.1 Usage of the blcomp
    • 4.2 Conversion from old to new blacklist
    • 4.3 C-code generation
    • 4.4 Linking with an application
    • 4.5 Combining conversion and object generation
    • 4.6 User interface
  • 5 Examples
    • 5.1 A simple example
    • 5.2 A more complex example
    • 5.3 Adding completely new variable to the system

 

1 Introduction

 

In the operational suite on Cray computer, the blacklist was basically a list of undesired stations to be excluded from the analysis in operations, and usually in prepan experiments, too, based on monthly monitoring by the Operations Department. The technique for blacklisting has been streamlined as a part of the migration of operational codes from Cray to Fujitsu.

...

It describes the blacklist language as well as its usage in IFS 

Contents

  • 1 Introduction
  • 2 The Blacklist language
    • 2.1 Variables
      • 2.1.1 Report characteristics
      • 2.1.2 Model/first guess characteristics
      • 2.1.3 Observation characteristics
    • 2.2 Keywords
    • 2.3 Statements and operators
      • 2.3.1 IF-statement syntax
      • 2.3.2 List of the simple operators
      • 2.3.3 List of more complex operators
    • 2.4 Built-in functions
    • 2.5 Actions
    • 2.6 Variable declaration
  • 3 Operational and experimental use of blacklist
    • 3.1 Location of blacklist files
    • 3.2 Some guidelines
  • 4 Creating new blacklist file
    • 4.1 Usage of the blcomp
    • 4.2 Conversion from old to new blacklist
    • 4.3 C-code generation
    • 4.4 Linking with an application
    • 4.5 Combining conversion and object generation
    • 4.6 User interface
  • 5 Examples
    • 5.1 A simple example
    • 5.2 A more complex example
    • 5.3 Adding completely new variable to the system

...