SYS600_Programming Language SCIL
SYS600_Programming Language SCIL
5
Programming Language SCIL
Document ID: 1MRK 511 664-UEN
Issued: February 2023
Revision: A
Product version: 10.5
Table of contents
Section 1 Copyrights....................................................................................................21
Section 3 Introduction..................................................................................................25
3.1 Presentation of SCIL........................................................................................................... 25
3.1.1 What is SCIL..................................................................................................................... 25
3.1.2 Application engineering.....................................................................................................25
3.1.3 What can be done with SCIL.............................................................................................26
3.2 SCIL programs.................................................................................................................... 27
3.2.1 Composition...................................................................................................................... 27
3.2.2 Occurrence .......................................................................................................................28
3.2.3 Activation of SCIL programs..............................................................................................28
3.2.4 Execution modes...............................................................................................................28
3.2.5 Example............................................................................................................................ 28
3.3 SCIL statements..................................................................................................................29
3.3.1 Components......................................................................................................................29
3.3.2 Statement format...............................................................................................................29
3.4 Organization of this manual.................................................................................................30
6.2.3.1 Description................................................................................................................... 52
6.2.3.2 Some attributes............................................................................................................ 52
6.2.3.3 Examples..................................................................................................................... 53
6.3 Application objects.............................................................................................................. 53
6.3.1 General..............................................................................................................................53
6.3.1.1 Object types................................................................................................................. 53
6.3.1.2 Application object notation........................................................................................... 54
6.3.2 Process objects (P)........................................................................................................... 55
6.3.2.1 Description................................................................................................................... 55
6.3.2.2 Some process object attributes....................................................................................55
6.3.2.3 Groups and indices...................................................................................................... 56
6.3.2.4 Examples..................................................................................................................... 56
6.3.3 Event handling objects (H)................................................................................................ 56
6.3.3.1 Description................................................................................................................... 56
6.3.3.2 Some event handling attributes....................................................................................57
6.3.4 Scales (X)..........................................................................................................................57
6.3.4.1 Description................................................................................................................... 57
6.3.4.2 Some scale attributes...................................................................................................57
6.3.5 Data objects (D)................................................................................................................ 57
6.3.5.1 Description................................................................................................................... 57
6.3.5.2 Some data object attributes......................................................................................... 58
6.3.5.3 Examples..................................................................................................................... 58
6.3.6 Command procedures (C).................................................................................................58
6.3.6.1 Description................................................................................................................... 58
6.3.6.2 Some command procedure attributes.......................................................................... 59
6.3.6.3 Examples .................................................................................................................... 59
6.3.7 Time channels (T)............................................................................................................. 59
6.3.7.1 Description................................................................................................................... 59
6.3.7.2 Some time channel attributes.......................................................................................60
6.3.8 Event channels (A)............................................................................................................60
6.3.8.1 Description................................................................................................................... 60
6.3.8.2 Some event channel attributes.....................................................................................61
6.3.9 Logging profiles (G)...........................................................................................................61
6.3.9.1 Description................................................................................................................... 61
6.3.10 Event objects (E)............................................................................................................... 61
6.3.10.1 Description................................................................................................................... 61
6.3.10.2 Example....................................................................................................................... 62
6.3.11 Variable objects (V)........................................................................................................... 62
6.3.11.1 Description................................................................................................................... 62
6.3.11.2 Examples..................................................................................................................... 63
6.4 User interface objects..........................................................................................................63
6.4.1 Visual SCIL objects........................................................................................................... 63
6.4.1.1 General........................................................................................................................ 63
6.4.1.2 Dialog systems.............................................................................................................64
6.4.1.3 Attributes and methods................................................................................................ 65
6.4.1.4 Visual SCIL object references......................................................................................65
Section 7 Variables....................................................................................................... 79
7.1 General................................................................................................................................79
7.1.1 Variable names..................................................................................................................79
7.1.2 Scope of variables.............................................................................................................79
7.2 Local variables.................................................................................................................... 79
7.3 Global variables...................................................................................................................80
7.3.1 SCIL contexts....................................................................................................................80
7.4 Using variables....................................................................................................................80
7.4.1 Variable assignment.......................................................................................................... 80
7.4.2 Examples...........................................................................................................................81
Section 8 Expressions................................................................................................. 85
8.1 General principles............................................................................................................... 85
8.1.1 Use....................................................................................................................................85
8.1.2 Composition...................................................................................................................... 85
8.1.3 Operands...........................................................................................................................85
8.1.4 Operators.......................................................................................................................... 86
8.2 Arithmetical operators......................................................................................................... 86
8.2.1 Use....................................................................................................................................86
8.2.2 Operators.......................................................................................................................... 86
8.2.3 Priority order......................................................................................................................86
8.2.4 Compatibility rules............................................................................................................. 87
8.2.5 Examples...........................................................................................................................89
8.3 Relational operators............................................................................................................ 89
8.3.1 Use....................................................................................................................................89
8.3.2 Operators.......................................................................................................................... 89
8.3.3 Compatibility rules............................................................................................................. 90
8.3.4 Examples...........................................................................................................................90
8.4 Logical operators.................................................................................................................91
8.4.1 Use....................................................................................................................................91
8.4.2 Operators.......................................................................................................................... 91
8.4.3 Compatibility rules............................................................................................................. 91
8.4.4 Examples...........................................................................................................................91
8.5 SCIL Data Derivation Language (SDDL).............................................................................91
8.5.1 General..............................................................................................................................91
8.5.2 Relation to SCIL language................................................................................................ 92
8.5.3 Context variables...............................................................................................................92
8.5.4 SDDL expression properties............................................................................................. 92
8.5.5 Examples...........................................................................................................................92
Section 10 Functions....................................................................................................139
10.1 General..............................................................................................................................139
10.1.1 Function calls.................................................................................................................. 139
10.1.2 Overview......................................................................................................................... 140
10.2 Generic functions.............................................................................................................. 153
10.4.10 HR_CLOCK.....................................................................................................................168
10.4.11 LOCAL_TIME..................................................................................................................169
10.4.12 LOCAL_TIME_ADD(time, s [,ms])...................................................................................169
10.4.13 LOCAL_TIME_INFORMATION[(time)]............................................................................169
10.4.14 LOCAL_TIME_INTERVAL(from, to)................................................................................ 170
10.4.15 LOCAL_TO_SYS_TIME(time).........................................................................................170
10.4.16 LOCAL_TO_UTC_TIME(time)........................................................................................ 170
10.4.17 MINUTE[(time)]............................................................................................................... 171
10.4.18 MONTH[(time)]................................................................................................................ 171
10.4.19 PACK_TIME(year, month, day, hour, minute, second).................................................... 171
10.4.20 SECOND[(time)]..............................................................................................................171
10.4.21 SET_CLOCK(time)..........................................................................................................171
10.4.22 SET_LOCAL_TIME(time)................................................................................................172
10.4.23 SET_SYS_TIME(time).................................................................................................... 172
10.4.24 SET_UTC_TIME(time).................................................................................................... 172
10.4.25 SYS_TIME.......................................................................................................................173
10.4.26 SYS_TIME_ADD(time, s [,ms])....................................................................................... 173
10.4.27 SYS_TIME_INTERVAL(from, to).....................................................................................173
10.4.28 SYS_TO_LOCAL_TIME(time).........................................................................................174
10.4.29 SYS_TO_UTC_TIME(time)............................................................................................. 174
10.4.30 TIME[(time [,"FULL"])]..................................................................................................... 174
10.4.31 TIME_SCAN(string [,resolution [,option1 [,option2]]])..................................................... 175
10.4.32 TIME_ZONE_RULES[(rule)]........................................................................................... 175
10.4.33 TIMEMS[(time [,msecs] [,"FULL"])]................................................................................. 177
10.4.34 TIMES[(time [,"FULL"])]...................................................................................................178
10.4.35 TOD[(time)]......................................................................................................................178
10.4.36 TODMS[(time [,msecs])]..................................................................................................178
10.4.37 TODS[(time)]................................................................................................................... 179
10.4.38 UTC_TIME...................................................................................................................... 179
10.4.39 UTC_TIME_ADD(time, s [,ms])....................................................................................... 179
10.4.40 UTC_TIME_INTERVAL(from, to).................................................................................... 179
10.4.41 UTC_TO_LOCAL_TIME(time)........................................................................................ 180
10.4.42 UTC_TO_SYS_TIME(time)............................................................................................. 180
10.4.43 WEEK(time)]....................................................................................................................180
10.4.44 YEAR(time)].................................................................................................................... 180
10.5 String functions..................................................................................................................181
10.5.1 ASCII(n)...........................................................................................................................181
10.5.2 ASCII_CODE(c).............................................................................................................. 181
10.5.3 BCD_TO_INTEGER(bcd)................................................................................................181
10.5.4 BIN(b)..............................................................................................................................182
10.5.5 BIN_SCAN(string)........................................................................................................... 182
10.5.6 BIT_SCAN(string)............................................................................................................183
10.5.7 CAPITALIZE(text)............................................................................................................183
10.5.8 COLLECT(v, delimiter).................................................................................................... 183
10.5.9 DEC(value [,length [,decimals]])......................................................................................184
10.5.10 DEC_SCAN(string)..........................................................................................................184
10.14.20 PROD_QUERY(n)...........................................................................................................241
10.14.21 History database functions..............................................................................................242
10.14.22 HISTORY_DATABASE_MANAGER("OPEN" [,apl])........................................................242
10.14.23 HISTORY_DATABASE_MANAGER("CLOSE", session)................................................ 243
10.14.24 HISTORY_DATABASE_MANAGER("SET_PERIOD", session, begin [,end]).................243
10.14.25 HISTORY_DATABASE_MANAGER("SET_DIRECTORY", session, directory)...............244
10.14.26 HISTORY_DATABASE_MANAGER("SET_WINDOW", session, begin, end).................244
10.14.27 HISTORY_DATABASE_MANAGER("SET_ORDER", session, order)............................ 245
10.14.28 HISTORY_DATABASE_MANAGER("SET_DIRECTION", session, direction)................ 245
10.14.29 HISTORY_DATABASE_MANAGER("SET_TIMEOUT", session, timeout)..................... 245
10.14.30 HISTORY_DATABASE_MANAGER("SET_CONDITION", session, condition)...............246
10.14.31 HISTORY_DATABASE_MANAGER("SET_ATTRIBUTES", session, attributes).............246
10.14.32 HISTORY_DATABASE_MANAGER("GET_PARAMETERS", session)...........................246
10.14.33 HISTORY_DATABASE_MANAGER("QUERY", session, count [,start]).......................... 247
10.14.34 HISTORY_DATABASE_MANAGER("READ", session, event)........................................248
10.14.35 HISTORY_DATABASE_MANAGER("SET_COMMENT", session, event, comment)..... 248
10.14.36 HISTORY_DATABASE_MANAGER("WRITE", session, data)........................................248
10.14.37 GENERATE_HISTORY_EVENT(LN, IX, MT, DATA).......................................................249
10.14.38 Name hierarchy function................................................................................................. 249
10.14.39 NAME_HIERARCHY(names, order, syntax [, arg4 [, arg5]])...........................................249
10.14.40 Mapping functions........................................................................................................... 253
10.14.41 LOGICAL_MAPPING(otype, number [, apl])................................................................... 253
10.14.42 PHYSICAL_MAPPING(otype, number [, apl]).................................................................254
10.15 Network Topology Functions............................................................................................. 255
10.15.1 NETWORK_TOPOLOGY_MANAGER(subfunction [, arg]* [, apl])................................. 255
10.15.2 NETWORK_TOPOLOGY_MANAGER("SCHEMAS").....................................................255
10.15.3 NETWORK_TOPOLOGY_MANAGER("SCHEMA", schema).........................................255
10.15.4 NETWORK_TOPOLOGY_MANAGER("LEVELS", schema).......................................... 255
10.15.5 NETWORK_TOPOLOGY_MANAGER("SET_LEVELS", schema, levels)...................... 256
10.15.6 NETWORK_TOPOLOGY_MANAGER("MODELS")....................................................... 256
10.15.7 NETWORK_TOPOLOGY_MANAGER("MODEL", model).............................................. 256
10.15.8 NETWORK_TOPOLOGY_MANAGER("START", model),
NETWORK_TOPOLOGY_MANAGER("STOP", model)................................................. 257
10.15.9 NETWORK_TOPOLOGY_MANAGER("VALIDATE", modeldata)................................... 257
10.15.10 NETWORK_TOPOLOGY_MANAGER("IMPORT", modeldata)...................................... 257
10.15.11 NETWORK_TOPOLOGY_MANAGER("EXPORT", model)............................................ 257
10.15.12 NETWORK_TOPOLOGY_MANAGER("DELETE", model).............................................257
10.16 File handling functions.......................................................................................................258
10.16.1 DATA_MANAGER(function [,argument]*)....................................................................... 258
10.16.2 DATA_MANAGER("CREATE", file)................................................................................. 258
10.16.3 DATA_MANAGER("OPEN", file)..................................................................................... 258
10.16.4 DATA_MANAGER("COPY", handle, new_file [, version])............................................... 258
10.16.5 DATA_MANAGER("CLOSE", handle)............................................................................. 259
10.16.6 DATA_MANAGER("LIST_SECTIONS", handle)............................................................. 259
10.16.7 DATA_MANAGER("CREATE_SECTION", handle, section)............................................259
10.16.8 DATA_MANAGER("DELETE_SECTION", handle, section)............................................ 259
Index.....................................................................................................................................367
The information in this document is subject to change without notice and should not be construed as
a commitment by Hitachi Energy. Hitachi Energy assumes no responsibility for any errors that may
appear in this document.
In no event shall Hitachi Energy be liable for direct, indirect, special, incidental or consequential
damages of any nature or kind arising from the use of this document, nor shall Hitachi Energy be
liable for incidental or consequential damages arising from the use of any software or hardware
described in this document.
This document and parts thereof must not be reproduced or copied without written permission from
Hitachi Energy, and the contents thereof must not be imparted to a third party nor used for any
unauthorized purpose.
The software or hardware described in this document is furnished under a license and may be used,
copied, or disclosed only in accordance with the terms of such license.
Trademarks
ABB is a registered trademark of ABB Asea Brown Boveri Ltd. Manufactured by/for a Hitachi Energy
company. All other brand or product names mentioned in this document may be trademarks or
registered trademarks of their respective holders.
Guarantee
Please inquire about the terms of guarantee from your nearest Hitachi Energy representative.
List of Third Party Copyright notices are documented in "3rd party licenses.txt" and other locations
mentioned in the file in SYS600 and DMS600 installation packages.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(https://www.openssl.org/). This product includes cryptographic software written by Eric Young
([email protected]). This product includes software written by Tim Hudson ([email protected]).
This product includes software developed by Computing Services at Carnegie Mellon University
(http://www.cmu.edu/computing/).
This publication includes warning, caution and information symbols where appropriate to point out
safety-related or other important information. It also includes tips to point out useful hints to the
reader. The corresponding symbols should be interpreted as follows:
Warning icon indicates the presence of a hazard which could result in personal injury.
Tip icon indicates advice on, for example, how to design a project or how to use a certain
function.
Although warning hazards are related to personal injury, and caution hazards are associated with
equipment or property damage, it should be understood that operation of damaged equipment could,
under certain operational conditions, result in degraded process performance leading to personal
injury or death. Therefore, comply fully with all warnings and caution notices.
This manual is intended for installation personnel, administrators and skilled operators to support
installation of the software.
• The words in names of screen elements (for example, the title in the title bar of a dialog, the
label for a field of a dialog box) are initially capitalized.
• Capital letters are used for file names.
• Capital letters are used for the name of a keyboard key if it is labeled on the keyboard. For
example, press the CTRL key. Although the Enter and Shift keys are not labeled they are written
in capital letters, for example, press ENTER.
• Lowercase letters are used for the name of a keyboard key that is not labeled on the keyboard.
For example, the space bar, comma key and so on.
• Press CTRL+C indicates that the user must hold down the CTRL key while pressing the C key
(in this case, to copy a selected object).
• Press ALT E C indicates that the user presses and releases each key in sequence (in this case,
to copy a selected object).
• The names of push and toggle buttons are boldfaced. For example, click OK.
• The names of menus and menu items are boldfaced. For example, the File menu.
• The following convention is used for menu operations: Menu Name/Menu Item/
Cascaded Menu Item. For example: select File/Open/New Project.
• The Start menu name always refers to the Start menu on the Windows Task Bar.
• System prompts/messages and user responses/input are shown in the Courier font. For
example, if the user enters a value that is out of range, the following message is displayed:
Entered value is not valid.
The user may be told to enter the string MIF349 in a field. The string is shown as follows in the
procedure: MIF349
• Variables are shown using lowercase letters: sequence name
This section introduces the SCIL programming language, the SYS600 application engineering, and
the SCIL program structure.
• Functional design, that is, the programming and definition of the SCADA functions, as well as
other supervisory control and calculation functions.
• User interface design.
Functional design involves the definition of databases (a database = a set of connected data stored
in a structured form) and the creation of SCIL programs. Each application has a process database for
handling process supervision and a report database for data storage, calculations, automatic
activation, etc. The databases are composed of objects named application objects.
The user interface design involves the composition of pictures and dialogs, see Figure 1. Pictures are
dynamic illustrations containing a static background, dynamic windows and user activated function
keys. Dialogs are independent windows that may contain a wide range of user interface items, such
as menus, buttons, images, notebooks and pictures. Pictures and dialogs represent two different
user interface design methods. The design and programming of dialogs and dialog systems is named
Visual SCIL.
These two portions of an application are interwoven with each others, and the user interface design
and the functional design generally occur in parallel.
Application engineering is simplified by using the standard application software library, LIB 500,
which requires a minimum of object definitions and SCIL programming. However, SCIL is found in all
SYS600 applications, even in those that are built with LIB 500, because the LIB 500 standard
application software is built with SCIL.
GUID-6C4BA3FE-638D-42AA-8585-38CF5600DF7C V1 EN-US
Figure 1: A SYS600 screen view showing three dialogs, one containing a picture.
The application engineering using LIB 500 is discussed in the LIB 500 User's Guide. The user
interface design is described in the Visual SCIL User Interface Design and the Picture Editing
manuals.
By means of SCIL, the user can control the entire SYS600 system, not only the features related to
the application, but also features related to the system configuration and communication. With SCIL,
for instance the following actions are possible (as shown in Figure 2):
• Program the user interface portion of the application, for example, define the dynamic changes
in pictures and dialogs, and program operator activated function keys and buttons.
• Design various forms of process control, such as manual control, sequential control, time
control, event control, etc.
• Define routines for calculation and updating in databases to be started automatically or
manually.
• Design reports for presentation on monitor screens or for paper printout.
• Configure, supervise and handle system components, for example printers and monitors.
• Build process simulations.
• Exchange data with other SYS600 applications and with external (non-SYS600) applications (for
example, office applications).
GUID-67A7C918-AF21-4AF7-A7F2-551063D2445A V1 EN-US
Figure 2: Features controlling the SCIL program execution and features controlled by SCIL
A SCIL program is composed of one or more textual statements. Each statement represents an
instruction to the system about a task to be carried out, for example, the presentation of a picture or
the assignment of a variable value. Consecutive statements mean a sequence of instructions, which
are carried out in the prescribed order.
SCIL programs appear in pictures, in command procedures (objects for automatic or SCIL activated
program execution), and in the dialogs and dialog items (Visual SCIL objects). For more information,
see Section 4.
• The function keys in pictures and the buttons in dialogs contain SCIL programs that are started
manually by the operator.
• The pictures and dialogs can contain programs, which are started automatically when a picture
is entered or exited, periodically with a certain time interval, and on the occurrence of a process
event.
• The command procedures can start automatically by real or simulated process events, by time,
from other SCIL programs, etc.
• SCIL programs can be started by a SCIL command or a program call.
• In Normal Mode, the entire functionality of SCIL language is available for the programmer.
• In Read-only Mode, commands and functions that have side-effects are not allowed. Any
operation that alters the data of the base system or devices connected to it is regarded as a
side-effect.
• A classic monitor runs in read-only mode before a successful login and after a logout.
• An unauthenticated OPC client runs as read-only if the system hardening is configured
accordingly.
• An external SCIL-API program runs as read-only if the system hardening is configured
accordingly.
• Search and query conditions (filters) of database SCIL functions are evaluated in read-only
mode.
• SCIL Data Derivation Language (SDDL) expressions are typically evaluated in read-only mode.
The example in Figure 3 gives an insight into what a SCIL program can look like. The program could
be placed under a function key in a picture, which means that it is executed each time the key is
pressed. The purpose of the program is to bring a new picture, called a MENU, on the screen
provided that a password is given correctly (999).
GUID-220CFBE3-D7D0-45A5-A360-D40F591C171B V1 EN-US
Each line in the program example in Figure 3 is a SCIL statement. A statement can also be
continued on several lines. A SCIL statement may consist of the following main components:
• Commands. These are words with a pre-declared meaning constituting orders to the system
about steps to be taken. In the example in Figure 3, each program line starts with a command.
• Objects. An object is a broad concept which may correspond to physical parts of the system or
the process, database items, user interface objects, or abstract functions specific to the SYS600
system.
• Variables. Variables are facilities for the temporary storage and use of changing data. In the
example in Figure 3, WORD is a variable.
• Function calls. SCIL has a large number of predefined functions for various purposes.
• Expressions. Expressions are formulas, which can contain constants, object notations,
variables, function calls and operators (for example, +, - , /, *).
The components above can be combined into statements according to one of the following three
formats:
Type (1) (described in Section 8, Section 10 and Section 11) implies that an action is performed on or
by means of the arguments. The arguments may be object references, expressions, variables,
names, etc. Some commands do not require any arguments, they are as such complete statements.
In some cases, the arguments may contain statements. The command names start with a ! (picture
commands), # (control commands) or . (Visual SCIL, full graphics and Motif commands).
Type (3) (described in Section 5) is a program call which starts a program execution in a picture,
dialog or dialog item.
This section describes the SCIL programming environment and the rules for programming in SCIL:
Section 4.1 SCIL programming environment:: the SYS600 objects where SCIL programs and
expressions are found, the programming tools in brief, the use of SCIL expressions in
external applications via DDE.
Section 4.2 SCIL programming rules: The structure of the SCIL programs, SCIL characters, SCIL names.
• Pictures
• Visual SCIL objects
• Command procedures
• Programs communicating with the base system via OPC Data Access Server
In addition, SCIL expressions appear in windows, data objects and time channels. SCIL expressions
can also be entered in external Windows based applications and evaluated through DDE (Dynamic
Data Exchange).
SCIL programming is carried out online, while the SYS600 system is running. Various application
programming tools, such as Dialog Editor, Picture Editor and Object Navigator, use the SCIL
Program Editor for entering SCIL programs. The SCIL Program Editor is able to check the syntax of
the program. To test SCIL programs, use the Test Dialog accessed from the Tool Manager.
SCIL programs are written in the SCIL Program Editor, which is accessed from tool pictures and from
the Tool Manager. The SCIL Program Editor is opened from the Picture Editor, the Dialog Editor and
the Command Procedure object definition tool.
A dynamic picture is composed of a static background, windows, function keys, SCIL-programs and
picture functions. Windows are the dynamic parts of the picture. They can present data fields,
graphs, figures or complete pictures. The picture functions are complete pictures which are
integrated in the total picture. Picture functions and window pictures (pictures shown in a window) are
commonly called "part pictures" or "sub-pictures", while the total picture is called "main picture".
Pictures are built and programmed in the Picture Editor where they can be named freely. The
pictures and picture editing are described in the Picture Editing manual.
A picture may contain the following types of picture programs (none of them is obligatory):
• A draw program executed every time the picture is loaded on screen, immediately after the
background has been produced on screen but before the start program is executed. It can, for
example, be used for adding context specific graphics to the background by means of graphics
commands.
• A start program executed after the draw program. The start program is used for basic
definitions such as initial variable values, update interval, and program blocks.
• An update program, which is executed repeatedly at intervals defined by a SCIL command
(the !UPDATE command, see Section 8) as long as the picture is displayed on screen.
• An exit program, which is executed each time the picture is closed (even at exit by clicking
three times in the upper left corner of the picture).
• Function key programs executed at each click on the function keys to which they belong.
• Named programs executed by program calls. A SCIL picture may contain any number of
named SCIL programs. The named programs are started by program calls as described in
Section 6.4. The named program names may be up to 63 characters long. Each picture may
contain a named program with a predefined name, ERROR_HANDLER, where the programmer
can define the error handling to be used in the picture. The ERROR_HANDLER program is
described in Section 12.
Besides these programs, the picture contains a background program which is created automatically
by the picture editor. The background program contains graphics commands. Normally, it should not
be edited manually.
The window definitions, see Figure 4, may contain expressions which specify what is to be shown in
the windows. The expression of a window is evaluated each time the window is shown. The window
definitions may also contain conditions for the display of different representations. Both the
expressions and the conditions follow the rules of SCIL.
GUID-F6253A25-E934-4E23-AAEB-D94CA7DEFD53 V1 EN-US
Each Visual SCIL object can have a number of methods, most of which are SCIL programs. (There
are also predefined methods which are programmed in C, but these methods are not editable).
A dialog or a dialog item may contain the following SCIL programs (methods):
In addition, each Visual SCIL object may have an arbitrary number of user defined methods which
are executed by a method call (see Section 6.4).
The methods of the dialogs and dialog items are programmed in the Dialog Editor. The composition
and programming of dialogs is described in the Visual SCIL User Interface Design manual.
A command procedure is an independent SCIL program consisting of up to 2 000 000 lines (see
Figure 5). A command procedure can be activated by a time channel (see below), an event channel
(controller of event-bound activities) or a SCIL program.
GUID-BCB506FD-540E-48CC-B8E5-1C56C6CA4BAA V1 EN-US
The data objects (datalog objects) are objects for the registration and storage of data. The object
definition, see Figure 6, contains a SCIL expression which states how the data is to be calculated.
GUID-723341A5-E418-4735-9ECF-DCF0C3EF7A91 V1 EN-US
The time channels control the execution of time-bound activities. By conditions which are SCIL
expressions, see Figure 7, the initialization times and execution times can be restricted, so that an
initialization or an execution can only occur when the conditions are fulfilled.
GUID-B5E3E998-8576-4C8D-9713-A1CE420EEF6F V1 EN-US
External applications may run SCIL programs and evaluate SCIL expressions using OPC connection
to the base system. The item name space of the SYS600 OPC Data Access server contains
predefined item names SCIL_PROGRAM and SCIL used to execute SCIL. See the OPC Server
manual for details.
In addition, SYS600 applications can be accessed from external Windows applications using the
DDE protocol, so that the SYS600 application works as a DDE server and the other application
works as a DDE client.
The DDE identifiers service, topic and item have the following meanings when accessing a SYS600
application:
Service = MicroSCADA
Topic = SYS600 application number (APL object number, see the System Configuration manual)
Item, data = Item and data depends on the DDE transaction as follows:
REQUEST: item = SCIL expression
Table continues on next page
The DDE Server function in SYS600 supports the following SCIL data types (see Section 5): integer,
real, text, boolean. There are some SCIL functions that can be used in the composition of the
expressions used via DDE. See the DDE Server Functions in Section 10.
When handling data using DDE Server, occurred SCIL errors are preserved so that the user can
afterwards read the last SCIL status code of each DDE conversation by doing a request transaction
by giving DDE_SCIL_STATUS_CODE as Item value.
Accessing a SYS600 application using the DDE Server requires that the DDE Server has been
enabled in the base-system configuration (the SYS:BDE attribute).
For more information about using DDE, refer to the DDE documentation of the Windows Application
that is currently in use.
The Test Dialog accessed from the Tool Manager allows the programmer to enter individual SCIL
statements and expressions, as well as programs. It also provides means for detailed examination of
the SCIL expressions.
A SCIL program can contain up to 2 000 000 lines, and each line up to 65 535 characters (including
spaces). A SCIL statement comprises one or more lines. A minus sign (-) at the end of a SCIL line,
before a possible comment, indicates that the statement continues on the next line. A line may be
divided anywhere where spaces are allowed, but not within text constants. Empty lines are allowed
anywhere in the programs.
Spaces are allowed anywhere in the program except within numbers, words, names, object notations
and composed symbols. These elements, disregarding operators, must be adjacent to at least one
space at each side. Also the operators DIV and MOD (see Section 8) must be adjacent to spaces.
Upper and lower case letters may be freely intermixed. When the program is executed, lower case
letters are converted into upper case, except for lower case letters within text constants (see Section
5).
Comments can be placed anywhere in the program. They are preceded by a semicolon (;), which
indicates that the rest of the line is a comment. However, if the semicolon is enclosed in quotation
marks (";"), it is regarded as a text (see Section 5).
Example 1:
T = TEMP:PAI1
#IF T> 90 #THEN #BLOCK
#SET C:PBO2 = 0
#PRINT 2 OVERHEAT
#BLOCK_END
#ELSE_IF T < 70 #THEN #SET C:PBO2 = 1
Example 2:
The following statement is divided on two lines. As a text constant cannot be divided it is necessary
to type it as a sum of two texts.
SCIL uses Unicode character set to encode text data. All current languages may be written using 2-
byte Unicode characters in numeric range 0 ... 65535. The range also contains a lot of special
purpose 'characters', such as mathematical symbols and many others.
However, the Unicode standard allows for representation of more than 1 million 'characters'. The
characters outside the range 0 ... 65535 are used to write ancient languages and to draw various
additional symbols. These characters occupy 4 bytes and may be embedded in 2-byte character
strings. These 4-byte Unicode characters are allowed in SCIL text strings, but they are counted as 2
characters wherever the length of string is concerned.
Some of the characters and character combinations have a special meaning in SCIL. They symbolize
punctuation marks and operators or have a special meaning in the SCIL Language. These special
symbols and their meanings are listed below. When the symbols are composed of more than one
character, the characters can not be separated by spaces.
Most user interface objects (picture and Visual SCIL objects, see Section 6) and application objects
(see Section 6) are identified by logical names (identifiers), which can be chosen freely. Likewise, the
names of variables, named programs, user defined methods, logical library representation files and
directory paths can be named freely.
As a rule, the names may be up to 63 characters long. However, the names of pictures, windows and
logical paths may be only 10 characters long.
Allowed characters are the letters A-Z, all digits and underscore (_). In application object names
periods (.) are allowed as well. As a rule, the first character of a name must be a letter or an
underscore. Application object names may also start with a digit, but this is not recommended.
Upper case and lower case letters are not distinct. For example, OBJ_NAME and
Obj_name are the one and the same name.
Examples
This section describes the SCIL data types: integer, real, boolean, time, text, bit string, byte string,
vector and list.
In SCIL, there are six types of simple data (data constituted of single values): integer, real, boolean,
time, text, bit string and byte string.
In addition, there are two types of structured data: the data type vector that represents an ordered
array of data elements, and the data type list that represents an unordered list of attribute names and
attribute values. The components (elements and attributes) of structured data may be of any data
type, for example an element of a vector may be a vector or a list.
For generic functions that deal with any type data (for example read the type or status of data,
determine the length of data item or test two data items for equality), see Section 10.2.
In SCIL, each data item has a status code, which expresses the reliability of the data. As a rule,
when an expression is evaluated, it gets the status code of the least reliable operand. Data written
explicitly by the programmer or entered by the user always have OK status. A bad status code may
originate, for example, from a process object value that has been marked as obsolete due to a
communication fault.
The status code of data can be read and written with SCIL functions GET_STATUS and
SET_STATUS (See Section 10.2). The status codes are listed in the Status Codes manual.
The integer data type denotes positive and negative integer values ranging from ‑2 147 483 648
through to +2 147 483 647. These values may be referred to by symbolic names MIN_INTEGER and
MAX_INTEGER, respectively. Constant integers outside these limits are represented as real
numbers. The most negative integer -2 147 483 648 cannot be written as a constant, it should be
referred to by its symbolic name MIN_INTEGER.
Integer constants can be typed either in decimal or in octal form. In decimal form integers are written
as a sequence of digits 0 ... 9 optionally preceded by a sign. No embedded spaces nor commas or
points are allowed.
Octal constants are written as a sequence of octal digits 0 ... 7 followed by a trailing up arrow (^).
000123
-5
777^
The real data type expresses, with limited precision, the continuous quantities within a large range of
values. The accuracy of real numbers is limited to about seven significant decimal digits.
Table 1 shows the value ranges of the real numbers. All numbers between the smallest negative and
the smallest positive numbers yield the value 0. The ranges are determined by the processor of the
base system computer.
Real numbers are written using digits, decimal points and signs. No exponents are allowed. At least
one digit must precede the decimal point. Numbers without any decimal point are considered as
integer values if they fall within the value range of integer values. Outside that range, they are
considered real values.
Because the internal representation of a real number is generally not exact, care should be taken
when comparing two real values for equality. For example, it is not safe to rely on such facts as
1.7/5.0 == 0.34. However, the following holds: every whole number in the range -16 777 216 ..
+16 777 216 has an exact representation as a real number. Therefore, for example the relation
170.0/5.0 == 34.0 is safe, no rounding errors can occur.
For various arithmetic functions that operate on real data, see Section 10.3.
If better accuracy of floating point arithmetics is required by an application, special purpose SCIL
functions operating on 64-bit floating point numbers may be used. See Section 10.3 for functions
whose name is prefixed by HIGH_PRECISION_.
GUID-711AA093-334F-40D9-9FEE-A3CE2C1E0397 v1
0.0
1234.56789
2147483648
5.
0.000000000000000000001
The second number contains 9 significant digits and thus cannot be stored without some loss of
precision. The third number is a real constant because it falls outside the range of integers.
Boolean values result from comparisons (relational operators) and various other tests (such as
functions EVEN and ODD). They are frequently used in conditional statements and expressions.
Internally, FALSE is represented by the value 0 and TRUE by the value 1. Hence, the relation
between the two boolean values is:
GUID-EA487460-5B5B-4B0C-8E97-89249B2D8BA6 v1
FALSE < TRUE.
Integer 0 and 1 are returned when boolean SCIL expressions are used via DDE (Dynamic Data
Exchange).
Time data is obtained by reading the system clock and various time stamp attributes of objects.
A time value is internally represented as a 32-bit unsigned integer counting seconds since the
beginning of 1978.
For various functions that operate on time data, for example give a textual representation (for
example, calendar time) of time data, see Section 10.4.
Text data is composed of 0 to 65 535 characters. Unicode character set encoding is used. Symbolic
name MAX_TEXT_LENGTH may be used to refer to the text length limit of the current
implementation (65 535 today). Strictly speaking, the limit 65 535 refers to the maximum length of the
text string as 2-byte words. The Unicode standard defines also characters that occupy 4 bytes of
memory. Fortunately, they are very seldom used. Hence, for practical purposes it is safe to equate
the length of text string and the number of characters it contains.
Text values may be compared and concatenated (added using + operator), see Section 8. For
various predefined functions that operate on text data, see Section 10.5.
Text constants are enclosed in quotation marks ("). A single quote (') or double quote (") contained in
the text must be typed as two single quotes or two double quotes respectively.
A bit string is a sequence of bits stored in consecutive memory bytes. The length of a bit string (the
number of bits in the string) may be anything from 0 to 65 535. The bits in a string are numbered
from 1 to 65 535 counting from left to right. Symbolic name MAX_BIT_STRING_LENGTH may be
used to refer to the bit string length limit of the current implementation (65 535 today).
Bit strings appear as values of process object attributes and functions. They can be created using
functions BIT_SCAN and BIT_STRING and represented in a textual format by means of BIN function
(See Section 10).
Bit strings may be compared and concatenated (’added’ using + operator), see Section 8. For
functions that manipulate bit strings on bit level, see Section 10.
Internally, a bit string is represented as a two-byte length field followed by as many data bytes as
needed to store the bits.
An example of a bit string of eight bits converted to a text by means of the BIN function:
GUID-EB5D2608-E4E3-4CD0-A238-4859A381720A v1
BIN(%BITSTRING) == "01010101"
A byte string is a sequence of consecutive 8-bit bytes with no structure and no predefined semantics.
The length of a byte string may be anything between 0 and 8 388 600 bytes. Symbolic name
MAX_BYTE_STRING_LENGTH may be used to refer to the byte string length limit of the current
implementation (8 388 600 today).
Byte strings can be created by the PACK_STR function. By using the function UNPACK_STR, a byte
string can be interpreted as an array of numerical values. Byte strings may be used to exchange
binary data between SYS600 and other applications. They are used within the SCIL programming
environment, for example, to store compiled SCIL programs.
Byte strings may be compared and concatenated (added using + operator), see Section 8.
Internally, a byte string is represented as a four-byte length field followed by as many data bytes as
needed to store the bytes.
A vector is an ordered array of data. A data item as a component of a vector is called an element. A
vector may contain up to 2 000 000 elements numbered from 1 to 2 000 000. Symbolic name
MAX_VECTOR_LENGTH may be used to refer to the vector length limit of the current
implementation (2 000 000 today).
The elements of a vector may be of any data type. Different elements may even be of different data
types.
or
GUID-6B33B818-0451-4F28-8DC7-04E4B30724FB v1
(element1, element2 [,element]*)
The key word VECTOR is followed by the vector element values separated by commas and enclosed
in parentheses. The elements may be given as expressions of any data type. The key word VECTOR
may be omitted if two or more elements are listed. An empty vector may be written as VECTOR or
VECTOR().
GUID-C7EE9037-2ADE-4426-979F-4385383178AA v1
(-23, "NAME", 0.000001, CLOCK, A + B)
A list is an unordered collection of data components. The components are called attributes which
have a name and a value. Hence, data type list is a list of attribute name/value pairs. A list can hold
up to 2 000 000 attributes. Symbolic name MAX_LIST_ATTRIBUTE_COUNT may be used to refer to
the attribute count limit of the current implementation (2 000 000 today).
The attributes of a list may be of any data type. Different attributes may have different types.
The key word LIST is followed by attribute value assignments separated by commas and enclosed in
parentheses. The attribute values may be given as expressions of any data type. An empty list may
be written as LIST or LIST().
Using a LIST aggregate and vector aggregates, the list could be written:
Components of structured data, that is, elements of a vector and attributes of a list, are accessed by
the following notation:
GUID-D3C7848A-E5C8-4C95-9516-AFB68E388FA7 v1
entity[component]*
GUID-689DF4F0-B739-4C7E-9C8C-596263403639 v1
( [low] .. [high] )
GUID-D895FEA0-F4C1-4EDA-A4B6-53B599CAB0B1 v2
.attribute
An index range may be specified only as the last component of the notation.
There is no limit for the number of components in the notation. Consequently, any component of
structured data may be directly accessed, regardless of the complexity of the data structure.
A component access notation may appear as an operand of an expression and as the left hand
operand of an assignment statement and .SET command.
Assigning a value to an attribute does not create the attribute. If the attribute to be assigned does not
exist, error SCIL_ATTRIBUTE_NOT_FOUND is raised.
On the other hand, assigning a value to a vector element that does not exist expands the vector or
even creates the vector, if the target is not of vector type.
Examples:
Invalid statements:
This section describes in general terms the objects and how to handle them in SCIL. The objects are
of three main categories which are described in the following sections:
Section 6.1 General: An overview of the three object categories, some object related concepts.
Section 6.2 System objects: The communication system objects and base system objects, their object
notation and some attributes.
Section 6.3 Application objects: The application object types, their object notation, and some attributes.
Section 6.4 User interface objects: The pictures and picture components, the visual SCIL objects, the
object hierarchy, the object references, attributes and methods.
Section 6.5 Files: File naming and different file types.
The description of the object types here is superficial. For a detailed description, refer to the following
manuals: System Objects, Application Objects, Visual SCIL Objects, Visual SCIL User Interface
Design and Picture Editing.
There are three categories of objects which represent three levels of system engineering:
• System objects.
System objects are used for system configuration and communication. There are two types of
system objects:
• Base system objects.
• Communication system objects (previously named system objects).
• Application objects.
These objects form the functional portion of the applications. There are eleven types of
application objects:
• Process objects
• Event handling objects
• Scale objects
• Data objects
• Command procedures
• Time channels
• Event channels
• Logging profiles
• Event objects
• Free type objects
• Variable objects
• User interface objects.
There are two types of objects for composing the user interface portion of applications:
• Pictures
• Visual SCIL objects. There are approximately 40 Visual SCIL object types. Each type
corresponds to a type of dialog, dialog item (for example, buttons, texts, lists, menus) or
image.
An important concept when talking about objects is the notion of attribute. Most object types have
attributes which represent the values and properties of the objects. The value of a process object, for
example, is represented by an attribute, the time stamp is another attribute, and so is the alarm state.
Regarding the Visual SCIL objects, the attributes may correspond to visual properties such as the
label or color of a button.
Through the attributes, the SCIL programmer can use and change the object properties. For
instance, the color of a dialog item and the alarm limits of a process object may be changed by
means of a SCIL statement.
The Visual SCIL objects may also have a number of methods which are programs written in SCIL or
in C. The SCIL programs may be freely modified, while the C programs are predefined. By executing
predefined methods, the programmer can affect certain features of the objects.
The values and properties of the objects can be read in SCIL as attributes. Provided that write
access is allowed, the values and properties can also be written by means of SCIL commands.
Reading an attribute means that it is used in a SCIL expression, for example, assigned to a variable
or shown in a window.
The system objects and application objects, more precisely their attributes, are accessed by means
of an object notation which contains the object name and type and the attribute name. The Visual
SCIL objects are accessed by means of an object name or path and an attribute name.
The system objects and most of the application objects are global and accessible not only within the
same application and the same base system, but also in the entire distributed SYS600 system. The
Visual SCIL objects, on the contrary, are accessible from SCIL only within the same dialog system.
The system objects define the hardware and software configuration of the entire SYS600 system, as
well as the data communication with connected devices. There are two types of system objects:
• Base system objects (B) which define the base system configuration.
• Communication system objects (S) which are images of the physical system devices
connected to the communication units (NETs).
The base system objects are stored in the RAM memory of the base system computer as long as
SYS600 is running. They are not stored on disk, but must be defined at each start-up of the base
system. The communication system objects are stored in the communication units (NETs) as long as
the units are running. Default values may be stored in the communication programs as a
preconfiguration.
SCIL refers to a system object value, i.e. an attribute, by an object notation of the following format
(the items within brackets may be omitted):
GUID-5F5A7512-188D-4D21-9356-95DC7673DDAB v2
name:[application]type attribute[index]
where
name is the name of the object. The system objects have predefined names which are
composed of a three-letter type notation and a sequence number. Base system objects
may also have a user-defined name.
application is an application number. Generally not needed.
type is a character indicating the object type: S = communication system object, B = base
system object.
attribute is the attribute to be read or written with the notation. The attribute names are a
combination of two letters (A ... Z). The attribute determines the data type of the entire
notation. The system object attributes are all detailed in the System Objects manual.
index is a number or a range of numbers. The indices have different meanings depending on
the object type and attribute. For instance, for NET line attributes the index generally
refers to the NET line number. For some attributes, the index denotes an address. For
more detailed information about the indexing of attributes, see the System Objects
manual.
• As an integer constant, 0 ... 2 000 000, either a positive decimal number or an octal number.
Octal numbers are used when addressing bits of memory attributes of communication system
objects.
• As an integer type expression enclosed by parentheses.
• As a range enclosed in parentheses, (i .. j), where 'i' denotes the first index number and 'j' the
last. Two points surrounded by parentheses, (..), denotes all the indices of the actual object
notation. (i ..) means all indices larger than or equal to 'i', and (.. j) all indices less than or equal
to 'j'. In an index range, either both or none of the index limits may be given with bit addresses.
The base system objects correspond to the devices and applications located in, connected to, or
otherwise known to the base system. They determine the hardware and software properties of the
base system and its applications.
'n' represents an ordinal number (base system object number). For APL and MON type objects, it
can be omitted from the object notations, which means that the notation refers to the current
application or monitor respectively.
Each of the base system object types have their own attributes. Here are some examples:
AS Application State
The state of the application (APL): HOT = active, WARM = not active, but accessible, COLD
= passive, not available.
AC Alarm Count
Belongs to APL objects and shows the number of active alarms in the application. The alarm
class is given as an index. Index 0 refers to the total number of active alarms.
The communication system objects correspond to the devices connected to the communication units.
Hence, these devices - communication units, stations, other base systems, workstations and
peripherals - can be accessed and controlled from SCIL as communication system objects. Each
NET unit has its own set-up of communication system objects.
NETn (or NODn) Communication units and base systems (n = 1 ... 250)
APLn Applications (n = 1 ... 250)
STAn Stations (RTUs, PCLs, relays, etc.) (n = 0 ... 255)
PRIn Printers (n = 1 ... 8)
The 'n' above indicates the number of the objects as known to the NET where they are defined.
When handling the objects in SCIL, the 'n' in the object name is the logical number of the device
(according to the device mapping attributes).
Each of the object types have their own attributes. Here are some examples:
SA Station Address
The station address of a device. The NET objects and STA objects have a station address.
IU In Use
States whether or not the object is in use. Most system objects have this attribute.
Value: 0 = out of use
1 = in use.
PO Protocol
The protocol of a communication line given as an integer, for example, 1 = ANSI full duplex,
14 = SPA. 0 = the line is not defined.
ME Memory address
The contents of the memory address given as an index. Belongs to the STA objects (ANSI
stations).
The application objects are programmable units which perform various functional tasks in the
SYS600 application. They constitute data images of physical process or system devices, data
registers, SCIL programs, scaling algorithms, facilities for automatic activation, etc.
• Process objects (P): data images of the physical process devices connected to process
stations (remote terminal units (RTUs), protective equipment, PLCs, etc.).
• Event handling objects (H): texts related to object states and events.
• Scales (X): algorithms for scaling analog process values.
• Data objects (D): collections of stored data.
• Command procedures (C): SCIL programs.
• Time channels (T): facilities for automatic time bound activation.
• Event channels (A): facilities for automatic event bound activation.
• Logging profiles (G): definitions for logging data into Historian database(s).
• Event objects (E): mechanisms for event activated start-up of SCIL programs or program
sequences in pictures and dialog objects.
• Free type objects (F): special objects for the definition of user-defined process object types.
• Variable objects (V): temporary objects which can contain attributes collected from other
objects or arbitrary attributes.
Process objects, event handling objects, scales and free type objects are stored in the process
database, which holds an image of the process. Data objects, command procedures, time channels,
event channels and logging profiles are all stored in the report database, which is a database
supporting reporting, calculation and control. These objects are also commonly named reporting
objects. Variable objects are stored in the same way as variables (see Section 7). Event objects are
not stored at all.
All application objects, with the exception of the variable objects, are global and accessible
throughout the entire system.
SCIL refers to an object value, i.e. an attribute, by an object notation of the following format (the
terms in brackets may be omitted in cases where they are not needed):
GUID-8AAD8484-038D-4E98-AFB3-9F15105A8F02 v1
name:[application]type[attribute][index]
where
name is the object name. The application object names are logical (symbolical) and can be
freely chosen in accordance with the rules given in Section 4.2.
application is the logical number of the application where the object is stored. Application number
must be given if the object belongs to an application other than the current one (the
application where the notation is used). If the object belongs to the same application,
the number is omitted. The application numbers are defined by the APL:BAP attribute
(see Section 7).
type is the type of the object given by using the letters P, H, X, D, C, T, A, G, E, F or V.
attribute is the attribute to be read or written by the notation. As a rule, the attribute names are a
combination of two letters (A ... Z). However, if the object is a variable object, the
attribute name may be composed of up to 63 characters. The object notation may
contain one or no attribute name. The attribute determines the data type of the entire
notation when used in expressions.
index is a number or a range of numbers used to select an element or a range of elements of
a vector attribute, or distinguish between process objects within an object group.
As a rule, the indices refer to the elements of an attribute of vector type. The predefined process
object types are an exception. For these objects, the indices refer to the individual objects in a group,
not to attributes of vector type. Still, for a certain attribute, the values are handled as elements in a
vector.
• As an integer constant, 1 ... 2 000 000. This way may be used only when the length of the
attribute name is exactly 2 characters.
• As an integer type expression enclosed in parentheses.
• As a range (i .. j), where 'i' denotes the first index and 'j' the last. Two points surrounded by
parentheses, (..), is interpreted as all the indices of the attribute. (i ..) means all indices larger
than or equal to 'i', and (.. j) all indices less than or equal to 'j'.
The process objects correspond to physical devices connected to the process stations (RTUs,
protection equipment, PLCs), for instance switches, sensors and breakers. Each input and output
connection in the stations is represented by a process object. Normally, the value of an input object is
updated from the process station, while the value of an output object is sent to the station when
written with the SCIL command #SET (Section 9.2).
Some process objects have no correspondence in the stations. These are called fictitious process
objects and they can generally be updated only from SCIL programs. They can be used, for example,
for process simulation or manually updated data.
There are nine predefined process object types depending on the type of object value (i.e. the input
or output connection in the stations): binary input and output, analog input and output, digital input
and output, double binary indications, pulse counters and bit streams. In addition, for special
purposes, the programmer can define their own process object types by means of free type objects.
An updating of a process object value may cause an alarm, an automatic printout, an updating on
screen (through event objects, Section 6.3.10), and activation of an event channel (Section 6.3.8).
Process objects with active alarms are included in an alarm buffer, which can be read by SCIL
function APPLICATION_ALARM_LIST and displayed as alarm lists. If desired, the process object
events can be stored in a history database, which can similarly be read by SCIL function
HISTORY_DATABASE_MANAGER and displayed as event lists.
A few process object attributes are described below. All attributes are detailed in the Application
Objects manual.
OV Object value
The value of the process object as registered in the process database. The object value is
the value read from the process (input values) or sent to the process (output values). The
attribute is a common name for the attributes BI, BO, AI, AO, DI, DO, DB, PC and BS (see
below). Each object value has a time stamp and an error status code.
Value: 1 or 0 for binary objects, real values for analog objects, bit string for bit streams
and integer for the others.
BI Binary Input
Binary process value from the process to the control system.
Value: 1 or 0.
BO Binary Output
Binary set value from the control system to the process.
Value: 1 or 0.
AI Analog Input
Analog measurement value from the process to the control system.
Value: real.
AO Analog Output
Analog set value from the control system to the process.
Value: real.
AL Alarm
States whether the object is in alarm state or not.
Value: 0 - no alarm
1 - alarm state.
If object notation is given without any attribute, the attribute is assumed to be OV, except in
connection with the commands #LIST, #CREATE, #DELETE and #MODIFY (see Section 9), where
the whole object is referenced to.
Related process objects (up to 65 535) of the predefined types may be given the same name.
Process objects with the same name form a process object group. The individual objects in a group
are accessed by means of indices. A process object notation of any predefined type without an index
is interpreted as the lowest indexed object with the given name and attribute (attributes common to
the group are always used without indices).
Concerning user-defined types (defined by free type objects), the indices refer to the elements of a
vector type attribute. A notation without indexing means the entire vector.
Event handling objects are related to the process objects. They define translatable texts that describe
the state of the process object and the transitions between the states.
Each process object owns a reference to an event handling object. One event handling object is
typically used by several process objects.
Two event handling object attributes are given below as examples. All attributes are detailed in the
Application Objects manual.
ST State Texts
Value: A text vector containing the text identifiers for the state texts
Scales are related to the process objects, particularly to analog process objects. They define
algorithms for the transformation of the digital process values transferred from the stations to the
values of the analog units of the corresponding process objects.
Every REAL valued analog process object has a scale name, which defines the scaling algorithm to
be used for the transformation. The same scale can be used by several process objects.
Below are two scale object attributes. All attributes are detailed in the Application Objects manual.
LN Logical Name
Value: text.
SA Scaling Algorithm
Value: 0 = 1:1 scaling
1 = linear scaling
2 = step-wise linear scaling
Data objects (datalog objects) register and store calculated or sampled data. They are used for the
storage of report data, trend data, data for calculation and control, system configuration data, etc.
The data objects can also be used as application variables when there is a need for exchanging data
between different objects.
The data registration may be initiated from a program (by means of the commands #EXEC and
#EXEC_AFTER, see Section 9.2), from a time channel (Section 6.3.7.) or from an event channel
(Section 6.3.8). Each registration is performed according to a SCIL expression and a logging
function. Besides the calculated or sampled value, each registration includes a time stamp and a
status code.
Every data object can store a chosen number of data registrations (up to 2 000 000). The
registrations can be accessed as vectors by means of indices. The oldest registered value has the
index number 1.
Some of the most important attributes are listed below. A complete description can be found in the
Application Objects manual.
OV Object Value
Registered value.
Value: real or vector of real values.
RT Registration Time
Value: time or vector of time values.
OS Object Status
Indicates the reliability of the registered data.
Value: Integer or vector of integers. The status codes listed in the Status Codes
manual, for example:
0 ... OK
1 ... uncertain
10 ... no values.
If the object notation lacks an attribute, the attribute is assumed to be OV, except in connection with
the command #EXEC or #EXEC_AFTER (Section 9.2), where the notation refers to the whole object.
The above mentioned attributes are used indexed. An object notation with these attributes without
any index refers to the latest registered value.
The command procedures contain SCIL programs which can be started automatically or by SCIL.
They can be used for all kinds of manually or automatically started operations, such as calculations,
control operations and reporting. They cannot be used for affecting the user interface. Command
procedures can be started in the following ways:
• From SCIL programs with the #EXEC and #EXEC_AFTER commands (Section 9.2). (A
command procedure can even start itself).
• From time channels (Section 6.3.7).
• From event channels (Section 6.3.8).
A command procedure can hold up to 2 000 000 SCIL lines. As a rule, command procedures may
not contain user interface related commands (picture commands, Visual SCIL commands or
graphical commands, see Section 9.1. However, a command procedure, or a selected part of it, can
be handled as a vector and be executed with the #DO command (Section 9.2) and the DO function
(Section 10). In these cases, it may contain user interface commands if the #DO command or DO
function is executed in a user interface object.
Some command procedure attributes are shown below. All attributes are detailed in the Application
Objects manual.
TC Time Channel.
The name of the time channel that starts the command procedure.
Value: text.
IN Instruction
The program of the command procedure.
Value: text vector.
OS Object Status
States how the last execution succeeded.
Value: The status codes listed in the Status Codes manual, for example:
0 ... correctly executed
10 ... not executed.
A command procedure notation without an attribute refers to the program, i.e., the IN attribute.
Indices can be used only with the attribute IN where they refer to the line numbers. The IN attribute
without indices refers to the whole program.
Time channels are used for the automatic start-up of time-bound activities, which can be:
A certain time channel can start several data objects and command procedures. The execution order
is determined by the priorities of the data objects and command procedures.
A time channel is activated at the execution time which means that the connected objects are
executed. At the initialization time the time channel is initialized, which means that the registration of
connected data objects is restarted from the first record. Both initialization and execution can take
place at absolute points of time or periodically with a fixed interval. All times are given with an
accuracy of one second. Discontinuous time activation is obtained with conditional expressions.
Time channels can be executed also with the #EXEC commands (Section 9.2) and with event
channels (Section 6.3.8).
Some time channel attributes are listed below (a complete list is found in the Application Objects
manual):
IU In Use
States whether the time channel is in use or not.
Value: 0 = not in use
1 = in use
RT
The time of last initialization/activation.
Value: time vector
The time channels can be used without an attribute only with the #EXEC commands.
Indices (1 or 2) can be used, for example, together with the RT attribute. Index 1 refers to the
initialization time and index 2 the activation time.
Event channels are used for the automatic start-up of event-bound activities. The events normally
originate from the process database, from where the event channels transmit them to objects in the
report database which take the consequential actions (calculations, control actions, etc.). An event
channel can start the following operations:
Each process object may have only one event channel, but an event channel may be connected to
up to 11 command procedures and data objects. At the activation of an event channel, some
essential attributes are transmitted as variables from the process object to the connected reporting
object. Thanks to this feature, several process objects can share the same event channel.
An event channel is activated by the following events in the activating process objects:
The options are chosen with a process object attribute (AA). Event channels can also be activated
with SCIL (the #EXEC commands, Section 9.2).
In addition, any user-defined attribute can activate the event channel of the object.
OT Object Type
The type of the object to be executed.
Value: text.
ON Object Name
The name of the object to be executed.
Value: text.
Logging profile objects are used to define the connection of SYS600 application database to a
Historian database. A Historian database is a high performance time series database designed to
store large amounts of real-time data for later analysis and reporting.
The following data from the SYS600 database can be logged to a Historian database:
In addition to the value itself, also the time stamp and status are logged (attributes RT and OS,
respectively). The objects to be logged are specified by linking the object to a logging profile object
(attribute GP of process and data objects). The logging profile objects specify where and how the
data is logged. For more information about logging profiles, see the Application Objects manual.
The event objects are used to start event-bound activities, normally updates, in user interface objects
(pictures and Visual SCIL objects).
In pictures, the activation of an event object causes the execution of the statement(s) determined by
the #ON command (Section 9.2) for the specific event object. The #ON commands are valid only for
the actual picture, either main picture or sub-picture, where they have been executed. The event
causes no action if there is no #ON command in force for the actual event in the picture shown on
screen at the event moment.
In dialogs and dialog items, the activation of an event object starts the execution of the event
method, if any, defined to be activated by the event object in question.
• From the process database, so that a change in a process object automatically activates an
event object with the same name and index as the process object. The activation takes place
independently of what causes the change - a change of state in a station or an assignment in a
SCIL program (by the command #SET, Section 9.2). The coupling of an event object to a
process object is optional. The activating attributes are listed in the Application Objects manual,
the EE attribute description.
• From a SCIL program (in a picture or a command procedure) by the #EXEC commands (Section
9.2). In this case the name of the event object can be freely chosen.
If a process object is equipped with an event object, updating in pictures is carried out automatically
and immediately when a change occurs. The value of the changed attribute is not transmitted to the
picture, nor is any information about which attribute has changed.
The event object notation does not contain any attribute. Event objects have no values, hence they
cannot be parts of expressions.
is always activated when a change in the process object (for instance the attribute AI) occurs in the
process database.
The variable objects serve as temporary storage places for attributes. They are used to compose
lists, for example, alarm and event lists, to browse through the object properties, to copy objects, to
create and modify objects, etc.
A variable object is at the same time both an object and a global variable of list type (Section 5.11).
The list as a whole is handled as a variable with the same name as the object (Section 7). The
attributes in the list are accessed with a variable object notation.
A variable object can be created and assigned attribute values in two ways:
• By creating the variable object with the #CREATE command (Section 9.2) and assigning it
attribute values with a list function or with the #SET command (Section 9.2). In this case, the
attribute names may be arbitrary, up to 63 characters.
• By assigning a global variable a value of list type (Section 7.2). A variable object with the same
name as the variable is formed. The variable object gets all the attributes of the list expression.
A variable object notation must always contain an attribute. Unlike other object types, the names of
variable object attributes can contain up to 63 characters. If the attribute is of vector type, the vector
elements are identified by indices. An object notation without an index denotes the whole vector. If
the attribute name contains more or less characters than two, the index must be enclosed by
parentheses.
As global variables (Section 7), variable objects are accessible within the SCIL context they are
created in.
The statement
GUID-E285580F-F422-43D7-9D95-983A8C609D63 v1
@VAR = PROD_QUERY(20)
assigns the variable VAR the list value returned by the function PROD_QUERY (Section 10). The
variable may be accessed as variable object VAR:V.
Variable objects are more or less obsolete. Attributes of list type variables may be
accessed in a more powerful way by using data component access described in Section
5.11. For example, VAR:VLN1 may be written as %VAR.LN(1), when read, or
@VAR.LN(1), when written.
The Visual SCIL objects correspond to the dialogs, dialog items and images designed in the Dialog
Editor or created with SCIL. There are approximately 40 types of Visual SCIL objects which could be
grouped as follows:
In SCIL, the visual SCIL object types are referred to by names starting with VS_. For instance,
buttons are named VS_BUTTON. The Visual SCIL Objects manual lists and describes all the Visual
SCIL object types.
Generally, the dialogs, dialog items and images are designed in the Dialog editor, though they can
also be created directly with SCIL. Dialog and dialog items created in the dialog editor are stored in
files from where the SCIL command .LOAD loads them in the memory as a visual SCIL object with a
specific name. Objects created with .CREATE are not stored in files.
The SCIL commands for handling Visual SCIL objects are detailed in Section 9.2.
Unlike system and application objects, the Visual SCIL objects are not global. They are known and
accessed only within the dialog system where they are created or loaded.
The Visual SCIL objects are arranged in hierarchical dialog systems with a main dialog or picture
container at the top. Each main dialog and each dialog system creates a new dialog system. The
object hierarchy is important when referencing the objects.
Objects containing another object are called parent objects, and the contained objects are called
child objects. Child objects are dependent upon their parent objects. When the parent objects are
loaded, the child objects are loaded as well, and when the parent objects are deleted (with
the .DELETE command), the child objects are also deleted.
When loading a dialog or a dialog item with the .LOAD command, it becomes a child object of the
loading object (unless object path is given, see below). When loading a main dialog or picture
container, it creates a new dialog system.
Figure 8 shows an example of a Visual SCIL dialog system with four dialogs. Dialog 1, which is the
main dialog, contains four dialog items. Dialog item B loads dialog 2. This dialog contains three
dialog items, one of which (object G) loads dialog 3. Dialog item D contains two dialog items, and
dialog item F contains two items. For instance, D could be a menu bar containing menus, which
contain menu items (menu options). Dialog item J loads dialog 4.
The dialog items A .. D are child objects of the main dialog. Dialog 2 is the child object of item B and
the parent object of the dialog items G .. I. Dialog 4 is the child object of item J which is the child
object of item F, and so on.
GUID-2F52471E-1031-4E8F-86A3-8FC809CEB29B V1 EN-US
The attributes of the Visual SCIL objects specify their properties and functions, for example, visibility,
position, text contents, behavior, color, fonts, etc. Some attribute values can be set in the dialog
editor, some only with SCIL, and some both in the editor and with SCIL.
The dynamic changes of the dialogs and dialog items are obtained by changing their attribute values
with the SCIL commands .SET and .MODIFY.
Each object has a number of predefined attributes with predefined names, data types and meanings.
The predefined attributes of each object type are listed and described in the Visual SCIL Objects
manual. In addition, the objects can be given an arbitrary number of user defined attributes with
the .LOAD, .CREATE and .MODIFY commands.
Each dialog and dialog item may have a number of methods which are programs for various
purposes, for example, cyclically executed programs, programs executed on certain events (event
objects), programs started by a user operation, and programs started by SCIL.
The programs started by SCIL may be predefined or user defined. They are started by a method call
of the format described below.
When designing a dialog or dialog item in the Dialog Editor, each item may be given a name. This
name will be the Visual SCIL object name of the item when it is included in a dialog or dialog item
loaded with the .LOAD command. The loaded dialog or dialog item is given a Visual SCIL object
name with the .LOAD command. Objects created with .CREATE are given object names with this
command.
Object references are used when loading, creating and deleting objects, and in the attribute
references and method calls. When referring to an object one level below, the object name is
sufficient. When referring to an object that is more than one level below, object path should be given
as follows:
GUID-676149E4-3F44-48EA-A4E8-797E8FA9944C v1
name\name\name\.... \name
ROOT The main dialog or picture container on top of the dialog system.
PARENT The parent of the object.
THIS The object in question.
PARENT and ROOT are the only possibilities for accessing objects on a higher level in the hierarchy.
where 'object' is an object reference, 'attribute' is the name of the attribute and 'component'
addresses a component of structured data, see Section 5. If the attribute or method is referenced
from a method within the same object, no object reference is needed.
Attribute references can be used as operands in expressions. They are also used together with
the .SET command to achieve a change of the attribute. The attribute references can be expanded
like variables, see Section 7.
Example:
This statement sets the label of the button (the visual SCIL object MY_BUTTON) to OK, which is
immediately shown on screen if the button is shown.
Method calls start the execution of methods, both predefined methods and user defined methods.
Method calls have the following format:
GUID-B8DB4B19-5414-48E6-948B-614C2B2D2228 v1
[object].method [(argument_list)]
where
'object' is an object reference. Not needed when referencing methods in the same object
or one level below.
'method' is the method name.
'argument_list' Arguments, which may be any SCIL expressions given as a list of SCIL
expressions separated by comma and enclosed in parentheses. Up to 32
arguments may be given.
By using the SCIL command #RETURN, a method can be programmed to return a value to the
calling program. A method call that returns a value can be used as an operand in an expression.
The pictures and picture components were briefly described in Section 4. The Picture Editing manual
describes how to build and program the pictures. This section discusses how to reference pictures
and picture elements from SCIL.
In SCIL, the pictures and windows are handled by the picture handling commands described in
Section 9.4. In addition, the windows may have attributes which are accessed by a window attribute
reference. The named programs of the pictures are executed by a named program call.
A picture may contain a number of sub-pictures in the shape of pictures shown in windows and
picture functions. These sub-pictures in turn may contain sub-pictures. A picture and its sub-picture
form a picture hierarchy with the main picture (total picture) on the top. Figure 9 shows an example of
such a hierarchy. A, B, C, D, E and F denotes windows and picture functions.
GUID-40B23FA9-6C16-4BBA-B84A-C47202333BB9 V1 EN-US
Figure 9: A hierarchical picture structure. The subpictures are picture functions or pictures
shown in windows. The letters A .. F denotes the names of windows and picture
functions.
A picture containing sub-pictures is the parent of its sub-pictures and the contained sub-pictures are
children. This parent-child relationship is important in determining how the windows are shown in
relation to other windows. It is also important when referencing windows and named programs.
When referencing windows and named programs, a picture path may be used. A picture path states
in which picture, main picture or sub-picture, the window or named program should be searched. A
picture path has the following format:
GUID-E0CA0094-8DED-4161-BB07-1C283D32747E v1
name/name/name/ ... /name
where each 'name' is the name of the window or picture function containing the next picture in the
hierarchy counting from the picture where the command is issued. (Back slash (\) could be used
instead of forward slash (/).) The main picture can be referenced with the predefined name ROOT. If
the picture is included in a dialog system (see Section 6.4.1.) ROOT also refers to the picture
container where the picture is included.
If no picture path is given, the window or named program is first searched from the same picture as
where the reference is issued. If not found there, it is searched from the parent picture and so on up
to the main picture. Hence, when referencing windows and programs within the same picture or its
parent picture, no path is needed.
For example, the picture path for referencing a named program SAMPLE in sub-picture 4 in Figure 9
from the main picture would be:
GUID-B3A3C1E7-7AAB-4DB0-BF20-B8C08636F507 v1
A/D
If not found in sub-picture 4, the program is searched in sub-picture 1 and then in the main picture.
The programmer can assign the windows and picture functions attributes for various purposes using
the .SET command, see Section 9.2.
The window and picture function attributes are referenced according to the following format:
[picture].attribute[component]*
where 'picture' is the picture path, 'attribute' is the name of the attribute and 'component' addresses a
component of structured data, see Section 5.
An attribute reference can be used as an operand in SCIL expressions. The operations allowed
depend on the data type of the attribute (see Section 8).
The picture object attributes can also be expanded in the same way as variables (see Section 7).
Examples:
Each picture can have a number of named programs which are started with the following program
call:
GUID-9B2B97B9-1972-4A36-B563-583382829C2A v1
[picture].program[(argument_list)]
where
'picture' is the picture path to the object containing the named program, see above. If
omitted, 'program' is searched for in the picture containing the program call. If not
found there, it is searched in its parent picture, and so on.
'program' The name of the named program.
'argument_list' Arguments given as a list of SCIL expressions separated by commas and
enclosed in parentheses. Up to 32 arguments may be given.
When encountered in a program, the program call starts the execution of the named program in the
given picture. The subsequent statement in the calling program is not executed until the named
program has been executed to the end. If no program with the given name is found, an error status is
produced. Named programs can be executed from any program in the dialog system. They are also
used as call back programs of Motif widgets.
By using the SCIL command #RETURN (see Section 9.2) in the named program, it can be
programmed to return a value to the calling program. A named program call that returns a value can
be used as operand in expressions.
Example:
A/B.CREATE_ERROR_DIALOG
Executes the named program CREATE_ERROR_DIALOG of window B which is a
child window of window A.
@A = .MY_NAMED_PROGRAM (125,%V+6,"ABC")
The program MY_NAMED_PROGRAM is executed and its return value is assigned
to the variable A.
Every Visual SCIL object, window and picture function has the following predefined methods that are
used to postpone a SCIL program execution.
'name' Text value used as the identifier of the flagged execution. An empty name is allowed.
'program' Text or text vector, the program to be executed.
'delay' Real value indicating the minimum amount of seconds to elapse before the program is
executed. Default value is 0.
Return value: No return value.
This method is identical to _QUEUE_FOR_EXECUTION (see below) with the following exception: If
_FLAG_FOR_EXECUTION method of an object is called twice using the same 'name', the first
flagged execution is cancelled (if still queued).
This method is used when the programmer wants to execute a SCIL program at a later point in time
when the process would otherwise be idle. The program to be executed is given as parameter in the
method call. There is no way to exactly know when in time the program is executed. A minimum time
that has to expire can however be defined in seconds as the second parameter. The maximum
number of queued programs per object is 100. If this limit is exceeded all queued executions are
removed and a SCIL error is raised.
Example:
The example shows how to ensure that the blocking cursor of a dialog is switched off after a long
program execution even if an error occurs that interrupts the normal program flow.
Every Visual SCIL object, window and picture function has the following predefined attributes that
provide information of various properties of the object. All these attributes are read-only.
Defines whether the SCIL programs of the object are compiled or not.
When the attribute is set to TRUE, the object and all its child objects that are loaded together with it,
are recursively flagged to be compiled. The methods of the objects are not compiled at once, but
instead they are compiled when called for the first time. If the compilation fails, the uncompiled
source code is silently used instead.
When the attribute is set to FALSE, the _COMPILED flag of the object and its child objects are
recursively cleared, and the compiled methods (if any) are decompiled, i.e. their compilation result is
discarded.
The _COMPILED attribute may be set any time (even from outside the object), but it is good practice
to insert the SCIL statement
in the CREATE method of the object. This is to state that the object has benefit from the compilation
and is comprehensively tested to run as compiled.
File revision.
The value is an empty string if the object has been created on-the-fly.
If the object is a window or picture function, the attribute has value "WINDOW" or
"PICTURE_FUNCTION", respectively.
The value is an empty string, if the object is created on-the-fly, i.e. using .CREATE, !WIN_NAME or !
WIN_CREATE command.
This section describes the principles of naming files in SCIL language, and the different file types
accessible by SCIL programs.
Here, file type refers to the interpretation of its contents. The three file types supported by SCIL
programming environment are the following:
• Text files
• Binary files
• Keyed files
The file types are further described in the following sections. File management functions, that handle
entire files with no interpretation of the contents, are described in Section 10.17.
The files and directories used in SCIL language may be identified in several different ways, both
operating system dependent and independent ways. The SCIL functions and commands that take a
file a directory name argument, accept all these identifications unless otherwise noted in their
description.
In the following, the term SYS600 root is referred to. It is the root directory of the current SYS600
installation. In Windows, it is normally the directory C:\SC\, but the drive may be changed during
installation.
File and directory tags are abstract, operating system independent identifiers, that are formed from
textual file and directory names by means of file management functions described in Section 10.17.
• "path/name" identifies a file contained in a logical path in an operating system independent way.
The logical paths are simple names given to a directory or a search list of directories. See
Section 9.2.4 for more information on logical paths.
• "name" identifies a file contained in the default directory of the SCIL context or in the logical path
derived from the file name. The default directory is normally the directory PICT below the root
directory of the SCIL application, but may be set by SCIL in the VS_MAIN_DIALOG object.
Outside the VS main dialogs, the so-called 4-letter rule is further applied: A file is first searched
for in the logical path named according to the 4 first letters of the file name. For example, file
APL_PROCES.PRD is searched for using the logical path "APL_".
• "/dir1/dir2/.../dir/name" names a file relative to SYS600 root in an operating system independent
way, for example, "/APL/TIPPERARY/APL_/FILE.EXT"
• By an operating system file path, for example, "D:\SC\APL\TIPPERARY\APL_\FILE.EXT".
• By an operating system independent file tag created from a file name given by any of the textual
ways above.
The file or directory name ('name' above) may be of any length and contain any characters allowed
by the operating system. However, as far as portability is concerned, names consisting of letters,
digits, underscores and a dot (as a separator of the file name extension) only are recommended.
Text files are sequential files organized as lines of text data. When a text file is read, the text is
supposed to be encoded via the Active Code Page (ACP) of the operating system unless the actual
text is preceded by a Byte Order Mark (BOM). UTF-8 and UTF-16 (both little and big endian) BOM's
are supported. By default, text files are written in UTF-8 encoding with a BOM. Optionally, the
functions WRITE_TEXT and WRITE_COLUMNS are capable to write ACP encoded text as well.
The lines are terminated by CR/LF (Carriage Return / Line Feed) character pair. When a text file is
read by SCIL, a single LF character is accepted as a line terminator and the terminator of the last line
of the file is not required.
Text file is read by the TEXT_READ or READ_COLUMNS function and written by the WRITE_TEXT
or WRITE_COLUMNS function. The entire file or a bulk of lines is read and written as a text vector by
these functions. Line lengths up to 65 535 characters are supported by the functions.
An obsolete function READ_TEXT is capable of reading only 255 character lines. It is supported for
upward compatibility, but new applications are encouraged to use the TEXT_READ function instead.
Parameter files are special purpose files of predefined format similar to INI files of used by various
utilities of Windows operating system. They are designed to save settings of tool programs from
invocation to another. SCIL functions READ_PARAMETER, WRITE_PARAMETER and
DELETE_PARAMETER implement the handling of parameter files. The format of parameter files is
described in Appendix B.
While a text file is being written, no other SCIL program may read or write the file. Consequently, if a
text file is used to pass data from a SCIL program to another SCIL program that may be executing in
parallel, the access of file should be synchronized between the programs, for example using function
FILE_LOCK_MANAGER.
Binary files are byte sequences of any length with no interpretation of structure. They can be used to
exchange data between a SYS600 application and any foreign application. Within SYS600 they are
used to store compiled SCIL programs and download/upload data of process objects of File Transfer
type.
A binary file is read by READ_BYTES function and written by WRITE_BYTES function. The entire file
or up to 8 388 600 bytes of data is read and written as a byte string by these functions.
While a binary file is being written, no other SCIL program may read or write the file. Consequently, if
a binary file is used to pass data from a SCIL program to another SCIL program that may be
executing in parallel, the access of file should be synchronized between the programs, for example
using function FILE_LOCK_MANAGER.
Keyed files are random access files that consist of data records. The maximum length of a data
record is 508 characters.
The beginning of the data record contains the key of the record. The key uniquely identifies the
record within the file. The length of the key is defined when a keyed file is created. The maximum
length of the key is 253 characters. The data records are logically ordered by the keys. The first
character of the key is the most significant in the ordering, the last character is least significant.
Hence, if the key contains a name, the records are alphabetically ordered.
Each data record must contain the key. Consequently, the minimum length of the data record is the
length of the key.
A data record can be read from a file by specifying its key, or the file may be browsed forward or
backward in the order specified by the record keys.
When a data record is written into the file, it is always positioned according to its key. If the same key
already exists in the file, the old data record is overwritten by the new one. The length of record may
change when it is rewritten.
Data records may also be deleted one by one by specifying the key to be deleted.
Concurrent access of keyed files by several SCIL programs is internally synchronized. Therefore,
they suit well for exchanging real-time data between SCIL programs. More than one program may
safely write and read a keyed file simultaneously.
The keyed files are implemented as a number of data blocks, index blocks and a status block.
The data blocks contain the data records of the file. Each data block contains a number of
consecutive (in the order specified by the key) data records organized in the order of the key.
The index blocks make up the index of data blocks in order to achieve fast access of data. An index
block contains a set of (key, block number) pairs, where the key is the first key of the data block
addressed by the block number. The pairs contained in an index block are again organized in the
order of the key. When the file grows, more than one index block is needed. Upper level index blocks
are then created. In the upper level index blocks, the block number addresses a lower level index
block instead of a data block.
The status block, which is the first block of the file, contains book-keeping information of the file,
such as the length of the key and address of the topmost index block.
When a new data record is written into the file (or an existing one is expanded), the index is first used
to locate the would-be data block for the record. If there is enough free space in the block, the data is
written into the block. Otherwise, the neighboring data blocks are examined. If there is enough free
space in the neighboring blocks to rearrange the old records and the new one into these three data
blocks, it is done. Otherwise, a new data block is created and its key is inserted in an index block.
The same procedure is then repeated for the index block.
When a data record is deleted from a file (or an existing one is shortened), the free space of a data
block grows. When it is possible to combine the data block with its neighbors, it is done and the freed
block is inserted in the free block list of the file for later re-use.
• Version 1 file format uses 512-byte blocks. The size of the file is limited to 32 megabytes.
• Version 2 file format, first introduced in MicroSCADA revision 8.4.4, uses 4 kilobyte blocks and
has no file size restrictions.
Function KEYED_FILE_MANAGER (see Section 10.16) may be used to convert version 1 files to
version 2 and vice versa.
The same function may be used to two other maintenance purposes of keyed files:
• Subfunction COMPACT makes a reorganized copy of a keyed file. The new file is written in its
most compact form and the free space in the file is minimized. The resulting file may be smaller
and faster to access.
• Subfunction REBUILD makes a copy of a keyed file where the index structure is rebuilt from the
scratch. The source file is scanned sequentially, the data records found in the data blocks are
written to the output file and a new index is created for them. The index blocks of the source file
are skipped. This subfunction should be used, when the structure of a keyed file gets corrupted
for a reason or another, for example because of power fail of the computer. A corrupted file may
often be recognized by spurious FILE_INCONSISTENT (5015) errors got when reading the file.
Keyed files are widely used within SYS600 to implement various system files, including:
For application specific purposes, keyed files may be used by file handling commands described in
Section 9.2.5.
A SCIL database is a data file for general purpose. It is internally structured to store any data
structure that may be created by SCIL language. The file is divided into sections. Each section has a
value that may be of any SCIL data type. The size of a SCIL database file is limited only by the
available disk space.
The structure of SCIL database is optimized for fast access. The component to be read is located
quickly by using indices without having to search through the file. Similarly, writing a new value to a
component rewrites only a minimal part of the file.
The concurrent use of SCIL database by two or more SCIL programs is internally synchronized. In
addition, each read and write operation is atomic. For example, if one SCIL program writes a list type
data structure into the database, the concurrent readers see all the new attribute values or none of
them. Because of the strict access discipline, SCIL databases suit perfectly for sharing SCIL data in
real-time between various SCIL programs of the application (in pictures, Visual SCIL objects,
command procedure objects etc.).
SCIL databases and parameter files (so called ini files handled by functions READ_PARAMETER,
WRITE_PARAMETER and DELETE_PARAMETER) have some similarities, but at the same time
some important differences. For some comparison of SCIL Database and parameter files, see the
table below:
The version of a SCIL database file is seen as an attribute of the result of the
DATA_MANAGER("OPEN") function call, see Section 10.16.
When MicroSCADA 9.0 or later is used, version 3 files are created by default. If a 9.0 system or later
is frequently used to create SCIL databases for an 8.4.5 system, this behavior may be overridden by
the revision compatibility switch CREATE_VERSION_2_SCIL_DATABASES in the application
attribute APL:BRC, see the System Objects manual, or in the SCIL function
REVISION_COMPATIBILITY, see Section 10.9.
When running MicroSCADA 9.0 or later, SCIL database files may be converted from version 2 to 3
(for faster access) or vice versa (for 8.4.5 compatibility) by using the DATA_MANAGER("COPY")
function, see Section 10.16.
The SCIL database is divided into sections (the same way as the parameter files). The names of the
sections are free texts, they may contain any number of characters and are case-sensitive. A zero-
length section name is allowed.
A section has a value, which may be of any SCIL data type. The value may be read and written as a
whole or only a component of it is accessed at a time.
In most cases, there is a need for more structure than the sections provide. An obvious way of
getting more structure is to define the section as a list value, whose attributes may be of any data
type.
If the database is used by several SCIL programs at the same time, the structure of the data should
be carefully designed. See an example of this below.
If a section contains a value of a process object along with its time stamp and status, one possibility
is to define three attributes in the section, for example OV, RT and OS, respectively. When a SCIL
program updates the value, it has to do 3 writes into the database (unless it rewrites the whole
section).
Now the reader of the data may encounter a problem. On one hand it is possible, for example, that it
reads the new value of OV but the old values of RT and OS (if it runs faster than the writer). On the
other hand, it might be that it reads the old value of OV but the new values of RT and OS (if it runs
slower).
A solution to this problem is to define only one attribute, for example VALUE, and make it a list of
attributes OV, RT and OS. This attribute may now be read and written in one atomic operation.
SCIL databases are managed and accessed by the SCIL function DATA_MANAGER, which is
described in Section 10.16.
SCIL databases are suitable for storing application specific data and sharing it in real time between
concurrent processes. The following four SCIL databases are used (and automatically created) by
the base system:
For fastest possible access, these files are kept permanently open by the base system.
Contrary to constants, the variables have no fixed values. A variable is a name which may be
assigned any value. After the assignment, the variable name represents this value within the scope
of the variable.
Any SCIL data type (Section 5) is allowed as a value of a variable. When speaking of the data type of
a variable, the data type of its current value is meant. The value of a variable, also its data type, may
be changed at any time by new assignment.
The variable names may be freely chosen in accordance with the rules in Section 4.2. The variable
names may contain up to 63 characters.
There are two types of variables in SCIL language: local and global variables.
The local variables are temporary variables that are available only within the SCIL program where
they are declared. They exist only while the SCIL program is executing.
The global variables are permanent variables that are available for any program executing within the
SCIL context where they were created. They exist during the entire life time of the SCIL context (see
below).
Local variables are declared by #LOCAL statement (see Section 9.2) at the beginning of a SCIL
program and destroyed automatically when the program terminates.
Local variables are visible only in the SCIL program that contains the declaration. The same variable
name may be declared by several SCIL programs, each declaration denotes a new variable. If a
SCIL program recursively calls itself, each invocation has its own local variables.
Within the SCIL program, a local variable is referenced simply by its name, no special characters are
needed.
Arguments of a SCIL program act as read-only local variables in the program, see #ARGUMENT
statement in Section 9.2.
Unlike local variables, global variables need no declaration. A global variable is created automatically
when it is assigned a value first time. It is deleted when the SCIL context containing the variable is
deleted, see below. Global variables may also be deleted explicitly with the #DELETE command.
A global variable is visible for all SCIL programs executing in the SCIL context during its entire life
time.
In a SCIL program, a global variable is referenced by its name prefixed by character %, when
reading its value, or by character @, when assigning it a new value.
A SCIL context is actually an internal data structure that contains the global variables, logical paths
and logical representation libraries defined by SCIL programs executed within the context. A SCIL
context is created when certain objects start their execution and is deleted when they terminate.
• A picture (whether printed or displayed on the screen). All programs, windows and sub-pictures
within the same picture share the SCIL context of the picture. A variable defined in a window
picture, for example, can be used in the main picture, and vice versa. If window specific
variables are desired, use window attributes instead of variables (see Section 6).
• A dialog system. All dialogs and pictures within the same dialog share the SCIL context of the
main dialog or the picture container. Hence, for example, variables defined in the main dialog
can be used in all its child dialogs and dialog items. If either dialog or dialog item specific
variables are desired, use the user defined attributes (see Section 6).
• A command procedure and data object started with #EXEC or #EXEC_AFTER or by an event
channel.
• A time channel. Data objects and command procedures run by the time channel share the SCIL
context of the time channel. Hence, variables defined in command procedures may be used by
command procedures and data objects executed later by the same time channel.
A SCIL context is normally created as empty: no variables, logical paths nor logical representation
libraries defined. There are the following exceptions to this rule:
• Objects activated by #EXEC, #EXEC_AFTER, #PRINT or #LIST command inherit the logical
paths and logical representation libraries of the activating SCIL context.
• Argument variables may be passed to objects by means of #EXEC, #EXEC_AFTER and
#PRINT commands (see Section 9.2).
• Event channels and format pictures activated by process events and format pictures printed by
#LIST command start with a set of variables created from attribute values of the process
objects, so called ‘snapshot variables’.
• Pictures have a few predefined variables created automatically (see Section 7.5).
Variables are assigned values with an assignment statement of the following syntax:
GUID-984CB87E-738D-4BA5-A06B-D0B28C7054EC v1
[@]V[component]* = expression
where 'V' is the variable name. If it is prefixed by @, a global variable is accessed, otherwise a local
variable.
Each 'component' addresses a component of structured data (an element or a range of elements of a
vector or an attribute of a list). See Section 5.11 for component access.
The expression, which may be of any data type, is evaluated and the value is assigned to the
variable or to its component.
(If the expression is a text constant, a global variable assignment may also be written without the
equal sign as follows:
GUID-7D1A412C-7B37-492C-8B7E-55BDF56FEA5C v1
@V character string
which is the same as the statement @V = "character string", except that in the first case lower case
letters are converted to upper case. This is an obsolete feature that is no longer recommended.)
Statement Explanation
@VAR = ABC:PAI The value of the process object is read from the process database
and assigned to the variable.
TEXT = "ABC:PAI" The object value is not read. The variable gets the text value
"ABC:PAI".
@LIST = PROD_QUERY(20) The variable LIST is assigned the list value formed by function
PROD_QUERY.
A.EXISTS = FALSE Attribute EXISTS of list variable A is set to FALSE.
@V = DATA:D(1 .. 20) Variable V becomes a vector containing the first 20 registered values
of the data object DATA.
V(1 .. 5) = D1:D(1 .. 5) + D2:D(1 .. 5) The first five elements in variable V are assigned the values of the
sums of the first five registered values of the data objects D1 and D2.
A = (5, 4, OBJ:POV3, CLOCK) The variable A becomes a vector of four elements.
After a variable has been assigned a value, this value is referred to as:
GUID-26589338-D3F0-4A50-901B-8364A7500E7A v1
[%]name[component]*
where 'name' is the variable name. If it is prefixed by %, a global variable is accessed, otherwise a
local variable or an argument.
Each 'component' addresses a component of structured data (an element or a range of elements of a
vector, or an attribute of a list). See Section 5.11 for component access.
This notation can be used as an operand in expressions. The data type of the variable determines
which operations may be carried out on it (Section 8).
Statement Explanation
@NEW = 30 * %OLD The variable NEW is assigned the value of the variable OLD
multiplied by 30.
A.COUNT = A.COUNT + 1 The COUNT attribute of list variable A is incremented.
!SHOW WIN VAR The whole vector is shown in the window WIN, which must be of the
type MULTIFIELD, BAR or CURVE.
@S = %A(1) + %A(2) The sum of the elements one and two in variable A.
Variables can also be used for forming text strings and names. By including a variable in a name or
text string, different contents can be assigned to the text or name depending on the context. To use a
variable as a part of a text or name, enclose the variable name by quotes as follows:
GUID-3E84746C-65C2-46F7-A23C-49A2DBDA408A v1
'name[.attribute]'
The value of the variable 'name' or the value of its attribute 'attribute' is regarded as a text constant
that replaces the quote notation. The value must be of data type integer, real, text, boolean (0 for
FALSE, 1 for TRUE is expanded) or time (yy-mm-dd hh:mm:ss is expanded). If a local variable by
name 'name' exists, it is used for expansion, otherwise global variable by that name.
This way of using variables is called variable expansion. Not only variables but also window
attributes and Visual SCIL object attributes can be expanded, provided that they are of proper data
type. In this case 'name' is a window or a Visual SCIL object reference.
Statement Meaning
LN = "P_METER" The variable LN is assigned the text value "P_METER" and the
IX = 22 variable IX value 22
PRESSURE = 'LN':PAI’IX’ The variable PRESSURE is assigned the AI attribute value of the
process object P_METER with index 22.
OBJ = LIST(LN = “P_METER”, IX = 22) Same as above but using attributes.
PRESSURE = ‘OBJ.LN’:P’OBJ.IX’
There are some picture variables with predefined names and meanings. These variables can be
used in pictures throughout the system, but their values depend on the circumstances in which they
are used. The predefined picture variable names are:
VIDEO_NR The logical monitor number of the current monitor. The variable is the same as MONn:BAN. It can
gain integer values in the range 1 ... 100. The monitor number is selected when an application
session is started. This variable should not be changed manually.
PIC_NAME The name of the picture (main picture) displayed on screen at the moment. The variable can have
text values containing a max. of 10 characters. This variable should not be changed manually.
CURSOR_PO This variable contains the coordinates of the cursor position of the last function key selection. It is
S always updated when a function key is selected, except when the system is in input mode (after
the !INPUT_VAR, !INPUT_POS or !INPUT_KEY commands). The variable is used, for example,
when building line command keys, see Section 8.
The variable is a vector with four elements:
(x, y, x_rel, y_rel)
where
x, y = the coordinates relative to the upper left corner of the picture, which is (1,1). x = 1 ... 80, y =
1 ... 48.
x_rel, y_rel = coordinates related to the upper left corner of the window where the cursor is
situated, which is = (1,1).
KEY_POS This variable contains the coordinates of the last function key selection related to the upper left
corner of the key. The variable is updated each time a function key is selected. The variable is a
vector of two elements:
(x_rel, y_rel)
Table continues on next page
where
x_rel, y_rel = coordinates relative to the upper left corner of the key, which is (1,1).
ENTER_POS This variable contains the coordinates of the last click on an ENTER key. The variable is updated
each time a function key containing an !ENTER command which terminates !INPUT_VAR is
pressed, no matter whether the ENTER key contains other statements or not. The variable is a
vector of four elements:
(x, y, x_rel, y_rel)
where
x, y = coordinates related to the upper left corner of the picture (=1,1).
x_rel, y_rel = coordinates related to the upper left corner of the window in where the ENTER key is
situated (= 1,1).
Statement Meaning
#EXEC EVENT_'VIDEO_NR':E An event object containing the video number is activated.
#ON EVENT_'VIDEO_NR':E !SHOW .... In combination with #ON sequences, likewise defined
with video number, the event is directed to the same
monitor.
#IF %CURSOR_POS(2) = 40 #THEN ...... A statement is executed on the condition that the
pressed line is number 40.
#PRINT 1 'PIC_NAME' The current screen picture is printed.
This section describes how to compose SCIL expressions using various types of operands and
operators. Special purpose context sensitive expressions defined by SCIL Data Derivation Language
are also described.
Expressions are composed of operands and operators (possibly enclosed in parentheses). The
operators are symbols for operations (for example, + : addition). The operands constitute the objects
of these operations.
• a constant (Section 5)
• a variable or a component of a variable (Section 7)
• a system or application object attribute or its component (Section 6)
• an attribute of a Visual SCIL or window object or its component (Section 6)
• a function call (Section 10)
• a vector or a list aggregate (Section 5)
• a named program or a method call, provided that the program returns a value (Section 6)
• an expression enclosed in parentheses
The data types of the operands determine which operations may be carried out on them and what
the data type of the result will be. The data compatibility rules for each operator are given in figures
below. List type operands cannot be operated upon by any operator. The list data type is therefore
omitted from the compatibility rule figures. The data type of an expression can be read with the
function DATA_TYPE (see Section 10).
• arithmetical operators
• relational operators
• logical operators
In SCIL expressions, they are evaluated in the order of priority mentioned below.
The operators and their usage are described in the next sections.
Arithmetical operators are used for numerical calculations. As operands, they expect numeric values,
except for addition, which accepts text, bit string and byte string operands as well (Figure 10).
The operators DIV and MOD must be enclosed by spaces. For the other operators, spaces are
optional.
Signs are valid for numeric data types (integers, real numbers and vectors of integers and real
numbers) only.
The order of priority for arithmetical operators, i.e. the order in which different parts of an expression
are evaluated, does not differ from that in mathematics. It is as follows (operators with the highest
priority first):
GUID-0E9F42B5-5EA1-4C1D-86D6-DA83C83D3F4C v1
1) **
GUID-24F79794-A4EA-4D55-AAAB-1B761F46F53A v1
2) / , * , DIV , MOD
GUID-B81B4B65-E927-4D90-9932-BEC8AF993CC9 v1
3) + , -
Operations with the same order of priority are evaluated from left to right.
Below are rules for which data types can be combined by means of the arithmetical operators and
the data type of the resulting value.
GUID-93E895B3-A3FE-4DB1-A2B1-090793CBEC5C V1 EN-US
GUID-99779811-2DCB-4A54-BE5B-A77BB6375A64 V1 EN-US
When two time type operands are subtracted, the result is an integer number stating the time
difference in seconds.
The result of adding two texts, two bit strings or two byte strings is the concatenation of the two
strings.
When one operand is a simple value and the other one is a vector, the operation is carried out
element by element and the result is a vector.
When both operands are vectors, the operation is carried out element by element and the result is a
vector of the length of the longer operand. If the vectors are different in length, the missing elements
of the shorter vector are regarded as zero or an empty string (depending on the data type of the odd
element) and the status of the result element is set to SUSPICIOUS_STATUS.
GUID-B2A27F3E-2569-444F-8ABF-28465AE6FE0F V1 EN-US
GUID-D7E7AEE7-015A-449D-A498-A1E37EB98B65 V1 EN-US
GUID-9CB498FB-85C5-4F3D-8E7D-FC82F38A8E5F V1 EN-US
When both operands are vectors (allowed only in multiplication), the operation is carried out element
by element and the result is a vector of the length of the longer operand. If the vectors are different in
length, the missing elements of the shorter vector are regarded as 1 and the status of the result
element is set to SUSPICIOUS_STATUS.
GUID-30F5C8C6-8A03-42D7-80AD-0E21518F05BF V1 EN-US
Below are some examples of arithmetical operations. The bit string operands are written here by
means of the BIT_SCAN function, which creates a bit string out of its text representation.
Expression Result
"A" + "B" "AB"
3**2 9
3.0**2 9.0
5 DIV 2 2
5 MOD 2 1
2*3 + 4/2 8.0
(2*3 + 4)/2 5.0
BIT_SCAN("0101") + BIT_SCAN("0011") BIT_SCAN("01010011")
Relational operators are used for comparing expressions. The result of a comparison is always a
boolean value, i. e. the value of a relation is either TRUE or FALSE.
== equal to
> greater than
< less than
<> unequal
<= less than or equal to
>= greater than or equal to
The relational operators have a lower order of priority than the arithmetical operators. Accordingly,
arithmetical expressions are evaluated before comparisons are carried out.
Figure 16 presents rules for what data types may be compared by means of relational operators.
GUID-558F4FC1-5582-4526-A0D1-6464010E269B V1 EN-US
Boolean values and text may be compared only with values of the same data type. Time data can be
compared to time data, integer and real values.
Bit strings are compared bit by bit starting from the leftmost bit, which is the most significant bit. If two
bit strings of different length are identical to their common length, the shorter one is considered
smaller.
Byte strings are compared numerically byte by byte (each byte has a value 0 ... 255), the first byte
being the most significant. If two byte strings of different length are identical to their common length,
the shorter one is considered smaller.
Expression Result
"B" > "A" TRUE
%A - 30 == 0 TRUE, if %A == 30
OBJ:PRT + 60 >= CLOCK TRUE, as long as less than one minute has
passed since the latest registration time
BIT_SCAN("0011") < BIT_SCAN("0101") TRUE
BIT_SCAN("0101") < BIT_SCAN("010101") TRUE
BIT_SCAN("000111") < BIT_SCAN("0101") TRUE
BIT_SCAN("010100") > BIT_SCAN("0101") TRUE
Logical operators have a lower order of priority than the relational operators, that is, relational
expressions are evaluated before the logical operations are carried out. Logical operator NOT takes
precedence of the other logical operators.
If an expression contains two or more different logical operators from the set (AND, OR, XOR),
parentheses are required to explicitly specify the order. See the example below.
All logical operators expect operands of boolean type. Likewise, the results of logical operations are
of boolean type.
Imagine that A and B are boolean data with the values shown to the left. The logical operators give
the following results:
Wrong: A == 1 AND B == 2 OR C == 3
Right: (A == 1 AND B == 2) OR C ==3
or A == 1 AND (B == 2 OR C == 3)
SCIL Data Derivation Language (SDDL) is a language used to describe a data value calculated from
context variables by using predefined SCIL operators and functions. The rule for calculating the data
value is given as an SDDL expression.
The values of context variables are defined by the context where the value is evaluated. Typically,
the context is a SYS600 object and context variables are attributes of the object. Some other context
variables may be defined by the use case, for example APL and SYS, which represent the
application and system object containing the context.
The language is designed in a way that allows for the calculation of the data value in a predictable
time and deep in the database within the database lock. Consequently, an SDDL expression can be
calculated, for example, as a part of the atomic transaction generated by an external event.
Syntactically, an SDDL expression is similar to an expression of SCIL. Context variables are used in
the same way as local variables are used in SCIL.
An SDDL expression is not allowed to access any data outside its context. Therefore, it may not
contain any direct references to MicroSCADA objects (such as MY_OBJECT:POV1) nor references
to SCIL program components (such as global variables or Visual SCIL objects). Furthermore, it may
not call any SCIL function that accesses data outside the context.
Context variables share the name and value of the attributes of the context object.
In addition to the attributes of the context object, the following predefined context variables are
declared:
Context variables TYPE and SUBTYPE are available in any SDDL expression. Visibility of variables
APL and SYS depends on the use case.
An SDDL expression is deterministic, if it always evaluates to the same value when the values of
context variables are the same. For example, a deterministic SDDL expression may not contain a
RANDOM function call. As another example, an SDDL expression containing an HOUR function call
(without arguments) is not deterministic, but HOUR(RT) is a deterministic SDDL expression.
An SDDL expression is static, if its context variables refer only to the configuration attributes of the
context object, otherwise it is dynamic.
An SDDL expression may not contain any function call that has or may have side effects. Good
examples of functions with possible side effects are OPS_CALL and DO.
Example 1
SDDL expression
defines a string data, which combines the application name, process object name and index to one
string. APL, LN and IX are context variables.
This SDDL expression could be used as the NP (Name Pattern) attribute of a logging profile object,
see the Application Objects manual.
Example 2
SDDL expression
defines a boolean data, which tells whether the context object belongs to bay MyBay and is in use, or
not.
Example 3
SDDL expression
results in text "Good", if the status of the context object is 0, otherwise in text "Not so good".
Example 4
SDDL expression
join(".", IE)
This section describes the SCIL statements. It is divided into four sections as follows:
Section 9.1 General: The different types of SCIL statements, their arguments, and a table over all general
SCIL statements, Visual SCIL commands and picture commands.
Section 9.2 General SCIL statements: The statements listed and described.
Section 9.3 Visual SCIL commands: The Visual SCIL commands listed and described.
Section 9.4 Picture handling commands: The picture handling commands listed and described.
There are five main types of SCIL statements (imperative, one-line statements are normally called
commands):
• General SCIL statements. These are the basic SCIL statements that control the program flow,
assign values to variables, access various system components such as system and application
objects and files, etc. General SCIL statements are characterized by a starting # (number sign)
and they can be used in all types of SCIL programs.
• Visual SCIL Commands. These commands operate on user interface objects (Visual SCIL
objects, windows and picture functions) and often affect the visual appearance of the screen.
Visual SCIL commands are characterized by a starting period (.) and they can be used in
dialogs and pictures displayed in a VS (Visual SCIL) monitor.
• Picture commands. These commands operate on various components of pictures: windows,
picture functions, function keys, etc. Picture commands are characterized by a starting !
(exclamation mark) and allowed only in pictures.
• Primitive graphics commands. These commands are used to draw graphical elements, such as
lines, circles and text, on the screen. Primitive graphics commands can be used in pictures and
Visual SCIL objects. The graphics commands are described in Section 11.
Most commands require arguments to become complete statements. The arguments specify the
command with operands or key words. In this section, the commands are written in uppercase letters
and the arguments in lowercase letters. Arguments in square brackets [] are optional. Argument
enclosed by []* may be repeated a number of times or it may be omitted. There must be at least one
space character between a command and its arguments.
These statements define the structure and hence, the flow of the program. They are also used to
declare arguments and local variables of the program and to assign values to variables.
Structured SCIL statements (#BLOCK, #CASE, #IF, #LOOP, #LOOP_WITH, #ON and a method call)
may be nested to depth of 300. For example, a loop may contain a block, which contains another
loop that calls a method, which contains a case statement, etc., to the structural depth of 300
statements.
This statement replaces the current value of a variable or a component of a variable by a new value.
With the @ prefix, 'name' refers to a global variable, otherwise a local variable is referred to.
Examples:
The #ARGUMENT statement names the arguments to be passed to the program by the caller (in the
order they should be given by the caller). All arguments may be listed in one statement, or several
subsequent #ARGUMENT statements may be written. The two ways are equivalent as long as the
arguments are declared in same order.
Arguments may be freely named using up to 63-character long identifiers. Arguments and global
variables may have a same name. If an argument has a name of a predefined SCIL language
element, such as a SCIL function, the predefined meaning is hidden and it cannot be used within that
SCIL program. For example, if a SCIL program declares an argument named MAX, the predefined
SCIL function MAX is no more available in the program.
The #ARGUMENT statements must be located at the beginning of program, before any other
statements. Within the program, the argument name 'name' may be used as if it were a read-only
local variable.
When a SCIL program that has declared its arguments is called by another SCIL program, the
number of arguments supplied by the caller is checked. If the caller does not supply a value to each
named argument, a SCIL error SCIL_ACTUAL_ARGUMENT_MISSING is raised. On the other hand,
additional arguments are allowed. They may be handled by the called program using SCIL functions
ARGUMENT_COUNT and ARGUMENT, see the example below.
Example:
This example shows how a method with two obligatory and one optional argument may be
implemented.
#ARGUMENT A, B
#LOCAL C = 0
#IF ARGUMENT_COUNT == 3 #THEN C = ARGUMENT(3)
#BLOCK compounds a number of statements into one statement. It is usually used within structured
statements (IF, CASE, ON) in places where a single statement is required by the syntax.
Example:
The statement selects (at most) one of listed SCIL statements for execution. The selection is based
on a case value, which is compared to 'selectors' of each branch.
'value' A value of type integer, real, boolean, time, text or bit string.
'selector' The selector is a comma-separated list of items that select the branch for execution. An item
may be given as:
1. A single value of type integer, real, boolean, time, text or bit string.
2. A vector of such values. In this case 'value' is compared to each element of the vector
to find a match.
3. A range of such values, v1 .. v2. The range may be semi-open:
The 'value' is compared to each 'selector' item of the #WHEN commands. The first matching #WHEN
statement is executed and the rest of the #CASE statement to the matching #CASE_END is skipped.
If no matching #WHEN statement is found, the #OTHERWISE statement (if any) is executed.
There may be several selectors that match the case value, but only the first branch is executed. No
error is generated, in case no branch is selected.
Examples:
#CASE C
#WHEN "A".."Z", "a" .. "z" #BLOCK
IS_A_LETTER = TRUE
#CASE C
#WHEN "A", "E", "I", "O", "U", "Y", -
"a", "e", "i", "o", "u", "y" IS_A_VOWEL = TRUE
#OTHERWISE IS_A_VOWEL = FALSE
#CASE_END
#BLOCK_END
#OTHERWISE IS_A_LETTER = FALSE
#CASE_END
#CASE D
#WHEN 0,3,6,8,9 SHAPE = "NO STRAIGHT LINES IN THIS DIGIT"
#WHEN 1,2,4..5,7 SHAPE = "CONTAINS STRAIGHT LINES"
#WHEN .. -1 #BLOCK
WISE_GUY = TRUE
SHAPE = "DON'T TRY TO FOOL ME"
#BLOCK_END
#OTHERWISE SHAPE = "ONE DIGIT ONLY, PLEASE"
#CASE_END
#CASE DATA_TYPE(D)
#WHEN "INTEGER" T = 1
#WHEN "REAL" T = 2
#OTHERWISE !SHOW W "SIMPLE NUMERIC DATA EXPECTED"
#CASE_END
'program' A text or a text vector containing the statement or the program to be executed.
The #DO command is used to execute a SCIL program stored outside the current program context
(picture, dialog, command procedure) or created on-the-fly.
The program is executed as a subroutine of the calling program, contrary to the #EXEC command,
which queues the specified object for later execution.
#DO command cannot pass arguments to the called program, nor does it support return values from
the called program. Use function DO instead.
Example:
#DO ABC:C
;The program (IN attribute) of the command procedure ABC is executed.
9.2.1.6 #ERROR IGNORE, #ERROR CONTINUE, #ERROR STOP, #ERROR EVENT GUID-40CADD2F-C2C5-4FCD-AFBC-A347668FC579 v1
IGNORE means that the program execution continues regardless of errors. The error handling
programs are not activated and no error message is produced.
CONTINUE means that an error handler is activated or an error message is produced, but the
program execution continues.
STOP means that an error handler is activated or an error message is produced and the
execution of the program containing the error is aborted. The statement of an active
#ON ERROR command is executed (see below).
EVENT means that the execution of the program containing the error is aborted, but no error
message is produced. The statement of an active #ON ERROR command is executed
(see below). Not available in the methods of dialogs.
An #ERROR command applies only to the program or #ON block in which it is executed.
The status code of the most recent error occurred in the program can be read with the STATUS
function, Section 10.
If no ERROR command has been executed in a program, the following default policies are applied:
In error handling programs, the error handling policy is always IGNORE, regardless of possible
#ERROR commands. In delete methods of Visual SCIL objects all errors are ignored.
'status' Integer expression. The status code to be activated. Default: the latest error code
occurred in the program.
The command is mainly used within error handling blocks (#ON ERROR or #ON KEY_ERROR
blocks) in order to activate an error status in the program. In error handling blocks, 'status' can be
omitted, whereby the activated status is the most recent error status that has occurred in the
program. Outside an error handling block, the command interrupts the program execution.
Example:
Conditional execution.
'condition1'
'condition2' Boolean type expressions
'statement1'
'statement2'
'statement3' Any SCIL statements.
If 'condition1' is TRUE, 'statement1' is executed and the rest of the #IF statement is skipped.
Otherwise, if any 'condition2' is TRUE, the corresponding 'statement2' is executed and the rest is
skipped. If none of 'condition1' or 'condition2' is TRUE, 'statement3' is executed.
Examples:
'name' Any valid SCIL name, the name of the local variable.
'value' Any type expression, the initial value of the variable.
The #LOCAL statement names the local variables to be used in the program. All local variables may
be listed in one statement, or several subsequent #LOCAL statements may be written. The two ways
are equivalent. Variables may be declared in any order.
Local variables may be freely named using up to 63-character long identifiers. Local and global
variables may have a same name. If an argument has a name of a predefined SCIL language
element, such as a SCIL function, the predefined meaning is hidden and it cannot be used within that
SCIL program. For example, if a SCIL program declares a local variable named MAX, the predefined
SCIL function MAX is no more available in the program.
The name of local variable may not be formed by using variable expansion. The following is not valid:
#LOCAL 'LN'_MAX
The #LOCAL statements must be located at the beginning of program, after #ARGUMENT
statements (if any) but before any other statements.
Within the SCIL program, local variables are referred to simply by their name. No special characters
(such as @ and % for global variables) are needed. Syntactically, local variables may be used
wherever a global variable reference is allowed.
Additionally, in every SCIL command that takes a variable name as its parameter, a local variable
name may be used (but not an argument name, because arguments are read-only). The list of such
SCIL commands follows:
The SCIL interpreter first finds out whether a local variable by the given name exists. If it does, the
local variable is used, if not, a global variable by the name is used.
The local variables exist only while the program is executed. When the program terminates, all its
local variables are destroyed and the memory space allocated for them is freed.
Example:
This example illustrates the use of local variables and arguments (which may be taken as read-only
local variables).
#ARGUMENT A, B, LN
#LOCAL X, Y = A + B ;Initial value of Y is the sum of arguments A and B
#LOCAL I
#LOCAL V = VECTOR()
'condition' A boolean expression, a precondition for entering the body of the loop. Default value:
TRUE.
'statement' Any SCIL statements, the body of the loop.
'max' The maximum number of times the loop is iterated. An integer expression. Default
value: 1000.
The body of the loop is executed repeatedly as long as the 'condition' is TRUE, or until the loop is
interrupted in one of the following ways:
• Statement #LOOP_EXIT (see below) is executed in the loop body. This is no error situation.
• The maximum number of loop iterations is reached. In this case, error
SCIL_MAX_LOOP_COUNT_EXCEEDED is raised.
• An emergency interruption is done from another SCIL program (in another monitor). In this case
error SCIL_PROGRAM_EXTERNALLY_TERMINATED is raised.
#SET MONn:BMS
#SET APLn:BRSm
where 'n' is the application number and 'm' represents the number of the queue that
runs the command procedure. This number may be found by reading the APLn:BRO
(Running Objects) attribute, it is encoded as follows:
'm' = 1: time channel queue
'm' = 2: event channel queue
'm' = 3 ... 32: parallel queue 1 ... 30 (the PQ attribute of the command procedure)
#SET APLn:BPSm
where
'n' is the application number,
'm' = 1 for process printouts and
'm' = 2 for report printouts.
Example:
'var' The name of the control variable of the loop. The name refers to a local variable by that
name, if such a variable is declared, otherwise to a global variable.
'low' The value of the control variable at the first loop execution, an integer expression.
'high' The value of the control variable at the last loop execution, an integer expression.
'statement' Any SCIL statements, the body of the loop.
The body of the loop is executed repeatedly a number of times, calculated as 'high' - 'low' + 1. Each
time the loop is completed, the variable 'var' is incremented by one. If 'high' is less than 'low', the
body is not executed at all.
The loop may be interrupted before 'var' reaching 'high' in the following ways:
• Statement #LOOP_EXIT (see below) is executed in the loop body. This is no error situation.
• An emergency interruption is done from another SCIL program (in another monitor). In this case
error SCIL_PROGRAM_EXTERNALLY_TERMINATED is raised. See command #LOOP above
for details of emergency interruption.
Example:
#LOOP_WITH I = 1 .. LENGTH(%V)
!SHOW WIN'I' %V(%I)
#LOOP_END
;Each element of the vector variable V is shown in a separate window.
Interrupts a loop.
The statement interrupts the innermost loop (#LOOP or #LOOP_WITH) it is textually located in.
Example:
I = 0
#LOOP
I = I + 1
!SHOW LOOP_NR I
!SHOW QUESTION "CONTINUE? (Y/N)"
!INPUT_VAR ANSWER ANSWER
#IF ANSWER == "N" #THEN #LOOP_EXIT
#LOOP_END
#ON command stores the 'statement' as the event program for 'event' in the current user interface
object (main picture, window picture, picture function or Visual SCIL object). Later, the 'statement' will
be executed each time the event object is activated. If 'statement' is omitted, the previous #ON
command for the same event object is cancelled.
Only one event program for a particular event is stored in each user interface object, second #ON
command for the same event replaces the first one. However, each window picture, picture function
or VS object may have its own event program for each event.
This command can be used only in user interface programs. It has no effect in command procedures.
Only events from the current application can be caught.
In Visual SCIL objects, it is recommended to define event programs as event methods of the object
(instead of #ON blocks) using the Dialog Editor.
Examples:
#ON TEMP:E1
;The former statement is cancelled.
The command defines a statement, or block of statements, to be executed each time an error occurs,
in the cases where the error handling is defined by #ERROR STOP or #ERROR EVENT (see
above). The command is valid only for the program or #ON block in which it has been executed. The
#ON ERROR command takes precedence over the #ON KEY_ERROR command (see below).
Example:
The command defines a statement, or a block of statements, to be executed in a picture each time
an error occurs in a function key program. The command applies only to the window picture where it
has been executed. If there is no key error handler in a picture, the error handler of its parent picture
is used, if any. The #ON ERROR command (see above) takes precedence over the #ON
KEY_ERROR command.
Example:
Takes a pause.
Be careful when using this command in command procedures! The pause delays the
execution of all the other objects in the same queue as well.
Examples:
#PAUSE 3.5
;The system waits for 3.5 seconds before the next statement is executed.
#PAUSE %T
;The length of the pause is specified by the variable T.
#RETURN command is used in named programs, methods and programs executed with the DO
function (see Section 10) to stop execution and return a value to the caller.
The #RETURN command without 'value' may be used in any SCIL program to exit the program.
A program encountering no #RETURN statement returns a value with data type "NONE".
Example:
'time' Time given in the format YY-MM-DD HH:MM:SS (if SYS:BTF = 0), DD-MM-YY
HH:MM:SS (if SYS:BTF = 1) or MM-DD-YY HH:MM:SS (if SYS:BTF = 2).
The seconds may be omitted.
The command sets the time of the system clock. If the computer has an external clock, the command
has no relevance.
'object' An object notation. Object types allowed are the application objects P, H, X, F, D, C, T,
A, G and V, and the system objects B.
'attributes' A list type expression.
The command creates a new object of the given type, with the given name (and index, if a process
object) and assigns it the attribute values of 'attributes'.
If a process object notation for a process object of a predefined type is given without an index, a
group with the given name is created. A group is automatically created when an indexed process
object of a predefined type is created.
To make a copy of an existing object, use functions FETCH, PHYS_FETCH, NEXT or PREV (Section
10).
An error is raised if the object already exists, or if the assigned 'attributes' do not match the actual
object type. In read-only mode, only V objects can be created.
Example:
The given object is deleted. If a variable object notation contains an attribute name, the attribute, not
the entire object, is deleted. In read-only mode, only V objects and their attributes can be deleted.
Using a variable object notation, any global variable may be deleted, see the example below.
A process object group (process object notation without an index) may be deleted only if it does not
contain any process objects. A time channel may be deleted only if no object is connected to it. A
scale or an event handling object can be deleted only if no process objects use it. An free type object
(F) can be deleted only if all process objects of the corresponding type have been deleted. A logging
profile can be deleted only if no objects use it.
Examples:
@TMP = 1
#DELETE TMP:V
;The variable TMP is deleted
#DELETE A:P1
;The process object A with index 1 is deleted.
#DELETE A:P
;The process object group A is deleted (possible only if there are no
objects ;in the group).
#DELETE V:VAB
;The attribute AB of the global variable V is deleted.
This command queues an application object (data object, command procedure, time channel, event
channel or event object) for execution. Because the object does not necessarily execute immediately,
the subsequent statements should not assume that the object has been completed. See Section 6.3
for the overview of application objects, or the Application Objects manual for details.
Any number of argument variables may be passed in 'variable_list' to the activated object (except for
event objects that do not take any arguments).
Examples:
#EXEC EVENT:E1
;An event object named EVENT is activated.
'delay' The delay time in seconds given as and integer or real expression.
'object' An object notation of type D, C, T, A or E.
'variable_list' A list of variable assignments separated by commas.
The command works like #EXEC (see above), but the execution is delayed for 'delay' seconds.
External applications are not supported. For example, the command #EXEC_AFTER 60
EXTERNAL:5C fails if application 5 is an external application. As a work-around, create a local
command procedure, say LOCAL, which contains only the command #EXEC EXTERNAL:5C and
queue it for execution: #EXEC_AFTER 60 LOCAL:C
Example:
'object' A process object notation or an STA system object notation with the attribute ME or
DA.
The command reads the specified process object value(s) or a memory address or an address range
from the station and updates the process database. For process objects, the attribute may be
omitted. It is then assumed to be OV. The command is valid only for process objects corresponding
to physical objects in stations on ANSI X.3 lines.
Examples:
#GET A:PBI
#GET B:PBI(1 .. 4)
#GET STA1:SME(1003^ .. 1010^)
;The binary object A, the four first indices of the binary object B and
;the memory address area 1003 to 1010 from station 1 are updated in the
process
;database.
"H" (History) The history buffer is searched in time order, the oldest events
first. A history buffer is an obsolete way of storing event history,
selected by the application attribute APL:BHP value
"EVENT_LOG".
"E" (Event) The history buffer is searched in reverse time order, the latest
events first. See "H" above.
'condition' A boolean type expression which selects the objects to be included in the query. The
condition is comprised of relations and logical operators. The relations have an attribute as
the left operand. All attributes (including CA) can be used. The objects that fulfil the condition
are included in the query. Wildcard characters % and * can be used in conjunction with text
attributes. % matches any character, * matches any sequence of characters (including a zero
length sequence).
The condition is evaluated in read-only mode.
This command only selects the objects included in the query. The objects along with some of their
attribute values are then listed by function PROD_QUERY (Section 10). Only one query at a time
may be active within the SCIL context. Only own application may be queried.
Examples:
#INIT_QUERY "A"
;The process query includes all objects in alphabetical order.
#INIT_QUERY "P" UN == 5
;The objects of unit 5 in address order.
This command is more or less obsolete. Use more powerful SCIL functions
APPLICATION_OBJECT_LIST and APPLICATION_OBJECT_ATTRIBUTES instead of
type "A" and "P" queries and function HISTORY_DATABASE_MANAGER (operating on
the history database) instead of type "H" and "E" queries (operating on the history buffer).
The object is assigned the attribute values of the list expression 'attributes'. Modifying the LN
attribute of an object (or the IX attribute of a process object) effectively renames the object.
Examples:
'n' The identification number of the search. An integer expression 1 ... 10 that identifies the
search within the SCIL context.
'apl' Logical application number. Integer expression, 0 ... 250. 0 = the own application. The
application must be local.
'type' The object type, "P", "H", "X", "F", "D", "C", "T", "A" or "G" given as a text expression.
'order' The search order given as a text expression:
"A" Alphabetical order. Searching through the object names in alphabetical
order (no index). Regarding process objects, only group names are
included in the search.
"I" Index order (only for process objects of predefined types). Searching
through the individual objects of a process object group.
"P" Address order (only for process objects).
"E" Execution order. The execution order within a time channel. 'type' can be
either "D" or "C". Whichever given, the search still applies to both data
objects and command procedures.
'start' The starting point of the search. Depending on 'order', the parameter has the following
values:
Order "A" An object name as a text expression. If omitted, the search starts from the
first name.
Order "I" A name or (name,index), where 'name' is the name of the object given as a
text expression and 'index' is the index of process object as an integer. If
'index' is omitted, the browsing starts from the first index.
Order "P" A unit or (unit,address) or (unit, address, bit address), where 'unit' is the
unit number, 'address' is the word address and 'bit address' is the bit
address, each given as an integer expression.
Order "E" A time channel or (time channel, type, name), where 'time channel' is the
name of the time channel and 'type' and 'name' are the name and type of
the connected object from which the search starts, each given as text
expressions. If only the time channel name is given, the search starts from
the object with the highest priority. Both data objects and command
procedures are included.
The argument 'start' is obligatory when 'order' is "I" or "P", and when a condition is appended
to the statement. If 'order' is "A" or "E", 'start' can be given as an empty string (" ").
Note, that the first NEXT or PREV function call after the #SEARCH command uses the 'start'
argument as it reference: If an object specified by 'start' exists, that object is not returned by
the call.
'condition' A boolean type expression which selects the objects to be included in the browsing. The
condition is comprised of relations and logical operators. The relations have an attribute as
the left operand. All attributes can be included in the expression. Vector type attributes are
referenced by the item index. List types are referenced using the list items' attribute name.
The objects that fulfill the condition are included in the search. Wildcard characters % and *
can be used in conjunction with text attributes. % matches any character, * matches any
sequence of characters (including a zero length sequence).
The condition is evaluated in read-only mode.
This command only selects the objects included in the search. The objects along with their
configuration attribute values are then listed by functions NEXT and PREV (Section 10). Up to 10
searches at a time may be active within the SCIL context.
This command is more or less obsolete. Use more powerful SCIL functions
APPLICATION_OBJECT_LIST and APPLICATION_OBJECT_ATTRIBUTES instead.
Examples:
With this command all types of system and application objects, except event objects, may be given
values through their attributes. For real process objects of output type, setting the OV attribute
implies control of the process via NET.
Depending on the object type and the attribute, the object notation may be indexed by a single index
or an index range. If the object notation has an index range, the 'value' may be a vector or of a
simple data type. If it is a vector, its elements list the values to be assigned. If it is simple data, all
indices receive the same value.
Data object and process object notations may be used without an attribute. It is then assumed to be
the OV attribute.
In read-only mode, only V objects can be set by this command. The attributes which are described as
read-only in the attribute descriptions (Application Objects and System Objects manuals) cannot be
set with the #SET command.
Examples:
#SET SWITCH:PBO1 = 1
;The switch is set to 1. If the object is in AUTO state, the command is
passed
;out to the process.
#SET TASK:CIU = 1
;The command procedure TASK is taken into use.
#SET PRI1:BLP = 72
;The number of lines per page is set to 72 for printer 1.
The format picture of the process object is output to the printer. If the process object is given with an
index, the physical format picture (PF) is written, otherwise the logical format picture of the group
(LF) is used. For process objects of user-defined types, the command always prints the physical
format picture (PF).
The start program of the picture, exclusive of the picture commands, is executed before printout.
Only those windows which have an expression are printed. Curves and bars are not printed.
Depending on the printer definition in the base system (the PRIn:BOD attribute), the printout may be
stored on disk.
The variable list, which may be omitted, defines the variables used in the printed picture (in windows
or in start programs). The variable list may assign a value to a variable called FORM_FEED, which
determines the paper form feed, see the #PRINT command. In conjunction with #LIST command, the
default value of FORM_FEED is 0, which means that the printer starts a new page only when the
previous one is full.
In addition to the variables of 'variable list', the #LIST command automatically defines a set of
variables which get their names as well as their values from attributes (snapshot variables). If the
process object is given with an index, these attributes may be (depending on the object type and
definition): LN, IX, OV, BI, BO, DB, DI, DO, AI, AO, PC, BS, OE, AL, AS, OS, SE, SP, OF, AZ, RT,
RM, AT, AM and CA. For user-defined object types also other attributes may also be transferred to
variables. The corresponding variables may be used in the physical format. If the process object is
given without an index, only the LN attribute is passed in this way to the logical format. The variable
values given in the variable list have precedence of these automatically generated variables.
Examples:
Prints a picture.
This command is used when a paper printout of a picture is needed, for example, a report picture.
The start program of the picture, excluding the picture commands, is executed before the print
process. Only those windows which have an expression are printed. Curves and bars are not printed.
Depending on the printer definition in the base system (the PRIn:BOD attribute), the printout may be
stored on disk.
The variable list, which may be omitted, defines the variables used in the printed picture (in windows
or in start programs). In addition, the variable list may assign a value to a predefined variable called
FORM_FEED, which controls the form feed during printing. The FORM_FEED parameter can have
the following values:
0 Form feed only when the page is full (the page length is determined by the PRIn:BLP attribute,
where 'n' is a physical printer number)
1 Form feed before (if not already done) and after printout
2 Form feed before printout (if not already done)
3 Form feed after printout
Examples:
#LOOP_WITH N = 1 .. 20
#PRINT 1 FORM_'N' (@FORM_FEED = 0)
#LOOP_END
;The pictures FORM_1 ... FORM_20 are printed without form feed.
9.2.4.1 #PATH name [dir [, dir]*], #PATH name + dir [, dir]*, #PATH name - [dir [,
dir]*] GUID-0D200733-BB82-4132-9367-0CFFE808C751 v2
Logical path names can be used in all commands where files are called by name, for example,
together with picture names. Each path name may correspond to several directories, which are given
in the search order and separated by commas. When a file is requested with the path name, it is first
searched for in the first directory of the path, then in the next one, etc. If a path name is used when a
new file is created, the new file will be stored in the first directory of the path name.
A #PATH command without any sign defines a global path. Such a path definition is monitor specific
when executed in a picture or dialog. If executed in a command procedure, it applies to all command
procedures. If executed in a printed picture, it applies to all pictures printed with #PRINT. If the
directory list is omitted, all directories of the path name are removed, but the path name remains.
Global paths should be defined only once, for example in the start picture or dialog. System and
application specific paths should be defined by using the base system attributes SYS:BPH and
APL:BPH, respectively (see the System Objects manual).
A #PATH command with a + or - sign defines local and temporary paths by adding directories to, or
removing them from, the path definition. Local paths are valid only in the SCIL context where they
are defined and take precedence over the global paths with the same name. A + sign means that the
directories are added to the beginning of the directory list of the path name. A - sign means that the
directories are removed from the directory list. If the directory list is omitted, the - sign removes all
locally defined directories from the path name. (Note: as a terminating - sign means that the
statement is continued on the next line, and in this case should be typed as two subsequent minus
signs followed by an empty line, see the example below).
When an object invokes another one using #EXEC, #EXEC_AFTER, #PRINT or #LIST command,
both the global and local path definitions are inherited as local path definitions in the activated object.
If, for example, a picture program starts a command procedure, the paths of the picture will be local
paths in the command procedure and, hence, take precedence over the global command procedure
paths.
The latest definition of a path is valid. Hence, by defining paths locally (with + and -), you ensure that
no inherited definitions will override the desired path definitions.
The following automatically defined path names are used as default paths:
LAN_ /LAN/ACTIVE/LAN_
SYSO /LAN/ACTIVE/SYSO
PICG /LAN/ACTIVE/PICG
SYS_ /SYS/ACTIVE/SYS_
APL_ /APL/application/APL_
FORM /APL/application/FORM
PICT /APL/application/PICT
These default path names are valid everywhere, though the corresponding directories may be
changed globally or locally. A file called without any path name is stored or sought in the directory/
directories defined by the default path name which coincide with the first four characters in the file
name. If no other path name suits, PICT is used. Visual SCIL main dialogs constitute an exception to
this case. This is described in the Visual User Interface Design manual.
Defined paths can be read with the path functions, see Section 10.
Example:
!NEW_PIC PROCESS/PICTURE
;The picture named PICTURE is first sought for in the application APPL1,
;then in application APPL2.
;empty line
;The local path definition is removed.
9.2.4.2 #REP_LIB library [file [, file]*], #REP_LIB library + [file [, file]*], #REP_LIB
library - [file [, file]*] GUID-45D79206-FD02-49F3-AD78-15BF451E8775 v1
Logical library names can be used everywhere, where library representations are requested. Each
library name may correspond to several library files, given in the search order and separated by
commas. When a library representation is requested, it is first sought for in the first library, then in the
next one, etc. If a library name is used when a new library representation is created, the new
representation will be stored in the first file of the logical library.
A #REP_LIB command without any sign defines a global library name. Such a name is monitor
specific, when executed in a picture or dialog. If executed in a printed picture, it applies to all pictures
printed with #PRINT. If the file list is omitted, all files defined for the library name are removed, but
the library name is preserved. Global libraries should be defined only once, for example in the start
picture or dialog. System and application specific representation libraries should be defined by using
the base system attributes SYS:BRL and APL:BRL, respectively (see the System Objects manual).
A #REP_LIB command with a + or - sign defines local and temporary library names by adding files to
or removing files from the given library name. Local representation libraries are valid only in the SCIL
context where they are defined and take precedence over the global libraries with the same name. A
+ sign means that files are added to the beginning of the file list of the library name. A - sign means
that files are removed from the list. If the file list is omitted from the command, the minus sign
removes all locally added files from the actual library name. (Note: as a terminating - sign means that
the statement is continued on the next line, this case should be typed as two subsequent minus signs
followed by an empty line, see the example below).
When an object invokes another one using #EXEC, #EXEC_AFTER, #PRINT or #LIST command,
both the global and local representation library definitions are inherited as local library definitions in
the activated object. If, for example, a picture program starts a printout, the representation libraries of
the picture will be local libraries in the format picture and, hence, take precedence over the global
libraries.
The latest definition of a library name is valid. Hence, by defining library names locally (with + and -),
you ensure that no inherited definitions will override the desired library name definitions.
If no library name is given, a representation is searched for in the library called DEFAULT. Unless
changed with a #REP_LIB command, the library name DEFAULT corresponds to the files:
1. /APL/application/APL_STAND.PIR
2. /LAN/ACTIVE/LAN_/LAN_STAND.PIR
Defined library names can be read with the replib functions, see Section 10.
Example:
This section lists and describes the commands used to access SYS600 keyed files. Keyed files are
general purpose files that may be read and written concurrently by several SCIL programs. Each
data record contains a unique key that is used to identify the record. Data records may be read and
written sequentially, or directly specifying the key value. See Section 6.5.4 for details.
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE command. Integer expression, 1 ... 10.
Closes the file defined by 'n'. This command should be used when the file is no longer used. Open
files are automatically closed when the SCIL context is deleted.
Example:
#CLOSE_FILE 2
;The file opened as number 2 is closed.
'n' File number. A number that identifies the file within the SCIL context. Integer
expression, 1 ... 10.
'apl' Logical application number, integer expression 0 ... 250. 0 is the own application. The
application must be local.
'file' Text or byte string expression, the name of the file. See Section 6.5.1 for file naming.
'keylength' The key length. Integer expression, 1 ... 253.
The command creates a keyed file with the given key length and opens the file. When no longer used
it should be closed with the #CLOSE_FILE command, see above.
Example:
#CREATE_FILE 3 0 "RTU5" 5
;A file called RTU5 with the key length 5 is created and opened in the
current ;application.
Deletes a file.
'apl' Logical application number. Integer expression, 0 ... 250. 0 = the current application.
The application must be local.
'file' Text or byte string expression, the name of the file. See Section 6.5.1 for file naming.
The command deletes the named file in the given application. This command can be used to delete
any file, not just keyed files.
Example:
'n' File number. A number that identifies the file within the SCIL context. Integer
expression 1 ... 10.
'apl' Logical application number, integer expression 0 ... 250. 0 = the current application.
The application must be local.
'file' Text or byte string expression, the name of the file. See Section 6.5.1 for file naming.
'keylength' The name of the variable to receive the key length (integer value 1 ... 253) used in the
file. If a local variable by that name exists, it is used, otherwise a global variable.
The command opens a keyed file. Up to 10 files can be open at the same time in the SCIL context.
When the file is no longer used, it should be closed with the #CLOSE_FILE command, see above.
Example:
#OPEN_FILE 2 1 "APL_/RTU3" L
;The file RTU3 in application 1 is opened. The variable L will
contain ;the key length.
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE commands (see above). Integer expression, 1 ... 10.
'key' The key of the record to be read. A text expression containing 'keylength' characters.
'data1', 'data2' The names of variables to receive the data. If local variables by these names exist,
they are used, otherwise global variables.
The command reads the contents of the record defined by 'key' and puts it as a text into one or two
variables, 'data1' (up to 255 characters) and 'data2' (the rest of the contents if the length of the record
exceeds 255 characters).
Example:
#READ 2 RTU_KEY(X:POA1) V1 V2
;The record corresponding the process object X in the opened file number
2 is
;read. The RTU_KEY function is described in .
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE commands (see above). Integer expression, 1 ... 10.
'keys' The name of the variable to receive the keys. If a local variable by that name exists, it
is used, otherwise a global variable.
'key1' The first key to be read. A text expression containing up to 'keylength' characters (see
the #OPEN_FILE command above). Not obligatory.
'key2' The last key to be read. A text expression containing up to 'keylength' characters. Not
obligatory.
The command reads the keys of the file defined by 'n' and stores them in the variable 'keys'. Up to 2
000 000 keys are read, starting from 'key1' and ending with 'key2'. If 'key2' is omitted the keys are
read to the end of the file, or until the vector is full (2 000 000 keys). If 'key1' and 'key2' are omitted,
the keys of the entire file, up to 2 000 000, are read.
Example:
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE commands (see above). Integer expression, 1 ... 10 .
'key' A reference record key. A text expression.
'data1', 'data2' The names of variables to receive the data. If local variables by these names exist,
they are used, otherwise global variables.
The command reads the contents of the record next to 'key' and places it as text in one or two
variables, 'data1' (up to 255 characters) and 'data2' (the rest of the contents if the length of the record
exceeds 255 characters).
Example:
#READ_NEXT 2 RTU_KEY(A:POA1) V1 V2
;The record following process object A1 is read. The RTU_KEY function is
;described in .
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE commands (see above). Integer value, 1 ... 10.
'key' A reference record key. A text expression.
'data1', 'data2' The names of variables to receive the data. If local variables by these names exist,
they are used, otherwise global variables.
The command reads the contents of the record previous to 'key' and places it as text in one or two
variables, 'data1' (up to 255 characters) and 'data2' (the rest of the contents if the length of the record
exceeds 255 characters).
Example:
#READ_PREV 2 RTU_KEY(A:POA1) V1 V2
;The record previous to the process object A is read. The RTU_KEY
function is
;described in .
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE commands (see above). Integer value, 1 ... 10.
'key' The key of the record to be deleted. A text containing 'keylength' characters (see the
#OPEN_FILE command above).
The command deletes the chosen record. The deletion cannot be undone.
Example:
#REMOVE 2 RTU_KEY(D:POA5)
;The record configuring the process object D is deleted.
Renames a file.
'apl' Logical application number. Integer value, 0 ... 250. 0 is the current application. The
application must be local.
'old' Text or byte string expression, the name of the file to be renamed. See Section 6.5.1
for file naming.
'new' Text or byte string expression, the new file name.
The command renames the file 'old' to 'new'. If 'new' already exists, an error is raised.
This command may be used to rename any file, not just keyed files.
Example:
'n' File number. The file number assigned to the file when opened with the #OPEN_FILE
or #CREATE_FILE command (see above). Integer 1 ... 10.
'data1', 'data2' Two text values containing the data to be written.
The command writes a record to the file defined by 'n'. 'data1' contains as a text the key of the record
and data to be written, up to 255 characters. The rest of the data to be written, if any, is in 'data2'.
The key is included as the first characters in 'data1'.
Example:
#WRITE 2 V1 V2
;The data of the variables V1 and V2 is written in the file opened as
number 2.
The Visual SCIL commands creates, loads and deletes the Visual SCIL objects and handles the
attributes of the Visual SCIL objects. The Visual SCIL objects are superficially described in Section 6
of this manual. They are described in more detail in Visual SCIL User Interface Design and Visual
SCIL Objects manuals.
'object' The name of the object or an object reference including the path (see Section 6).
Giving a path means that the object is created as the last child in the object chain. The
object name must be unique among the objects with the same parent.
'type' The name of the Visual SCIL object type. See the Visual SCIL Objects manual.
'attribute' The name of an attribute which is assigned the subsequent value. If no predefined
attribute with the given name exists, the attribute is created as a user defined attribute.
'value' The value assigned to the attribute. If the attribute is predefined, the value must be of
the correct data type (see the Visual SCIL Objects manual). If the attribute is user
defined, the value may be of any data type.
The .CREATE command creates the object and loads it into the dialog system. Unless an object path
is given, the object will be the child object of the object containing the .CREATE command.
The predefined attributes which are not assigned values in the attribute list are given default values.
After an object has been created, its attributes can be changed with the .MODIFY and .SET
commands, see below.
The .CREATE command is normally used for creating objects whose appearance is dynamically
defined, based on some run time information. It must also be used for creating objects of the ready-
built types which are not accessed in the Dialog Editor. The .LOAD command described below is
used for loading dialogs and dialog items drawn in the editor.
Generally, methods cannot be written with this command. However, if the object has action methods,
these can be written with attributes, see the Visual SCIL Objects manual. Except for this type of
methods, objects created with .CREATE will only have the predefined methods with predefined
contents.
Examples:
The example above creates a dialog containing two containers, each of which contains dialog items.
The last statement makes the dialog visible on screen.
'object' The object name, possibly including a path (see Section 6).
Deleting a Visual SCIL object means that it is removed from the screen (if shown) and from the
dialog system. When an object is deleted, all its children are deleted as well.
Examples:
.DELETE DIALOG1 ;Deletes the object DIALOG1 and all its child objects.
'object' The Visual SCIL object reference (name and possibly path) of the loaded object.
This argument determines the name of the loaded object and its situation in the object
hierarchy. If the object reference is given with an object path, the loaded object will be
created as the last child in the object chain. If no path is given, only object name, the
object will be the child object of the object containing the .LOAD command. The object
name can be freely chosen, as long as it is unique among all objects with the same
parent.
'type' The name of the Visual SCIL object type. The Visual SCIL object types are listed and
described in the Visual SCIL Objects manual.
'file' Text. The name of the file where the object is stored, including the path. Path is not
needed if the file is situated in the directory defined as the default path of the main
dialog of the dialog system. The default path is defined by the attribute
_DEFAULT_PATH when loading the main dialog.
'name' Text. The name under which the object is stored in the file. The name is given in the
dialog editor.
'attribute' An attribute name.
'value' A value assigned to the attribute.
This command is used for loading objects built in the dialog editor and stored in files. It loads the
specified object as a Visual SCIL object with the given name. If a loaded dialog or dialog item
contains other dialog items, they are also loaded. The contained dialog items will be known as Visual
SCIL objects with the names they were given in the dialog editor. The loaded object is incorporated
with all its child objects into the existing object hierarchy.
When loaded, the create methods of the objects are executed (see the Visual SCIL User Interface
Design manual). If the load command contains attribute definitions, the attributes are set after the
create methods.
A stored dialog, dialog item or image can be concurrently loaded several times in parallel under
different object names or in different contexts.
Example:
In the example above, the dialog stored as MYDIALOG in the file MYFILE is loaded as a Visual SCIL
object of type VS_DIALOG. As the visibility attribute _OPEN is set to TRUE, the dialog is shown
immediately. The command loads the complete contents of the dialog MYDIALOG.
Calls a method.
'object' A Visual SCIL object reference or a picture reference (see Section 6). THIS object, if
omitted.
'method' A method name.
'argument' Up to 32 arguments of any data type.
Calls the specified method in the specified object, optionally with arguments. The result value
returned by the called method, if any, is ignored.
Example:
'object' A Visual SCIL object reference or a picture reference (see Section 6). THIS object, if
omitted.
'attribute' An attribute name.
'component' Component of a structured value, see Section 5. Only components of user-defined
attributes may be set, the predefined attributes must be written as a whole.
'value' The value given to the attribute or its component. If the attribute is predefined, the
value must be of an allowed data type (see the attribute descriptions in the Visual SCIL
Objects manual). If the attribute is user defined, any data type is allowed.
The command assigns the given attribute or its component the given value. If the object is visible
when the .SET command is issued, the assignment may cause an immediate change of the
appearance of the object.
When referencing Visual SCIL attributes, an error is raised if the attribute does not exist. When
referencing a window attribute, the attribute is defined if it does not exist.
User defined attributes will always have the data type of the value last assigned to the attribute.
Examples:
Moving a button:
The picture handling commands can be used only within SYS600 pictures. They are not allowed in
dialogs or in command procedures.
On full graphic operator consoles, the command ends the application session by closing the kernel
process of the monitor (PICO).
On a semi-graphic monitor, the command empties the screen from pictures and makes it turn black.
The monitor can be refreshed by clicking the mouse, which loads the SYS600 start picture on
screen. If there are pictures in the monitor alarm picture queue when the !CLOSE command is
issued, the monitor screen is not emptied but instead the oldest alarm picture in the queue is
displayed on screen. If an alarm occurs while the monitor is kept closed, and the monitor in question
is defined as an alarm monitor for the object, the alarm picture is immediately displayed.
The command applies only to semi-graphic monitors and has no effect in full graphic
monitors.
The first command model marks the picture as a fast picture. When the picture is subsequently
erased from the screen, it is saved as a fast picture. This means that every dynamic part of the
picture is saved in the form it had when the picture was erased. Updating is, however, terminated as
in the case of ordinary pictures. When the picture is again displayed on the screen, it has the same
appearance as when it was previously erased and updating starts from this state. The start program
of the picture is no further executed.
The second command model, where the picture name is preceded by a minus sign, removes the fast
picture definition. Henceforth, the picture is no longer stored as fast picture. Several fast picture
definitions at a time can be added and removed as shown in the third command model above. Note:
if 'picture' is omitted, the minus sign at the end of the line will denote that the statement is continued
on the next line. To avoid this, type two subsequent minus signs and an empty line as shown in the
example below.
Fast pictures are monitor specific, i.e. a picture may be a fast picture in one monitor but not in the
others.
The fast pictures are continuously stored in the main memory. If there is insufficient main memory
storage space in the computer, a large number of fast pictures may delay the handling of the ordinary
ones.
All fast picture definitions are cancelled when the system is exited or the application state is changed.
After a fast picture has been edited in the picture editor it functions in the normal way until it is stored
again.
Example:
!FAST_PIC MYPIC
;Next time the picture MYPIC is exited it is stored as a fast picture.
!FAST_PIC - -
;empty line
;The fast picture definition of the current picture is cancelled.
Hereafter
;it functions as an ordinary picture.
Incoming alarms are added to a monitor (application session or window) specific alarm picture
queue. This command displays the oldest alarm picture in the queue. At the same time the name of
the picture is removed from the alarm picture queue. If the alarm picture queue is empty, the
command has no effect.
This command causes the picture handling process to go one step backwards in the queue built up
by !NEW_PIC, see Figure 17, and display that picture. If this picture is no longer available (for
example has been deleted or is locked by Picture Editor), the previous picture in the queue is
displayed. Finally, if there are no available pictures in the queue, an error is raised and no picture
change occurs.
Displays a picture.
The picture with the given name, if it exists, is displayed on screen. First the background becomes
visible. After that, possible draw and start programs are executed (unless the picture is stored as fast
pictures, see Section). If the named picture does not exist, an error message is produced.
When a picture is displayed, its picture name is automatically placed as the last item in a monitor
specific queue of shown pictures, which is maintained by the picture handling unit. If the picture
name already is in the queue, all subsequent picture names are removed from the queue, and the
picture name in its former position is thereafter the last item in the queue, see Figure 17.
If 'path' is omitted, the picture is searched for in the directories defined by the default path name valid
for the actual picture name, see the #PATH command, Section 9.2.4.
Examples:
!NEW_PIC MYPIC
;The picture named MYPIC is shown on screen. The picture is searched for
in
;the directory/directories defined by the path name PICT.
!NEW_PIC OWNPIC/MYPIC
;The picture MYPIC is searched for in the directory/directories defined
by the
;path name OWNPIC.
GUID-AB8121B8-F146-4291-8655-517F7234A26F V1 EN-US
Figure 17: The picture queue. Each monitor or picture container has its own picture queue.
The picture, the name of which is stored by !STORE_PIC (see below), is displayed on screen. The
command functions like !NEW_PIC.
When a function key has been pressed, it may be marked by blinking (depending on the key
definition). This command stops the blinking of all function keys on the entire screen.
The name of the present picture is stored and it can later be retrieved with the command !
RECALL_PIC.
Only one name at a time may be stored in this way. When the command is used again, the previous
picture name is removed.
If there is an update program in the picture, it is executed repeatedly with this interval as long as the
picture is displayed on screen, or until a new !UPDATE command is issued. After the update program
has been executed to the completion, it restarts when the time interval given by this command has
elapsed. Subsequent !UPDATE commands may change the time interval. The most recently given
time interval is valid. If 0 is given as a time interval, the updating ceases until a new interval other
than 0 is given.
When an !UPDATE command is issued, the update program is immediately executed once (provided
that the interval is unlike 0). The next execution takes place at a synchronization time. After that
execution restarts cyclically with the given interval. The time interval between the first and second
execution may be shorter than the interval given with the !UPDATE command.
In MicroSCADA revision 8.2 no synchronization was done. If the changed policy causes troubles at
an upgrade, the revision compatibility switch DO_NOT_SYNCHRONIZE_PICTURE_UPDATE may
be used. See the System Objects manual for details.
The main picture, its window pictures and picture functions may have different updating intervals.
Examples:
!UPDATE 5
;The update program is restarted when five seconds have elapsed since the
;previous execution.
!UPDATE ;The updating interval is assigned the value of the variable A.
Windows can be defined using the Picture Editor or the !WIN_CREATE or !WIN_NAME commands
together with the !WIN_POS, !WIN_PIC, !WIN_REP, and !WIN_INPUT commands. Windows are
displayed on screen with the !SHOW and !SHOW_BACK commands and erased from screen with
the !ERASE command.
When a window is displayed, it is placed on top of its parent picture (see the picture hierarchy in
Section 6). Windows which are children of the same parent are arranged according to their level
parameter which can be changed with the !WIN_LEVEL command. Windows with the same parent
and the same window level are stacked in the order they were first shown with the !SHOW command
so that the newest window is placed on top. The updating of a window with !SHOW has no effect on
the stacking order. However, when a shown window is moved by !WIN_POS, it is raised to become
the topmost window among the windows with the same level and the same parent. When the level of
a displayed window is updated with the !WIN_LEVEL command, the window is stacked as the
topmost window among the windows with the same level and the same parent.
The stacking order is the same whether the child window is totally contained within its parent or not.
The command erases the named window from the screen. If the window is of type PICTURE, a
possible exit program is executed when the window is erased. If it contains windows, these windows
are erased, too.
Examples:
!ERASE MESSAGE
;The window MESSAGE is erased.
!ERASE TREND/COLUMN
;The window COLUMN in the window (or picture function) TREND is erased.
Shows a window.
The window is displayed on screen at the location determined by the window definition. The value of
the expression is calculated before the window is displayed.
If the expression is given by the !SHOW command, the expression in the window definition is
disregarded. If the expression is omitted here, you may define it by the command !WIN_INPUT. Only
as the last alternative, the expression is taken from the window definition. If the window is defined as
PICTURE or FIGURE, the expression is disregarded.
If the window is of PICTURE type, possible background, draw and start programs are executed when
the picture is shown. The update program is executed in the interval given in the window picture,
which may differ from that of the main picture.
Examples:
This command shows the picture background of a window picture. The background of the picture
functions included in the picture are shown as well. The background and draw programs of the
picture are executed. No other programs are executed. No windows are shown and the function keys
do not function.
If the window is of some other type than PICTURE, the command works like !SHOW.
Example:
!SHOW_BACK SCHEME
;The picture background of the window SCHEME is displayed.
When a window is displayed, the background color can be seen for a moment until the window is
drawn on screen. Likewise, when a window is erased, the background color appears for a moment
until the background behind the window is redrawn on screen. By choosing an appropriate
background color for the window, disturbing color switches can be avoided.
The window background used in the monitor is specified by the base system attribute MONn:BWC.
By means of the !WIN_BG_COLOR command, the SCIL programmer can choose the background
color of individual windows. The command may be given before or after the window is shown for the
first time.
When a window is shown for the first time, the background color is set to the color defined by the
MON:BWC attribute, if not otherwise defined by the !WIN_BG_COLOR command. Later changes of
WC do not affect the background color.
Creates a window.
The command creates a new window during the picture handling. Once the window has been
created with this command, it can be assigned a position with the !WIN_POS command (default
position: the upper left corner of the picture), a representation with !WIN_REP (library representation)
or !WIN_PIC (picture), and an expression with the !WIN_INPUT or !SHOW command. Similar to
windows created in the picture editor, windows created with !WIN_CREATE are shown with the !
SHOW command.
!WIN_CREATE first checks whether the window already exists. If no picture reference is given, the
window is searched only within the current picture. If the window already exists, and if it is an
ordinary window, the command does not produce any result. If the window exists as a Motif widget,
its X background is mapped as a SYS600 window background to enable SCIL graphics to be drawn
on it.
The created window exists as long as the picture is displayed on screen, or stored as fast picture
(semi-graphic monitors).
Use !WIN_CREATE instead of !WIN_NAME in cases where !WIN_NAME might have undesired side-
effects.
The command assigns the window an expression which is stored as long as the picture is displayed
on screen or stored as a fast picture. The expression is evaluated every time the window is shown
with the !SHOW command.
With this command the window expression may be changed during the program execution. The last
given expression is valid. Hence, if the expression given with !WIN_INPUT is intended to be used, no
expression should be given with the !SHOW command.
If 'picture' is omitted, the window is sought from the picture or picture function where the command
was issued. If the window is not found there, the window is sought from the entire screen. An error
status is produced if the window cannot be found.
Example:
The command specifies the level of the window in relation to other windows on the same level in the
picture hierarchy (see Section 6). See the general part of this sub-section.
The command has the same function as the !WIN_CREATE command, except for the following:
If no picture reference is given, the !WIN_NAME command searches throughout the whole main
picture. If a window with the given name is found, no new window is created.
Example:
!WIN_NAME A
!WIN_POS A (1,1)
!WIN_PIC A A_PIC
!SHOW A ;A window A is created and placed in the upper left corner. The
picture A_PIC
;is shown in the window.
With this command you can change the picture name during program execution. The latest issued
picture name is the valid one. The name of the window picture is stored as long as the main picture is
displayed on screen or stored as a fast picture. The command entails that the picture name in the
window definition is ignored.
If 'picture path' is excluded, the window is sought from the picture or picture function where the
command was issued. If the window is not found there, the window is sought from the entire screen.
An error status is produced if the window cannot be found.
Example:
Positions a window.
The upper left corner of the window 'window' is positioned to the semi-graphic character position
specified by 'pos'.
If the window is currently shown, it is immediately erased from the old location and displayed at the
new one. The window is placed on the top of all windows with the same level parameter and the
same parent. The new location is stored as long as the main picture is displayed on screen or stored
as a fast picture.
If 'picture' is excluded from the command, the window is sought from the picture or picture function
where the command was issued. If the window is not found there, the window is sought from the
entire screen. An error status is produced if the window cannot be found.
Examples:
With this command the representation to be used in the window may be changed during the program
execution. The most recently given representation is valid. The given representation name is stored
as long as the main picture is displayed or stored as a fast picture. The command entails that the
representation given in the window definition is ignored.
If 'picture' is excluded from the command, the window is sought from the picture or picture function
where the command was issued. If the window is not found there, the window is sought from the
entire screen. An error status is produced if the window cannot be found.
Examples:
!CSR_LEFT moves the data entry cursor one step to the left and !CSR_RIGHT one step to the
right. !CSR_BOL moves the cursor to the beginning of the input field, !CSR_EOL to the end of the
input field.
These commands may be used only after the !INPUT_VAR command, and have no effect if this
command has not been issued.
After an !INPUT_VAR command has been executed, the system waits for character inputs until it
gets an !ENTER command, or the ENTER key on the keyboard is pressed. If the program containing
the !ENTER command (usually a function key program) contains other statements after !ENTER,
these are executed. Then the program execution continues with the statements following after !
INPUT_VAR.
The chosen information of the clicked function key is read and placed in the variable 'var'. The
variable becomes a vector, the length of which is determined by the chosen information.
After this command has been executed, no other commands are executed until a function key has
been clicked.
The execution of this command may be interrupted by input timeout (attribute APL:BIT), status
PICO_INPUT_TIMEOUT.
Example:
!INPUT_KEY HELP V
!SHOW HELP %V
;After the !INPUT_KEY command has been executed, the system waits until a
;function key is pressed. If this has a help text, the text will be shown
in
;the window HELP.
'var' The name of a variable. If a local variable by the name exists, it is used, otherwise a
global variable.
The command reads the coordinates of the subsequent click on the mouse, or the corresponding
keyboard operation, and stores the coordinates in the given variable. After this command has been
executed, no other commands are executed until a position has been pointed out with the mouse.
where:
'x,y' are the coordinates for the cursor position in relation to the upper left corner of the
screen which is (1,1). The value range of the x-coordinate is 1 ... 80. The value
range of the y-coordinate is 1 ... 48.
'x_rel,y_rel' are the coordinates of the cursor position in relation to the upper left corner (=
(1,1)) of the window where the !INPUT_POS command is executed. These
coordinates may have negative values.
The execution of this command may be interrupted by input timeout (attribute APL:BIT), status
PICO_INPUT_TIMEOUT.
Examples:
!INPUT_POS V
;The position of the following push on the mouse is read and assigned to
the
;variable V.
!WIN_POS WINDOW %V
;The window WINDOW is moved to the position determined by the variable V
(only
;the first two elements are noted, i.e., the first coordinate pairs).
This command allows the user to assign a value to a variable during operation. The window name
states in which window the value is echoed. The statement is executed only if the window is defined
and is of FIELD type. The window definition determines the data type of the variable (integer, real or
text) as well as the number of decimals (if real data).
After this command, the system waits for an input in the form of characters, from the keyboard or a
function key program, until it gets an !ENTER command or the Enter/Line Feed key of the keyboard
is pressed. No commands are handled other than those affecting the character input.
Lower case letters are converted to upper case letters. The Nordic letters Å, Ä, Ö, and the German Ü
are converted to the corresponding SYS600 semi-graphic characters, i.e., the ASCII codes [ , \ ,
and ].
The execution of this command may be interrupted by input timeout (attribute APL:BIT), status
PICO_INPUT_TIMEOUT.
Example:
!INPUT_VAR WIND V
;The value of the variable V is read from the window WIND.
!RUBOUT_BOL deletes the beginning of the line until, but not including, the cursor.
!RUBOUT_EOL deletes the end of line starting from the cursor position.
The commands may be used only after the !INPUT_VAR command, and they have no effect if this
command has not been issued.
!TOGGLE_MOD
Insert/typeover.
Shifts from type-over (default) to insert and vice versa. The command may be used only after the !
INPUT_VAR command and has no effect if this command has not been issued.
The semi-graphic portions of the picture, in its current format, is copied to a printer (hardcopy). The
printer starts a new page both before and after the printout.
Depending on the printer definition in the base system (the PRIn:BOD attribute), the printout may be
stored on disk.
Example:
!SEND_PIC LPT 1
All variables assigned before this command, except for those of the start program, are deleted. At the
same time the command !RESTORE (Section 9.4.1) is executed.
Example:
@PROFIT = 350000
!SHOW WIND %PROFIT
;350000 is shown in the window WIND.
!RESET
!SHOW WIND %PROFIT
;An error message is displayed.
#ON ERROR !RESET
;The variables are deleted when an error occurs.
This section describes the predefined SCIL functions. The section is organized into the following
sections:
Besides the SCIL functions described in this section, there are also some functions for handling full
graphic elements, which are described in Section 11.
SCIL provides a number of standard functions, which return values according to a predetermined
algorithm. Function calls are used as operands in expressions (see example 8-1).
GUID-F48C056E-4696-4146-A3B8-9C777FA351A9 v1
function(argument(s))
The argument list consists of one or more expressions, separated by commas. If the function does
not take any arguments, only the function name is used or an empty argument list () may be given.
The expected data types of the arguments, as well as the data type of the result, are fixed by the
actual function. The data type of the result determines how the function call may be used in
expressions (see Section 8.)
Whenever a function expects a real type argument, an integer argument will do as well. It is implicitly
converted to real value before the function is called. Also, when a vector argument with real type
elements is expected, integer elements are accepted as well, unless otherwise noted.
Many functions operate either on a single argument value or a vector of argument values. When a
vector argument is used, each element of the resulting vector has its own status. Consequently, the
function call executes without an error even if one or more of the elements of the argument vector
are bad.
Several functions expect a predefined text type argument. They are called text keywords in the
descriptions of functions. These arguments are case-insensitive. As an example, function LOCATE
takes an optional argument by keyword value "ALL". Though not mentioned in the description,
argument values "all", "All" and even "aLL" are accepted as well.
In the function descriptions in this section, the data types of the arguments, as well as the data type
of the resulting value, are given for each function. Arguments within square brackets [] are optional.
Notation []* means that the argument within the square brackets is optional but may appear more
than one times. If not otherwise stated, all arguments can be arbitrary SCIL expressions of the
specified data type.
Examples:
The following table lists all SCIL functions. The last column (labeled "S") states whether the function
has side-effects or not. The following notation is used:
CLASSIFY(v, n, low, high) Classifies the elements of a vector into size Section 10.7.3
classes and returns the counts of each class.
CLOCK The present SYS time with a one-second Section 10.4.2
resolution.
COLLECT(v, delimiter) Collects text fields into a text. Section 10.5.8
COMPILE(source) Runs the SCIL compiler. Section 10.11.1
CONSOLE_OUTPUT(text [,severity Writes a message into the system error log Section 10.10.2 S
[,category]]) (SYS_LOG.CSV) and into the notification
window.
COS(arg) The cosine of the argument. Section 10.3.5
CSV_TO_SCIL(csv, start, field_info [,option]) Converts a CSV file format record into SCIL Section 10.19.1
data.
CUMULATE(v) Accumulates the elements of the argument Section 10.7.4
vector.
DATA_FETCH(apl, name, index1 [,step Reads history records of a data object. Section 10.14.16
[,count]]), DATA_FETCH(apl, name, time1,
time2 [,step [,shift]]), DATA_FETCH(apl,
name, time1 [,step [,count [,shift]]]),
DATA_FETCH(apl, name, indices)
DATA_MANAGER(function [,argument]*) SCIL database management. Section 10.16.1 P
DATA_MANAGER("CLOSE", handle) Closes a SCIL database when no longer used. Section 10.16.5
DATA_MANAGER("COPY", handle, new_file Makes a copy of an open SCIL database into Section 10.16.4 S
[, version]) another file.
DATA_MANAGER("CREATE", file) Creates a new SCIL database and opens it for Section 10.16.2 S
use.
DATA_MANAGER("CREATE_SECTION", Creates a new (empty) section in a SCIL Section 10.16.7 S
handle, section) database.
DATA_MANAGER("DELETE", handle, Deletes a component from a SCIL database. Section 10.16.11 S
section, [,component]*)
DATA_MANAGER("DELETE_SECTION", Deletes a section, both the name and the Section 10.16.8 S
handle, section) contents, from SCIL database.
DATA_MANAGER("GET", handle, section Reads data from SCIL database. Section 10.16.9
[,component]*)
DATA_MANAGER("LIST_SECTIONS", Lists the sections of a SCIL database in Section 10.16.6
handle) alphabetic order.
Table continues on next page
'selector' Any value of type integer, real, boolean, time, text or bits string.
'w1' , 'wi' Values of a type compatible to 'selector', or a vector of such values. Up to 13 'w'
arguments may be given.
'v1', 'vi', 'vo' Any values.
Example:
The following example gives display names to some SCIL status code values:
Value: The first 'non-empty' element in the vector, or the first 'non-empty' argument in the
argument list.
Integer 0
Real 0.0
Boolean FALSE
Time 1978-01-01 00:00:00
Text ""
Bit string BIT_STRING(0)
Byte string Empty byte string (length 0)
Vector VECTOR()
List LIST()
Example:
The following example evaluates to the ON attribute value of process object PO:P10, if ON is
defined. If not, the result is the value of the OI attribute, if OI is defined. The result is "No id", if both
ON and OI are empty.
The function returns the data type of the argument, or value "NONE" if the expression cannot be
evaluated. Consequently, it can be used to check an expression, for example the existence of a
variable.
"VECTOR"
"LIST"
"NONE" (= the expression is wrong or undefined)
Example:
DATA_TYPE(CLOCK) == "TIME"
#IF DATA_TYPE(DATA:DOV) == "NONE" #THEN .......
This function creates a text vector that represents the contents of any SCIL data in SCIL expression
syntax. The status code of each data item (unless 0) is also dumped.
This function can be used to store any SCIL data structure in a text file.
If the argument 'vl' is a vector, the value of the function call is an integer vector of the same length,
the nth element of the resulting value containing the length of nth element of 'vl'.
If the argument 'vl' is a list, the value of the function call is a list having the same attributes as 'vl',
each containing the length of the corresponding attribute of 'vl'.
Example 1:
;each line
Two values are considered equal if all the following conditions are met:
Text values are compared for equality according to the argument 'case_policy'.
The test for equality is recursive, i.e. if the value is a vector or list, its components are tested for
equality.
Example:
'expression' A text or text vector value containing the SCIL expression to be evaluated. If a text
vector is given, other lines but the last one must end with a continuation character (-).
Value: The result of the evaluation, which may be of any data type.
For any value v, EVALUATE(DUMP(v)) results to v, except for one case: real numbers
may slightly lose their precision.
Example:
The following example shows how to store any data value (such as a complicated list) in a disk file
and then read it back:
Example:
The following example evaluates to "Work" or "Weekend" according to the current day of week:
Examples:
LENGTH(340) == 1
LENGTH("ABCD") == 4
LENGTH(" ") == 1
LENGTH("") == 0
The function merges the contents of 'source' argument and the status code(s) 'status' as follows:
If a value is assigned a status code >= 10, the value itself is lost. If a value in 'source' has a status
code >= 10, and it is assigned a status code <10, the value is initialized by integer zero.
Examples:
@V = SET_STATUS(%V, 2)
;Status code 2, OBSOLETE_STATUS, is set to the variable V.
@A = SET_STATUS(%A,GET_STATUS(%B))
;The status of the variable A is copied from the variable B.
'source' The source data to be viewed. Integer, real, time, boolean, text, bit string or byte string.
'type' Text keyword specifying the result data type:
"INTEGER", "REAL", "TIME", "BOOLEAN", "TEXT", "BIT_STRING" or
"BYTE_STRING"
See the compatibility rules below.
Value: A value of data type specified by 'type'.
This function interprets the memory bit pattern of a value as if it were of another data type. The
following data type compatibility rules apply:
• Bit patterns of INTEGER, REAL, TIME and BOOLEAN data can be viewed as INTEGER, REAL,
TIME or BOOLEAN data.
• Bit patterns of TEXT, BIT_STRING and BYTE_STRING data can be viewed as TEXT,
BIT_STRING or BYTE_STRING data.
• Any other combination results to a runtime error.
This is a low-level, close-to-hardware, function, whose results may be hardware dependent. Type-
casting from and to real data may result to invalid floating point numbers. Type-casting to a bit string
returns the bit pattern of the source as a bit string, whose length is 8 times the length of the source
(one character or byte occupies 8 bits). Type-casting from a bit string returns a text or byte string,
whose length is 1/8 of the length of the bit string.
Type casting from and to TEXT values operate on 8-bit active code page encoded characters.
Examples:
TYPE_CAST(TRUE, "INTEGER") returns the integer value 1, which is the integer representation of
the boolean value TRUE.
TYPE_CAST(%BS, "TEXT") == "AÖ" ;Type casting to text results in "AÖ", if ISO Latin-1 code page is
active
Example:
Arcus cosinus.
This function returns, as radians, the angle, whose cosine equals to the argument.
'arg' A real value -1.0 ... +1.0, or a vector of such real values.
Value: A real value or a vector of real values. The angle(s) in radians.
Arcus sinus.
This function returns, as radians, the angle, whose sine equals to the argument.
'arg' A real value -1.0 ... +1.0, or a vector of such real values.
Value: A real value or a vector of real values. The angle(s) in radians.
Arcus tangens.
This function returns, as radians, the angle, whose tangent equals to the argument.
'arg' A real or integer value or a vector of such values. The angle(s) in radians.
Value: A real value or a vector of real values.
The result is the number e, Neper's number, raised to the power of the argument.
This and the following five functions implement the high precision arithmetics in SCIL. High precision
numbers are based on 64-bit floating point numbers, while the REAL datatype of SCIL is based on
32-bit floating point numbers. High precision numbers are accurate to approx. 15 decimal digits
(compared to only 7 of REAL data).
The high precision number arguments of these functions may be given in any of the following four
ways (collectively called 'DOUBLE' type, for short):
The high precision functions return their high precision results as a byte string data containing the 64-
bit floating point representation. This internal representation is converted to normal SCIL data types
by function HIGH_PRECISION_SHOW.
When entering a high precision constant in the SCIL program, use a text type argument
instead of a real or an integer argument, unless it is certain that the constant has an exact
representation as a 32-bit floating point number or as an integer.
Example:
The STATUS attribute of the result is set to SUSPICIOUS_STATUS (= 1), if any of the elements of
the argument vector has a bad status (other than 0 or 3). If the argument vector is empty, or it
contains no valid elements, NOT_SAMPLED_STATUS is set.
If the argument vector contains elements that are not valid 'DOUBLE' values, the indices of such
elements are returned in attribute ERRORS. If the length of the attribute is 0, no erroneous elements
have been encountered.
Natural logarithm.
The following rules apply for scalar (non-vector) arguments. First, if all the arguments are integers,
the result is an integer. Second, if all the arguments are time values, the result is a time value. Third,
if any of the arguments is a real value, the result is a real value. Fourth, if time arguments are mixed
with numeric arguments (which actually makes no sense), the result is numeric.
Finally, if the argument list contains vectors, the result is a vector of the length of the longest
argument vector. Each element is compared to the corresponding element in the other argument
vectors, as well as to the scalar arguments according to the data type conversion rules above. If the
lengths of argument vectors are unequal, the odd elements get SUSPICIOUS_STATUS (see the
Status Codes manual).
Notes:
1. If the argument list contains only one argument, the argument is returned as such.
2. To find the largest element of a vector, use function HIGH or HIGH_INDEX.
Examples:
MAX(1, 5, 3) == 5
MAX(1.0, 5, 3) == 5.0
MAX(VECTOR(1, 2, 4), 3, VECTOR(5, 0, 1)) ;returns VECTOR(5, 3, 4)
The following rules apply for the scalar (non-vector) arguments. First, if all the arguments are
integers, the result is an integer. Second, if all the arguments are time values, the result is a time
value. Third, if any of the arguments is a real value, the result is a real value. Fourth, if time
arguments are mixed with numeric arguments (which actually makes no sense), the result is
numeric.
Finally, if the argument list contains vectors, the result is a vector, which is as long as the longest
argument vector. Each element is compared to the corresponding element in the other argument
vectors, as well as to the scalar arguments according to the data type conversion rules mentioned
above. If the lengths of argument vectors are unequal, the odd elements get SUSPICIOUS_STATUS
(see the Status Codes manual).
Notes:
1. If the argument list contains only one argument, the argument is returned as such.
2. To find the smallest element of a vector, use function LOW or LOW_INDEX.
Examples:
MIN(1, 5, 3) == 1
MIN(1.0, 5, 3) == 1.0
MIN(VECTOR(1, 2), 3, VECTOR(5, 0, 4)) ;returns VECTOR(1, 0, 3)
Example:
ODD(5) == TRUE
EVEN(5) == FALSE
If 'n1' and 'n2' are integers, an integer value in the range [n1, n2] (including n1 and n2) is returned. If
'n1' and 'n2' are real values, a real value in the range [n1, n2), i.e. including n1 but excluding n2, is
returned.
This function is based on the random number generator of the underlying operating system. The
generator generates a fixed sequence of pseudo-random integers, where each generated number
works as a seed to the next number. If you want to get exactly the same random numbers every time
the SCIL program is executed. You can use function SET_RANDOM_SEED with a fixed argument,
but if you want to have different random numbers each time, use SET_RANDOM_SEED with a
varying argument (current time, for example).
If 'decimals' is omitted, the argument is rounded off to the nearest integer. If 'decimals' is given, the
argument is rounded off to the nearest real value having 'decimals' decimal digits. See also function
TRUNC.
Examples:
ROUND(4.5) == 5
ROUND(-4.5) == -5
ROUND(2.7456, 2) == 2.75
'arg' A real or integer value or a vector of such values. The angle(s) in radians.
Value: A real value or a vector of real values.
If 'decimals' is omitted, the argument is truncated to an integer by removing the fraction part. If
'decimals' is given, the argument is truncated to a real value having 'decimals' decimal digits. See
also function ROUND.
Examples:
TRUNC(4.5) == 4
TRUNC(-4.5) == -4
TRUNC(2.7456,2) == 2.74
The time functions operate on time type data in various ways: They read and set system time,
convert time values to a readable text representation, retrieve various information of a time type
value, convert between local and UTC times and do some simple arithmetics on time values.
The time functions usually take a time type or a qualified time type argument. A time type value is
used to represent a time in one-second resolution. A qualified time has a resolution of one
millisecond, it also contains the daylight saving information, see below. Many of the functions may
also be called without an argument, the present time is then assumed.
Both local and UTC time are supported by these functions. See function TIME_ZONE_RULES for
details of maintaining the rules of time zone and daylight saving time transitions.
A SYS600 system may run either in local time or in UTC time. The time reference is specified by the
base system attribute SYS:BTR. The term SYS time is used below to refer to the time reference of
the system.
At the end of this section you find examples of the time functions.
Leap seconds are not supported by SCIL. Time 23:59:60 is never accepted nor produced
by SCIL, even if it is a valid time stamp when a leap second is added according to the
UTC standard. All calculations are done with 60 second minutes.
A qualified time represents a moment of time uniquely by adding a daylight saving time flag and
status information to the one-millisecond resolution time. A qualified time is implemented as a list
with predefined attributes as follows:
Several functions that convert times from local to UTC time or otherwise calculate qualified time
values return status information as the status of the CL attribute of the result. The following values
may be returned:
FAULTY_TIME_STATUS (3). The time is non-existing, either because its DS attribute is wrong or it
specifies a moment that was skipped over during the transition to daylight saving time or the resulting
time is out of the valid range of time type data.
AMBIGUOUS_TIME_STATUS (4). The time is ambiguous, because it specifies a moment that was
duplicated during a transition to standard time and DS attribute does not tell which one is meant.
The following special cases may occur when converting UTC time to local time:
The following special cases may occur when converting local time to UTC time:
1. DS attribute of the argument is missing. This is OK if the given local time is neither ambiguous
nor non-existing (normally it is not). A local time may be ambiguous if it specifies a time close to
the transition from daylight saving time to standard time: If the transition takes place at 4 o'clock
by moving clock one hour backward, the times from 03.00.00 to 03.59.59 are ambiguous, they
may represent daylight saving or standard time. If the given time is ambiguous, it is assumed
that it is standard time. The status of the CL attribute of the result is set to 4
(AMBIGUOUS_TIME_STATUS).
2. The argument specifies a non-existing time. A local time may be non-existing if it specifies a
time close to the transition from standard time to the daylight saving time. If the transitions takes
place at 3 o'clock by moving clock one hour forward, the times from 03.00.00 to 03.59.59 are
non-existing. If the argument specifies a non-existing time, the exact UTC time of the transition
is returned and the status of the CL attribute of the result is set to 3 (FAULTY_TIME_STATUS).
3. The DS attribute of the argument is wrong. The attribute is ignored and the status of resulting CL
attribute is set to 3 (FAULTY_TIME_STATUS).
4. The resulting value of CL attribute is not in the range of TIME data type. CL is set to its minimum
or maximum value and its status is set to 3 (FAULTY_TIME_STATUS).
Example:
; This function converts the given local time argument to UTC time and
displays
; an error message if something wrong.
#ARGUMENT LOCAL_TIME_ARG
#LOCAL UTC = LOCAL_TO_UTC_TIME(LOCAL_TIME_ARG)
#CASE GET_STATUS(UTC.CL)
#WHEN STATUS_CODE("FAULTY_TIME_STATUS") -
.SET MESSAGE._TITLE = "Skipped during transition to DST"
#WHEN STATUS_CODE("AMBIGUOUS_TIME_STATUS") -
.SET MESSAGE._TITLE = "Please specify DST or STT"
#OTHERWISE
.SET MESSAGE._TITLE = ""
#CASE_END
#RETURN UTC
If the optional argument "FULL" is given, the year is shown with 4 digits: yyyy-mm-dd, dd-mm-yyyy or
mm-dd-yyyy.
Examples:
DATE
;Returns the current date, for example "03-10-22", if SYS:BTF = 0
DATE("FULL")
;Returns the current date, for example "22-10-2003", if SYS:BTF = 1
The number of the day counting from Monday, which is number one.
The hour.
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
Example:
The following three calls each return the moment of time 3 seconds from now:
LOCAL_TIME_ADD(LOCAL_TIME, 3)
LOCAL_TIME_ADD(LOCAL_TIME, 0, 3000)
LOCAL_TIME_ADD(LOCAL_TIME, 4, -1000)
'time' Time or list (qualified time) value, local time. Default value is the present local time.
Value: A list with the following attributes:
UTC Time value
DAYLIGHT_SAVING Boolean value
TIME_ZONE Real value
BIAS Real value
STATUS Integer value
The attributes contain the following information from the moment of 'time':
If the length of the interval is greater than MAX_INTEGER, S is set to MAX_INTEGER, MS is set to
999 and the status of S is set to 3 (FAULTY_TIME_STATUS).
If the (negative) length of the interval is smaller than MIN_INTEGER, S is set to MIN_INTEGER, MS
is set to -999 and the status of S is set to 3 (FAULTY_TIME_STATUS).
For other possible status codes returned as the status of the S attribute of the result, see Section
10.4.2.
'time' A time or list (qualified time) value or a vector of such values, local time(s).
Value: A list (qualified time) or a vector of lists, SYS time(s).
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
This function either is equivalent to LOCAL_TO_UTC_TIME or simply returns its argument (as
qualified time value(s)), depending on the time reference of the system (SYS:BTR).
'time' A time or list (qualified time) value or a vector of such values, local time(s).
Value: A list (qualified time) or a vector of lists, UTC time(s).
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
The minute.
'time' A time value or a vector of time values. Default value is the present SYS time.
Value: An integer 0 ... 59 or a vector of such integers.
'time' A time value or a vector of time values. Default value is the present SYS time.
Value: An integer 1 ... 12 or a vector of such integers.
If any of the arguments is out of range, a zero (corresponding to Jan 1st 1978, 00:00 o'clock) is
returned.
The second.
'time' A time value or a vector of time values. Default value is the present SYS time.
Value: An integer 0 ... 59 or a vector of such integers.
The 'time' argument is first converted to UTC time and the system clock is set accordingly. However,
if the conversion results to a non-existing (FAULTY_TIME_STATUS) or ambiguous
(AMBIGUOUS_TIME_STATUS) time, the system clock is not set and only the STATUS attribute is
returned.
The 'time' argument is first converted to UTC time (if needed) and the system clock is set
accordingly. However, if the conversion results to a non-existing (FAULTY_TIME_STATUS) or
ambiguous (AMBIGUOUS_TIME_STATUS) time, the system clock is not set and only the STATUS
attribute is returned.
This function is equivalent to either LOCAL_TIME or UTC_TIME, depending on the time reference of
the system (SYS:BTR).
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
Example:
The following three calls each return the moment of time 3 seconds from now:
SYS_TIME_ADD(SYS_TIME, 3)
SYS_TIME_ADD(SYS_TIME, 0, 3000)
SYS_TIME_ADD(SYS_TIME, 4, -1000)
If the length of the interval is greater than MAX_INTEGER, S is set to MAX_INTEGER, MS is set to
999 and the status of S is set to 3 (FAULTY_TIME_STATUS).
If the (negative) length of the interval is smaller than MIN_INTEGER, S is set to MIN_INTEGER, MS
is set to -999 and the status of S is set to 3 (FAULTY_TIME_STATUS).
For other possible status codes returned as the status of the S attribute of the result, see Section
10.4.2.
'time' A time or list (qualified time) value or a vector of such values, SYS time(s).
Value: A list (qualified time) or a vector of lists, local time(s).
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
This function either is equivalent to UTC_TO_LOCAL_TIME or simply returns its argument (as
qualified time value(s)), depending on the time reference of the system (SYS:BTR).
'time' A time or list (qualified time) value or a vector of such values, SYS time(s).
Value: A list (qualified time) or a vector of lists, UTC time(s).
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
This function either is equivalent to LOCAL_TO_UTC_TIME or simply returns its argument (as
qualified time value(s)), depending on the time reference of the system (SYS:BTR).
If the optional argument "FULL" is given, the year is shown with 4 digits: yyyy-mm-dd hh:mm, dd-
mm-yyyy hh:mm or mm-dd-yyyy hh:mm.
Examples:
TIME
;Returns the current time, for example "03-10-22 12:42", if SYS:BTF = 0
TIME("FULL")
;Returns the current time, for example "22-10-2003 12:42", if SYS:BTF = 1
TIME("FULL")
;Returns the current time, for example "10-22-2003 12:42", if SYS:BTF = 2
'string' A text or text vector to be interpreted. Sample format: 2008-12-24 19:15:20.345. The date is
given in the format specified by attribute SYS:BTF. The year is given with 4 or 2 digits.
'resolution' A text keyword, the expected resolution:
"DATE" Date only
"MINUTES" Time without seconds
"SECONDS" Time with seconds
"MILLISECONDS" Milliseconds included (default)
'options' One or two keywords in any order:
"TIME_OF_DAY" No date expected
"EXACT" See note 4 below
Value: A list with the following attributes:
STATUS SCIL status code, 0 = OK
CL Time type (date and time)
Integer type if "TIME_OF_DAY" (seconds since
00:00:00)
MS Integer, milliseconds
Notes:
For example, 2008-12-19 10:44 is valid with resolutions "MINUTES", "SECONDS" and
"MILLISECONDS", if "EXACT" is not given. If "EXACT" is given, it is valid only when resolution is
"MINUTES".
'rule' A list value, the time zone rule to be set, see below.
Value: A list value with two attributes:
STATUS An integer, SCIL status code of the call.
RULES A vector of list values, the implemented time zone rules in chronological
order.
This function sets a new time zone rule and returns all the implemented rules (including the rule just
set) as a vector. If the function is called without an argument, only the implemented rules are
returned.
A time zone rule is represented as a list value containing the following attributes:
If any of attributes TZ, STT or DST is missing, the corresponding definition remains untouched. For
example, if a given rule contains only the attribute DST, the time zone and Standard Time
specification are as they were before DATE.
The Standard Time and Daylight Saving Time specification are represented as a list value containing
the following attributes:
A once only rule may be specified by omitting attributes DAY_OF_WEEK and WEEK, and specifying
the following two attributes instead:
Example:
Suppose the following rules have been and will be applied on a site:
1. Daylight saving time was first applied in 1983. Transition to DST at 3:00 on the last Sunday of
March. Transition to STT at 4:00 on the last Sunday of September.
2. In 1997, the transition to STT was moved one month later, to the last Sunday of October.
3. In 2002 it was decided, that from 2003 on, daylight saving is no longer applied.
RULES = TIME_ZONE_RULES(LIST(-
DATE = GENESIS, TZ = 2,-
DST = LIST(MONTH = 0), STT = LIST(MONTH = 0)))
;Rule 1
RULES = TIME_ZONE_RULES(LIST(-
DATE = DATE1,-
DST = LIST(MONTH = 3, DAY_OF_WEEK = 7, WEEK = 5, HOUR = 3),-
STT = LIST(MONTH = 9, DAY_OF_WEEK = 7, WEEK = 5, HOUR = 4)))
;Rule 2
RULES = TIME_ZONE_RULES(LIST(-
DATE = DATE2,-
STT = LIST(MONTH = 10, DAY_OF_WEEK = 7, WEEK = 5, HOUR = 4)))
;Rule 3
RULES = TIME_ZONE_RULES(LIST(-
DATE = DATE3,-
DST=LIST(MONTH = 0), STT=LIST(MONTH = 0)))
The time zone rules are stored in the text file SYS_/SYS_TIME.PAR. After running the example
above, the contents of the file are as follows (the second rule has been divided to two lines here, for
clarity):
1978-01-01 DST=LIST(MONTH=0),STT=LIST(MONTH=0),TZ=2
1983-01-01 DST=LIST(BIAS=1,DAY_OF_WEEK=7,HOUR=3,MINUTE=0,MONTH=3,WEEK=5),-
STT=LIST(BIAS=0,DAY_OF_WEEK=7,HOUR=4,MINUTE=0,MONTH=9,WEEK=5)
1997-01-01 STT=LIST(BIAS=0,DAY_OF_WEEK=7,HOUR=4,MINUTE=0,MONTH=10,WEEK=5)
2003-01-01 DST=LIST(MONTH=0),STT=LIST(MONTH=0)
Whenever the SYS600 program is restarted, the current rule obeyed by the operating system is read.
If it differs from the current rule from SYS_TIME.PAR, a new rule is appended to the file. This makes
an alternative way to add a new time zone rule: change the operating system time zone settings and
restart SYS600. However, a rule obeyed in the past cannot be added this way and the program must
be restarted.
When the program is started for the first time, it makes the sophisticated guess that the current rule
has been applied since the beginning of SYS600 time counting, 1st of January, 1978.
'time' A time value, a qualified time (list) value or a vector of such values. The default value is
the present SYS time.
'msecs' An optional integer or integer vector argument, milliseconds 0 ... 999.
"FULL" An optional keyword argument, 4-digit year is requested.
Value: A text or text vector.
If the optional argument "FULL" is given, the year is shown with 4 digits: yyyy-mm-dd
hh:mm:ss.mmm, dd-mm-yyyy hh:mm:ss.mmm or mm-dd-yyyy hh:mm:ss.mmm.
If the milliseconds are given explicitly as a vector, the length of the vector must be equal to the length
of the 'time' vector.
See also the DATE, TIME, TIMES, TIME_SCAN, TOD, TODMS and TODS functions.
Examples:
TIMEMS(ABC:PRQ1)
;Returns the registration time of the process object ABC:P1
;for example "04-03-22 12:42:15.030" (SYS:BTF = 0)
TIMEMS("FULL")
;Returns the current time, for example "22-03-2004 12:42:15.030" (SYS:BTF
= 1)
'time' A time value or a vector of time values. Default value is the present SYS time.
"FULL" Optional keyword argument, 4-digit year is requested.
Value: A text or text vector.
If the optional argument "FULL" is given, the year is shown with 4 digits: yyyy-mm-dd hh:mm:ss, dd-
mm-yyyy hh:mm:ss or mm-dd-yyyy hh:mm:ss.
See also functions DATE, TIME, TIMEMS, TIME_SCAN, TOD, TODMS and TODS.
Examples:
TIMES
;Returns the current time, for example "03-10-22 12:42:15", if SYS:BTF = 0
TIMES("FULL")
;Returns the current time, for example "22-10-2003 12:42:15", if SYS:BTF
= 1
'time' A time value, a qualified time (list) value or a vector of such values.The default value is
the present SYS time.
'msecs' An optional integer or integer vector argument, milliseconds 0 ... 999.
Value: A text or text vector, in format hh:mm:ss.mmm.
If the milliseconds are given explicitly as a vector, the length of the vector must equal to the length of
the 'time' vector.
For the possible status codes returned as the status of the CL attribute of the result, see Section
10.4.2.
Example:
The following three calls each return the moment of time 3 seconds from now:
UTC_TIME_ADD(UTC_TIME, 3)
UTC_TIME_ADD(UTC_TIME, 0, 3000)
UTC_TIME_ADD(UTC_TIME, 4, -1000)
If the length of the interval is greater than MAX_INTEGER, S is set to MAX_INTEGER, MS is set to
999 and the status of S is set to 3 (FAULTY_TIME_STATUS).
If the (negative) length of the interval is smaller than MIN_INTEGER, S is set to MIN_INTEGER, MS
is set to -999 and the status of S is set to 3 (FAULTY_TIME_STATUS).
'time' A time or list (qualified time) value or a vector of such values, UTC time(s).
Value: A list (qualified time) or a vector of lists, local time(s).
'time' A time or list (qualified time) value or a vector of such values, UTC time(s).
Value: A list (qualified time) or a vector of lists, SYS time(s).
This function either is equivalent to UTC_TO_LOCAL_TIME or simply returns its argument (as
qualified time value(s)), depending on the time reference of the system (SYS:BTR).
The week numbering rule that is used may be given as the statement: "The 4th of January always
belongs to week number 1".
The year.
Examples:
On 19th February 1997 at 20:35:04 o'clock the time functions returned the following values (supposing SYS:BTF ==
0):
Function call Value
TIMES "97-02-19 20:35:04"
TIMES(CLOCK-1) "97-02-19 20:35:03"
TIME "97-02-19 20:35"
TODS "20:35:04"
DATE "97-02-19"
YEAR 1997
MONTH 2
HOUR 20
Table continues on next page
MINUTE 35
SECOND 4
DOY 50
HOD 20.58444
HOY 1196.584
LOCAL_TIME_INFORMATION If the time zone is +2 hours:
LIST(UTC=...,DAYLIGHT_SAVING=FALSE,
TIME_ZONE=2.0,BIAS=2.0,STATUS=0)
TIMES(PACK_TIME(1993,5,5,12,30,0)) "93-05-05 12:30:00"
The string functions perform operations on texts, bit strings and byte strings.
The name of this function has been reserved for compatibility although it now operates on Unicode
characters.
Examples:
The name of this function has been reserved for compatibility although it now operates on Unicode
characters.
Example:
ASCII_CODE("A") == 65
BCD (Binary Coded Decimal) values are represented in SCIL by values of BIT_STRING data type.
Each digit takes 4 bits (called a nibble), so the length of a BCD bit string is a multiple of 4. The length
of a BCD value is limited to 9 digits.
If the bit string represents a valid BCD number, the STATUS attribute is set to OK_STATUS (0) and
the result of the conversion is returned in attribute INT.
If the bit string is invalid, i.e. it contains nibbles out of range 0 ... 9, its length is not a multiple of 4 or
its length is greater than 36, STATUS is set to SCIL_NOT_A_BCD_NUMBER and INT attribute is not
returned.
Example:
Example:
BIN(BIT_SCAN("010101")) == "010101"
BIN(23) ;returns "0000...0010111" (27 leading zeroes)
The text representation may contain leading blanks, a sign (+/-), digits 0 and 1 and a decimal point.
'string' A text containing characters "0" and "1" only, or a vector of such texts.
Value: A bit string or a vector of bit strings.
Example:
Capitalizes a text.
The function converts the first character of the text or each vector element to upper case and the rest
of the text to lower case according to the Unicode standard..
Example:
CAPITALIZE("VÄSTERÅS") == "Västerås"
The function collects the text fields given in a text vector into one text value, where the fields are
delimited by the given delimiter character.
Example:
Examples:
Examples:
DEC_SCAN(" -5") == -5
DEC_SCAN("+40000.0") == 40000.0
The function removes spaces and tabs out of a text according to a specified rule.
Example:
HEX(26) == "001A"
HEX(-1) == "FFFF"
HEX(123456) == "0001E240"
The text representation may contain leading blanks, a sign (+/-), hexadecimal digits and a decimal
point. Any other character is considered as an error generating a bad status. The allowed digits are
0 ... 9, A ... F and a ... f.
Examples:
HEX_SCAN("F") == 15
HEX_SCAN("A.8") == 10.5
BCD (Binary Coded Decimal) values are represented in SCIL by values of BIT_STRING data type.
Each digit takes 4 bits so the length of a BCD bit string is a multiple of 4. The length of a BCD value
is limited to 9 digits.
If 'digits' is 0, a bit string long enough to hold the result is returned. Otherwise exactly 'digits' BCD
digits are returned, padded with leading zeroes, if necessary.
If the value of 'int' can be represented as a BCD bit string (i.e. it is non-negative and in the range
specified by 'digits'), the STATUS attribute is set to OK_STATUS (0) and the result of the conversion
is returned in attribute BCD.
Example:
The function joins the text fields given as arguments into one text value, where the fields are
delimited by the given delimiter character.
Example:
Example:
LOCATE ("ABC","BC")
;returns 2
LOCATE ("ABC","BC ")
;returns 0
LOCATE ("ABB","B","ALL")
;returns vector(2,3)
LOCATE (("FGHBBN","ABBBB"),"BB","ALL")
;returns (vector(4), vector(2,4))
LOCATE (("HBBN","ABBBB","BB","AA"),"BB","ALL")
;returns (vector(2), vector(2, 4), vector(1), vector(0))
The function converts the upper case characters of 'text' to lower case according to the Unicode
standard.
Example:
LOWER_CASE("VÄSTERÅS") == "västerås"
Examples:
OCT(10) == "000012"
OCT(-1) == "177777"
The text representation may contain leading blanks, a sign (+/-), digits of the radix and a decimal
point. Any other character is considered as an error generating a bad status. The allowed digits are
0 ... 7.
Examples:
OCT_SCAN("10") == 8
OCT_SCAN("1.2") == 1.25
The function creates a text value out of a vector of its substrings, or a bit string or a byte string out of
a vector of integers that represent the values of bit or byte fields of given length.
Examples:
PACK_STR(("A","B","CD"),"TEXT") == "ABCD"
PACK_STR((0,1,0),"BIT_STRING") == BIT_SCAN("010")
PACK_STR((0,3,1),"BIT_STRING",2) == BIT_SCAN("001110")
If the length of 'string' is greater than 'length', the 'string' is returned as such.
Examples:
PAD("A", 5) == "AAAAA"
PAD("AA", "BC", 7) == "AABCBCB"
PAD(" ", MAX_TEXT_LENGTH) ;returns a blank text of the maximum length
PAD("ABC", "D", 2) == "ABC"
The arguments 'string' and 'new_string' may be of different length. Argument 'new_string' may be
empty. In this case, all the occurrences of 'string' are deleted.
If the resulting string is too long (> 65 535 characters), SCIL_STRING_TOO_LONG error is
generated when the 'text' argument is of text type. If it is a vector, the status of the overflowing
element is set to SCIL_STRING_TOO_LONG.
The function extracts the fields of text and returns the fields as a text vector. A field is any substring
delimited by the given delimiter character.
Example:
SEPARATE("A,B,C,D", ",")
;returns the vector ("A","B","C","D").
'string' A text, a bit string or a byte string value, or a vector of such values.
'start' An integer 1 ... 65 535 (texts and bit strings) or 1 ... 8 388 600 (byte strings). The
starting position of the substring.
'length' An integer 0 ... 65 535 (texts and bit strings) or 0 ... 8 388 600 (byte strings). Default is
0. The length of the substring. If 'length' = 0, the function returns the end of 'string'
starting from 'start'. If 'start' is greater than the length of 'string', an empty string is
returned. If 'length' > 0 and the substring extends beyond the end of 'string', the result
is padded with trailing blanks (texts), zero bits (bit strings) or zero bytes (byte strings).
Value: The same data type as 'string'. The substring.
Examples:
SUBSTR("ABCDE",3,2) == "CD"
SUBSTR("ABCDE",4,3) == "DE "
SUBSTR("ABCDE",6,3) == " " ;3 blanks
V = BIT_SCAN("1010101")
BIN(SUBSTR(V,2,3)) == "010"
SUBSTR(BYTES,1,100000)
;returns a byte string containing the first 100000 bytes of byte string
BYTES.
The function splits a text to a vector of substrings, or a bit string or a byte string into a vector of
integers that represent the values of bit or byte fields of given length.
If 'source' is a byte string, 'length' is the number of bytes in the byte fields. The values
1, 2 and 4 are allowed. 'length' may also be negative (-1, -2 or -4), in which case the
integers in the byte string are taken as signed, otherwise they are taken as unsigned. If
the length of 'source' is not a multiple of 'length', the excess bytes are ignored.
Default = 1.
'byte_order' Text keyword "BIG_ENDIAN" or "LITTLE_ENDIAN". The 'byte_order' argument
specifies the byte ordering of the byte string (see PACK_STR above). It should only be
used if the byte string has been imported from a foreign system. If omitted, the byte
string is supposed to have the byte ordering of the underlying architecture.
Value: A text or integer vector.
Examples:
UNPACK_STR("ABC") == ("A","B","C")
UNPACK_STR("ABCDE",2) == ("AB","CD","E")
UNPACK_STR(BIT_SCAN("0111")) == (0,1,1,1)
UNPACK_STR(BIT_SCAN("011011"),2) == (2,1,3)
UNPACK_STR(BIT_SCAN("0110111"),2) == (2,1,3)
The function converts the lower case characters of 'text' to upper case according to the Unicode
standard.
Example:
UPPER_CASE("Västerås") == "VÄSTERÅS"
The bit functions manipulate integers and bit strings on bit level.
An integer consists of 32 bits. The bits are numbered 0 .. 31 from right to left, i.e., 0 = Least
Significant Bit (LSB) and 31 = Most Significant Bit (MSB). A bit string can be composed of up to
65 535 bits numbered 1 ... 65 535 from left to right (see Section 10).
See also the SUBSTR function in Section 10.5. This function can be used to extract a substring out
of a bit string.
The function returns the bit value of bit number 'b' in 'a'.
Examples:
BIT(3,0) == 1
BIT(-1,15) == 1
BIT(BIT_SCAN("010101"),5) == 0
If one of the arguments is a vector and the other is simple data, the operation is performed on the
simple data and each vector element. If both arguments are vectors, the operation is performed on
the corresponding elements. If the lengths of the vectors are unequal, odd elements are given
SUSPICIOUS_STATUS (see the Status Codes manual). Mixing integer and bit string values in one
operation is not allowed.
Examples:
BIT_AND(6,5) == 4
BIT_AND(BIT_MASK(0,2,4), BIT_MASK(1,2,4)) == BIT_MASK(2,4)
The function calculates an integer by setting the bits numbered 'b' in 'a' to zero.
Examples:
BIT_CLEAR(3,0) == 2
BIT_CLEAR(2,0) == 2
BIT_CLEAR(BIT_SCAN("01111"),2,4,5) == BIT_SCAN("00100")
Examples:
BIT_COMPL(0) == -1
HEX(BIT_COMPL(HEX_SCAN("207F"))) == "DF80"
BIT_COMPL(BIT_SCAN("0101")) == BIT_SCAN("1010")
The function calculates an integer number by setting the given bits to 1 and all the others to 0.
'b1', 'b' Bit numbers. Up to 32 integer values in the range 0 ... 31.
Value: An integer.
Examples:
BIT_MASK() == 0
BIT_MASK(0) == 1
BIT_MASK(4,0) == 17
If one of the arguments is a vector and the other is simple data, the operation is performed on the
simple data and each vector element. If both arguments are vectors, the operation is performed on
the corresponding elements. If the lengths of the vectors are unequal, odd elements are given
SUSPICIOUS_STATUS (see the Status Codes manual). Mixing integer and bit string values in one
operation is not allowed.
Examples:
BIT_OR(6,5) == 7
BIT_OR(BIT_MASK(0,2,4), BIT_MASK(1,2,4)) == BIT_MASK(0,1,2,4)
The function calculates an integer by setting the bits numbered 'b' in 'a' to one.
Examples:
BIT_SET(0,3) == 8
BIT_SET(-1,15) == -1
BIT_SET(BIT_SCAN("0101"),1,3) == BIT_SCAN("1111")
Creates a bit string by setting given bits to 1 and the other ones to 0.
'length' An integer, 1 ... 65 535. The number of bits in the bit string.
'b' Up to 31 integer values in the range 1 ... 'length'. The numbers of the bits to be set to 1.
Value: Bit string.
Example:
BIT_STRING(5,1,3,5) == BIT_SCAN("10101")
If one of the arguments is a vector and the other is simple data, the operation is performed on the
simple data and each vector element. If both arguments are vectors, the operation is performed on
the corresponding elements. If the lengths of the vectors are unequal, odd elements are given
SUSPICIOUS_STATUS (see the Status Codes manual). Mixing integer and bit string values in one
operation is not allowed.
Examples:
BIT_XOR(6,5) == 3
BIT_XOR(BIT_MASK(0,2,4), BIT_MASK(1,2,4)) == BIT_MASK(0,1)
The function creates a vector by appending 'data' to the contents of vector 'v'. If 'data' is a vector, the
elements of 'data' are appended to 'v' resulting to a vector whose length is the sum of the argument
vectors. If 'data' is of any other data type, the length of the resulting vector is one greater than the
length of 'v' and the last element gets the contents of 'data'.
'v' A vector.
'data' Any SCIL data type.
Value: A vector.
Example:
V1 = (1,2,3)
V2 = (4,5)
APPEND(V1,V2) ;returns (1,2,3,4,5)
APPEND(V1,6) ;returns (1,2,3,6)
The vector 'v' must be arranged in ascending or descending order. Its elements must be all numeric
(integer or real), all time values, all text values or all Boolean values.
If the vector contains more than one element by value 'value', the function returns the index of any of
them.
The validity of vector 'v' is not checked. If the vector is not arranged, the function may or may not find
the value. If the data type rules are violated, the function may fail by status
SCIL_INCOMPATIBLE_TYPES, or it may find the requested value or return a zero.
To search an unordered vector by its contents, see function FIND_ELEMENT. When the vector is
long, BINARY_SEARCH is much faster than FIND_ELEMENT and should therefore be used
whenever possible.
Example:
V = ("AB","CD","CD","EF")
I = BINARY_SEARCH(V,"EF") ;returns 4
I = BINARY_SEARCH(V,"CD") ;returns 2 or 3
I = BINARY_SEARCH(V,"ab") ;returns 0 (the search is case-
sensitive)
Classifies the elements of a vector into size classes and returns the counts of each class.
The range 'low' .. 'high' is divided into 'n' size classes of equal length ('high' - 'low')/'n'. The function
calculates the count of elements of 'v' in each class. If an element in 'v' is smaller than or equal to
'low', it is counted to the lowest class. Elements larger than or equal to 'high' are counted to the
highest class. An element on a class boundary is classified to the upper class.
Example:
Each element n of the result vector is set to the sum of the n first elements of the argument vector.
The function uses double precision (64-bit) floating point arithmetics internally to achieve the best
possible accuracy.
Example:
Example:
V = (1,3,5,7,9)
I = (6,2,4,0,4)
R = DELETE_ELEMENT(V,I) ;returns vector (1,5,9)
Example:
V = ("AB","CD","EF","CD")
I = FIND_ELEMENT(V,"CD") ;returns 2
I = FIND_ELEMENT(V,"CD",I + 1) ;returns 4 (second occurrence of
I = FIND_ELEMENT(V,"CD",I + 1) "CD")
;returns 0 (no more found)
The result is returned as a one-element vector to be able to return the status of the result: The status
of the only element is set to SUSPICIOUS_STATUS (= 1), if any of the elements of the argument
vector has a bad status (other than 0 or 3). If the argument vector is empty, or it contains no valid
elements, NOT_SAMPLED_STATUS is set.
Example:
V = (1,-5.6,3.3,37)
HIGH(V) == 37.0
LOW(V) == -5.6
HIGH_INDEX returns the index of the largest and LOW_INDEX the index of the smallest element in
the argument vector. If the argument vector is empty, or it contains no valid elements, the function
returns the value 0.
Examples:
V = (1,-5.6,3.3,37)
HIGH_INDEX(V) == 4
LOW_INDEX(V) == 2
Position 'pos' (or each element of it, if a vector) is given as the index of the element in vector 'v' that
is to succeed the inserted element in the result vector. As an example, if 'pos' is 1, the new
element(s) are inserted at the beginning of vector. If 'pos' specifies an index that is larger than the
length of 'v', the vector is expanded and elements that are not assigned a value will have status 10
(NOT_SAMPLED_STATUS).
The allowed combinations of 'pos' and 'contents' types are the following:
1. 'pos' is an integer
1.1. 'contents' is not a vector A new element with contents 'contents' is inserted to become
element 'pos' in the result vector.
1.2. 'contents' is a vector New elements with contents specified by elements of 'contents' are
inserted in the position specified by 'pos'.
2. 'pos' is an integer vector
2.1. 'contents' is not a vector New elements are inserted in positions specified by elements of
'pos'. All new elements are assigned the value 'contents'.
2.2. 'contents' is a vector The lengths of vectors 'pos' and 'contents' must be equal. Each
contents(i) is inserted in position pos(i). If same index appears more than once in vector
'pos', the new elements are inserted in the order they appear in 'contents'.
Examples:
The argument 'v' is interpreted as (x, y) coordinate pairs defining a curve. The 1st and 2nd element
define the first point (x, y) of the curve, the 3rd and 4th define the second point, etc. The x
coordinates must be given in ascending order. The y coordinate corresponding to the given 'x' is
interpolated from the curve and returned as a real number. If 'x' < x1, y1 is returned. If 'x' > xn, yn is
returned (where 'n' denotes the number of coordinate pairs in the vector).
Examples:
Inverts a curve.
The elements in 'v' are interpreted to define a monotonously ascending curve y = y(x), where the
index of the vector represents the x-coordinate (1.0 .. length(v)) and the element value represents the
y-coordinate. The INVERSE function inverts this curve, i.e. solves the curve x = x(y) by linear
interpolation.
The numeric solution is returned in the resulting vector elements so that the i:th element gives the x-
coordinate corresponding to y = 'low' + i * ('high' - 'low')/'n'. If y < v(1), value 1.0 is assigned. If y >
v(n), where n is the length of 'v', value n is assigned.
Examples:
A(1) = 3.0
A(2) = 4.0
A(3) = 9.0
X = INVERSE(A,5,0.0,10.0)
;The vector X now consists of the elements:
; 1.0 (y=2)
; 2.0 (y=4)
; 2.4 (y=6)
; 2.8 (y=8)
; 3.0 (y=10)
For y=2, x gets the value 1.0, because this is the lowest possible value, and for y=10, x gets the
value 3.0, because this is the highest possible value.
This function calculates the sum of all valid elements of a vector and divides the sum by their count.
The result is returned as a one-element vector to be able to return the status of the result: The status
of the only element is set to SUSPICIOUS_STATUS (= 1), if any of the elements of the argument
vector has a bad status (other than 0 or 3). If the argument vector is empty, or it contains no valid
elements, NOT_SAMPLED_STATUS is set.
The function uses double precision (64-bit) floating point arithmetics internally to achieve the best
possible accuracy.
Example:
V = (1,-5.6,3.3,37)
M = MEAN(V) ;Now M(1) == 8.925
If the index vector contains indices that are not present in the source vector (i.e. indices <= 0 or
indices that are greater than the length of 'v'), the corresponding elements in the result vector are
given NOT_SAMPLED_STATUS.
This function is frequently used in conjunction with functions SELECT, SORT and SHUFFLE.
Example:
#LOCAL P, N, S
P = (1,2,3,5,7,11,13,17,19)
N = (7,4,1)
S = PICK(P,N)
;Now S == (13,5,1)
Two elements are considered equal if all the following conditions are satisfied:
Text values are compared for equality according to the argument 'case_policy'.
The test for equality is recursive, i.e. if an element is a vector or list, its components are tested for
equality.
Example:
REMOVE_DUPLICATES(VECTOR("ABC","abc","DEF"),"case_insensitive")
;returns VECTOR("ABC","DEF")
Example:
V = (1,-5.6,3.3,37)
REVERSE(V)
;returns (37,3.3,-5.6,1)
Selects the elements of a vector or a list of vectors that fulfil given condition.
If 'source' is a vector, each element of the vector is matched for the given condition. The indices of
the matching elements are returned in the result vector. The syntax of the condition is the normal
SCIL expression syntax (see Section 4), but the value of the element is referred to by notation ().
Even the parentheses may be omitted, when the element is used as the left hand operand of a
relation. The expression must evaluate to a boolean value. Local variables and arguments of the
program may not be used as operands in the condition. Examples of valid conditions:
If 'source' is a list, the attribute values of each index are matched for the given condition. The syntax
of the condition is the normal SCIL expression syntax, but the value of the attribute element is
referred to by the attribute name. Examples of valid conditions:
"AB >= 1 AND CD <= 10" ;Selects all i: source.AB(i) >= 1 and
; source.CD(i) <= 10
"ABC > 10 OR ODD(EFG)" ;Selects all i: source.ABC(i) > 10 and
; source.EFG(i) is odd
"LN == ""A*""" AND OV == 1" ;Selects all i: source.LN(i) starts with A and
; source.OV(i) == 1
In text strings given in argument 'condition', wildcard character % can be used to represent any
single character and * to represent any sequence of characters. For example, "%B*C" matches with
any string that has letter B as its second character and letter C as its last character. To use wildcards,
"WILDCARDS" argument must be given, otherwise characters % and * have no special meaning.
Because SELECT returns the indices of the selected elements, function PICK is frequently applied to
the result to get the element values.
Examples:
@A = (1.0,2.5,7.0,10.6)
@I = SELECT(%A,">= 2 AND < 10")
;Now I == (2,3)
@S = SELECT(A:DOS(1..30),">0")
@A = PICK(B:DOV(1..30),%S)
;The registrations of the data object A that have a status >0 are
selected and
;the corresponding values of the data object B are picked.
;If 'source' is a list containing the attributes AB and CD the condition
can be written, ;e.g., ;"(AB > 10) AND (CD == 5)" which implies that the
indices which
;fulfil these conditions are selected.
SELECT(%V,"GET_STATUS () == 0")
;means that the elements with status == 0 in the vector %V are selected.
The function creates a vector of length n that contains integer values 1 to n in a random order.
Example:
SHUFFLED = PICK(V,SHUFFLE(LENGTH(V)))
Sorts a vector.
The function sorts a vector of numeric (integer, real or time) or text data into ascending order or
alphabetical order (ASCII code order), respectively. When text data is sorted, a substring of the text
may be selected to be used as the sort key.
'v' The vector to be sorted. The elements of the vector must be uniform, either numeric or
text.
'start' The start position (1 ... 65 535) of the sort key when text data is sorted. Default = 1, i.e.,
the first character of the text.
'length' The length of the sort key (1 ... 65 535). If omitted, the substring from start position to
the end of text is used as the key.
Value: An integer vector.
If the length of ‘v' is n, the length of the resulting vector is also n and it contains
integers 1 to n in the collating sequence of the elements of 'v'. For instance, if the first
element of the result vector is 25, the 25th element of the 'v' vector is the ‘smallest’
one.
If descending order is required, apply function REVERSE to the result of SORT. Function PICK is
frequently used to physically rearrange the elements into the sort order.
Example:
The function creates a vector that is otherwise identical to the argument vector, but the elements
specified by an index vector are replaced by a new value.
If 'new_value' is of simple (non-vector) data type, the elements listed by 'indices' are replaced by that
value. If 'new_value' is a vector, its elements replace the elements listed the index vector. If vectors
'indices' and 'new_value' are unequal in length, the extra elements of the longer vector are
disregarded. indices in the index vector that are greater than the length of 'v' are disregarded.
Example:
#LOCAL V, I, A, S, T
V = (1,2,3,4,5)
I = (1,3,5)
A = (6,7,8)
S = SPREAD(V,I,A)
T = SPREAD(V,I,0)
;Now
;S == (6,2,7,4,8)
;T == (0,2,0,4,0)
The functions calculate the sum of all (SUM), positive (SUM_POS) or negative (SUM_NEG) valid
elements of a vector, respectively.
The result is returned as a one-element vector to be able to return the status of the result: The status
of the only element is set to SUSPICIOUS_STATUS (= 1), if any of the elements of the argument
vector has a bad status (other than 0 or 3). If the argument vector is empty, or it contains no valid
elements, NOT_SAMPLED_STATUS is set.
The functions use double precision (64-bit) floating point arithmetics internally to achieve the best
possible accuracy.
Examples:
Examples:
#LOCAL V = (1,-5.6,3.3,37)
TREND(V,2)
;returns vector (3.3,37)
'element' An expression of any data type. Up to 2 000 000 elements can be given. Using
VECTOR without an argument list creates an empty vector.
Value: A vector with the given elements.
Example:
#LOCAL A = VECTOR()
;The variable A will be an empty vector.
Attributes that do not exist in 'list' are silently ignored, no error is generated.
Example:
The following statement reads the definition of a process object and removes attributes LN and IX
out of it.
Syntactically, LIST is actually not a function, because it does not have expressions as its arguments.
Example:
Example:
Example:
For efficiency and clarity, it is recommended to name the arguments using the #ARGUMENT
command. However, if the SCIL program is designed to take a varying number of arguments, this
function along with ARGUMENT_COUNT is frequently used to read the optional arguments.
Example:
#ARGUMENT A
#LOCAL B = 1 ;Default value for the second argument
#IF ARGUMENT_COUNT == 2 #THEN B = ARGUMENT(2)
Value: Vector with up to 32 elements. If the program call has no arguments, a zero length
vector is returned.
Example:
@A = ARGUMENTS
@B = DO(%PROGRAM, %A)
This function is recommended instead of #DO command, because arguments and return values are
not supported by #DO command.
Example:
STATUS_CODE("SCIL_ARGUMENT_OUT_OF_RANGE")
#ELSE #RETURN SIN(ANGLE) / COSA
Value: Text value depicting the current error handling policy: "STOP", "CONTINUE",
"IGNORE" or "EVENT".
Example:
#LOCAL PREVIOUS_ERROR_STATE
PREVIOUS_ERROR_STATE = ERROR_STATE
#ERROR IGNORE
; Run ignoring errors
...
#ERROR 'PREVIOUS_ERROR_STATE'
This function helps debugging and analysing SCIL applications. It returns the amount of memory pool
(as bytes) allocated for an expression, or for a variable (including the book keeping data and the
value of the variable).
Examples:
MEMORY_USAGE("EXPRESSION","ABC") == 8
MEMORY_USAGE ("EXPRESSION",1) == 0 ;since integer values are not allocated
'command' A text value. The command to be executed. The maximum length of command is 32 767
characters. The started application may limit the accepted length from this value.
'nowait' Integer 0 ... 16. If omitted, OPS_CALL starts the execution of the command and waits until it
has finished. If given, termination is not waited. The value of the argument has no meaning in
current implementation. The allowed range is preserved for compatibility.
'options' One or two keywords in any order:
Table continues on next page
The option argument values "CLIENT" and "SERVER" are ignored in systems running an operating
system older than Windows Vista or Windows Server 2008. The following applies to newer operating
systems only.
The option argument "SERVER" specifies that the command is to be executed in the session of the
system server (Windows session #0, where the MicroSCADA service is running). The value
"CLIENT" specifies that the command is to be executed in the caller's session. If the caller runs in the
server session, the command is executed in the server session regardless of the argument value.
The default value for the argument is "CLIENT".
When OPS_CALL is executed in a client session (other than session 0), the started program has
access to the caller's desktop (if any), i.e. it may have a visible window and it may receive user input.
When the user logs out, any process started by OPS_CALL without "SERVER" argument is
terminated by the operating system.
When OPS_CALL is executed in the server session, the started program has no access to a
desktop. The program runs until it terminates itself or the MicroSCADA service is stopped.
'command' Text value containing the command to start the process, for example, "\tools\my_tool my_file
-my_option". The maximum length of command is 32 767 characters. The started application
may limit the accepted length from this value.
'directory' Optional text value containing the work or default directory to be used by the process. The
directory is given in OS dependent format (see PARSE_FILE_NAME function to obtain OS
directory names). An empty name, "", denotes the work directory of the caller. Default value =
"".
'options' One or two keywords in any order:
"WAIT" OPS_PROCESS waits until the command has finished.
"NOWAIT" OPS_PROCESS does not wait the command termination. This is the
default value.
"CLIENT" The command is executed in the caller’s session. This is the default
value. See below.
"SERVER" The command is executed in the server session. See below.
Table continues on next page
The functionality is close to that of OPS_CALL function. However, OPS_PROCESS does not start
the command interpreter, it simply runs the program given as an argument of the function call. In
Windows this means that only EXE files may be started this way. To execute BAT files, OPS_CALL
should be used.
For the meaning of the option argument values "CLIENT" and "SERVER", see the description of the
OPS_CALL function.
The compatibility with the old revision is enabled/disabled by compatibility issues. The
REVISION_COMPATIBILITY function overrides temporarily, in the current SCIL context, the revision
compatibility defined in the APL:BRC attribute. See the description of the APL:BRC attribute in the
System Objects manual.
Example:
#LOCAL RC
RC = REVISION_COMPATIBILITY ("FILE_FUNCTIONS_CREATE_DIRECTORIES", FALSE)
; WRITE_TEXT function used here
RC = REVISION_COMPATIBILITY ("FILE_FUNCTIONS_CREATE_DIRECTORIES", RC)
Value: A non-negative integer, status code. See the Status Codes manual.
The function reads and resets the internal ’last error’ indicator.
Example:
#LOCAL S
#ERROR IGNORE
S = STATUS
#SET ABC:PBI = 0
S = STATUS
#ERROR STOP
'apl' Integer value 0 ... 250, the logical application number. 0 = current application.
Value: A vector. Each element provides information about one AEP program invocation as a list with
the following attributes:
PROGRAM_NUMBER Integer, the AEP program number.
START_COMMAND Text, the command that was used in AEP_START to start
the program.
ARGUMENT Any type, the SCIL argument given to the program when
started.
START_TIME Time value, the time program was started.
PROCESS_NAME Text, the name of the executable,e .g. "TOPCAL.EXE".
PROCESS_ID Integer, the process id (PID) of the executing process.
This function may be used to supervise the execution of external programs. See also Section
10.10.4.
Writes a message into the system error log (SYS_LOG.CSV) and into the notification window.
In Windows, the names of available environment variables are shown by the Windows Command
Shell command set (without any arguments).
Examples:
COMPUTER = ENVIRONMENT("COMPUTERNAME")
WORKSTATION_COMPUTER = ENVIRONMENT("CLIENTNAME")
Value: A vector. Each element provides information about one IP program invocation as a list with
the following attributes:
PROGRAM_NUMBER Integer, the IP program number.
START_COMMAND Text, the command that was used in IP_START to start
the program.
ARGUMENT Any type, the SCIL argument given to the program when
started.
START_TIME Time value, the time program was started.
PROCESS_NAME Text, the name of the executable, for example, "IP.EXE".
PROCESS_ID Integer, the process id (PID) of the executing process.
This function may be used to supervise the execution of external programs. See also
AEP_PROGRAMS above.
If the function is called without arguments, the name of the operating system that is running is
returned.
The following table summarizes the values of the major and minor version numbers of current
Windows versions that run SYS600:
If the arguments do not match with any known operating system version, a question mark (?) is
returned.
Tools that display operating system information are encouraged to use this function. By using it, they
don’t have to be updated when new operating system versions are taken into use.
The function reads the value of the specified key from the HKEY_LOCAL_MACHINE section of the
registry. Only value types REG_SZ (text value) and REG_DWORD (integer value) are supported. In
case of a failure, one of the following status codes is returned in the STATUS attribute of resulting
value:
SCIL_REGISTRY_KEY_NOT_FOUND, SCIL_REGISTRY_VALUE_NOT_FOUND,
SCIL_REGISTRY_DATATYPE_NOT_SUPPORTED.
See operating system documentation for further information about registry keys, value names and
value types.
Example:
#LOCAL RESULT
RESULT = REGISTRY("READ","SOFTWARE\ABB\PAK
\SYS_500\MAIN_LICENSE","CUSTOMER")
#IF RESULT.STATUS == 0 #THEN .DO_SOMETHING(RESULT.VALUE)
#ELSE_IF RESULT.STATUS == STATUS_CODE("SCIL_REGISTRY_KEY_NOT_FOUND")
#THEN -
.MAIN_LICENSE_IS_MISSING
#ELSE .DO_SOMETHING_ELSE(RESULT.STATUS)
Returns the type and number of the process that is running this SCIL code.
For example, the start program of a picture can find out whether the picture is being displayed on a
monitor or printed.
This function can be used, for example, in the start program of a picture to determine whether the
picture is being displayed on a monitor or printed.
Example:
This program block first checks whether the picture is being printed or shown on the screen. If it is
printed, the PRINT_TRANSPARENT function prints a row containing the present time and the values
of attributes OX, CX and OV of a process object.
GUID-30B4FE18-53BD-49A4-97E3-58DF5006814D v1
'apl' is the application number
Attribute CODE is returned if the compilation succeeds (STATUS == 0). Attributes ERROR_LINE,
ERROR_LINE_NUMBER and ERROR_POSITION are returned if the compilation fails.
Value: Integer, 20
Value: Integer, 2 000 000 (10 000 in rev. 8.4.4, 1 000 000 in rev. 8.4.5 - 9.4)
Value: Integer, 63
Value: Integer, 10
Value: Integer, 20
Value: Integer, 10
Value: Integer, 2 000 000 (10 000 in rev. 8.4.4, 1 000 000 in rev. 8.4.5 - 9.4)
Value: Integer, 10
'apl' Integer value, the logical application number (0 = current). Both local and external
applications are supported.
'type' Text keyword value specifying the object type:
"P" Process object
"X" Scale object
"H" Event handling object
"F" Free type object
"D" Data object
"C" Command procedure object
"T" Time channel object
"A" Event channel object
"G" Logging profile objects
"B" Base system object
"OBJECT" Attribute info is requested from the named object given as the next
argument.
'subtype' If 'type' = "OBJECT", text value specifying the object name.
Otherwise, its value depends on the 'type':
'type' = "P": Integer 0 or keyword value "COMMON". The properties of the
common attributes of process objects are returned.
Table continues on next page
Integer >0, taken as the process object type PT. The properties of
the PT specific attributes are returned.
Text value, either the two-letter mnemonic name of a predefined
process object type or the name of the F-object describing the type.
The properties of the PT specific attributes are returned.
If the 'subtype' argument is omitted, the properties of the attributes of
the process group are returned.
'type' = "B": Text value, the three-letter mnemonic name of the base system type.
'type' = "H": Text value "SYS" or "AEC", the three-letter value of the HT (Event
Handling Type) attribute. If empty or omitted, all attributes are
considered.
'type' = "G": Text value "OBJECT", "DATABASE" or "HISTORY", the value of the
PT (Profile Type) attribute.
Other types: Omitted or an empty text.
'selection' Text value that selects the attributes whose properties are returned:
"ALL" All attributes. This is the default value.
"CONFIGURATION" Configuration attributes. For application objects,
these are the attributes returned by the FETCH
function.
"DYNAMIC" Dynamic attributes.
aa The two-letter name of the attribute, whose
properties are returned.
Value: A list value with the following attributes, if 'selection' = aa, otherwise a vector of such list
values:
SHORT_NAME The two-letter name of the attribute
LONG_NAME The two-word name of the attribute
DESCRIPTION The text identifier of the description of the attribute.
ACCESS Text vector containing one or more of the following
keywords: "READ", "WRITE", "SET", "MODIFY",
"SUBSCRIBE". See below.
VALUE_TYPE The data type of the attribute. See below.
DEFAULT The default value of the object attribute. Omitted if
the attribute is not a configuration attribute or the
attribute has no default value.
VECTOR_LENGTH The maximum length of the vector attribute.
Omitted if not a vector.
ELEMENT_TYPE The data type of the elements of the vector
attribute. Omitted if not a vector. See below.
ELEMENT_DEFAULT The default value of the elements of the vector
attribute. Omitted if not a vector or the attribute is
not a configuration attribute or the elements have
no default value.
The VALUE_TYPE or the ELEMENT_TYPE of the attribute is one of the standard SCIL data types or
one of the following:
Examples:
OBJECT_ATTRIBUTE_INFO(0, "D")
; The properties of all attributes of data objects
OBJECT_ATTRIBUTE_INFO(0, "D", "", "CONFIGURATION")
;The properties of the configuration attributes of data objects
OBJECT_ATTRIBUTE_INFO(0, "D", "", "LF")
;The properties of the LF attribute of data objects
OBJECT_ATTRIBUTE_INFO(0, "P", "COMMON")
;The properties of the common attributes of process objects
OBJECT_ATTRIBUTE_INFO(0, "P", "BI")
;The process object type specific attributes of binary input objects
OBJECT_ATTRIBUTE_INFO(2, "P", "FREETYPE")
;The process object type specific attributes of objects of type
FREETYPE
OBJECT_ATTRIBUTE_INFO(0, "OBJECT", "ABC:P1")
;The properties of all attributes of the object ABC:P1
OBJECT_ATTRIBUTE_INFO(0, "B", "STA")
;The properties of the attributes of the STA base system objects
Examples:
STATUS_CODE("SCIL_UNDEFINED_VARIABLE") == 188
STATUS_CODE_NAME(188) == "SCIL_UNDEFINED_VARIABLE"
STATUS_CODE("NO_SUCH_ERROR_CODE") == -1
STATUS_CODE_NAME(-1) == ""
This function validates a given text string as a VS object, an application object, a window, a picture or
a variable name. If the name is OK, integer zero is returned. Otherwise an appropriate SCIL status
code is returned. Only the validity of the name is checked, existence of the object is not verified.
Example:
#LOCAL STATUS
#LOCAL INPUT_STRING = "A_B_C"
STATUS = VALIDATE("VS_OBJECT_NAME",INPUT_STRING)
#IF STATUS == 0 #THEN ROOT.CREATE_NEW_OBJECT(INPUT_STRING)
#ELSE MESSAGES.SHOW("INVALID OBJECT NAME: " + STATUS_CODE_NAME(STATUS))
The function returns the status code the base system would return, if an object by the given object
type and address would be created. In case of an address overlap, it reports the conflicting process
object.
'apl' Integer value, the logical application number (0 = current). Both local and external
applications are supported.
'pt' Integer value, the process object type:
3 BI
5 BO
6 DI
7 DO
Table continues on next page
9 AI
11 AO
12 DB
13 PC
14 BS
15 FT
16 OE
17 NT
'un' Integer value, the unit number.
'oa' The object address. Either an integer value, the OA attribute of the object, or a text value, the
IN attribute of an OPC object
'subaddress' The object subaddress. Either an integer value, the object bit address (OB attribute), or a text
keyword "IN" or "OUT" for OPC objects. "IN" stands for the input object by the item name 'oa',
"OUT" for the output object by the item name 'oa'. Default value 16 (no bit address) for
numeric addresses, "IN" for textual (OPC) addresses.
'self' A list with the following attributes:
LN Text, the logical name of the process object being validated
IX Integer, the logical index of the process object being validated
This attribute may be specified when the object address of an existing process object is
changed. Address overlap is not reported if the conflicting process object is 'self'.
Value: A list with the following attributes:
STATUS Integer status code, the result of validation:
0 The address is valid, no conflict.
2129 PROF_PT_ATTRIBUTE_OUT_OF_RANGE
2131 PROF_BIT_ADDRESS_MISSING
2134 PROF_BIT_ADDRESS_NOT_ALLOWED
2136 PROF_PHYSICAL_ADDRESS_OVERLAP See the attributes LN and IX below.
2314 PROF_OBJECT_ADDRESS_NOT_ALLOWED
The following two attributes are returned only when STATUS = 2136:
LN Text, the logical name of the overlapping object.
IX Integer, the index of the overlapping object.
This section describes the SCIL functions that are related to translating different application texts into
different languages.
The translations of the texts included in the Visual SCIL objects, such as button labels, menu texts
etc., are normally defined by using the Dialog Editor and stored in the same objects. The function
TRANSLATE is used to translate the texts into the operator's language.
The translations of other application texts, such as texts describing process objects and their states,
are stored in text databases. These texts are translated explicitly by the TRANSLATION function, or
usually implicitly by referencing a language sensitive attribute of the object.
It is recommended, but not required, that the two-letter language identifiers defined by the ISO
standard 639 are used by the applications.
When ISO 639 language identifiers are used, the system is able to map the Windows language id's,
which are derived from the Windows locale id's, to the language identifiers of the SYS600
applications. Consequently, the OPC clients connected to the OPC Data Access Server may define
their language by the means specified in the OPC standard, and the base system automatically
converts the Windows language id's to the ISO 639 language identifiers.
Afrikaans AF LANG_AFRIKAANS
Albanian SQ LANG_ALBANIAN
Arabic AR LANG_ARABIC
Armenian HY LANG_ARMENIAN
Assamese AS LANG_ASSAMESE
Azerbaijani AZ LANG_AZERI
Basque EU LANG_BASQUE
Byelorussian BE LANG_BELARUSIAN
Bengali BN LANG_BENGALI
Bulgarian BG LANG_BULGARIAN
Catalan CA LANG_CATALAN
Chinese ZH LANG_CHINESE
Croatian HR LANG_CROATIAN
Czech CS LANG_CZECH
Danish DA LANG_DANISH
Dutch NL LANG_DUTCH
English EN LANG_ENGLISH
Estonian ET LANG_ESTONIAN
Faroese FO LANG_FAEROESE
Persian FA LANG_FARSI
Finnish FI LANG_FINNISH
French FR LANG_FRENCH
Georgian KA LANG_GEORGIAN
German DE LANG_GERMAN
Greek EL LANG_GREEK
Gujarati GU LANG_GUJARATI
Hebrew HE LANG_HEBREW
Hindi HI LANG_HINDI
Hungarian HU LANG_HUNGARIAN
Icelandic IS LANG_ICELANDIC
Indonesian ID LANG_INDONESIAN
Italian IT LANG_ITALIAN
Japanese JA LANG_JAPANESE
Kannada KN LANG_KANNADA
Kashmiri KS LANG_KASHMIRI
Table continues on next page
Kazakh KK LANG_KAZAK
Korean KO LANG_KOREAN
Latvian LV LANG_LATVIAN
Lithuanian LT LANG_LITHUANIAN
Macedonian MK LANG_MACEDONIAN
Malay MS LANG_MALAY
Malayalam ML LANG_MALAYALAM
Marathi MR LANG_MARATHI
Nepali NE LANG_NEPALI
Norwegian NO LANG_NORWEGIAN
Oriya OR LANG_ORIYA
Polish PL LANG_POLISH
Portuguese PT LANG_PORTUGUESE
Punjabi PA LANG_PUNJABI
Romanian RO LANG_ROMANIAN
Russian RU LANG_RUSSIAN
Sanskrit SA LANG_SANSKRIT
Serbian SR LANG_SERBIAN
Sindhi SD LANG_SINDHI
Slovak SK LANG_SLOVAK
Slovenian SL LANG_SLOVENIAN
Spanish ES LANG_SPANISH
Swahili SW LANG_SWAHILI
Swedish SV LANG_SWEDISH
Tamil TA LANG_TAMIL
Tatar TT LANG_TATAR
Telugu TE LANG_TELUGU
Thai TH LANG_THAI
Turkish TR LANG_TURKISH
Ukrainian UK LANG_UKRAINIAN
Urdu UR LANG_URDU
Uzbek UZ LANG_UZBEK
Vietnamese VI LANG_VIETNAMESE
Uzbek UZ LANG_UZBEK
Vietnamese VI LANG_VIETNAMESE
When a SCIL context is created, it is assigned to an initial language according to the following rules:
1. If the context is owned by a monitor, i.e. it is a SCIL context of a picture or a Visual SCIL object,
the LA (Language) attribute of the monitor (MON:BLA) defines the initial language.
2. If the context is not owned by a monitor, the LA attribute of the application (APL:BLA) defines
the initial language of the SCIL context.
The language may later be changed by the SET_LANGUAGE function. This function may also be
used to restore the initial language of the SCIL context.
When SYS600 is accessed via the OPC Data Access Server, the language is chosen by the
functions specified in the OPC standard. See the System Objects manual for the descriptions of the
LA attributes.
When a language sensitive attribute of an external application is evaluated (by using the
APL-APL communication), the attribute is translated into the language of the external
application, by default. If an explicit translation into another language is wanted, the
language of the SCIL context must explicitly be set by the SET_LANGUAGE function
before the evaluation of the attribute.
The translations of application texts are stored in data files called text databases.
The databases have three different scopes for different needs of software components using
translated texts:
1. The application text database APL_TEXT.SDB is designed to contain the site-specific texts of
the application.
2. The text databases listed by the application attribute APL:BTD are to be used by various
software products, such as LIBxxx products, and their localizations.
3. The system text database SYS_TEXT.SDB is delivered with the SYS600 base software and
should not be modified.
The databases are searched in the scope order, APL_TEXT.SDB first and SYS_TEXT.SDB last.
The text databases are organized as SCIL databases, where the text identifier acts as the section
name. The databases are maintained by the Text Translation Tool, or directly by using the SCIL
function DATA_MANAGER, see the example below.
Example:
The following piece of SCIL code creates a translation of the text identifier "IDClosed" into a couple
of languages:
#local db,-
ok = 0,-
result,-
id,-
translations,-
close_result
id = "IDClosed"
translations = list(EN = "Closed", DE = "Geschlossen", FI = "Kiinni")
db = data_manager("OPEN", "APL_TEXT.SDB")
#if db.status <> ok #return db.status
'language' A text keyword, language identifier as defined in the ISO standard 639.
Value: A text keyword, the language of the SCIL context before the function call.
The function does not check that the language identifier is a valid ISO 639 language identifier, nor
does it check that the language is really supported by the application.
If the 'language' argument is an empty string, the initial language of the SCIL context is restored.
'text' A text value, a reference to a text identifier defined in the Dialog Editor, or a vector of
such text identifiers. The reference starts with an @ character.
'language' A text keyword, language identifier as defined in the ISO standard 639.
Value: A text or a text vector value, the translated text(s).
If there is no initial @ character in 'text', no translation is done, but the text is returned
as such. If there are two initial @ characters, one of the @ characters is removed from
the resulting text, but no translation takes place.
The function can only be used in user interface objects (Visual SCIL objects and pictures). The
function searches the current dialog or dialog item (object THIS) for the text reference. If either the
text reference or the language is not found, the parent object is searched, and so on, up to the object
that was loaded with .LOAD command.
The 'language' argument is used only if the language selected for the monitor should be overridden.
If no 'language' argument is given, the language of the SCIL context is used (see above).
'id' A text value, the identifier of the text to be translated, or a vector of such identifiers.
The identifier is case-sensitive, may be of any length and may contain any characters.
'language' A text keyword, language identifier as defined in the ISO standard 639.
'Value:' A text or a text vector value, the translated text(s).
Normally, the function is used without the 'language' argument. In this case, the language of the SCIL
context is used (see above). If no translation into the language is found, the English translation is
returned, if any.
If the target language is explicitly given as the argument 'language' and the translation is not found,
no automatic translation into English is performed.
If no translation into the requested language is found, the function returns the text identifier as such.
Example
The functions in this section are used for debugging SCIL programs. Tracing means recording of all
SCIL statements that are executed. The tracing is started by the TRACE_BEGIN function and
stopped by TRACE_END. If TRACE_BEGIN is called while tracing is already on, the second call is
ignored but counted: two TRACE_ENDs are needed to stop tracing. Functions TRACE_PAUSE and
TRACE_RESUME are used to skip tracing of uninteresting parts of the program execution.
The statements that contain variable expansions (macros), are recorded in their expanded form.
Each line is preceded by the depth of the control structure hierarchy to help find matching BLOCKs
and BLOCK_ENDs etc. Optionally, a time tag is inserted at the beginning of each line.
Example:
'filename' Text or byte string (file tag). The name of the file where the trace output is written. See
Section 6.5.1 for file naming.
'append' Text keyword "APPEND". If given, the trace output is appended to the file if it already
exists.
'time_tags' Text keyword "TIME_TAGS". If omitted, no time tags are written.
'no_cyclics' Text keyword "NO_CYCLICS". If given, cyclic methods of Visual SCIL objects and
update programs of pictures are not traced.
Value: Integer value. The status of file creation (0 = successful).
The keyword arguments 'append', 'time_tags' and 'no_cyclics' may be given in any order.
Value: Integer value. The status of closing the trace file (0 = successful).
Example:
The value, status and registration time of two indices of process object BREAKER1 are read. Note
that this code is not equivalent to the following:
@OV10 = BREAKER:POV10
@OS10 = BREAKER:POS10
@RT_STR10 = TIMEMS(BREAKER:PRQ10)
@OV22 = BREAKER:POV22
@OS22 = BREAKER:POS22
@RT_STR22 = TIMEMS(BREAKER:PRQ22)
Use of APPLICATION_OBJECT_ATTRIBUTES guarantees that the attribute values are from the
same moment of time. In the latter example, the database may have been updated between the first
and last command.
Because of modifications to types "P" and "IX", the behaviour in revision 8.4.2 is not fully
compatible with 8.4.1. Types "P" and "IX" no longer count process objects of user defined
types.
Example:
Example:
'apl' Integer. The logical number of the application to navigate in. 0 = current application. Both
local and external applications are supported.
'type' Text keyword. Object type: "P", "IX", "UP", "IX_AND_UP", "H", "X", "F", "D", "C", "T", "A" or
"G".
"P" Process object groups.
"IX" Indices of process objects of predefined types.
"UP" Process objects of user defined types.
"IX_AND_UP" Process objects of both predefined and user defined
types.
"H" Event handling objects
"X" Scales.
"F" Free type objects.
"D" Data objects.
"C" Command procedures.
"T" Time channels.
"A" Event channels.
"G" Logging profiles.
'order' Text keyword. The search order given as a text expression:
"A" or "ALPHABETIC" Alphabetical order. When used with type "P", only group
names are included in the search. If used with type "IX"
or "IX_AND_UP", the indices are searched in name/
index order.
"I" or "INDEX" Index order (only for process objects of predefined
types). Searches the indices of the process object group
given as 'start'.
"P" or "PHYSICAL" Address order. Applicable only when 'type' is "IX", "UP"
or "IX_AND_UP".
"U" or "UNIT" Alphabetic (name/index) order within the unit given as
'start' (types "IX", "UP" and "IX_AND_UP" only).
Table continues on next page
The selection criterion is a boolean type expression composed of relations and logical
operators. The relations have an attribute as the left operand. All attributes can be included in
the expression. Vector type attributes are referenced by the item index. List types are
referenced using the list items' attribute name. In conjunction with text attributes, the wildcard
characters % and * can be used. % matches any character, * matches any sequence of
characters (including a zero length sequence).
Default = "".
The condition is evaluated in read-only mode.
'attributes' A text or text vector containing the name(s) of attribute(s) to be returned in addition to LN
(and IX or OT). The vector may contain vendor attributes, i.e. attributes named by the caller
and defined by SDDL (SCIL Data Derivation Language). See the example below. Default = ""
(no additional attributes).
'max' Maximum number of objects to be returned (integer). Default = 10 000.
Value: A list including the following attributes:
COUNT Integer value, number of objects returned
MORE Boolean value. TRUE if browsing was interrupted due to 'max' being
exceeded
LN Text vector, names of the objects
IX Integer vector, indices (types "IX" and "IX_AND_UP" only)
OT Text vector (values "D" or "C") (order "E" only)
Plus additional attributes defined by the 'attributes' argument.
The objects are returned in the order specified by 'order' even if backward browsing is
specified.
Because of modifications to types "P" and "IX", the behaviour in revision 8.4.2 is not fully
compatible with 8.4.1. Types "P" and "IX" no longer return process objects of user defined
types.
Example 1:
APPLICATION_OBJECT_LIST(0, "IX")
; All (or 10000 first) process objects (of predefined type)
APPLICATION_OBJECT_LIST(0, "IX", "UNIT", "", 5)
; All objects of unit 5
APPLICATION_OBJECT_LIST(0, "IX", "UNIT", "", 5, "AL == 1")
; Alarming objects of unit 5
APPLICATION_OBJECT_LIST(0, "IX", "UNIT", "", 5, "AL == 1",-
("OV", "OS", "RT_STR = TIMEMS(RQ)"))
;SDDL used here
; Alarming objects of unit 5,
; attributes LN, IX, OV, OS and RQ are read
Example 2:
The following piece of code reads and handles all the data objects of the application, 50 objects at a
time.
#LOCAL OBJECTS
#LOCAL START = ""
#LOCAL MORE_TO_COME = TRUE
#LOOP MORE_TO_COME
OBJECTS = APPLICATION_OBJECT_LIST(0, "D", "A", "", START, "", "", 50)
#IF OBJECTS.COUNT > 0 #THEN #BLOCK
.HANDLE_UP_TO_50_OBJECTS(OBJECTS.LN)
START = OBJECTS.LN(OBJECTS.COUNT)
#BLOCK_END
MORE_TO_COME = OBJECTS.MORE
#LOOP_END
Selects from a list of objects the ones that fulfil the given condition.
Example:
Lists the base system objects that fulfil the given condition.
'type' Text keyword. Object type: "SYS", "APL", "MON", "STA", "STY", "PRI", "NOD", "LIN".
'condition' A text containing the criterion for selecting objects.
The selection criterion is a boolean type expression composed of relations and logical
operators. The relations have an attribute as the left operand. All attributes can be included in
the expression. Vector type attributes are referenced by the item index. List types are
referenced using the list items' attribute name. In conjunction with text attributes, the wildcard
characters % and * can be used. % matches any character, * matches any sequence of
characters (including a zero length sequence).
Default = "".
The condition is evaluated in read-only mode.
'attributes' A text or text vector containing the name(s) of the attributes to be returned in addition to BM
(Base System Object Number). The vector may contain vendor attributes, i.e. attributes
named by the caller and defined by SDDL (SCIL Data Derivation Language). Default = "" (no
additional attributes).
'apl' Integer. The logical number of the external application that performs the query. This argument
is used to list the base system objects of a remote SYS600 system.
Value: A list containing the following attributes:
STATUS Integer, the SCIL status code of the operation. The following
attributes are returned only if STATUS = 0 (OK_STATUS).
COUNT Integer value, number of objects returned
BM Integer vector, object numbers of the objects
Plus additional attributes defined by the 'attributes' argument.
The function lists only the objects that do 'exist'. The rules for considering an object as an existing
one are the following:
Example:
These functions along with commands #CREATE, #MODIFY, #DELETE and #SEARCH (see Section
9.2.2 ) are used to do maintenance of application objects. Function FETCH may also be used to read
the attributes of base system objects.
'apl' Integer expression, 0 ... 250. The logical number of the application. 0 = the own
application. The function supports both local and external applications.
'type' Text expression. The type of the object: "P", "H", "X", "F", "D", "C", "T", "A", "G" or "B".
'name' Text expression. The name of the object.
'index' Integer expression, 0 ... 65 535. The index of a process object of a predefined type (not
obligatory). If 'index' is omitted or == 0 for process objects of the predefined types, the
function returns the attributes that are common to the process object group.
Value: A list containing the configuration attributes of the object, the dynamic run-time
attributes are not returned. If the named object does not exist, a list is returned with
only one attribute, IU, which has the value -1.
The function makes a list containing all configuration attributes of any application object (process
object, event handling object, scale, free type object, data object, command procedure, time channel,
event channel or logging profile).
Additionally, the function may be applied to a base system object. In this case, all the attributes of the
base system object are fetched.
Example:
@V = FETCH(0,"P","A",1)
;%V.LN has value "A"
;%V.IX has value 1
These functions are used to browse through the result of a search initiated with the #SEARCH
command. Process objects, data objects, command procedures, scales, time channels, event
channels, logging profiles and free type objects can be searched through. The functions require that
the search has been initiated with the #SEARCH command, see Section 9.2.2.
Example:
#LOCAL OBJ
#SEARCH 2 0 "P" "A" "A"
OBJ = NEXT(2)
!SHOW NAME OBJ.LN
The name of the process object group following A in alphabetical order is shown.
'apl' Integer, 0 ... 250. The logical application number. 0 = the own application. Only local
applications are supported.
'unit' Integer. The unit number of the process unit where the object is situated. This is the
station number as known to the application.
'address' Integer. Object address. The OA attribute of the process object.
'bit_address' Integer, 0 ... 15. Bit number (can be omitted). The OB attribute of the object.
Value: A list containing the configuration attributes of the object, the dynamic runtime
attributes are not returned. If the object does not exist, the list contains only one
attribute, IU, which has the value -1.
Example:
'apl' Integer, 0 ... 250. The logical application number. 0 = the own application. Both local and
external applications are supported.
'filter' A text containing a filter for selecting objects.
The filter is a boolean type expression composed of relations and logical operators. The
relations have an attribute as the left operand. All attributes, except vector and list type
attributes, can be included in the expression. In conjunction with text attributes, the wildcard
characters % and * can be used. % matches any character, * matches any sequence of
characters (including a zero length sequence). Default = "".
The filter is evaluated in read-only mode.
Value: A list containing the following integer attributes:
STATUS SCIL status code, 0 = OK_STATUS. The next attributes
are present only if STATUS = 0.
ACTIVE_NOACK Count of active alarms that do not require an
acknowledgement
(AL = 1, AR = 1, RC = 0)
Table continues on next page
If an analog input object is in a warning state and has a fleeting alarm, it is counted as FLEETING
until the alarm has been acknowledged.
'apl' Integer, 0 ... 250. The logical application number. 0 = the own application. Both local and
external applications are supported.
'lists' A text or text vector defining the lists to be returned. The following keywords or any
combination of them are available:
"ACTIVE_NOACK" The active alarms that do not require an
acknowledgement
(AL = 1, AR = 1, RC = 0)
"ACTIVE_ACKED" The acknowledged active alarms
(AL = 1, AR = 1, RC = 1)
"ACTIVE_UNACKED" The unacknowledged active alarms
(AL = 1, AR = 0, RC = 1)
"FLEETING" The fleeting (unacknowledged inactive) alarms
(AL = 0, AR = 0, RC = 1)
"LOW_WARNINGS" The low warnings of analog input objects
(AC > 0, AZ = 3)
"HIGH_WARNINGS" The high warnings of analog input objects
(AC > 0, AZ = 4)
"ACKED" The acknowledged alarms:
"ACTIVE_NOACK" +
"ACTIVE_ACKED"
(AL = 1, AR = 1)
"UNACKED" The unacknowledged alarms:
"ACTIVE_UNACKED" +
"FLEETING"
(AR = 0)
"ACTIVE" The active alarms: "ACTIVE_NOACK" +
"ACTIVE_ACKED" +
"ACTIVE_UNACKED"
(AL = 1)
"ALARMS" All alarms:
"ACTIVE" + "FLEETING"
"WARNINGS" All warnings:
"LOW_WARNINGS" +
"HIGH_WARNINGS"
Table continues on next page
If an analog input object is in a warning state and has a fleeting alarm, it is listed as FLEETING until
the alarm has been acknowledged.
Example:
STATUS 0 0
ACTIVE List of
COUNT 2
LN Vector("ABC", "DEF")
IX Vector(1, 3)
ALARM_TIME Vector("15-04-21 11:26:28.341", "15-04-21 11:26:14.236")
AC Vector(2, 4)
AR Vector(0, 1)
OV Vector(1, 999.1)
FLEETING List of
COUNT 0
Data objects functions read and write the history registrations of data objects.
'apl' Integer, 0 ... 250. The logical application number (0 = the own application).
External applications are supported.
'name' Text data. The name of the data object.
'index1' Integer, 1 ... 2 000 000. The index of the first record to be fetched.
'step' Integer, positive or negative. Defines the step between records to be fetched.
The default value = 1 (all records are fetched). If 'step' is negative, the values
are returned in reverse time order.
For example, if 'step' = 2, records 'index1', 'index1' + 2, 'index1' + 4, etc. are
fetched.
If 'step' = -2, records 'index1', 'index1' - 2, 'index1' - 4, etc. are fetched.
'count' Integer, 0 ... 2 000 000. The number of records to be fetched. 0 (default)
means all existing records up to 10 000.
'indices' Vector. An integer vector defining explicitly the records to be fetched.
'time1' Time data. The start of the time interval to be fetched.
'time2' Time data. The end of the time interval.
If 'time1' < 'time2', the values are returned in time order regardless of the sign
of 'step'. If 'time1' > 'time2', the values are returned in reversed time order
regardless of the sign of 'step'. The given time range is regarded as a semi-
open range. For example, if the range is given as 09.00.00-10.00.00, a
record sampled at 09.00.00 is included but a record sampled at 10.00.00 is
excluded (if shift = 0, see below).
'shift' Integer, 0 or 1.
0 No shift
1 A shift of one sampling interval.
Table continues on next page
When a time interval fetch is specified, the function expects that the history records are
stored in ascending time order. If not, the set of records included in the result is
unspecified.
Examples:
'apl' Integer, 0 ... 250. The logical application number. 0 = the own application. External
applications are supported.
'name' Text. The name of the data object.
'data' List. The values to be stored, 3 attributes:
OV Real vector: recorded values
RT Time vector: registration times
OS Integer vector: status codes
If the RT attribute is missing from 'data', the original registration times are kept. If the OS
attribute is missing, the status codes of the elements of OV vector are stored as the OS
attribute.
'index1' Integer, 1 ... 2 000 000. The index of the first record to be written.
'step' Integer. This argument defines the step between records to be stored. Default value = 1 (all
records are stored). If 'step' is negative, the values are stored in reverse time order.
Table continues on next page
For example, if 'step' = 2, records 'index1', 'index1' + 2, 'index1' + 4, etc., are stored.
If 'step' = -2, records 'index1', 'index1' - 2, 'index1' - 4, etc., are stored.
'indices' Integer vector. Defines explicitly the records to be written.
Value: Integer. A status code. See the Status Codes manual. 0 = OK.
Examples:
The history of the data object A in the current application is copied to the data object DATA in the
current application and to the data object A in application 2.
Process object query functions are used to browse the results of a process object query defined by
preceding #INIT_QUERY command.
These functions are more or less obsolete. Use more powerful SCIL functions
APPLICATION_OBJECT_LIST, APPLICATION_OBJECT_ATTRIBUTES and
APPLICATION_ALARM_LIST for a query of the process database and
HISTORY_DATABASE_MANAGER to browse the event history.
Value: Boolean data. TRUE = the query is completed. FALSE = the query is not completed.
The function tests whether all objects matching a process query initiated by the #INIT_QUERY
command (Section 9) have been read with the PROD_QUERY function.
Example:
If the query has been completed, the message READY is shown on screen. Otherwise, 20 more
process objects are handled.
'n' Integer, [-] 1 ... APL:BQL. The maximum number of process objects that are included in
the query. If the number is given with a negative sign, the browsing is performed
backwards.
Value: A list containing the following attributes:
Identification: LN (Logical Name), IX (Index), PT (Process Object
Type), OI (Object Identification), OX (Object Text)
Object value: OV (Object Value), OS (Object Status)
Alarm state: AL (Alarm), AS (Alarm State), AR (Alarm Receipt), AZ
(Alarm Zone)
Time stamps: RT (Registration Time), RM (Registration Milliseconds),
AT (Alarm Time), AM (Alarm Milliseconds), YT, YM
RTU attributes: SE (Selection), SP (Stop Execution), OF (Overflow),
Protocol attributes: BL, CT, OR, RA, RB, SB
Blocking: AB, HB, PB, UB, XB
Miscellaneous: RI, RX
In addition, when the query concerns the history buffer: CA (Changed Attribute)
The function returns attribute values of the process objects selected by the preceding #INIT_QUERY
command (see Section 9). The query concerns always the current application.
After one #INIT_QUERY, the function may be called several times. Each time it continues from where
it finished previously.
The attribute values of a certain attribute form a vector. For example, the LN attribute is a vector of all
object names included in the query. Vector elements with the same index refer to the same process
object.
Examples:
Attributes
Index LN IX OV
1 "TEMP" 1 63.0
2 "PH" 5 6.5
3 "SWITCH" 1 1
4 "SWITCH" 2 0
The attribute LN (logical name) constitutes the first vector, IX (index) the second one and OV (object
value) the third one.
When a SCIL context is deleted, the open query sessions are closed automatically. However, it is a
good practice to close the sessions explicitly by SCIL to save system resources.
This command opens a new query session and sets the query parameters to their default values
(described later). If already 10 sessions are open, status SCIL_TOO_MANY_HDB_SESSIONS is
returned in the STATUS attribute of the result.
If another than the current APPLICATION is specified, it has to be local (in same SYS) but its state is
allowed to be COLD.
If no application is specified, SET_DIRECTORY command must be used to tell the history database
manager where to find the database.
If a cold application or no application at all is specified, the user defined attributes of user defined
process objects are not returned, because there is no process database to find the attribute
descriptions of corresponding F-type objects.
This command closes the session by releasing all the resources associated to the session.
The period defines the time period whose database files are included in the query. A period may
contain up to 1000 database files. Status SCIL_PERIOD_TOO_LONG is returned, if this limit is
exceeded.
The arguments 'begin' and 'end' are used only to define the date: hours, minutes and seconds are
ignored.
When a session is opened, this parameter is set to point to the APL_ subdirectory of the application.
If no application is defined, the parameter is left empty.
This command sets the time window of the query. A time window may have an open beginning
and/or an open end, meaning all events older than 'end' or old events newer than 'begin',
respectively.
If both 'begin' and 'end' are non-zero, they may be given in any order.
If logging order is requested, the time window applies to attributes HT and HM of the event,
otherwise to attributes ET and EM.
The results of a query are returned in the order of 'direction': If "FORWARD", they are returned in
time order, if "BACKWARD", they are returned in reversed time order.
The time-out of a query specifies the maximum time a query may last. If it is exceeded, the query is
interrupted and the partial results found so far are returned.
10.14.31 HISTORY_DATABASE_MANAGER("SET_ATTRIBUTES",
session, attributes) GUID-BB7D5D0A-F0FF-4E0F-8342-8FA9D5E2D8A8 v1
History database information related to each event are described in the Application Objects manual.
Attributes LN, IX, OV, ET and EM do not have to specified, they are always included in the set. The
object type specific names (BI, BO, etc.) for the object value attribute are not used. If no application
is specified for the session, the user defined attributes of user defined process objects are not
returned by the query.
The initial value of the set is (LN, IX, OV, ET, EM).
The set may contain vendor attributes, i.e. attributes named by the caller and defined by SDDL (SCIL
Data Derivation Language). For example, "RT_STR = TIMEMS(RQ)" is a valid attribute definition,
which returns the formatted text representation of the registration time.
10.14.32 HISTORY_DATABASE_MANAGER("GET_PARAMETERS",
session) GUID-C86D3725-8882-4C12-A0C3-25301DA95C48 v1
PERIOD Two place vector containing the first and last date of the period, see
SET_PERIOD command.
WINDOW Two place vector containing the beginning and end of the time
window, see SET_WINDOW,
ORDER "LOG" or "EVENT".
DIRECTION "FORWARD" or "BACKWARD".
TIMEOUT Real value, the query time-out in seconds.
ATTRIBUTES Text vector, the attributes returned by the query.
CONDITION Text value, the query condition.
STATUS Integer value, SCIL status code.
To continue a query, the event id returned by the previous query (attribute LAST) should be used as
the argument 'start' of the subsequent query. The event identified by 'start' is not included in the
result.
The attribute DATA of the function result contains the event data read from the database as a list.
The attributes of the list are the ones specified by SET_ATTRIBUTES command. History database
information related to each event are described in the Application Objects manual. The value of each
attribute is a vector of length COUNT. If an event does not have a certain attribute, the corresponding
element in the vector has status PROF_ATTRIBUTE_DOES_NOT_EXIST. The list may be further
processed with SELECT function by the event list dialog, if needed.
When a query is interrupted by TIMEOUT and the query order is EVENT, it is not guaranteed that the
events returned by two subsequent queries are returned in exactly correct order. It is possible, that
events contained in database files not yet processed should have been included in the results of the
interrupted query.
The event identifiers returned by a query are valid only during the current period setting.
The following example reads the latest 20 events, then waits a second and reads the new ones. For
clarity, error handling is omitted.
Example:
The second query may miss a new event if its time-stamp is out of order.
History database information related to each event are described in the Application Objects manual.
This command writes an event into the history database. The attribute values to be written are given
in the list argument 'data'.
Attribute HT is used to specify the history database file, into which the event is written. The file is
created if it does not exist.
The attribute values to be written are given in the list argument 'data'. For details about command
parameters, see Section 10.14.36.
Example:
The NAME_HIERARCHY function is used in database tools to create a tree view of process objects
according to various naming attributes.
Constructs the tree hierarchy formed by given fully qualified hierarchical names.
Example 1:
Syntax "ON", order "SEPARATE". The delimiter is dot, duplicates are not allowed.
; LEAF_COUNT 1
; LEAF_NAMES Vector 1
; (1) "f"
; LEAF_INDEXES Vector 1
; (1) 4
; LEAF_COUNT 0
; ERRORS Vector 1
; (1) 5 ;The 5th name "a.b.c" is a duplicate
Example 2:
Syntax "ON", order "INTERLEAVED". The delimiter is dot, duplicates are not allowed. The same data
as in Example 1.
Example 3:
Mapping functions map the logical APL, PRI and STA numbers used by application SCIL programs to
corresponding physical (base system) object numbers, and vice versa.
The function uses the mapping attributes AP, PR and ST of the application object to do the mapping.
In the resulting value, a zero is returned for each physical object that does not have a logical
mapping in the application.
Example:
The function uses the mapping attributes AP, PR and ST of the application object to do the mapping.
In the resulting value, a zero is returned for each logical object that does not map to any physical
object.
Example:
'subfunction' Text keyword, the requested subfunction. The subfunctions are described in detail below.
'arg' Up to 2 subfunction specific arguments.
'apl' Integer, 0 ... 250. The logical application number. 0 = the own application. External
applications are supported. Optional, default value is 0.
Value: List:
STATUS Integer value, SCIL status code.
Subfunction specific return attributes.
In the following subfunction descriptions, the optional argument 'apl' is not repeated.
Value: List:
STATUS Integer value, SCIL status code.
SCHEMAS Text vector, names of supported schemas. Currently, only the POWER
schema is supported.
Value: List:
STATUS Integer value, SCIL status code.
MODELS Text vector, names of imported models.
Validates a model.
The structure and properties of SCIL databases are described in Section 6.6.
'file' A text or byte string value, the name or tag of the file to be created. Extension SDB is
recommended.
Value: A list with attributes:
STATUS An integer, the SCIL status code
HANDLE An integer, a handle to the file to be used in subsequent calls of the
function
Up to 10 databases may be concurrently open within a SCIL context.
VERSION Integer 2 or 3, the version of the file format
'file' A text or byte string value, the name or tag of the file to be opened
Value: A list with attributes:
STATUS An integer, the SCIL status code
HANDLE An integer, a handle to the file to be used in subsequent calls of the
function
Up to 10 databases may be concurrently open within a SCIL context.
VERSION Integer 2 or 3, the version of the file format
For compatibility, this function may be used to convert an old (Rev. 8.4.5) version 2 database to the
new (Rev. 9.0) version 3 format for faster access, or vice versa.
If a SCIL program does not close the file, it is automatically closed when the SCIL context of the
program is destroyed.
Deletes a section, both the name and the contents, from SCIL database.
If no 'component' is specified, the entire section is read. The components, i.e. attributes of lists and
indices or index ranges of vectors, are given in SCIL language syntax. Examples of valid component
descriptions:
The component description may be given as several arguments as well. The following examples are
equivalent to the last example above.
"ABC", 2, "DEF"
Note, that only one component is read even if more than one 'component' arguments are given.
These arguments are combined to locate the component deep in the SCIL data structure.
If no 'component' is specified, the entire section is written. See subfunction "GET" for description of
'component's.
If the specified component (attribute or vector element) does not exist in the database, it is created.
If no 'component' is specified, the entire content (but not the name) of the section is deleted. See
subfunction "GET" for description of components.
If the specified component is an element of a vector, the element is deleted. The length of the vector
will thus decrement by one.
If the specified component is a range of vector elements, the elements are deleted. The length of the
vector will thus decrement by the number of deleted elements.
'file' Text or byte string (file tag). The name of the parameter file. See Section 6.5.1 for file naming.
'section' Text. The name of the section.
'key' Text. The key of the parameter to deleted. If 'key' is omitted from the argument list, the whole
section is deleted.
Value: A list with one attribute:
STATUS An integer, the SCIL status code
This function is used to temporarily lock a file for use of only one SCIL context. This function is
mainly needed by tools (such as Dialog Editor) to prevent simultaneous modification of same data by
two users. All the SCIL tools accessing the file should use FILE_LOCK_MANAGER to synchronize
the access to the file, locking a file with FILE_LOCK_MANAGER does not prevent accessing of the
file by READ_TEXT, WRITE_TEXT or other SCIL functions.
'file' Text value containing the name of the file to be locked in OS dependent format (see
PARSE_FILE_NAME function to obtain OS file names).
Value: A text value containing:
"OK" Function successfully performed.
"LOCKED" LOCK failed because of an existing lock.
"BROKEN" UNLOCK detected that the file was not locked, i.e. broken by somebody
else.
"INVALID" The 'file' argument is invalid. This means that the name is not a valid file
name or the directory in the name does not exist or the access to it is
denied.
Notes:
• The file does not have to exist, actually 'file' argument is used as a unique identifier of the lock.
The argument is used a seed for a lock file name, which is generated by prefixing the file name
in 'file' by "_L_". For example, if 'file' is "C:\DATA\ABC.DAT", then the lock file name used is
"C:\DATA\_L_ABC.DAT". Therefore, the file name should not be extremely long.
• Two different 'file' arguments may refer to one and same lock. For example, if a logical drive K
points to directory "C:\DATA", then 'file' arguments "C:\DATA\ABC.DAT" and "K:\ABC.DAT"
denote the same lock.
• When a SCIL context is destroyed, all the locks it holds are automatically released by the base
system software.
• The function "BREAK" should be used with care. It should be used only after a program crash or
other such failure which has left the file locked.
The 'function' value "COMPACT" returns the same attributes as the 'function' value
"INFORMATION" (the values are those before the compacting) and in addition the following
attribute:
RECORDS Number of records copied.
The 'function' value "REBUILD" returns the same attributes as the 'function' value
"COMPACT" and in addition the following attribute:
DUPLICATES A text vector containing the key values that were found
duplicated in the source file. The corresponding records in the
output file may contain obsolete or otherwise bad data, they
should be checked. Max. 1000 duplicate keys are reported.
If the status block of the file was corrupted, attributes VERSION, USED_BLOCKS and
INDEX_LEVELS are not returned.
This function converts SYS600 keyed files from a format to another, saves corrupted files and does
some other file maintenance. It can handle one file at a time, the 'file' argument, and provides the
following operations selected by the 'function' argument:
Example:
@RESULT = KEYED_FILE_MANAGER("COMPACT",-
"/APL/TIPPERARY/APL_/APL_PROCES.PRD",-
"/APL/TIPPERARY/APL_V2/APL_PROCES.PRD",-
2)
; Converts the process database of application TIPPERARY to file format 2.
Converts SCIL path names and file names to operating system file names.
Notes:
• The directory name in SCIL format may be given with or without the trailing "/" (see however
note 3).
• The OS dependent directory name may be given with or without the trailing OS dependent
delimiter (for example, "\").
• In SCIL, depending on the context, "PICT" may mean either the path PICT or the directory
"/APL/xxx/PICT". To resolve the ambiguity, "PICT" is used for the path and "PICT/" for the
directory.
• If a path name is given as 'name' and file is not given, the function returns the first directory in
the path.
• If a path name is given as 'name' and 'file' exists, the complete file path name of the found file is
returned.
• If a path name is given as 'name' and 'file' does not exist, the returned path name contains the
first directory of the logical path, i.e. the returned value is the complete would-be name of the file
if created.
• The arguments of the function are case-insensitive. The case of the returned value is OS
dependent. In NT, upper case string is returned.
'file' Text or byte string (file tag). The name of the file. See Section 6.5.1 for file naming.
'start' Positive integer value, defaults to 1. Specifies the byte position within the file where to
start reading.
'length' Non-negative integer value. Specifies the maximum number of bytes to be read.
Default value = 8 388 600 (max. byte string length).
Return value: Byte string containing the read data.
Using this function any file may be read as a sequential binary file, i.e. an unstructured string of
bytes. It is usually used to import data generated by some external application or to read a compiled
SCIL program from a file
The function reads a text file as columns and stores them in a vector where each element is a text
vector containing the text of one column.
'file' Text or byte string (file tag). The name of the file. See Section 6.5.1 for file naming.
'pos' Integer vector. Specifies the start positions of the columns to be read (1 ... 65 535). The
positions do not have to be in ascending order.
'width' Integer vector. The 'width' argument must be of the same length as the 'pos' argument.
Specifies the column widths (1 ... 65 535). The columns are allowed to overlap.
'start' Positive integer value, defaults to 1. Specifies the line number within the file where to
start reading.
'count' Non-negative integer value, defaults to 10 000. Specifies the maximum number of lines
to be read.
Value: A vector of the same length as 'pos' and 'width'. Each element of the vector is a text
vector containing the text of one column.
The function supports Unicode files, UTF-8 and UTF-16 Byte Order Marks (BOM's) are recognized.
'file' Text or byte string (file tag). The name of the parameter file. See Section 6.5.1 for file naming.
'section' Text. The name of the section.
'key' Text. The key of the parameter.
'default' Text. The value to be returned if 'section' or 'key' does not exist in the specified file.
Value: A list with the following two attributes:
STATUS The status code of the read operation.
VALUE The value of the parameter. Returned only if STATUS = 0.
If the given section or key does not exist, error code SCIL_SECTION_DOES_NOT_EXIST or
SCIL_KEY_DOES_NOT_EXIST is returned in the STATUS attribute.
Example:
'file' Text or byte string (file tag). The file name. See Section 6.5.1 for file naming.
'start' Positive or negative integer. If positive, it is the number of the first line to be read from
the text file counted from the beginning of the file (1 = the first line). If negative, it is the
number of the last line to be read counted from the end of the file (-1 = the last line).
Default: 1.
'number' Integer, 0 ... 1 000 000. The number of lines to be read from the file.
0 = nothing is read. Default: 1000.
Value: A text vector containing the lines read from the file.
If 'start' is omitted, reading starts from the beginning of the file. If 'number' is omitted, reading is
performed to the end of file, or until 1000 lines have been read.
The function supports Unicode files, UTF-8 and UTF-16 Byte Order Marks (BOM's) are recognized.
For compatibility reasons, this function does not support lines longer than 255 characters.
Longer lines are silently truncated to 255 characters. This function is now more or less
obsolete, use the function TEXT_READ instead.
Example:
See #REP_LIB command in Section 9.2.4 for details of logical representation libraries.
'file_name' Text or byte string (file tag). The name of the file. See Section 6.5.1 for file naming.
"DELETED" Optional keyword "DELETED".
Value: A list value containing the following attributes:
STATUS status code (0 = OK).
QUEUED Boolean value indicating whether the file was queued for shadowing.
The function first locates the file. The status is returned in attribute STATUS. Then, it checks whether
the file belongs to an application that is currently shadowed. If yes, the file is queued for shadowing
(the function does not wait for the completion of shadowing) and TRUE is returned in attribute
QUEUED. If not, FALSE is returned and nothing is done.
If optional keyword "DELETED" is specified, the file is expected to be already deleted from the local
system. In this case the file delete operation is only queued for shadowing.
This function should be used if a file is created in an application directory (a directory below the
directory "/APL/application") using a non-SYS600 program, for example, by a tool that copies files
using operating system utilities.
'file' Text or byte string (file tag). The file name. See Section 6.5.1 for file naming.
'start' Positive or negative integer. If positive, it is the number of the first line to be read from the text
file counted from the beginning of the file (1 = the first line). If negative, it is the number of the
last line to be read counted from the end of the file (-1 = the last line). Default: 1.
'number' Integer, 0 ... 2 000 000. The number of lines to be read from the file.
0 = nothing is read. Default: 10 000.
Value: A list with the following attributes:
STATUS SCIL status code, 0 = OK
TEXT Text vector containing the read data (up to 2 000 000 lines, each line up to
65 535 characters)
LONGEST Integer, the index of the longest line in TEXT
MORE Boolean, TRUE if there are more lines to be read, otherwise FALSE
If 'start' is omitted, reading starts from the beginning of the file. If 'number' is omitted, reading is
performed to the end of file, or until 10 000 lines have been read.
The attributes TEXT, LONGEST and MORE are returned only when STATUS = 0.
The function supports Unicode files, UTF-8 and UTF-16 Byte Order Marks (BOM's) are recognized.
'file' Text or byte string (file tag). The name of the file. See Section 6.5.1 for file naming.
'data' Byte string value containing the data to be written.
'append' Integer value 0 or 1, defaults to 0. If 0, a new file is created. If 1, the data are appended
to the file, if it already exists.
Value: Integer value. The status code of file write operation, 0 if OK.
Using this function a byte string value may be written as a sequential binary file, i.e. an unstructured
string of bytes. It is usually used to export data to an external application or to store a compiled SCIL
program in a file.
'file' Text or byte string (file tag). The name of the file. See Section 6.5.1 for file naming.
'pos' Integer vector. Specifies the start positions of the columns to be written (1 ... 65 535). The
positions do not have to be in ascending order.
'width' Integer vector. Must be of the same length as pos. Specifies the column widths (1 ... 65 535).
The columns are allowed to overlap. If they do, a column earlier in the list will be covered by
the later one. Any data written past character position 65 535 are lost. Possible gaps
between the columns are filled with space characters.
'data' Vector value of the same length as 'pos' and 'width'. Each element of the vector is a text
vector containing the text of one column. The element vectors must be of the same length.
'append' Integer value 0 or 1, defaults to 0. If 0, a new file is created. If 1, the data are appended to the
file, if it already exists.
'encoding' Text keyword, either "UTF" or "ANSI":
"UTF" The file is written in UTF-8 encoding with a BOM (Byte Order Mark). This is
the default value.
"ANSI" The file is written in extended ANSI encoding using the ACP (Active Code
Page) of the operating system. This value is used when the file is later read
by an application that is not Unicode aware.
When an existing file is appended, this argument is ignored. The encoding of the file is
reserved.
Value: Integer value. The status of the write operation, 0 if OK.
'file' Text or byte string (file tag). The name of the parameter file. See Section 6.5.1 for file naming.
'section' Text. The name of the section.
'key' Text. The key of the parameter.
'value' Text. The value to be assigned to the parameter.
'encoding' Text keyword, either "UTF" or "ANSI":
"UTF" The file is written in UTF-8 encoding with a BOM (Byte Order Mark).
"ANSI" The file is written in extended ANSI encoding using the ACP (Active Code
Page) of the operating system. This value is used when the file is later read
by an application that is not Unicode aware. This is the default value.
Return value: A list with one attribute:
STATUS The status code of the write operation.
The file and/or the section is created if it does not exist. The parameter files are described in Section
6.5.2.
Parameter file lines may be up to 65 535 characters long. If a longer line is written, the following error
raises: SCIL_PARAMETER_FILE_LINE_TOO_LONG.
Because the spaces before and after the equal sign are insignificant, it is not possible to write a key
value with a leading space character.
'file' Text or byte string (file tag). The name of the file. See Section 6.5.1 for file naming.
'text' A text vector containing the text to be written.
'append' Integer value 0 or 1, defaults to 0. If 0, a new file is created. If 1, the data are appended to the
file, if it already exists.
'encoding' Text keyword, either "UTF" or "ANSI":
"UTF" The file is written in UTF-8 encoding with a BOM (Byte Order Mark). This is
the default value.
"ANSI" The file is written in extended ANSI encoding using the ACP (Active Code
Page) of the operating system. This value is used when the file is later read
by an application that is not Unicode aware.
Value: An integer. The status code of the file write, 0 = OK.
Example:
#LOCAL S = WRITE_TEXT("A", V, 1)
#IF S == 0 #THEN !SHOW INFO "File successfully appended"
#ELSE !SHOW INFO "Append failed by " + STATUS_CODE_NAME(S)
File management functions implement the handling of drives (or disk-like devices), directories and
files in an operating-system independent way.
Used terminology:
Drive name Printable drive name in OS dependent format. In Windows, one-letter name A,
B, ... or a UNC name. Lower case letters accepted as a function argument.
Directory name Printable directory name. In Windows, any valid file name. Returned in case
stored by the file system, case-insensitive as a function argument.
File name Printable file name. In Windows, any valid file name. Returned in case stored by
the file system, case-insensitive as a function argument. By convention, file name
is divided into the proper file name and the extension separated by a period. If
there are several periods in the name, the last one is considered as the name/
extension separator.
Absolute path Printable absolute directory or file path in OS dependent format. Absolute path
contains the drive name (or uses the default drive) and all the intermediate
directory names to uniquely identify a directory or a file. In Windows, the syntax
of an absolute path is [drive:]\[directory_name\]*name.
Relative path Printable relative directory or file path in OS dependent format. Given a root
directory, relative path contains intermediate directory names (if any) to uniquely
identify a directory or a file within the root directory. The absolute path of a file is
obtained by combining the absolute path of the root directory and the relative
path of the file. In Windows, the syntax of a relative path is [directory_name
\]*name.
SCIL name File (or directory) name given in operating system independent format used by
other SCIL commands and functions, see PARSE_FILE_NAME function for
details.
Examples:
"PATH/FILE.EXT",
"/SYS/ACTIVE/SYS_/SYS_BASCON.COM", "/LIB"
Drive tag An OS independent identifier of a drive represented as a byte string data in SCIL.
Absolute directory tag An OS independent representation of the absolute path of a directory. A drive tag
is a valid absolute directory tag referring to the root directory of the drive.
Relative directory tag An OS independent representation of the relative path of a directory.
Absolute file tag An OS independent representation of the absolute path of a file.
Relative file tag An OS independent representation of the relative path of a file. Filters used when
browsing directories may contain following wildcard characters:
* Matches with any character string including null string.
? Matches with any single character, at the end of name or
extension it matches also null character.
% Matches with any single character.
An example: sysm?.exe? matches with sysm.exe, but
sysm%.exe% does not.
Operation of the filters is comparable to the Windows
Find|Files or Folders operation.
The first argument 'command' is a text keyword that selects the requested subfunction. The keyword
is case-insensitive. In the descriptions of subfunctions below, the 'command' argument is represented
as an upper-case text constant. Any valid SCIL expression resulting to a valid keyword value will do,
of course.
TAGS = FM_DIRECTORY("c:\temp")
NAMES = FM_REPRESENT(FILE_MANAGER("LIST", TAGS))
;NAMES is a vector containing the filenames of the directory "c:\temp".
The functions in this section all use abstract tags instead of a textual names as file identifiers.
File handling commands (Section 9.2.5) and file handling functions (Section 10.16) accept a file tag
argument as the identifier of the file to enable their use in conjunction with file management
functions.
A drive is the root of a file hierarchy. Depending on the operating system, a drive may correspond to
a physical disk-like device or it may consist of several physical devices or it may be a partitioning of a
physical device or it may map to a directory of another drive. In Windows, a drive corresponds to a
Windows logical drive (labelled A, B, and so on) or an UNC (Universal Naming Convention) name of
the form \\servername\sharename.
• LIST
• EXISTS
• GET_DEFAULT
• GET_ATTRIBUTES
Value: Vector value containing the drive tags of the available drives.
Returns the default drive, i.e. the drive assumed if an absolute path does not contain the drive.
Value: Byte string value containing the tag of the default drive.
• LIST
• CREATE
• DELETE
• DELETE_CONTENTS
• EXISTS
• COPY
• COPY_CONTENTS
• MOVE
• RENAME
• GET_ATTRIBUTES
directory' Absolute directory tag of the directory whose contents are listed.
'filter' Text value: The filter for the directory names to be listed. May contain wildcard
characters * , % and ?.
Default value is "" (no filter).
'recursion' Text keyword "RECURSIVE" or "NON_RECURSIVE". Recursive listing means that
whole directory hierarchy rooted in 'root' is listed.
Default value is "NON_RECURSIVE".
'hidden' Text keyword "EXCLUDE_HIDDEN" or "INCLUDE_HIDDEN". Specifies whether hidden
directories are listed or not.
Default value is "EXCLUDE_HIDDEN"
Value: Vector value containing the relative directory tags of the directories found.
Deletes one or more directories and all the directories and files contained in them.
'directory' Absolute directory tag of the directory whose contents are deleted.
'filter' Text value: The filter for the file and directory names to be deleted.
May contain wildcard characters * , % and ?.
Default value is "" (no filter).
'subdirectories' Text keyword "INCLUDE_DIRECTORIES" or "OMIT_DIRECTORIES".
Specifies whether the subdirectories are deleted or not. If subdirectories are deleted, the filter
is applied to the name of subdirectories (not to the contained files).
Default value is "OMIT_DIRECTORIES".
Value: List value with following attributes:
OK Boolean value, TRUE if successful.
FAILED A vector value containing relative directory or file tags of directories and
files not deleted. Missing if OK = TRUE.
STATUS An integer vector containing the status codes of failed deletions. Missing if
OK = TRUE.
Copies the files of a directory into another directory. Optionally, the subdirectories are recursively
copied as well.
Renames a directory.
• LIST
• DELETE
• EXISTS
• COPY
• MOVE
• RENAME
• GET_ATTRIBUTES
'directory' Absolute directory tag of the directory whose contents are listed.
'filter' Text value: The filter for the file names to be listed. May contain wildcard characters *
% and ?. Default value is "" (no filter).
'recursion' Text keyword "RECURSIVE" or "NON_RECURSIVE". Recursive listing means that all
files in the directory hierarchy rooted in 'directory' is listed. Default value is
"NON_RECURSIVE".
'hidden' Text keyword "EXCLUDE_HIDDEN" OR "INCLUDE_HIDDEN". Specifies whether
hidden files are listed or not. Default value is "EXCLUDE_HIDDEN"
Value: Vector value containing the relative file tags of the files found.
Renames a file.
'path' Text or text vector value, the directory path(s) given in SCIL file name format, e.g.
"PAR/DEFAULT".
Value: The absolute directory tag of the directory specified by 'path' or a vector of such tags.
If argument 'path' is omitted, the tag of the application root directory is returned.
'path' Text or text vector value, the file path(s) given in SCIL file name format, e.g. "PAR/
DEFAULT/MYTOOL.INI".
Value: The absolute file tag of the file specified by 'path' or a vector of such tags.
Combines two or more drive, directory or file tags to create a new directory or file tag.
The tags given as the arguments must follow the order of file hierarchy. A drive must be first
argument if any. Any absolute path containing a drive may not be specified if the first argument is a
drive tag. Only one absolute path may be given. An absolute path may not follow a relative path in
the argument list. A file path must be the last argument if any.
Either 'name' or 'extension' or both may be vectors. If both, they must be of equal length.
Trailing blanks, if any, are removed from 'name' and 'extension'. If the extension is empty, the name
is returned. Otherwise, a period is inserted between name and extension. The resulting file name is
not syntax checked.
'path' Text or text vector value, directory path(s). Any valid directory path.
'check' Text keyword "CHECK".
Value: If "CHECK", a text or text vector value:
"ABSOLUTE" 'path' denotes a valid absolute path.
"RELATIVE" 'path' denotes a valid relative path.
"ERROR" 'path' is not a valid path.
Otherwise, an absolute or relative directory tag (a byte string value) or a vector of tags.
'name' Text or text vector value, drive name(s). In Windows, one-letter name optionally
followed by ":" or a UNC name.
'check' Text keyword "CHECK".
Value: If "CHECK", a text or text vector value "OK" or "ERROR", otherwise a drive tag (a byte
string value) or a vector of drive tags.
If the selected component is "PATH" or "DIRECTORY", the result is absolute if 'tag' is absolute and
relative if 'tag' is relative.
'path' Text or text vector value, file path(s). Any valid file path.
'check' Text keyword "CHECK".
Value: If "CHECK", a text or text vector value:
"ABSOLUTE" 'path' denotes a valid absolute path.
"RELATIVE" 'path' denotes a valid relative path.
"ERROR" 'path' is not a valid path.
Otherwise an absolute or relative file tag (a byte string value) or a vector of tags.
Converts one or more drive, directory or file tags into an OS dependent text representation.
'tag' Byte string or a byte string vector value: drive, directory or file tag(s).
'option' One or more of following text keywords in any order
"DRIVE_POSTFIX" In Windows, append a ":" to a drive name (if
a drive tag).
Table continues on next page
By default, in Windows a drive name is given without the trailing ":", a directory name is given without
the trailing "\" and the case used when the tag was created is not changed.
Creates a directory tag out of a SCIL directory name or checks a SCIL directory name.
SCIL directory names begin with a slash and are relative to the root directory of the SYS600
installation (usually "\SC"). To create a directory tag for a logical path, use function PATH first to find
out the directory name(s).
Creates a file tag out of a SCIL file name or checks a SCIL file name.
If "IGNORE_EXISTING" option is not specified, the function does a lookup for the name given, and
returns a tag for the found file. If the file does not exist, a tag for a file that would be created by
'name' is returned. If the option is specified, the lookup is bypassed.
Converts one or more directory or file tags into a SCIL name text representation.
'tag' Byte string or a byte string vector value: directory or file tag(s).
'case' One of the following text keywords:
"UPPER_CASE" Use upper case letters.
"LOWER_CASE" Use lower case letters.
"CAPITALIZE" Capitalize the names.
Value: Text or text vector value, the SCIL name representation of the given tag(s).
A zero length text is returned if the 'tag' cannot be converted into a SCIL name, i.e. it contains a drive
or is not located below the root of SCIL file hierarchy (in Windows, "\SC\" by default).
Extracts the proper name and the extension from one or more file names.
The SPACOM function sends the 'message' string to the SPACOM unit and returns the reply
character string. The function can be used only for communication with SPACOM units connected to
the base system. This assumes that the base system attributes SYS:BSD and SYS:BSP have been
set (see the System Objects manual).
Changes locally the base system time-out used in the communication with other nodes. The function
affects only the context where it is used. The global time-out is specified by the SYS:BTI attribute.
Example:
The CSV functions are used to export data from SYS600 to any Windows application that uses CSV
(Comma Separated Value) file format and to import CSV data into a SYS600 application. The
spread-sheet program Excel is a good example of such a Windows application.
• The 'original' variant uses a comma as the field separator character (as the format name states)
and a dot as the decimal point character.
• The 'Europian' variant uses a semicolon as the field separator, because the comma is reserved
for the decimal point use.
All the SCIL data types are supported by the CSV functions. For the structured data types (vectors
and lists), two representation options are implemented:
• Horizontal: The components are presented on one line, separated by commas, as the output of
the DUMP function.
• Vertical: Each component is shown in its own line. Note, that these lines still make up only one
field of the CSV format.
The primary target in the design of the CSV functions has been the database export/import
functionality. Typically, a CSV record contains the configuration of a SYS600 database object and a
CSV field contains the value of one attribute of the object. However, the functions can be used to
export and import any data between SCIL and an external application.
'csv' Text vector, the contents of a CSV file (or a portion of it)
'start' Positive integer, the row number in 'csv' to start with.
'field_info' A list value describing the contents of the CSV fields or a vector of such list values, if the
fields are different. The list contains the following attributes:
VALUE_TYPE Text keyword, any value type returned by the
OBJECT_ATTRIBUTE_INFO function. This attribute defines
the SCIL value type of the field data, or the value type of the
elements of a vector value.
VECTOR_LENGTH Integer, the maximum length of vector data. If the field does
not contain a vector, this attribute should be omitted.
ELEMENT_TYPE Text keyword, see VALUE_TYPE. The value type of the
elements of vector data. If the field does not contain a vector,
this attribute should be omitted.
'option' Optional text keyword defining which variant of the CSV format is used:
Table continues on next page
Some CSV applications (including Excel) have various size restrictions on the CSV data.
Therefore, they may fail to import a CSV file generated by this function, if the file is very
big (many rows and/or columns) or a field is very long or contains many lines.
The DDE client functions allow the SYS600 user (application) access to external applications using
the DDE (Dynamic Data Exchange) protocol. The DDE client functions establish a DDE link between
SYS600 and other Windows applications, such as Microsoft Excel or Word. The SYS600 application
works as a client and the other application as a server. The other application must be running when
the connection is opened.
Since Windows Vista and Windows Server 2008, the client and server application must be running in
the same computer.
The DDE protocol is supported by most Microsoft Windows applications. To use the SYS600 DDE
client functions, the user should be familiar with the server application and its DDE functions.
The DDE client functions support the following data transaction commands directed from the client
(SYS600) to the server application:
The DDE client functions use the following three identifiers to address data in the server application:
The DDE functions in SYS600 use status codes listed below, most of which are DDE protocol status
codes. The status code texts can be, and should be, used as such in SCIL expressions. They are
defined as predefined integers in the SYS600 kernel.
DMLERR_POKEACKTIMEOUT 16395
DMLERR_POSTMSG_FAILED 16396
DMLERR_REENTRANCY 16397
DMLERR_SERVER_DIED 16398
DMLERR_SYS_ERROR 16399
DMLERR_UNADVACKTIMEOUT 16400
DMLERR_UNFOUND_QUEUE_ID 16401
DMLERR_ITEM_TOO_LONG 20483
'service' Text. The service name the remote application responds to. Usually the same as the
application name.
'topic' Text. A valid topic name within the remote application.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The value indicates
whether the function was successfully executed or not.
DMLERR_NO_ERROR (= 0) means that the operation
succeeded.
CONNECTION_ID Integer, 1 ... 10. The id-number of the connection. If the
connection did not succeed, the CONNECTION_ID is
undefined.
The connection gets an identification number which is used in the subsequent DDE operations. The
DDE connections are SCIL context specific which means that they are automatically closed when a
picture is exited, when a command procedure has been executed to the end or when the dialog
system is deleted. Each SCIL context can have up to 10 open DDE connections simultaneously.
The remote application must be running when the DDE_CONNECT function is issued. Likewise, the
topic for which DDE_CONNECT is issued must be available. For instance, for Excel this means that
the desired spreadsheet must be opened. The remote application can be started from SCIL with the
OPS_CALL command. At the same time the desired topic (e.g. a file) can be opened. A topic can
also be opened later by sending an open command to the server application using the DDE-
_EXECUTE function.
Example:
'connection_id' Integer, 1 ... 10. The DDE connection identifier obtained using the DDE_CONNECT.
Value: A list containing the following attribute:
STATUS A predefined integer, see above. The value indicates whether the function
was successfully executed or not. DMLERR_NO_ERROR (= 0) means that
the operation succeeded.
Example:
RESULT = DDE_DISCONNECT(CONN )
#IF RESULT.STATUS == DMLERR_NO_ERROR #THEN #BLOCK
;Connection was successfully closed.
#BLOCK_END
#ELSE
;Connection not successfully closed.
'connection_id' Integer, 1 ... 10. The DDE identifier obtained using the DDE_CONNECT.
'item' Text. A valid DDE item in the remote application.
'timeout' Integer, 0 ... 1000. The DDE transaction timeout in seconds. The parameter is optional.
Default value = 20 s.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The value indicates whether the function
was successfully executed. DMLERR_NO_ERROR (= 0) means that the
operation succeeded.
DATA Text (max length 65 535), the requested data. If STATUS is not equal to
DMLERR_NO_ERROR, the DATA is undefined.
Example:
The cell references in Excel are language dependent if the reference style R1C1 s used
(R for row and C for column). To check the type of reference style and the cell reference
notation of the Excel version in use, select: Tools > Options > General tab.
'connection_id' Integer, 1 ... 10. The DDE identifier obtained using the DDE_CONNECT.
'item' Text. A valid DDE item in the remote application.
'value' Text. The value which will be set into item.
'timeout' Integer, 0 ... 1000. The DDE transaction time-out in seconds. The parameter is optional.
Default value = 20 s.
Value: A list containing the following attribute:
STATUS A predefined integer (see above). The value indicates whether the function
was successfully executed. DMLERR_NO_ERROR (= 0) means that the
operation succeeded.
Example:
The connection to the application must be open. To be able to use this function, the DDE
documentation of the server application is needed.
'connection_id' Integer, 1 ... 10. The DDE connection identifier obtained using the DDE_CONNECT.
'statement' Text. A valid executable statement in the remote application (see the documentation of the
application in question).
'timeout' Integer, 0 ... 1000. The DDE transaction time-out in seconds. The parameter is optional.
Default value = 20 s.
Value: A list containing the following attribute:
STATUS A predefined integer (see above). The value indicates whether the function
was successfully executed. DMLERR_NO_ERROR (= 0) means that the
operation succeeded.
Example:
The string "%o~" corresponds to <Alt+o><ENTER> in Excel and opens a dialog for cell formatting.
Use the DDE_EXECUTE function with caution! Different applications respond differently
to the DDE_EXECUTE statement. Excel, for example, must be the active application on
the desktop to be able to execute a submitted DDE_EXECUTE command.
SYS600 applications can be accessed from external Windows applications using the DDE protocol
so that the SYS600 application works as a server and the other application as a client.
Integer
Text
Time Time will be returned as seconds count from1.1.1978.
Boolean Boolean will be returned as 0 or 1.
Real Real will be returned to client application as SCIL real format ("." as decimal separator)
The vector data type is not supported directly, but can be used with the help of the DDE_VECTOR
function described below. SYS600 real data can be transformed into text data with user defined
decimal separator using the DDE_REAL function (see below). The data types Bit string, Byte string
and List are not supported.
The function transforms a SCIL vector into a format readable in the client in the application.
'vector' Vector. A valid SCIL expression. The vector may only contain real, integer, text and
boolean elements. Note that the vector will be transformed into a text which can
contain no more than 65 535 characters.
'decimal_separator' Text. A valid separator in the client application.
'list_separator' Text. A valid separator in client application.
Value: A text composed of the elements in 'vector' separated by the list separator (see the
example below).
If a vector element is of invalid data type or missing, there is an empty value in result
string. In other words, there are two consecutive list separator characters in the result
string.
Example:
Creates a DDE style real number with a user defined decimal separator.
Example:
@A = DDE_REAL(1.23,",")
;Result: %A == "1,23"
The ODBC functions provide means for accessing databases and applications that support SQL
(Structured Query Language), e.g. databases built with Microsoft Access, Paradox and Oracle.
SYS600 uses the database interface Microsoft ODBC (Open Database Connectivity) and SQL
statements.
Access to databases requires that an ODBC driver for the database management system in question
has been installed and configured in the SYS600 computer where the ODBC functions are executed.
For more information, see the ODBC documentation.
To be able to use the ODBC functions, the programmer should be familiar with SQL statements.
Refer to suitable SQL manuals and books.
The ODBC functions may return the following seven status codes, which can be used as such in
SCIL expressions because they are defined as predefined integers:
0 SQL_SUCCESS
1 SQL_SUCCESS_WITH_INFO
-1 SQL_ERROR
100 SQL_NO_DATA_FOUND
2 SQL_STILL_EXECUTING
99 SQL_NEED_DATA
2001 SQL_UNSUPPORTED_DATATYPE
In certain cases, also an error code may be returned (for status codes SQL_ERROR and
SQL_SUCCESS_WITH_INFO). The error codes are the ODBC error codes listed in appendix A.
The data source may be situated in the same computer or in another computer on the network. The
connection gets an identification number which is used in the subsequent ODBC functions.
The ODBC connections are SCIL context specific. This means that when the context, e.g. the picture
or command procedure, is exited, the connections are automatically closed.
'source' Text. The data source name as defined by the ODBC administration tool.
'user' Text. A text string containing the user name that is to be used when accessing the data
source specified in 'source'. An empty string if no user name needed.
'password' Text. A text string containing the password for 'user' when accessing the data source
specified in 'source'. An empty string if no password needed.
Value: A list containing the following three attributes:
STATUS A predefined integer (see above). The values
SQL_SUCCESS and SQL_SUCCESS_WITH_INFO
indicate a successful execution.
CONNECTION_ID Integer, 1 ... 10. The identification number of the
connection. Returned only when the operation did
succeed.
ERROR_CODE Text. A five-character ODBC error code. Returned only
when STATUS is SQL_ERROR or
SQL_SUCCESS_WITH_INFO.
Example:
'connection_id' Integer 1 ... 10. The connection identification of the connection that is to be disconnected.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS and
SQL_SUCCESS_WITH_INFO indicate a successful execution.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
Example:
@RESULT = SQL_DISCONNECT(%CONN)
#IF RESULT:VSTATUS <> SQL_SUCCESS AND-
RESULT:VSTATUS <> SQL_SUCCESS_WITH_INFO #THEN #BLOCK
;The connection was not successfully disconnected.
#BLOCK_END
'connection_id' Integer 1 ... 10. The identification number of the connection on which the statement is to be
executed.
'SQLstring' Text or text vector. The SQL statement that is to be executed. For more information, see SQL
manuals.
'timeout' Non-negative integer. The maximum time (in seconds) the result is waited for. Zero value
specifies no timeout. The default value is 20 seconds.
Value: A list containing the following three attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS
and SQL_SUCCESS_WITH_INFO indicate a successful
execution.
STATEMENT_ID Integer, 1 ... 100. The identification number of the statement.
Returned only if the operation did succeed.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
The function executes the SQL statement on the connection specified by the 'connection_id'
argument. It reserves a statement identification number which is used in a possible subsequent
SQL_FETCH function. Each connection may have up to ten simultaneous execute statements.
Example:
Deleting all records in the table "MYTABLE" where the value in the column "AGE" is equal to 18:
'statement_id' Integer 1 ... 100. The statement identification number returned by SQL_EXECUTE.
Value: A list containing the following three attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS and
SQL_SUCCESS_WITH_INFO indicate a successful execution.
DATA A vector containing data fetched from a result table. Returned only if
the operation did succeed.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
Example:
The UNICODE character set is not supported by the function. Therefore, any UNICODE
data to be fetched should be converted to one-byte characters using 'convert' function in
the SELECT clause.
Frees the specified statement and stops processing associated with the statement.
'statement_id' Integer, 1 ... 100. The statement identification returned from SQL_EXECUTE.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS and
SQL_SUCCESS_WITH_INFO indicate a successful execution.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
This function must be used if several calls to SQL_EXECUTE are issued on the same connection. All
open statements associated with the connection will be freed automatically when a connection is
closed.
Example:
@RESULT=SQL_FREE_STATEMENT(%STMT)
#IF RESULT:VSTATUS <> SQL_SUCCESS AND-
RESULT:VSTATUS <> SQL_SUCCESS_WITH_INFO -
#THEN #BLOCK
;The statement was not successfully freed.
#BLOCK_END
'connection_id' Integer, 1 ... 10. The identification of the connection on which the transaction is to be
executed.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS and
SQL_SUCCESS_WITH_INFO indicate a successful execution.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
Example:
@RESULT = SQL_BEGIN_TRANSACTION(%CONN)
#IF RESULT:VSTATUS == SQL_SUCCESS OR-
RESULT:VSTATUS == SQL_SUCCESS_WITH_INFO -
#THEN #BLOCK
@SQLSTMT = "DELETE FROM MYTABLE WHERE AGE = 18"
@RESULT1 = SQL_EXECUTE(%CONN, %SQLSTMT)
@SQLSTMT = "UPDATE MYTABLE SET AGE = 18 WHERE AGE = 17"
@RESULT2 = SQL_EXECUTE(%CONN, %SQLSTMT)
#IF (RESULT1:VSTATUS == SQL_SUCCESS OR-
RESULT1:VSTATUS == SQL_SUCCESS_WITH_INFO) AND-
(RESULT2:VSTATUS == SQL_SUCCESS OR-
RESULT2:VSTATUS == SQL_SUCCESS_WITH_INFO) -
#THEN #BLOCK
@RESULT = SQL_COMMIT(%CONN)
#IF RESULT:VSTATUS <> SQL_SUCCESS AND-
RESULT:VSTATUS <> SQL_SUCCESS_WITH_INFO - #THEN #BLOCK
;The commit was not successful
#BLOCK_END
#BLOCK_END
#ELSE #BLOCK
@RESULT = SQL_ROLLBACK(%CONN)
#IF RESULT:VSTATUS <> SQL_SUCCESS AND-
RESULT:VSTATUS <> SQL_SUCCESS_WITH_INFO - #THEN #BLOCK
;The rollback was not successful
#BLOCK_END
#BLOCK_END
#BLOCK_END
#ELSE #BLOCK
;The transaction could not be started.
#BLOCK_END
'connection_id' Integer, 1 ... 10. The identification number of the connection on which a transaction is to be
committed.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS and
SQL_SUCCESS_WITH_INFO indicate a successful execution.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
Example:
'connection_id' Integer, 1 ... 10. The connection identification of the connection on which a transaction is to
be rolled back.
Value: A list containing the following two attributes:
STATUS A predefined integer (see above). The values SQL_SUCCESS and
SQL_SUCCESS_WITH_INFO indicate a successful execution.
ERROR_CODE Text. A five-character ODBC error code. Returned only when
STATUS is SQL_ERROR or SQL_SUCCESS_WITH_INFO.
Example:
OPC Name Database functions are used to maintain the OPC Name Database. The database is
used to give OPC style (alias) names for SYS600 objects and their attributes.
An OPC name (item id) is a hierarchical name consisting of any number of fields separated by dots:
Each field may contain any visible characters, except for colons and dots. The name is case-
sensitive. Single embedded spaces are allowed in the field, leading and trailing spaces are not
accepted. The maximum length of the name is 255 characters.
• "South Tipperary.Kilkenny.Relay1.Breaker.Position"
• "Äänekosken ala-asema.Laukaan syöttö.Katkaisija.Tila"
The names defined in the database and the values of ON attributes of the application objects share
the same name space. They must be unique within an application. Consequently, the user cannot,
for example, define an OPC name that is identical to the value of the ON attribute of some process
object. See the Application Objects manual for the description of the ON attribute.
Each OPC name is mapped to a SYS600 object or an object attribute. Any of the object types P, X,
H, F, D, C, T, A, G, B and S, or any of their attributes may be used. It is even allowed to give an OPC
name for an element (or a slice) of a vector valued attribute. More than one OPC name may refer to
the same SYS600 object.
External references are not supported. The following is not a valid reference:
The OPC Name Database is stored in the application file APL_OPCNAM.SDB. It is implemented as
a SCIL database for fast and easy access and flexibility. The OPC names act as section names, the
SCIL mapping is given in the data of the section. For SCIL databases, see Section 6.6.
At the application start-up, the complete OPC name space is created by combining the names (ON
attribute values) from the process and report database with the ones read from the OPC Name
Database.
When an application object is deleted or renamed, the OPC names that refer to it or any of its
attributes are also deleted.
The OPC Name Database is maintained in real-time by the SCIL function OPC_NAME_MANAGER.
Lists the OPC item names found in the OPC Name Database.
Creates a new name in the OPC Name Database or overwrites an existing one.
The given name and the SCIL attribute reference are syntax checked according to the rules above.
The following SCIL functions are used to search for existing OPC servers in the network, examine
their name space, cross-check the SYS600 process database and the server name space, and
perform some specific actions on an open OPC client - server connection.
'apl' An integer, the logical application number, 0 = current application. The application must be
local.
'ln' A text, the logical name of the process object to be acknowledged
'ix' An integer, the process object index
'ack_id' A text, the acknowledger ID. This value is seen by other clients as the acknowledger of the
alarm. If an empty text is given, the MicroSCADA user name is used.
'comment' Any text supplied by the acknowledger (optional)
'cookie' An integer, an opaque number supplied by the server to identify the event. This is the value
of the CK attribute of the process object at the time of alarm event.
'active_time' A byte string, the alarm time in a format required by the server. This is the value of the CQ
attribute of the process object at the time of alarm event.
Value: An integer, the SCIL status code of the operation Some possible values:
0 OK_STATUS
2 OBSOLETE_STATUS, the alarm has already been acknowledged
690 SCIL_OPC_CLIENT_NOT_RUNNING, there is no running OPC client for (apl,
unit).
691 SCIL_INVALID_ACK_TIME, the 'cookie' or 'active_time' argument not accepted
by the server
689 SCIL_OPC_COMMUNICATION_ERROR
The arguments 'cookie' and 'active_time' are optional, but if one is given the other one must also be
given. If they are omitted, the CK and CQ attribute of the process object are used.
More information on acknowledgement of OPC A&E conditions is found in the Application Objects
manual.
'nodenr' An integer 1 ... 250, the node number of the type OPC_AE node object
describing the OPC A&E server, or the node number of another type node
object locating the computer where the server is found.
'clsid1' A text, the class ID of the server (optional). This argument is given only when
the 'nodenr' argument only locates the computer (node type is not OPC_AE).
Otherwise, it is omitted or given as an empty text.
'root' A text, the OPC item ID of the browsing root (optional) If not given, the entire
name space is listed.
'nodename' A text, the name or IP address of the node where the server is located A null
string denotes the current node.
'clsid2' A text, the class ID of the server. This value is obtained for example by the
OPC_AE_SERVERS function.
'user' A text, the name of the user account under which the remote OPC server is
launched (optional). The name may be prefixed by the domain name, for
example "DOMAIN\USER".
'password' A text, the password of the user.
Value: A list of the following attributes:
STATUS An integer, SCIL status code of the
operation The following attributes are
returned only if STATUS = 0 (OK)
EVENT_CATEGORIES
A list vector, each element describes
one event category by an event
category descriptor, see below.
AREA_BROWSING_SUPPORTED
Boolean TRUE if the OPC A&E
server supports area browsing,
FALSE if not
ROOT A list value, an area node descriptor
containing the entire event source
hierarchy below the 'root', see below.
This attribute is returned only if
AREA_BROWSING_SUPPORTED =
TRUE.
An event category descriptor is a data structure that describes one event category in an OPC A&E server. It is a list
of the following attributes:
ID An integer, the numeric ID of the category
DESCRIPTION A text description of the category
TYPE A text keyword, which tells the type of the events of the category:
"SIMPLE" Simple events
"TRACKING" Tracking events
"CONDITION" Condition events
Table continues on next page
CONDITIONS A list vector, present only if TYPE = "CONDITION". Each element describes
one of the conditions of the category by the following attributes:
NAME The name of the condition.
SUBCONDITIONS A text vector containing the names of
the subconditions of the condition.
An area node descriptor is a data structure that describes one area in the OPC event source hierarchy tree. It is a list
with the following five attributes:
AREA_NAMES A text vector containing the names of the area nodes
directly below this node.
AREAS A list vector containing the area node descriptors of
these descendant areas (recursive definition!).
SOURCE_NAMES A text vector containing the names of OPC event
sources directly below this node.
SOURCE_QUALIFIED_NAMES A text vector containing the fully qualified names of these
sources.
SOURCE_CONDITIONS A vector of vectors containing the names of the
conditions that these sources have. Each element is a
text vector that lists the names of the conditions
associated to the event source.
In the first form of the function call (i.e. the node is defined by a base system node number), the
possible user account and its password are defined by the node object attribute OP (NODn:BOP).
See the System Objects manual for the details.
'apl' An integer, the logical application number, 0 = current application. The application must
be local.
'unit' An integer, the number of the process database unit that runs the OPC A&E client
Value: An integer, the SCIL status code of the operation (0 = OK)
An OPC A&E refresh causes the server to (re)send an event notification for all active and
unacknowledged inactive conditions.
If the A&E server provides a full implementation of the OPC A&E specification, this function is never
needed. If not, the function may be used to get initial values for OPC Event type process objects that
are created or taken into use while the system is running.
'nodenr' An integer 1 ... 250, the node number of the node object locating the computer to be
searched for the servers.
'nodename' A text, the name or IP address of the node to be searched. A null string denotes the current
node.
'user' A text, the name of the user account under which the remote OPC server browser is
launched (optional). The name may be prefixed by the domain name, for example "DOMAIN
\USER".
'password' A text, the password of the user.
Value: A list with the following attributes:
STATUS SCIL status code of the operation The following attribute is returned
only if STATUS = 0 (OK)
SERVERS A list vector. Each element describes an A&E server by the following
3 text attributes:
NAME The name of the server
PROGID The program ID of the server
CLSID The class ID of the server
In the first form of the function call (i.e. the node is defined by a base system node number), the
possible user account and its password are defined by the node object attribute OP (NODn:BOP).
See the System Objects manual for the details.
Cross-checks a process database and the name space of an OPC A&E server.
'nodenr' An integer 1 ... 250, the node number of the type OPC_DA node object
describing the OPC DA server, or the node number of another type node
object locating the computer where the server is found.
'clsid1' A text, the class ID of the server (optional). This argument is given only when
the 'nodenr' argument only locates the computer (node type is not OPC_DA).
Otherwise, it is omitted or given as an empty text.
'root' A text, the OPC item ID of the browsing root (optional) If not given, the entire
name space is listed.
Table continues on next page
'nodename' A text, the name or IP address of the node where the server is located A null
string denotes the current node.
'clsid2' A text, the class ID of the server. This value is obtained for example by the
OPC_DA_SERVERS function.
'user' A text, the name of the user account under which the remote OPC server is
launched (optional). The name may be prefixed by the domain name, for
example "DOMAIN\USER".
'password' A text, the password of the user.
Value: A list with the following three attributes:
STATUS An integer, SCIL status code of the
operation The following attributes are
returned only if STATUS = 0 (OK)
SUPPORTED Boolean TRUE if the OPC DA server
supports address space browsing,
FALSE if not
ROOT A list value, a name space node
descriptor containing the entire item
hierarchy below the 'root', see below.
This attribute is returned only if
SUPPORTED = TRUE.
A name space node descriptor is a data structure that describes one node in the OPC item hierarchy tree. It is a list
with the following six attributes:
BRANCH_NAMES A text vector containing the names of the branch nodes directly below this
node.
BRANCHES A list vector containing the name space node descriptors of these
descendant branch nodes (recursive definition!).
ITEM_NAMES A text vector containing the names of OPC items directly below this node.
ITEM_IDS A text vector containing the fully qualified OPC item ID’s of these items.
ITEM_DATATYPES An integer vector containing the native data types of these items. See the
OPC and Windows OLE documentation for the VARTYPE encoding of the
data types.
ITEM_ACCESS_RIGHTS An integer vector containing the access rights of these items encoded as
follows:
0 No access rights
1 Read only
2 Write only
3 Read / write
In the first form of the function call (i.e. the node is defined by a base system node number), the
possible user account and its password are defined by the node object attribute OP (NODn:BOP).
See the System Objects manual for the details.
'apl' An integer, the logical application number, 0 = current application. The application must
be local.
'unit' An integer, the number of the process database unit that runs the OPC DA client
'group' A text, the name of the item group
'wait' A non-negative integer, milliseconds to wait for the reply. Optional, default value is 0
(do not wait for reply)
Value: An integer, the SCIL status code of the operation: 0 = OK_STATUS 8410 =
OPCC_REFRESH_TIMEOUT Other error status codes
OPC_DA_REFRESH requests a refresh of an item group from the connected OPC Data Access
Server and optionally waits until the item values have been updated in the process database.
Typically, this function is used for item groups whose update rate is set to -1. Such a group is not
cyclically updated, see the System Objects manual, attribute NOD:BOP.
The function may be used for cyclically updated groups as well, for example when the update cycle is
long and fresh item values are needed in the middle of the cycle.
Example:
#LOCAL REFRESH_STATUS
...
REFRESH_STATUS = OPC_DA_REFRESH(0, 100, "PassiveGroup", 2000)
#IF REFRESH_STATUS == 0 #THEN -
.SET INFO._TITLE = "Refreshed"
#ELSE_IF REFRESH_STATUS == STATUS_CODE("OPCC_REFRESH_TIMEOUT") #THEN -
.SET INFO._TITLE = "The server did not reply in 2 seconds"
#ELSE .SET INFO._TITLE = "? Failed: " +
STATUS_CODE_NAME(REFRESH_STATUS)
'nodenr' An integer 1 ... 250, the node number of the node object locating the computer to be
searched for the servers.
'nodename' A text, the name or IP address of the node to be searched. A null string denotes the current
node.
'user' A text, the name of the user account under which the remote OPC server browser is
launched (optional). The name may be prefixed by the domain name, for example "DOMAIN
\USER".
'password' A text, the password of the user.
Value: A list of the following attributes:
STATUS SCIL status code of the operation The following attributes are
returned only if STATUS = 0 (OK)
DA20_SERVERS A vector of server descriptors of the DA servers that support
the version 2.0 of the standard.
DA30_SERVERS A vector of server descriptors of the DA servers that support
the version 3.0 of the standard.
The server descriptor is a list of the following three text attributes:
NAME The name of the server
PROGID The program ID of the server
CLSID The class ID of the server
In the first form of the function call (i.e. the node is defined by a base system node number), the
possible user account and its password are defined by the node object attribute OP (NODn:BOP).
See the System Objects manual for the details.
The TP attribute contains the four most significant bits and the BA attribute the 12 least significant
bits of the object address (OA).
0 No object type
1 Object command
2 Regulation command
3 Digital set-point
4 Analog set-point
5 General persistent output
6 Analog value
7 Indication (single or double)
8 Pulse counter
9 Digital value
10 Indication event recording (indication with time stamp)
11 Analog event recording
Example:
@RTU = RTU_ADDR(RTU_KEY(X:POA1))
;Now
;RTU:VTP == 5
;RTU:VBA == 201
Example:
Example:
Example:
Example:
Example:
Example:
'oa' Integer. The object address, the OA attribute, of the process object stored in the record.
Value: A text of three characters. The search key for the record.
Example:
@UN = X:PUN1
#OPEN_FILE 1 0 "RTU'UN'.CFG" KL
#READ 1 RTU_KEY(X:POA1) RECORD
;%RECORD contains the configuration record associated with the object
X:P1.
'type' Integer, 0 ... 11. The type of the object (see the TP attribute in the RTU_ADDR
description above).
'ba' Integer. The address (block address) of the object in RTU200, see the BA attribute in
the RTU_ADDR description above.
Value: Integer. The object address, the attribute OA of the process object.
Example:
Example:
The functions described in this section are intended to be used only in printed pictures (format
pictures).
The function sends a printout (data, printer commands and control codes) directly to printers defined
as 'transparent' and writes data to the printer log file. The function enables full printer control and
allows for freely formatted texts and graphics.
When called in a printed picture (printout activated by the #PRINT or #LIST command or by an event
in the process database), the function spools the output (printer commands, control codes and data)
to the printer (see Figure 18).
The function should be placed in the start program of all pictures used for printout on 'transparent'
printers. If the printed picture contains picture functions, the start programs are executed in the
following order: the start program of the main picture, the start program of the base function, the start
programs of the picture functions in the installation order. When used in other environments than
printed pictures (pictures shown on screen, command procedures), the function causes an error
message (SCIL_UNKNOWN_FUNCTION).
GUID-654150FA-F8B5-4CE9-9EDC-8D3B0C8FE7B1 V1 EN-US
Unlike the semi-graphic picture based printout, the printout produced with the
PRINT_TRANSPARENT function does not automatically include any SYS600 picture elements, only
the texts, graphics and formatting specified by the function. However, complete pictures and picture
elements may be included as printout files.
The first argument of the function, 'data', specifies the printout - i.e. the printed data, formatting and
print processing. The second (optional) argument, 'log', specifies the output to the log file. The
function returns the status of the printer spool operation.
• The data to be sent to the printer. This is specified by texts and text vectors given as constants
or SCIL expressions. The texts may be encoded in any symbol set supported by the printer. The
SCIL expressions must be marked by the printout processing command -5 as the preceding
element (see below). They are evaluated at the moment of physical printing, and the result is
sent to the printer. Expressions can be used, e.g. to print the actual printout time of a report. The
text elements may also comprise printer control sequences for producing graphics. However,
this is generally not recommended, because they would make the print vector printer interface
dependent and the print processor would not be able to keep track of output pages. Instead,
printer control sequences can be defined in the CS attribute and included in the print vector as
printer control commands. Files (e.g. window dump files transferred to printout files) may be
included using the READ_TEXT function.
• Printer control commands. The printer control commands are logical commands that control the
printer. They are represented as positive integers defined by the printer specific CS attribute of
the printer object (see the System Objects manual). There is a tool for defining the printer
control commands.
• Print processor commands. The print processor commands control the processing of the print
vector itself. They are given as negative integers. The following print processor commands are
available:
The automatic new line feature (on by default) means that a new line command (printer
control command 1, see above) is automatically appended to each text element in the print
vector.
The increment LN and increment PN commands may be used to inform the print processor
that a new line or new page is started using printer control commands that are not predefined
(see the CS attribute).
'log' Vector (or integer 0). The contents of the vector is in full transferred to the log file (provided
that the printer has been defined with printer log output in the base system configuration).
SCIL expressions are evaluated before the transfer. 0 = no log file output.
Value: Integer. The status code generated by the print spool operation. 0 = OK or no 'transparent'
printer among the target printers.
The target printers can be examined by means of the PRINTER_SET function (see below). By
reading the SCIL_HOST function, the SCIL program can determine whether the picture is being
printed or displayed on the screen.
Example:
This program block first checks whether the picture is being printed or shown on the screen. If it is
printed, the PRINT_TRANSPARENT function prints a row containing the present time and the values
of attributes OX, CX and OV of a process object.
The function returns the logical target printer numbers (mapped through APL:BPR to find the physical
printer numbers) of the printed picture. By means of this function, the SCIL program may examine
the properties of target printers.
Called somewhere else than in a printed picture, the function has no meaning.
The following functions are used manage a user session and read its attributes. A session begins by
login and ends either by logout or termination of the client program. Most of the functions can be
used only during an active session.
Sets the name that is displayed in User Name column of the event list.
'name' Text The name that is used as the User Name in the Event List for events
generated by the calling SCIL program. In the Event List the name appears
prefixed by * for distinction between these artificial and proper user names.
Value: Integer SCIL status code:
0 OK_STATUS
8033 USER_ALREADY_LOGGED_IN
This function may not be used by a logged-in user.
This function is used by SCIL programs that run without a login (for example event and time channel
command procedures).
OPC Clients that run without a login appear as "OPCGuest" in the event list. The user name
OPCGuest is a reserved name that may not be used as a real user name.
The event list user name of external SCIL-API programs is of the format "SCIL-API: username",
where the 'username' is the Windows user name of the launcher of the SCIL-API program.
Tells the address of the workplace computer where the user logged in.
Value: Text Address of the session, either computer name or IP address. Empty string
if not logged in.
Value: Vector Vector of lists with following attributes (empty vector if the user is not an
AoR operator):
10.27.5 USM_AUTHORIZATION_LEVEL_FOR_OBJECT(group,
object_name, object_index) GUID-0A45067B-0F27-402F-AAD8-E2DD06DA3A2B v1
Reads the authorization level of the user for controlling a process object.
'group' Text The name of the authorization group used for process object control
'object_name' Text The name of the process object to be controlled
'object_index' Integer The index of the process object to be controlled
Value: Integer The user's authorization level for the process object
0 ... 5, or -1 if no access
This function is used to determine user's authorization level for controlling a process object when
Area of Responsibility (AoR) concept is in use.
The area is determined by the Object Identifier (OI) attribute of the process object. If the user has a
role in the area, authorization level of that role is returned, otherwise -1 (no access) is returned. If the
process object is contained in more than one area (overlapping areas), the highest authorization
level in the user's area roles is returned.
If Exclusive Access Rights (EAR) concept is in use, only the current EAR owner is given the 'real'
authorization level. Other AoR operators are given authorization level 0.
If AoR concept is not used or the given process object is not contained in any area, the user's
authorization level in the group is returned according to the session role.
Value: List vector Vector of lists with following attributes (empty vector if not logged in):
0 OK_STATUS
8035 USER_INVALID_USER_OR_PASSWORD
The old password is wrong.
8017 USER_PASSWORD_POLICY_VIOLATION
The new password is not valid.
8034 USER_NOT_LOGGED_IN
8036 USER_SESSION_NOT_VALID
The session has timed out.
The word 'new' here means that the next user that logs in to the application becomes an
Administrator user of the application. This function may be called before login.
Logs in a user starting a new session or silently joins an existing session as a sub-session.
'name' Text Name of the user. If this is a silent login to join an existing session, the id of
the session is given as 'name'.
'password' Text Password of the user. If this is a silent login, password is empty ("").
Value: Integer SCIL status code:
0 OK_STATUS
8033 USER_ALREADY_LOGGED_IN
The user is already logged in.
8049 USER_LOGIN_FAIL_WRONG_CR
Wrong credentials (user name or password)
8051 USER_LOGIN_FAIL_EXPIRED
The password has expired.
8052 USER_LOGIN_FAIL_LOCKED
The user account has been locked because of too many
retries.
8053 USER_LOGIN_FAIL_DISABLED
The user account has been disabled.
8055 USER_LOGIN_FAIL_NO_CAM
No connection to Centralized Account Management (CAM)
0 OK_STATUS
8034 USER_NOT_LOGGED_IN
8036 USER_SESSION_NOT_VALID
Session has timed out.
Value: List The following attributes (empty list if not logged in):
Releases user login sessions. If optional parameter 'session nr' is not provided, all user sessions of
the specified 'user' are released.
Example:
USM_RELEASE_USER_SESSIONS("Operator")
Release a single user session of user "Operator" where the login sequence number is 18.
USM_RELEASE_USER_SESSIONS("Operator", 18)
0 OK_STATUS
8034 USER_NOT_LOGGED_IN
8036 USER_SESSION_NOT_VALID
The session has timed out.
8002 USER_ROLE_CAN_BE_SELECTED_ONLY_AT_LOGIN
The role cannot be selected twice.
Value: List The following attributes (empty list if not logged in):
MONITOR_PRO_SESSION_TIMEOUT
MONITOR_PRO_INACTIVITY_TIMEOUT
Value: A list vector of active sessions. Each element describes a session by the following attributes:
APL Integer Application number
NR Integer Sequence number of the session
USER Text Name of the user
ROLE Text Name of the user's role in the session
ADDRESS Text Name or IP address of the workplace computer
LOGIN_TIME Time Local time of the login
BREAK_TIME Time Local time of the connection break between kernel
and workplace
SUBSESSIONS Integer Number of sub-sessions in the session
READ_ONLY Boolean TRUE, if the session runs in read-only mode
This function requires super-user access rights (authorization level of group GENERAL must be 5).
Value: Text Two-letter ISO 639-1 abbreviation of the preferred language of the user.
Empty string if not logged in.
Value: Text Name of the user. Empty string if not logged in.
Tells the name of the role that the user has selected at login.
Value: Text The role of the in this session. Empty string if not logged in.
Lists the roles that the user may select from after a successful login.
Value: Text vector Names of roles. Empty vector if not logged in.
0 ""
1 "FIRST_LOGIN"
2 "RESET"
3 "EXPIRED"
4 "EMERGENCY_LOGIN"
'object' Text keyword value, either "SYS" or "APL". Specifies the base system object. Note that
application number may not be given, the current application is always assumed.
'index' Integer or vector value.
If an integer, specifies the index of the UV attribute to be modified.
If a vector, specifies both the attribute and the index: The first element is a text value,
either "UV" or "SV". The second element is an integer value specifying the index.
'amount' Integer value to be added into the element of the UV or SV attribute.
Value: Integer value, the result of the addition.
Example:
#LOCAL DUMMY
#LOOP ADD_INTERLOCKED("SYS",("SV",77),1) <> 1 ;Try to reserve the resource
DUMMY = ADD_INTERLOCKED("SYS",("SV",77),-1) ;Didn't get it
#PAUSE 0.5 ;Wait a while
Table continues on next page
A system wide (inter-application) binary semaphore may be implemented by this SCIL code.
SYS:BSV77 is used as the semaphore. It is supposed to been set to zero in SYS_BASCON.COM.
The value returned by 2nd and 3rd call of the function is not used anywhere. For clarity, the code to
handle a deadlock situation is omitted. In a real application, too long waits must be avoided.
The value "ALL" for the argument 'alarm_class' sets or resets the audio alarm for all alarm classes 1
to 7.
The value 8 is used to force the watchog flip-flop bit to 0 or 1 at system start-up or shutdown.
The direction "INPUT" corresponds to the scaling of analog input process objects, direction
"OUTPUT" corresponds to the scaling of analog output process objects.
Example:
@r_invalue=SCALE(100,"TEST_SCALE","INPUT")
@r_outvalue =SCALE(0.1,"TEST_SCALE","OUTPUT")
'picture' Text value, the name of the picture in SCIL ([path/]name) or operating system file name
format.
Value: Integer value, a SCIL status code.
0 OK_STATUS
4024 PICF_PICTURE_IS_NOT_LOCKED
Other status codes may also be returned if the argument is invalid.
This function should be used only after a monitor process has crashed or silently
disappeared while the picture has been displayed or edited in the monitor, leaving the
picture locked. In the locked state a picture cannot be edited or in some cases not even
displayed, error 4005 (PICF_SHARE_ERROR) is raised instead.
This section describes the use of the graphics primitives, which constitute the base of all full graphics
elements in SYS600 pictures, partly also in dialogs. The first section introduces some concepts
related to the graphics primitives.
SYS600 full graphics in pictures, partly also in dialogs, are realized using SCIL graphics commands.
There are SCIL commands for drawing various types of graphical elements, such as points, lines,
polylines and polygons, arcs, circles, ellipses, boxes (rectangles), and texts. The SCIL graphics
commands specify the geometry of the graphical elements, while the location and size, as well as
other features, are given as arguments.
The graphics commands can be included in any SYS600 picture program (see Section 4.1.) and in
the methods of the dialogs and dialog items. The BACKGROUND program of a picture contains the
graphics commands generated by the picture editor. As a rule, this program should not be edited
manually. Context dependent graphics in the background can be written in the DRAW program. Like
picture commands and Visual SCIL commands (Section 9), the graphics commands are not allowed
in command procedures, unless they are executed by #DO commands or DO functions situated in
user interface objects. The graphics commands are described in Section 11.2.
The features of the graphical elements (color, type of line, line width, font, etc.) are defined by
graphics contexts, which are identified by integer numbers. A graphics context is a series of
properties, called "components", such as the ones mentioned. Several commands can use the same
graphics context, though all properties are not used by all graphics commands. The graphics
contexts are described in Section 11.3.
The graphical elements are displayed in the user interface object (picture, picture function, dialog
item) chosen as graphics "canvas". By default, the canvas is the picture or Visual SCIL object where
the graphical commands are situated.
Any picture and picture function can be chosen as graphics canvas. However, regarding the dialogs,
only certain types of dialog items can contain graphics elements. These are the dialog items that
allow the display of images (have the image attribute).
The location of a graphical element is given by x,y coordinates related to the home position of the
canvas. The upper left corner of the picture or picture function where the element will be displayed.
As the resolution of screens varies, the graphics commands use a screen independent coordinate
system. The coordinate system can contain SCIL coordinates or VS coordinates. The SCIL
coordinate system is fixed by a scaling factor. By means of an input command, the coordinates can
be read from the mouse position. Refer to Section 11.4. to learn about the SCIL and VS coordinates,
and the mouse input commands.
The context definitions, canvas selection and scaling can be temporarily stored and restored within
the same picture, see Section 11.5.
The display of the graphics on screen can be controlled by some display handling commands
(Section 11.5.2).
The commands below draw graphical elements on screen, in the user interface object selected for
canvas (default = the same object as where the commands are situated). Coordinate system is
different in pictures and in VS objects. The command .COORDINATE_SYSTEM is described in
Section 11.4.
The color and other features of the elements are fixed by the graphics contexts. The graphics
contexts are described in Section 11.3.
In most cases, several elements can be drawn with one command by giving vectors for coordinates
and sizes. If one coordinate or size is a scalar while the other one is a vector, the scalar argument is
handled as a vector with all elements equal, for example .POINT 0, (100,200) is equivalent to .POINT
(0,0), (100,200). If the coordinates fall outside the canvas (that is they are negative or too large), they
will still affect the shape of the graphical element. The part of the graphical element that falls outside
the canvas will not be displayed.
In the command syntax descriptions below, all arguments given in lower case letters can be SCIL
expressions of the data type required for the respective argument.
If the FILL option is given, the arc is filled according to the ARC_MODE component of the graphics
context.
GUID-7D146BB8-8082-4A11-8AD1-E9C4E55B69C1 V1 EN-US
If the FILL option is given, the box is filled (in the FOREGROUND color).
.IMAGE command draws a VS_IMAGE object into the current window or VS object.
The current coordinate system is SCIL, the coordinates x and y define the position of the upper left
corner of the image, otherwise the lower left corner.
'w' and 'h' specify the size of the rectangle the image is drawn into, the image is scaled to fill the
rectangle.
At least one image must and up to 4 images may be specified in the command. The one used in
drawing depends on the size of the current MicroSCADA font. If no image is specified for the current
font size, the image for the next smaller font is used. If there is no image for smaller fonts, the image
for the next larger font is used. When an image for a wrong font size is used, it is scaled in proportion
to font sizes (if 'w' and/or 'h' is 0).
Draws one or several points of one pixel's size at the coordinates (x,y). If any of x or y or both are
vectors, and the option RELATIVE is given, the first point is taken as canvas relative, the next one as
relative to the previous one, etc.
The corresponding elements in the x and y vectors are taken as x,y-coordinates (see Figure 20). The
command draws a line between each of the coordinates.
If the RELATIVE option is included in the argument list, the first coordinate pair is placed relative to
the upper left corner of the canvas and each of the following coordinates are drawn relative to the
previous one.
If the first and last point coincide, the polyline will form a closed figure (a polygon), where the end
points are joined according to the JOIN_STYLE component of the graphical context.
If the FILL option is included in the argument list, the polygon outlined will be filled (with the
FOREGROUND color). In this case, the polyline is always closed.
GUID-9E23C605-9F31-4ADD-B95B-CE2E6F72E9CE V1 EN-US
This command draws horizontal text starting at (x,y). The size and font of the texts is determined by
the graphics context.
When multiple lines are drawn, i.e. 'text' is a text vector, the x,y coordinates can be vectors with the
coordinates for each new line or they can be scalars. In the latter case, the text lines are displayed
under one another starting from x,y with a line space adjusted to the font characteristics.
If the FILL option is given, the background of the text is filled with the BACKGROUND color of the
graphics context, otherwise the background is transparent.
A graphics context is a collection of components (Section 11.3.3.) each of which define a graphical
property, for instance, background color, foreground color, font. A picture contains a number of
graphical contexts identified by a number. The context numbers are used as arguments in the
graphical commands. The maximum number of graphics contexts that can be used in one picture is
limited to 2 000.
The defined graphics contexts (together with the canvas selection and the scaling) can be
temporarily stored and restored, see Section 11.5.
The scope of a graphics context is the set of objects where the context applies. A graphics context
can be defined for a single object (picture, dialog object), for a group of objects, or for all objects
used in the monitor. There are five different scopes, each of which can contain a number of graphics
context definitions. In the context definition commands, the scope is given by a text, a single letter or
a word as follows:
"C" or "CURRENT" The scope is the object (picture or Visual SCIL object) containing the .GC
command. Max. number of contexts: 20.
"P" or "PARENT" The scope is the parent object of the object in which the context is defined
with .GC. Max. number of contexts: 20.
"R" or "ROOT" The scope is the root object (main dialog, picture container or main picture).
Max. number of contexts: 20.
"M" or "MONITOR" The scope is all object used in the monitor. Max. number of contexts: 50.
This scope is reserved for LIB 500 pictures.
"U" or "USER" The scope = all objects shown in the monitor. Max. number of contexts: 50.
This scope is for use in the application pictures.
The number of the context together with its scope identify the context and distinguishes it from other
contexts with different context number or scope.
When a part picture is shown, it inherits the contexts of its parent picture. However, changes in the
contexts of the parent picture do not affect the contexts of the part pictures which are already
displayed on screen. Likewise, the contexts are inherited downwards in the hierarchy of a dialog
system.
As long as no component definitions have been done for a context in a certain scope, all the
components have the default values mentioned in the component descriptions Section 11.3.3. The
contexts (except number 99) can be modified any time with the commands described in Section
11.3.2.
Context number 99 contains the default settings of the components. This contexts cannot be
changed. It contains the following components:
FUNCTION "COPY"
FOREGROUND "WHITE"
BACKGROUND "BLACK"
LINE_WIDTH 0
LINE_STYLE "SOLID"
CAP_STYLE "BUTT"
JOIN_STYLE "MITER"
FONT "" (semi-graphic)
ARC_MODE "PIESLICE"
NAME ""
Context number 0 is the default context in those cases where no context number is given in the
graphics commands.
The following three commands are used for the modification of graphics contexts. The graphics
contexts can be read with a SCIL function described in Section 11.3.5.
'scope' A text which specifies the scope of the context, i.e., the objects (pictures, and Visual
SCIL objects) where the context is valid. 'scope' can take the values "C" or
"CURRENT", "P" or "PARENT", "R" or "ROOT", "M" or "MONITOR", "U" or "USER".
See Section 11.3.1. Default value = "C".
'n' The number of the graphics context, integer 0 ... 20 or 0 .. 50. This number is used in
the graphical commands, see Section 11.2. Default: 0.
'm' The number of another graphics context which is copied to the current one before
modification. Integer, 0 ... 20 or 0 ... 50.
'component' The name of a component to be modified. The component names can be given in the
complete or abbreviated form, see Section 11.3.3.
'value' A SCIL expression, the value assigned to the component. The allowed data types are
mentioned in the component descriptions in Section 11.3.3.
The modification concerns all graphical elements subsequently drawn with the context in question. It
does not affect the graphical elements drawn previously with the same context number. Those
components which are not included in the component list are not affected by the command. The
graphics contexts are inherited to the pictures shown in windows and to the picture functions.
The ROOT, MONITOR and USER scopes represent separate sets of contexts, while the CURRENT
and PARENT scopes can mean the same or separate sets of contexts depending on the situation.
Example:
("C",5), ("R",5), ("M",5) and ("U",5) are all different graphics contexts. The contexts ("C",5) and ("P",5)
may be the same or different contexts. When a part picture is shown, its context is the same as the
one of the parent (i.e. CURRENT = PARENT). If the parent's context is changed later, they become
two different contexts and the parent's context is referred to as ("P",5).
The PARENT scope could, e.g., be used in a general purpose tool designed to change the
appearance of any picture it is used in. The MONITOR and USER scopes are suitable for defining
monitor specific graphics contexts in the start program of the APL_INIT picture, which is shown each
time a monitor is mapped for an application (either at system start-up or later).
Example:
This sub-section describes the components included in the graphics contexts. The components are
listed in alphabetical order.
The components are assigned values by means of the commands described in Section 11.3.2. The
values are given as SCIL expressions of the allowed data types. From the start, the components
have the default values given below. In the context defining commands, the component names can
be given in complete form or in the abbreviated form found to the left in the description below.
This component specifies how filled arcs are drawn, either as sectors or segments.
Value: "CHORD" The end points of the arc are connected and the resulting segment is
filled.
"PIESLICE" The end points of the arc are connected in the center of the circle
and the resulting sector is filled.
Default: "PIESLICE"
Specifies the "background color" of the full graphic lines and text. This BACKGROUND color is used
in the following cases:
Values: The color can be given in the following four ways (see Section 11.3.4):
With a color name given as a text, e.g., "LIGHT BLUE"
With a RGB number given as a vector of three elements, e.g., (10000,20000,30000)
With a color number given as an integer expression, e.g. 5
With scope and color number given as a vector of two elements:
(scope,color_number), e.g., ("M",5).
Default value: "BLACK"
Values: "BUTT" The line is cut off in a 90° angle to the line direction at the end
point.
"NOTLAST" The same as "BUTT", but the line is cut off one pixel before the
end point.
"PROJECTING" The line is cut off in the same way as "BUTT" half its width past
the endpoint.
"ROUND" The line end is rounded in a half circle with r = half its width
past the endpoint.
Default value: "BUTT"
"PROJECTING" and "ROUND" are meaningful only for lines with a width larger than 1
pixel.
Specifies the length of dashes and gaps when drawing dashed lines.
Value: Vector of even length. The odd indexes define the lengths of dashes and the even
indexes the lengths of the gaps. The lengths are given in coordinate units, see Section
11.4.
Default: The dashes as well as the gaps are four pixels long.
GUID-F6747BAC-70E5-443A-A73E-473E285365ED V1 EN-US
Figure 21: Wide lines are drawn centered in relation to the start and end points
GUID-B5961E68-F1A5-42CB-8D48-09938C374839 V1 EN-US
GUID-BA4FE396-E9CF-4E50-9314-36DA25CF27CB V1 EN-US
Specifies the position in the dash pattern where to start a dashed line. For example, if DASH_LIST
== (5,2) and DASH_OFFSET == 5, the line starts with the gap.
Value: The value can be given in the following four ways (see Section 11.3.4):
With a font name given as a text, e.g. "KANJI_24"
With a font number given as an integer expression, e.g. 3.
With scope and font number given as a vector of two elements: (scope,font_number),
e.g., ("M",3).
As a list with one or several of the following attributes: FAMILY (FA), POINT_SIZE
(PS), FACE (FC).
Default: The MicroSCADA semi-graphical font which is called "MICROSCADA-
SEMIGRAPHICS".
This component specifies the color in which the graphical element is displayed.
Values: The color can be given in the following four ways (see Section 11.3.4.):
With a color name given as a text, e.g., "LIGHT BLUE".
With a RGB number given as a vector of three elements, e.g., (10000,20000,30000).
With a color number given as an integer expression, e.g. 5.
With scope and color number given as a vector of two elements:
(scope,color_number), e.g., ("M",5).
Default value: "WHITE"
This component states how the color (RGB values) of added pixels ('new') is combined with the color
of already existing pixels ('old') on screen by means of logical operators.
Value: "CLEAR" 0
"AND" new AND old
"ANDREVERSE" new AND (NOT old)
"COPY" new
"ANDINVERTED" (NOT new) AND old
"NOOP" old
"XOR" new XOR old
"OR" new OR old
"NOR" (NOT new) AND (NOT old)
"EQUIV" (NOT new) XOR old)
"INVERT" (NOT old)
"ORREVERSE" new OR (NOT old)
"COPYINVERTED" (NOT new)
"ORINVERTED" (NOT new) OR old
"NAND" (NOT new) OR (NOT old)
"SET" 1
"SCIL_XOR" Proprietary implementation of XOR, preserved for
compatibility
Default value: "COPY"
Examples:
"COPY" means that the added color replaces the former color.
Using "SCIL_XOR" or "XOR" repeatedly on the same graphic element alternately draws and deletes
the graphics.
Specifies how corners are drawn for wide lines drawn with a single graphics command, see Figure
23.
Values: "MITER" The outer edges of the two lines are extended to meet in one point.
"ROUND" The lines are joined by a circular arc with r = half the line width
centered on the join point.
"BEVEL" The outer edges of the lines are joined at the end points.
Default: "MITER"
Values: "SOLID" The line is continuous (without dashes) and drawn in the
FOREGROUND color.
"ONOFFDASH" The line is dashed with the dashes drawn in the foreground color.
"DOUBLEDASH" The line is dashed with the dashes drawn n the foreground color and
the gaps between the dashes in the background color.
Default value: "SOLID"
Specifies the width of the line in coordinate units (see Section 11.4). Wide lines are drawn centered
between the start and the end point given in the drawing command, see Figure 21.
LINE_WIDTH=0 specifies the width to one pixel regardless of the scaling. LW=0 is the
most efficient line width and fastest to draw.
A freely chosen name of the graphics context. This component is not copied when copying a context.
Value: Text.
The final color of a graphical element displayed on screen depends on the FOREGROUND
BACKGROUND and FUNCTION components of the graphics context (Section 11.3.3). The colors
can be defined in four manners:
• By color names. The names of the colors in the semi-graphic pictures are: WHITE, BLACK,
RED, GREEN, BLUE, CYAN, MAGENTA, YELLOW.
• By RGB intensities given as a vector of three elements where the first element defines the red,
the second element the green and the third element the blue intensity of the color as an integer
or real value in the range 0 ... 65 535. Consequently, for example, (0,0,0) is black and
(65535,65535,65535) is white.
• By a color mix number. A color mix number is a given small integer used to identify a color
definition. The number is defined by the .COLOR command, see below.
• With scope and color mix number given as a vector of two elements: (scope,color_number),
e.g., ("M",5).
If the operating system is not capable to provide the requested color exactly (e.g.
because the palette of the server is full due to the use of many different colors on
screen), the nearest possible color is used.
The .COLOR command below is used for creating and modifying color mix numbers, and the
COLOR function for reading the RGB values of colors.
'scope' The scope of the color number. The scope is given in the same way as for graphics
contexts in Section 11.3.2.
'number' Color number given as a positive integer expression. Each scope can have the
following maximal number of colors: “C": 20, "R": 20, "M": 50, "U": 50.
'color' Color definition given in one of the four manners described above.
The color mix number can be used for color selection in the graphics contexts (BACKGROUND and
FOREGROUND).
The optional argument SHARED has been preserved for compatibility reasons. It has no effect in
current implementation.
Example:
#local RGB
.COLOR 1: "NAVYBLUE"
.GC : FG = 1
.BOX 100, 100, 100, 100, FILL
RGB = COLOR(1)
RGB(1) = RGB(1) + 10000
.COLOR 1 : RGB
.BOX 200, 100, 100, 100, FILL
The example creates a color mix initialized as navy blue, then draws a filled box in the selected color.
More red is added to the color and another box is drawn adjacent to the first one.
The font used in texts is specified by the FONT component of the graphics context (Section 11.3.3).
Fonts can be given as follows:
The .FONT command below defines font numbers, and the FONT function is used for reading font
numbers.
'scope' The scope of the font number. The scope is given in the same way as for graphics
contexts in Section 11.3.2
'number' Font number given as a positive integer expression. Each scope can have the following
maximal number of fonts: "C": 10, "R": 10, "P": 10, "M": 20, "U": 20. 0 = the
MicroSCADA semi-graphic font. Do not change it!
'font' Font definition given in any of the four ways allowed for the FONT component, see
Section 11.3.3.
GUID-B154502F-461F-46C2-AC9D-4C6E67A010B5 V1 EN-US
NAME, NA Name
HEIGHT, HE Height (number of pixels)
ASCENT, AS Ascent (logical extent above baseline in number of pixels)
DESCENT, DE Descent (logical descent below baseline in number of pixels)
WIDTH, WI Width (width of the widest character in the font in number of pixels)
FAMILY, FA Family (the name of the font family)
POINT_SIZE, PS Point size
SCIL_SIZE, SS SCIL size
FACE, FC Face
ENCODING, EN Encoding
The defined graphics contexts can be read with the following SCIL functions:
Example:
@GC_DEF = GC(0)
!SHOW INFO "CURRENT DEFAULT FONT IS " + GC_DEF:VFT
The function returns the RGB values of the foreground color in the context as a vector of three
elements.
The function returns a list value with the same attributes as for the FONT function, see Section
11.3.4.
The graphical elements are displayed on the selected canvas which can be:
• The object (picture, picture function, dialog object) which contains the command (default).
• The root object - the main picture or the main dialog.
• A named window or dialog object.
• The parent object of the object where the command is executed.
The canvas can be selected with the commands in next section Selecting Canvas (together with the
context definitions and the scaling factor) can be temporarily stored. See Section 11.5.
If not changed with any of the commands listed below, the canvas for the graphics commands is the
object where the commands are executed. Use the following commands in order to get the elements
displayed on another canvas:
The command selects the named picture object (window picture or picture function) or dialog object
(dialog or dialog object) - for canvas.
The root object is used as canvas. In a picture the root object is the main picture. In a dialog system,
the root is the main dialog or picture container.
The parent object is used as canvas. In a picture the parent object is the parent picture of the current
window picture or picture function. In a dialog system, the parent is the parent object of the current
object.
The current object is used as canvas, i.e., the object containing the graphics command. Hence, this
command returns the canvas to the default.
Specifies the coordinate system to be used in graphic drawing commands and mouse handling
commands.
The coordinate system is specified by one of the following key words: SCIL, VS.
Changes of the coordinate system with the COORDINATE_SYSTEM command are valid only within
the SCIL program where the change was made.
Example:
.COORDINATE_SYSTEM SCIL
Within the SCIL coordinate system, the (0,0) coordinate lies in the upper left corner of the canvas.
The relation between SCIL coordinates and pixels on screen depends on the semigraphic font used
in the SYS600 Monitor and on the scaling factor used by the drawing commands. See Figure 25.
GUID-66EA9594-7AA9-44B7-801F-B8CDE28E2351 v1
pixel_coord = SCIL_coord *MicroSCADA_Monitor_Width / scaling_factor
where
pixel_coord = the pixel coordinates as displayed on screen.
SCIL_coord = the coordinates given in the graphics SCIL command.
MicroSCADA_Monitor_Width = 80 * Width of semigraphic character
= 80*8 or 80*12 or 80*15.
scaling_factor = the scaling factor. The default scaling factor is 1280. The scaling factor can
be changed with the .SCALING command see Section 11.4.11.
GUID-DF440F94-6D83-472F-A7E0-D85983B91657 V1 EN-US
Within the Visual SCIL coordinate system, the (0,0) coordinate is situated in the lower left corner of
the canvas. The Visual SCIL coordinates are equal to the pixel positions within the canvas.
When handling dialogs, the origin of the coordinate system lies at the bottom left corner of the
screen. When handling dialog items, the origin is in the lower left corner of the parent object. A unit in
the coordinate system is a pixel.
Coordinates are also used, for example, when giving a position with the _GEOMETRY attribute and
when reading a position with the _GET_POINTER_POS method. For more information on VS
coordinates, see Section 2.4 in the Visual SCIL manual.
The Graphics Contexts components LW, DL, DO are defined according to the active coordinate
system. These Graphics Contexts components are not affected by the coordinate system used at
drawing.
Example:
.COORDINATE_SYSTEM VS
.GC : LW = 5
.LINE 10,10,100,100 ;line width is now 5 units according to
;the VS coordinate system (pixels).
.COORDINATE_SYSTEM SCIL
.LINE 10,10,100,100 ;line width is still 5 units according to
;the VS coordinate system (pixels),
;because the Graphics Components were defined under
;VS coordinate system
Sets the scaling factor to be used in the subsequent SCIL graphics commands.
's' is an integer or real expression, the scaling factor. If 's' = 0, the coordinates are taken
as pixel coordinates of the screen where the graphical element is displayed. If 's' is
omitted, the scaling factor is returned to the default (= 1 280).
For example, a graphical element programmed with s = 0 will have different sizes depending on the
resolution of the screen where it is shown.
The scaling factor can be temporarily stored (together with context definitions and canvas selections)
by the commands in Section 11.5. Note that the scaling factor only affects the SCIL coordinate
system.
The coordinates can be read from the cursor position with the .MOUSE command. The .MOUSE
command can be used with or without tracing. If tracing is OFF, the command reads the cursor
position and the current mouse button states. If tracing is on, the command notes the following
mouse events: button press and release, movement of mouse (provided that motion event is on, see
the .MOUSE ON command). By means of the .MOUSE ON and .MOUSE OFF commands, tracing is
switched on and off (default = OFF).
The .MOUSE DISCARD command is used to discard the pending mouse clicks.
Reads the SCIL coordinates of the cursor and the mouse button states.
'x' and 'y' Two variables that get the value of the x and y coordinates respectively (SCIL or VS
coordinates).
'button' A variable that gets the value of the pressed or released mouse button number (1, 2 or
3). If the registered mouse event was a motion event, the variable gets the value 0. If
tracing is OFF, the variable gets the value 0. If a local variable by the name exists, it is
used, otherwise a global variable.
'buttons' A variable that receives the current mouse button states if tracing is OFF, or the button
states immediately before the mouse event if tracing is ON. The states are returned as
a bit mask, where each bit number represents a mouse button. The bit values have the
following meanings: 0 = the button is released, 1 = the button is held down. If a local
variable by the name exists, it is used, otherwise a global variable.
RELATIVE An optional keyword. If RELATIVE is given as the last argument of the command, the
coordinates are relative to the current canvas (If the canvas is not explicitly set, the
window or picture function executing the .MOUSE command acts as the current
canvas). If RELATIVE is not given, the coordinates returned by .MOUSE command are
relative to the part picture (picture shown in window) executing the command.
Examples:
.MOUSE X, Y, RELATIVE
.MOUSE X, Y, BUTTON, RELATIVE
.MOUSE X, Y, BUTTON, BUTTON_MASK, RELATIVE
.MOUSE ON sets the program in tracing state. If the MOTION option is given, also the motion of the
cursor is traced.
.MOUSE OFF ends the tracing state. The tracing state is automatically ended when a program is
completed.
Example:
The following SCIL sequence draws a line segment from (0,0) to the position pointed by the user.
The final position is given by releasing button 1.
.MOUSE ON
@B1_PRESSED = FALSE
#LOOP NOT %B1_PRESSED
.MOUSE X, Y, BUTTON, BUTTONS
#IF (%BUTTON ==1) AND (BIT(%BUTTONS , 1)==0) #THEN #BLOCK
@B1_PRESSED = TRUE
#BLOCK_END
#LOOP_END
The program sequence above waits until mouse button 1 is pressed, then the following is executed:
The line is drawn and erased until the mouse button is released, then the following is executed:
The line is drawn from (0,0) to the coordinates given be the variables %NEW_X and %NEW_Y.
.MOUSE DISCARD discards all the pending mouse clicks, i.e. the mouse clicks that have not yet
been processed.
This command may be used after a lengthy calculation to discard the mouse clicks that are done by
an impatient operator.
After a new dialog has been displayed, this command may be used to cancel any mouse clicks that
may have been done before the dialog was seen.
Unlike other .MOUSE commands, .MOUSE DISCARD may be used both within a main dialog
context and within a picture container context (the others work only in a picture container context).
The commands .PUSH and .POP are used for storing temporarily the context definitions, the scaling
factor and the canvas selection. They are useful when there is a need to store standard selections
while making other selections, and then restore the standard selections after a while. They are used,
for example, when a subroutine uses specific values for canvas, scaling and graphics contexts,
which should not interfere with the picture that executes the subroutine.
.PUSH stores the current canvas selection, scaling factor and graphics contexts definitions. .POP
restores the selections stored with .PUSH. The .POP command must be located in the same
program as the corresponding .PUSH command.
This command forces a blink timing and an immediate updating of the entire application window.
However, if there is an ongoing pending, the command has no effect. The command is rather time
consuming.
Pending is used to prevent disturbing flickering when drawing related graphics primitives in sequence
(for example when changing position of an object in animation).
The graphics drawn after PEND ON are not shown on screen until the matching PEND OFF is
encountered. At PEND OFF the resulting output of the intervening commands is shown as a flash
(that is the drawn primitives are not displayed one by one). PEND ON and the matching PEND OFF
must be located in the same SCIL program. If a SCIL program ends while the output is pending, an
automatic PEND OFF is generated by the base software. PEND commands may be nested. In this
case, the outermost PEND OFF triggers the output.
An implicit PEND ON - PEND OFF is set by the base software around the semi-graphical
background and the draw program when a picture is displayed.
This section provides a programming guide for the most important SCIL tasks. The guide gives brief
instructions for accomplishing various tasks with SCIL and refers to the sections in this manual and
other manuals where the used SCIL elements are detailed. The following main subjects are
discussed:
• Picture handling
• Visual SCIL object handling
• Program execution
• Process supervision and control
• Alarm and event handling
• Calculations and reports
• System configuration and communication
• Application database management
• Error handling
The error handling in pictures can be defined by a named program with the name
ERROR_HANDLER. When a SCIL error occurs in a picture program, the ERROR_HANDLER
program, if it exists, is started. The following 6 arguments are transferred to the error handler and can
be used in the named program by means of the ARGUMENT functions (see Section 10.9).
WINDOW1/PIC_FUNC_1/WINDOW2.MY_NAMED_PROGRAM
1. The picture - main picture, window picture or picture function - where the error occurred.
2. The picture functions of the picture where the error occurred.
3. The parent of the picture where the error occurred.
4. The picture functions of the parent picture.
5. The parent of the parent picture, etc., up to the main picture.
If no error handler is found, the standard picture error message is shown on the top line of the main
picture. See the Status Codes manual.
This section describes the SCIL Editor when it is accessed from the Tool Manager or from other tools
like Picture Editor, Command Procedure Object Definition tool and Dialog Editor for Visual SCIL.
GUID-054F7BC4-F062-4372-A2DA-7C3F63346FFE V1 EN-US
Figure 26: The SCIL editor as accessed from the Tool Manager
The SCIL editor is a text editor designed for editing text files and SCIL programs. The editor has
ordinary editing functions and tools for assisting design of SCIL program code. The assistant tools for
SCIL programming are dialogs for inserting SCIL commands, statements and functions as well as
syntax checking. Figure 26 shows the SCIL editor as opened from the Tool Manager. The menu bar
and the toolbar are located above the text window and below there is a status bar. The status bar
shows the current cursor position in terms of rows and columns. The active path is also shown in a
field on the status bar. Unsaved changes in the program are indicated with a colored pencil on the
status bar. The pencil is dimmed when there are no unsaved changes.
New Open a new file with the default name ‘Untitled.txt’. In case there are
unsaved changes to the current file a dialog asking if changes are to be
saved is shown.
Open... Open an existing file. Clicking Open displays a File Chooser dialog box for
selecting the file to open.
Save Save the file without changing the filename. The Save command acts as
Save As if invoked on a new file.
Save As... Save the file. A File Chooser dialog box for choosing path and file name is
opened.
Import... Insert the contents of a text file after the current line. Opens a File Chooser
dialog box for selecting the file to be imported.
Export... Export the whole text or the selected text. Opens a File Chooser dialog box,
with a default file name EXPORTED.TXT, for selecting the file to export to.
Print Setup... This command opens a standard Print Setup dialog provided by the Windows
operating system.
Print... This command opens a standard Print dialog provided by the Windows
operating system.
File history commands The names and the paths of the most recently opened files. The maximum
number of the file names and paths shown can be determined from the File
history commands in the Options menu.
More History This submenu is placed under the 5th file history command and displays the
possible commands from 6 to 20. The submenu is visible if File history
commands is set to more than 5, and if more than 5 files have been opened
after the setting was made. The commands on the submenu do not contain
any mnemonics.
Exit Exit the SCIL editor. The user is informed if there are unsaved changes to the
text.
The commands of the File menu differ whether the SCIL editor is opened from the Tool Manager or
from within another tool. When the SCIL editor is opened from the Tool Manager the File menu
contains the commands New/Open/Save and Save As..., while opened from within another tool
these commands are replaced by the Update command.
Modify All Lines/Capitalize Converts the first character to upper case and the rest to lower
case letters.
Modify All Lines/Left Trim Removes leading spaces from the lines
Modify All Lines/Right Trim Removes trailing spaces from the lines
Modify All Lines/Compress Spaces Replaces multiple spaces with a single space.
Modify All Lines|Sort Alphabetically Sorts the lines in the alphabetical order.
Modify All Lines/Sort by Length Sorts the lines in the length order.
Modify All Lines/Reverse Order Reverses the order of the lines.
Modify All Lines/Remove Duplicates Removes duplicate lines.
Find/Replace... Open a Find/Replace dialog with a field for text to find and a field
for the optional replacement text.
Find Next Performs the last specified find operation from the current cursor
position.
Find Block Find subsequent blocks of code in a SCIL program. For example
blocks delimited by a loop command.
Go To Line Move cursor to a line which line number is given in the dialog
shown by the command.
Naming Standards Open a dialog showing naming conventions for SCIL variables and Visual
SCIL objects / text identifiers.
Insert SCIL... Open a dialog for inserting SCIL commands, functions and objects. The
dialog shows the different categories in a tree structure. To expand a
category click the plus sign in front of the category name. Clicking an item in
the tree structure shows the syntax of the SCIL code in the text field to the
right in the dialog. Clicking the Insert button inserts the code at current
cursor position. Click Close to exit the dialog.
Check Syntax Check the syntax of SCIL code. Information of no found errors is shown as a
message. A found error is shown in a dialog along with an error code and the
line number of the invalid program code. The line containing invalid syntax is
shown in the text field. Edit the program and click the Check button to verify
the correction. If the correction pass the syntax check, the next error is
located and shown. When no more errors are found, a Syntax Checking
Successful message is displayed.
Status Codes... Show Status Code dialog. The inserted status code is shown as the
mnemonic status message.
File History Length Determines the maximum number of the names and the paths, of the most
recently opened files, displayed as file history commands under the File menu.
The file history length can be set between 0 and 20. Giving the length 0 means
that the file history is disabled.
Indent... Open a dialog for setting indent character count and the state for indenting new
lines.
Font|Set Font Brings up a Font Chooser for selecting the editor font.
The selected font is saved in the parameter file, and restored when the editor is
opened next time.
Font/Enlarge Size Find the next larger point size and set the editor font.
Font/Reduce Size Find the next smaller point size and set the editor font.
Font/Reset Font Set the editor font to the default value: Courier Medium Modern 10.
Shortcut Keys Shows a dialog with the sequences of keystrokes that corresponds to certain
actions not included in the menus.
User Parameter Saving Shows information about whether tool or user specific parameters are used to
save the properties and geometry of the SCIL editor.
About Shows a dialog with Tool information and System information.
The toolbar of the SCIL editor is a collection of buttons corresponding to commands found in the
menus. The toolbar is shown in Figure 27. The corresponding command of each button is explained
in Table 22.The last button Evaluate in test dialog (in Table 22) is present on the tool bar when the
editor is opened from the Test Dialog.
GUID-AD0C2DB3-F71A-43D6-9322-DC4C26B0ED37 V1 EN-US
Figure 27: Toolbar of the SCIL editor as opened from the Tool Manager
The SCIL Editor is opened when you select a program for editing in the Picture Editor, Command
Procedure object definition tool, Test Dialog or the Dialog Editor. The programs and the procedures
for starting the program editing are described in the manuals Picture Editing, Visual SCIL User
Interface Design and Application Objects.
The SCIL program editor can also be opened from the Tool Manager by clicking the SCIL Editor icon
in the Miscellaneous page.
When the SCIL Editor is opened from a tool, the user already chosen a program for editing. If it
exists, its contents is shown in the editor. If it is new, the editor is empty.
After having opened the editor from the Tool Manager, the user can open a text file for editing or
create a new file. This possibility is usually not available when the editor has been opened from an
object tool. To open a file:
1. Click Open from the File menu. A file chooser dialog box appears.
2. Select directory from the directory tree. All files are listed as default. Four different path selection
modes are supported, as described below. The default is SYS600 Relative Paths. The file list
can be viewed as a list or with details by clicking on either the List ( ) or the Details ( ) button
on the right, above the file list box.
3. Click the name of the text file, or type the file name in the data entry field below the file list. A file
can be opened also as a read-only file by selecting the Read-only check box.
4. Click Open.
To close a file and start editing of another file, open another file or click New from the File menu to
open a new file. If the previous file was not saved, the user is asked to save the changes or abandon
them.
In the File Chooser the paths can be selected in four different modes:
Application Relative Paths Path representation in the SYS600 path format relative to the current
SYS600 application home directory. The application home directory itself
can't be referenced.
SYS600 Relative Paths Path representation in the SYS600 path format relative to the SYS600
root directory. The SYS600 root directory itself can't be referenced.
Logical Paths Path representation in the SYS600 logical path format.
Operating System Paths Path representation in the format used by the operating system.
File name is given when the file is saved. If the file does not exist, a new file is created.
1. Click Save or Save As from the File menu. The Save command saves the file with the same
name, if it already exists. Use the Save As command to save the file with another name.
2. When selecting Save for the first time or Save As, the file chooser dialog box appears. Select
the correct folder from the directory tree and click on the file name, or type it in the Save as text
box. Four different path selection modes are supported, as described above. A new folder can
also be created by clicking on the Create New Folder button ( ) above the file list.
3. Click Save.
If the SCIL Editor has been opened from an object tool, save the program by choosing Update on
the File menu.
To undo the last editing operation, click Undo on the Edit menu. The undo operation revokes the last
editing operation. The maximum number of actions that can be undone is 50.
If changes has been made since the last time the program was saved, a dialog box appears
prompting to save changes.
The basic function of the SCIL Editor compares to common text editing programs. Most keyboard
keys have their natural functions. The functions of some important keys are explained below:
More information on shortcut keys is found by choosing Shortcut Keys from the Help menu.
A lengthy program/content in the SCIL editor can be scrolled up/down by scrolling the middle mouse
button.
The whole program or parts of it can be selected for moving, copying and deleting as follows:
The selected text is shown in reversed colors. It can be moved, copied and deleted as described
below. Text strings can also be replaced in the selected section.
To move text from one program to another, activate the program to be copied.
1. Place the cursor at the position where the copied text should be inserted.
2. Click Paste from the Edit menu or press CTRL+V.
To move text:
To delete text:
A comment in a SCIL program is a line or a part of a line marked by a comment mark (;) at the
beginning. When this sign appears in a program line, the rest of the line is regarded as a comment
and not executed. Comments can be used, for example, to explain how the program works or to
prevent the execution of a program line without deleting it permanently. The comment signs may be
inserted and deleted using the ordinary text editing functions. To mark several subsequent lines as
comments, the Comment and Uncomment commands of the Edit menu can aslo be used.
1. Select the lines from which the comment marks should be removed.
2. Click Uncomment on the Edit menu.
All the comment marks that are located at the beginning of the lines are removed. Semicolons
located elsewhere are not removed.
Text in paragraphs usually extends from the left margin to the right margin. A paragraph can be
indented to set it off from other text. Indenting is used to increase readability of program code.
Setting the measurement for indenting is done by choosing Indent... from the Options menu. The
checkbox Auto-indent enabled means that a new line is indented according to previous line.
To indent a section:
1. Select the lines to be indented. If no text is selected, the current line is indented.
2. Click Indent from the Edit Menu.
To unindent a section:
The Find/Replace command searches for a given text in the program. It stops when it finds the first
match and shows it as a selection. To use the Find/Replace command:
1. To search a certain part of the text, select the text to be searched. Otherwise the entire
document is searched. The Find or Replace operation is always started from the current cursor
position.
2. Click Find/Replace from the Edit menu. The dialog box shown in Figure 28 appears. Moving
the cursor is possible in the main window while the Find/Replace dialog box is open.
GUID-1E9093A3-654C-4FDD-BAEE-450373E5098C V1 EN-US
Figure 28: You can search for text that is located somewhere in the same program using
the Find/Replace command on the Edit menu
3. In the Find what field, type the text to be searched for. A document can be searched either in an
upward or downward direction of the program by selecting Forwards or Backwards under
Direction in the dialog. If the case of the text (uppercase/lowercase) is of importance, select the
check box Match Case. If a text was selected in step 1, Selection is selected under Scope.
4. Click Find First. If a matching text is found, the first match is shown selected in the text window.
If no matching text is found, a dialog box saying “Text not found” appears. After the first find
operation the Find First command button is replaced with Find Next command button, which
can be used for finding the next occurrence. Find Next may be invoked repeatedly to search for
the string until Close is clicked.
The Find Next operation in the main window is not possible while the Find/Replace dialog is open.
The last twenty items of the Find/Replace word lists are saved and restored when closing and
opening the SCIL Editor. The lists are sorted in the chronological order, last used words first.
1. To replace the occurrences found in a certain text section, select the section. Otherwise the
entire document is considered. The Find or Replace operation is always started from the
current cursor position.
2. Click Find/Replace from the Edit menu. The dialog shown in Figure 29 appears. Moving the
cursor is possible in the main window while the Find/Replace dialog box is open.
GUID-47D99EB8-D307-4832-8DA7-A21E0369B469 V1 EN-US
Figure 29: With this dialog you can replace one text with another
3. In the first text box, type the text you want to replace, and in the second box, type the text to be
replaced it with. The user can also select whether the entire document or just the selected text
section is replace. If the case of the text is of importance, select Match Case. Select search
direction under Direction.
4. Click Find First to find the first occurrence of the text string without replacing it immediately.
After the first find operation the Find First command button is replaced with Find Next
command button, which can be used for finding the next occurrence. Find Next may be invoked
repeatedly to search for the string until Close is clicked.
5. When an occurrence to be replaced is found, click Replace. This replaces the selected text and
searches the next occurrence of the text string. If the found text is edited manually in the main
window during a Find or a Replace operation, clicking Replace button replaces nothing, but the
Find Next operation is performed. Replace All replaces all occurrences of the text string.
The Find Next operation in the main window is not possible while the Find/Replace dialog is open
The last twenty items of the Find/Replace word lists are saved and restored when closing and
opening the SCIL Editor. The lists are sorted in the chronological order, last used words first.
To go to a certain SCIL block in the program, click Find Block in the Edit menu. The Find Block
command searches for the following Block commands downwards in the program starting from the
cursor:
When a block is found, it is selected in the text window. To find another block, place the cursor after
the command that ends the previous block and then click Find Block again.
1. Click Go To Line from the Edit menu or press CTRL+L on the keyboard.
The dialog shown in Figure 30 appears.
GUID-28E9526F-FFCA-4957-A55E-97D89BBE4A8F V1 EN-US
If the line number is invalid, the cursor is moved to the first line and if the given line number is too big
the cursor is moved to the last line.
Importing text means that the contents of a text file is inserted after the current line except for the
case when the cursor is located at the beginning of the text, then the text is inserted at the beginning.
To import a text file:
1. Click Import... from the File menu. The file chooser dialog box appears.
2. Select the correct folder from the directory tree and click on the name of the file.
3. Click OK.
Exporting a file means that the selected or the whole text is stored in a file. To export a text:
If there is an existing file with the same name, the user is asked to confirm overwriting of the existing
file.
In the file chooser four different path selection modes are supported, as described in Section 10.17.
Most editing operations can be cancelled using the Undo command, for example Cut/Copy/Paste
and Replace commands. When the user chooses to undo typing, undo will affect all that was written
since the last editing operation, for example Copy/Undo/Save.
The operations that have been cancelled by using Undo, can be done again. This means that an
Undo operation can also be canceled. To do this, click Redo from the Edit menu.
This assisting tool in the SCIL editor is designed to help writing SCIL code. The dialog below appears
as the Insert SCIL... command on the SCIL menu is invoked. The text box to the left in the dialog
contains the different categories of commands, functions and objects. Expand the nodes in the tree
by clicking the plus sign. Subcategories appear as leafs in the tree structure. Select a subcategory by
clicking it. When this is done commands, functions or object definition attributes appear in the text
box to the right in the dialog. The desired command, function or attribute is selected by clicking. The
status bar at the bottom of the dialog displays a short description of the selected command, function
or attribute.
GUID-25B23889-336E-49E9-AEC8-41B1D4559189 V1 EN-US
Figure 31: The Insert SCIL Commands, Functions & Objects dialog of the SCIL editor
To insert a SCIL command:
The syntax check, independent of the current cursor position, always starts at the beginning of the
program. A successful syntax check displays Syntax Checking Successful in a message box. The
syntax check command itself does not alter the code, changes are made by the user. The first
encountered invalid code is displayed in a dialog as shown in the picture below. The erroneous line is
shown in the dialog and it is also made the current line of the editor. The error is corrected in the text
window and then checked by clicking the Check button in the SCIL Syntax Error dialog. If the
correction passes the syntax check, the next error is displayed. This procedure continues until no
more errors are found and the Syntax Checking Successful message is shown. To exit the dialog
while errors still exist, click Close.
GUID-E8EC569A-23CA-4F0D-8B46-0F2ECDD3C041 V1 EN-US
Figure 32: The Syntax check command shows a dialog like this when a syntax error is
encountered
To check the syntax of a SCIL program:
The SCIL programs of pictures and command procedures can be compiled for better performance.
Compiling a SCIL program means that it is converted into an operating system independent format,
which is then executed by a so called virtual SCIL machine. The compiled code is stored, in addition
to the original SCIL code, in the picture or in the command procedure. Once a SCIL program is
compiled, the compiled version is automatically used instead of the original SCIL code. The
compilation is controlled by means of the corresponding tools, picture editor and command
procedure tool.
By compiling the SCIL code, the interpretation time is reduced to only a fraction of the original time.
However, the total time needed to execute a SCIL statement depends very much on what the
statement does, and thereby no single performance improvement between executing uncompiled
and compiled SCIL code can be given. The performance improvement varies between no
improvement and up to 50 times faster. Two extreme cases are shown below:
#loop_with i = 1 .. 1000
#if TRUE #then #block
#block_end
#loop_end
#pause 1
The picture change time of a typical single line diagram picture built with LIB500, which is compiled,
is approximately 2/3 of the time of the uncompiled version.
In most cases, a valid SCIL program executes exactly in the same way whether compiled or not
(apart from the speed). However, there are some rare cases that must be considered:
Case 1 is the simplest one to handle as it is discovered during compilation. The program must be
corrected and recompiled. Case 2 is more difficult, and careful retesting is required to point out the
possible problems. Case 3 is the most difficult one to solve, but it is also an almost academic case
which is hard to encounter unless deliberately written. Because of these possible incompatibilities, a
compiled SCIL program must be thoroughly retested.
In most cases, the problems arise from wild usage of variable expansions. The cases are described
in more detail below. Recommendations on how to avoid this kind of problems are given as well.
A compiled SCIL program may be harder to debug than an uncompiled one, because the source
lines are not available at run-time. The error message field on the top left corner of a picture is not
able to show the erroneous SCIL line (only the line number is given). The standard error dialog of VS
objects is also unable to display the line that caused the error. It is recommended that a SCIL
program is first debugged uncompiled, and after that compiled to a product version.
There are two cases when a valid SCIL program does not compile:
• HMI commands do not compile. HMI commands are commands that are addressed to the HMI
program started by !MODULENAME command (such as the old picture editor program PICG). In
normal pictures they generate an error; 896 (PICO_NO_MODULE_TO_SEND_MESSAGE).
This restriction is a deliberate choice. HMI commands are seldom needed, and it is easy to write
a HMI command by mistake, for example, by omitting character # or @ at the beginning of a
line.
• Variable expansions are used in a way that hides the program structure from the reader.
Example 1:
Example 2:
@END = "_END"
#BLOCK
.DO_SOMETHING
#BLOCK'END'
Example 3:
@A = "1 + "
@B = 'A' 2
There are two cases when a program runs without errors when uncompiled but not when compiled:
• Alias checking is always performed by the Virtual SCIL Machine regardless of the revision
compatibility switch (NO_ALIAS_CHECKING). The SCIL program design must be corrected to
enable compilation if the compiled program fails with error code 580
(SCIL_VARIABLE_ALIASING_ERROR).
• Variable expansions are used in a way that hides certain syntactical language elements from the
reader.
Example 1:
@V = "AI(%INDEX)"
@POWER = OBJECT:P'V' ;Index expression hidden
@V = "AI5"
@POWER = OBJECT:P'V'
Example 2:
@A = 1
@B = 2
@C = 'A'.'B' ;The compiler assumes that the right hand
;expression is a VS object or window
attribute reference
If variable expansions are used in a way that hides the correct evaluation order of an expression, the
results of compiled and uncompiled program may be different.
Example:
@A = "1 + 2"
@B = "3 + 4"
@C = 'A' * 'B'
@C = 1 + 2 * 3 + 4
The compiler relies on what it sees as it generates byte code which expands and evaluates A first,
then B and finally multiplies the two. The result is (1 + 2) * (3 + 4) = 21.
To avoid the potential problems described above (and to make SCIL programs more readable),
following recommendations on the use of variable expansions may be given:
As another advantage, the direct variable access is faster than expansion even in uncompiled
programs.
@OLD_ERROR_STATE = ERROR_STATE
#ERROR IGNORE
.DO_SOMETHING
When variable expansions are used as recommended above, the compiled and uncompiled program
always behave identically. Even most cases of other 'non-pathological' (or even 'pathological') use of
expansions work as they are expected.
Examples:
@V = "PBO1"
#SET OBJECT:'V' = 1
@V = "OBJECT:PBO1"
#SET 'V' = 1
@V = "DIALOG\BUTTON"
.SET 'V'.TITLE = "Push me"
.SET 'V'_2.TITLE = "Push me too"
@NAME = "ABC"
@'NAME' = %'NAME' + 1
This appendix lists the ODBC error codes which the SCIL SQL interface may return.
The character string value consists of a two character class value followed by a three character
subclass value. A class value of "01" indicates a warning and is accompanied by a return code of
SQL_SUCCESS_WITH_INFO. The class values other than "01", except for the class "IM", indicate
an error and are accompanied by a return code of SQL_ERROR. The class "IM" is specific to
warnings and errors that derive from the implementation of ODBC itself. The subclass value "000" in
any class is for implementation defined conditions within the given class.
Note 2 Although the SCILSQL interface has only eight functions the user can call, it includes several
different ODBC functions. ODBC error codes may also refer to those hidden functions.
SQLSTATE Error
01000 General warning
01002 Disconnect error
01004 Data truncated
01006 Priviledge not revoked
01S02 Option value changed
01S03 No rows updated or deleted
01S04 More than one row updated or deleted
07001 Wrong number of parameters
07006 Restricted data type attribute violation
08001 Unable to connect to data source
08002 Connection in use
08003 Connection not open
08004 Data source rejected establishment of connection
08007 Connection failure during transaction
08S01 Communication link failure
21S01 Insert value list does not match column list
21S02 Degree of derived table does not match column list
22003 Numeric value out of range
22005 Error in assignment
22008 Datetime field overflow
22012 Division by zero
23000 Integrity constraint violation
Table continues on next page
SQLSTATE Error
24000 Invalid cursor state
25000 Invalid transaction state
28000 Invalid authorization specification
34000 Invalid cursor name
37000 Syntax error or access violation
40001 Serialization failure
42000 Syntax error or access violation
IM001 Driver does not support this function
IM002 Data source name not found and no default driver specified
IM003 Specified driver could not be loaded
IM004 Driver’s SQLAllocEnv failed
IM005 Driver’s SQLAllocConnect failed
IM006 Driver’s SQLSetConnect-Option failed
IM009 Unable to load translation DLL
IM013 Trace file error
S0001 Base table or view already exists
S0002 Base table not found
S0011 Index already exists
S0012 Index not found
S0021 Column already exists
S0022 Column not found
S1000 General error
S1001 Memory allocation failure
S1002 Invalid column number
S1003 Program type out of range
S1008 Operation cancelled
S1009 Invalid argument value
S1010 Function sequence error
S1011 Operation invalid at this time
S1012 Invalid transaction operation code specified
S1090 Invalid string or buffer length
S1092 Option type out of range
S1109 Invalid cursor position
S1C00 Driver not capable
S1T00 Timeout expired
This appendix describes the parameter files used in SYS600. First, it gives a general description,
then a detailed description in BNF format.
Parameter files contain data in a Windows ini-file style format. A parameter file consists of any
number of sections and any number of comment lines. Each section consists of a section header and
any number of keys: value pairs, empty lines and comment lines. However, the total number of lines
in a file is limited to the maximum length of SCIL vector.
Example:
[SECTION1]
KEY=VALUE
;this is a comment
[SECTION2]
KEY=VALUE
A section begins with a header, the name of the section enclosed in brackets, e.g. [section name],
and ends at the beginning of another section or at the end of the file. The enclosing brackets ([]) are
required, and the left bracket must be in the leftmost column.
extended_name_char ::= SP NC
Index
LOCAL_TIME_ADD...............................146, 169 N
LOCAL_TIME_INFORMATION............. 146, 169 NA..................................................................330
LOCAL_TIME_INTERVAL.....................146, 170 Name................................................. 51, 54, 330
LOCAL_TO_SYS_TIME........................ 146, 170 NAME_HIERARCHY..................................... 249
LOCAL_TO_UTC_TIME........................146, 170 Named program.........................................32, 68
Local variables.................................................79 Natural logarithm................................... 146, 162
LOCATE................................................ 146, 187 NET................................................................. 52
Logging profile................................................. 53 NETWORK_TOPOLOGY_MANAGER..147, 255
LOGICAL_MAPPING............................ 147, 253 Network Topology.......................................... 255
Logical names................................................. 39 NEW_PIC.............................................. 126, 127
Logical operator.........................................86, 91 New Folder............................................ 352, 356
Logical path................................................... 116 NOD...........................................................51, 52
Logical representation library...................96, 117 Normal Mode................................................... 28
LOOP.......................................................98, 103 NOT................................................................. 91
LOOP_END..................................... 98, 103, 104 Notification window................................ 142, 211
LOOP_EXIT.............................................98, 105
LOOP_WITH........................................... 98, 104 O
LOW.............................................. 145, 147, 197 Object.................................... 29, 49, 53, 96, 108
LOW_INDEX................................. 145, 147, 197 OBJECT_ATTRIBUTE_INFO................ 148, 218
LOWER_CASE......................................147, 187 Object notation.......................................... 50, 54
LS.................................................................. 330 Object query............................................ 96, 110
LW................................................................. 330 OCT....................................................... 148, 187
OCT_SCAN........................................... 148, 188
M Octal number................................................... 41
Main picture..................................................... 31 ODBC functions.............................................289
MAX.......................................................147, 162 ODD.......................................................148, 164
MAX_APPLICATION_NUMBER............147, 216 ON..................................................... 61, 98, 105
MAX_BIT_STRING_LENGTH............... 147, 216 ON ERROR............................................. 98, 106
MAX_BYTE_STRING_LENGTH........... 147, 216 ON KEY_ERROR.................................... 98, 106
MAX_INTEGER.....................................147, 216 OPC_AE_ACKNOWLEDGE..................148, 296
MAX_LINK_NUMBER........................... 147, 216 OPC_AE_NAMESPACE........................148, 297
MAX_LIST_ATTRIBUTE_COUNT.........147, 216 OPC_AE_REFRESH.............................148, 298
MAX_MONITOR_NUMBER.................. 147, 216 OPC_AE_SERVERS.............................148, 298
MAX_NODE_NUMBER.........................147, 217 OPC_AE_VALIDATE............................. 148, 299
MAX_OBJECT_NAME_LENGTH..........147, 217 OPC_DA_NAMESPACE....................... 148, 300
MAX_PICTURE_NAME_LENGTH........ 147, 217 OPC_DA_REFRESH.............................148, 301
MAX_PRINTER_NUMBER................... 147, 217 OPC_DA_SERVERS.............................148, 302
MAX_PROCESS_OBJECT_INDEX...... 147, 217 OPC_NAME_MANAGER...................... 149, 295
MAX_REPRESENTATION_NAME_LENGTH..... OPC Name Database....................................294
147, 217 OPEN_FILE................................................... 119
MAX_STATION_NUMBER.................... 147, 217 Operands.........................................................85
MAX_STATION_TYPE_NUMBER.........147, 217 Operator.............................................. 85, 86, 91
MAX_TEXT_LENGTH........................... 147, 218 OPS_CALL............................................ 149, 208
MAX_VECTOR_LENGTH..................... 147, 218 OPS_NAME...........................................149, 213
MAX_WINDOW_NAME_LENGTH........ 147, 218 OPS_PROCESS................................... 149, 209
MEAN.................................................... 147, 200 OR................................................................... 91
MEMORY_POOL_USAGE....................147, 212 OTHERWISE.............................................98, 99
MEMORY_USAGE................................147, 208
MERGE_ATTRIBUTES......................... 147, 206 P
Method.......................................................33, 50 PACK_STR............................................149, 188
Method call.................................................... 124 PACK _TIME......................................... 149, 171
Method calls.................................................... 66 PAD....................................................... 149, 189
MIN........................................................ 147, 163 Parameter files................................................ 73
MIN_INTEGER...................................... 147, 218 PARENT................................................ 324, 326
MINUTE.................................................147, 171 Parent object................................................... 64
Mix................................................................. 331 PARSE_FILE_NAME.............................149, 263
MOD.......................................................... 86, 87 Part picture...................................................... 31
MODIFY......................................... 111, 124, 125 PATH..............................................115, 149, 264
MON................................................................ 51 PATHS................................................... 149, 264
Monitor.....................................97, 126, 324, 326 PAUSE.....................................................98, 106
MONTH................................................. 147, 171 Pending......................................................... 339
MOUSE......................................................... 337 PEND OFF............................................ 338, 339
MOUSE DISCARD........................................ 338 PEND ON.............................................. 338, 339
Mouse input................................................... 337 Peripherals equipment.....................................52
MOUSE OFF................................................. 337 PHYSICAL_MAPPING.......................... 149, 254
MOUSE ON................................................... 337 PIC_NAME...................................................... 82
Moving in SCIL Program Editor..................... 353 PICK...................................................... 149, 200
Multiplication..............................................86, 87 Picture......................................... 25, 66, 97, 133
Picture commands...........................................95
Picture Editor................................................... 31
Y
YEAR.....................................................153, 180