Proceedings of SOUTHEASTCON '94最新文献

筛选
英文 中文
Digital processing for non-stationary narrow-band interference suppression in fading channels 衰落信道中非平稳窄带干扰抑制的数字处理
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324346
R. S. Nelson, T. Kasparis
{"title":"Digital processing for non-stationary narrow-band interference suppression in fading channels","authors":"R. S. Nelson, T. Kasparis","doi":"10.1109/SECON.1994.324346","DOIUrl":"https://doi.org/10.1109/SECON.1994.324346","url":null,"abstract":"The suppression of narrow-band interference has long been a concern in direct-sequence spread spectrum (DS-SS) communication systems. Recently, transform domain processing (TDP) approaches have been used to suppress intentional interference. This paper extends previous work done in the area of TDP utilizing non-linear rank order filters, namely conditional median filters (CMFs). The paper confronts problems incurred in Rayleigh distributed fading channels. A solution is suggested by introducing a normalized adaptive median filter. This adaptive approach considers each received bit independently and uses a normalization metric to compensate for fading. The paper also presents bit error rates (BER) for a DS-SS receiver employing the proposed approach. Using Monte-Carlo simulations the BER of the fading channel was determined for various jammer and fading scenarios, and results are presented.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"25 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Neural networks as robot arm manipulator controller 神经网络作为机器人手臂机械手的控制器
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324284
R. Szabo, P. Szabo, A. Pandya
{"title":"Neural networks as robot arm manipulator controller","authors":"R. Szabo, P. Szabo, A. Pandya","doi":"10.1109/SECON.1994.324284","DOIUrl":"https://doi.org/10.1109/SECON.1994.324284","url":null,"abstract":"Traditional controllers used in robot arm manipulators are complex, nonadaptive, and somewhat slow. Several researchers have developed approaches that use neural networks as controllers. This paper includes a theoretical discussion and design details for a robot arm manipulator controller using a neural network trained by feedback error learning, originally proposed by Kawato. The scheme and technique used in this research differ from the work published earlier (Kawato, Furukawa, and Suzuki 1987, Kawato, Isobe, Mayeda, and Suzuki 1988, and Lippman, 1987), although analyses and implementation presented here combine the best of them. The feedback learning scheme was implemented for robot arm manipulator with three degrees of freedom. The results of simulation were compared with the desired trajectory given.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Artificial neural network for the inverse electromagnetic problem of system identification 人工神经网络用于电磁逆问题的系统辨识
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324289
A. Arkadan, Y. Chen
{"title":"Artificial neural network for the inverse electromagnetic problem of system identification","authors":"A. Arkadan, Y. Chen","doi":"10.1109/SECON.1994.324289","DOIUrl":"https://doi.org/10.1109/SECON.1994.324289","url":null,"abstract":"An approach which is based on the use of artificial neural networks and finite element analysis is used to solve the inverse problem of system identification. The approach is used on a test problem to identify location, material and values of unknown sources within an inaccessible region. A comparison of actual and predicted values of the unknown parameters demonstrates the validity of this approach.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electromagnetic field scattering by an inhomogeneous composite circular cylinder 非均匀复合材料圆柱的电磁场散射
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324290
M. Kolbehdari
{"title":"Electromagnetic field scattering by an inhomogeneous composite circular cylinder","authors":"M. Kolbehdari","doi":"10.1109/SECON.1994.324290","DOIUrl":"https://doi.org/10.1109/SECON.1994.324290","url":null,"abstract":"The scattering of electromagnetic field by an inhomogeneous composite cylinder is presented. The inhomogeneous composite circular cylinder is illuminated by a line source or plane wave in free space. The analysis of the problem involves applying the field equivalence principle to derive for each excitation (TE or TM) a system of coupled integral equations for the equivalent magnetic currents on the dielectric interfaces. The integral equations are solved by Galerkin's method. The far-scattered field and the radar cross section for both polarization are obtained in terms of the equivalent magnetic currents on the dielectric interfaces. The analysis is specialized to the problem of a conducting strip loaded by an inhomogeneous dielectric cylinder, as well as to the case of plane wave excitation. It is also shown that the radar cross section is reduced by increasing the dielectric constant of the dielectric portions of the composite circular cylinder.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131484054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISDN coin phone ISDN投币电话
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324321
K. Bender
{"title":"ISDN coin phone","authors":"K. Bender","doi":"10.1109/SECON.1994.324321","DOIUrl":"https://doi.org/10.1109/SECON.1994.324321","url":null,"abstract":"Presents the ISDN coin phone concept (ICP). The ICP may be located at airports, convention centres, hotels or any other area where individuals need to get access to the network. The ICP will provide such services as voice telephony, videotelephony, database access, e-mail and fax.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A customer-oriented test-estimation test 面向客户的测试-评估测试
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324307
Hede Ma
{"title":"A customer-oriented test-estimation test","authors":"Hede Ma","doi":"10.1109/SECON.1994.324307","DOIUrl":"https://doi.org/10.1109/SECON.1994.324307","url":null,"abstract":"In this paper, a customer-oriented test, estimation test (COTET), is presented, which is an application of estimation theory into compact testing, to speed up error detection with optimized test quality in VLSI circuits. An algorithm is developed for customers to estimate and generate test parameters efficiently in COTET. Finally, the COTET will be evaluated by simulation to prove its efficiency. The results of the simulation will be given in presentation.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using operating system routines for control and I/O applications 使用操作系统例程进行控制和I/O应用程序
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324287
W. Subbarao
{"title":"Using operating system routines for control and I/O applications","authors":"W. Subbarao","doi":"10.1109/SECON.1994.324287","DOIUrl":"https://doi.org/10.1109/SECON.1994.324287","url":null,"abstract":"In the present day industrial environment, microcomputers such as IBM PC or Apple Macintosh have become very handy tools and subsystems for control and automation. Most of the software routines are written in higher level and transportable languages such as C or Pascal. Most of these microcomputers are networked together and the intelligence is shared to perform several other tasks, including task distributions. Many times, data needs to be entered into host system and is to be examined. Similarly, many times data need to be displayed on to the terminal for examination and further action. These operations involve some of the built in input/output functions of host system under consideration. Fortunately, the operating system of the host computer contains some of the I/O routines written in assembly and optimized for performance. A knowledge about these routines and how to use them with other software modules will greatly help utilization of these computers as host systems. We present some of the most widely used I/O routines for the IBM PC family of computers and case studies involving these built in routines. We also present some of the applications involving these routines which will help in the industrial use of these systems as host computers.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133084095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of wavelet transform as a preprocessor for the neural network detection of EEG spikes 利用小波变换作为预处理,实现了神经网络对脑电图峰值的检测
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324252
T. Kalayci, O. Ozdamar, N. Erdol
{"title":"The use of wavelet transform as a preprocessor for the neural network detection of EEG spikes","authors":"T. Kalayci, O. Ozdamar, N. Erdol","doi":"10.1109/SECON.1994.324252","DOIUrl":"https://doi.org/10.1109/SECON.1994.324252","url":null,"abstract":"In this study, the wavelet transform is used to process EEG data as input to a feed forward neural network for the detection of epileptogenic transient waveforms. The compression capability of wavelet transform provided the inclusion of data before and after the spike for contextual information without increasing input size of the neural network. The network is trained for the detection of spikes and non-spikes. The results show that wavelet transform can be used to provide more relevant information for improving the detection of epileptogenic spikes for automated EEG monitoring of seizure patients.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"26 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
The 3-tier structured access protocol to control unfairness in DQDB MANs 采用三层结构访问协议控制DQDB城域网中的不公平性
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324269
L. Kumar, A. D. Bovopoulos
{"title":"The 3-tier structured access protocol to control unfairness in DQDB MANs","authors":"L. Kumar, A. D. Bovopoulos","doi":"10.1109/SECON.1994.324269","DOIUrl":"https://doi.org/10.1109/SECON.1994.324269","url":null,"abstract":"Presents a 3-tier structured access protocol to address the unfairness problems in DQDB. These domains subdivide the access mechanism (depending on the aggregate network traffic) and address the dominating cause of unfairness. At low loads, the 802.6 mechanism is retained. The second domain addresses latency-related unfairness. At heavy loads, access protection is applied. Emphasis is given to the graded (or symmetric) load type, which is the most natural load pattern in a unidirectional channel. The proposed fair access protocol is studied under different load types and traffic demand. A tuning scheme is also outlined that extends the potential for dynamic bandwidth allocation.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123586962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study of issues relating to traffic restoration in wide area communication networks 广域通信网络通信量恢复问题的研究
Proceedings of SOUTHEASTCON '94 Pub Date : 1994-04-10 DOI: 10.1109/SECON.1994.324312
K. Balakrishnan, S. Menon, D. Tipper
{"title":"A study of issues relating to traffic restoration in wide area communication networks","authors":"K. Balakrishnan, S. Menon, D. Tipper","doi":"10.1109/SECON.1994.324312","DOIUrl":"https://doi.org/10.1109/SECON.1994.324312","url":null,"abstract":"In this paper, we compare two different criteria for the traffic restoration process at a node in a wide area communication network. The issue of the timing of the reconnection is compared with the issue of ordering the virtual circuits that need reconnection. In the first scheme, an algorithm is developed to minimize the amount of time the network is congested while the latter scheme tries to minimize the probability of blocking of calls during the reconnection process. The feasibility of implementing both these schemes simultaneously in a network is studied.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123590061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信