{"title":"Digital processing for non-stationary narrow-band interference suppression in fading channels","authors":"R. S. Nelson, T. Kasparis","doi":"10.1109/SECON.1994.324346","DOIUrl":"https://doi.org/10.1109/SECON.1994.324346","url":null,"abstract":"The suppression of narrow-band interference has long been a concern in direct-sequence spread spectrum (DS-SS) communication systems. Recently, transform domain processing (TDP) approaches have been used to suppress intentional interference. This paper extends previous work done in the area of TDP utilizing non-linear rank order filters, namely conditional median filters (CMFs). The paper confronts problems incurred in Rayleigh distributed fading channels. A solution is suggested by introducing a normalized adaptive median filter. This adaptive approach considers each received bit independently and uses a normalization metric to compensate for fading. The paper also presents bit error rates (BER) for a DS-SS receiver employing the proposed approach. Using Monte-Carlo simulations the BER of the fading channel was determined for various jammer and fading scenarios, and results are presented.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"25 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural networks as robot arm manipulator controller","authors":"R. Szabo, P. Szabo, A. Pandya","doi":"10.1109/SECON.1994.324284","DOIUrl":"https://doi.org/10.1109/SECON.1994.324284","url":null,"abstract":"Traditional controllers used in robot arm manipulators are complex, nonadaptive, and somewhat slow. Several researchers have developed approaches that use neural networks as controllers. This paper includes a theoretical discussion and design details for a robot arm manipulator controller using a neural network trained by feedback error learning, originally proposed by Kawato. The scheme and technique used in this research differ from the work published earlier (Kawato, Furukawa, and Suzuki 1987, Kawato, Isobe, Mayeda, and Suzuki 1988, and Lippman, 1987), although analyses and implementation presented here combine the best of them. The feedback learning scheme was implemented for robot arm manipulator with three degrees of freedom. The results of simulation were compared with the desired trajectory given.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial neural network for the inverse electromagnetic problem of system identification","authors":"A. Arkadan, Y. Chen","doi":"10.1109/SECON.1994.324289","DOIUrl":"https://doi.org/10.1109/SECON.1994.324289","url":null,"abstract":"An approach which is based on the use of artificial neural networks and finite element analysis is used to solve the inverse problem of system identification. The approach is used on a test problem to identify location, material and values of unknown sources within an inaccessible region. A comparison of actual and predicted values of the unknown parameters demonstrates the validity of this approach.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electromagnetic field scattering by an inhomogeneous composite circular cylinder","authors":"M. Kolbehdari","doi":"10.1109/SECON.1994.324290","DOIUrl":"https://doi.org/10.1109/SECON.1994.324290","url":null,"abstract":"The scattering of electromagnetic field by an inhomogeneous composite cylinder is presented. The inhomogeneous composite circular cylinder is illuminated by a line source or plane wave in free space. The analysis of the problem involves applying the field equivalence principle to derive for each excitation (TE or TM) a system of coupled integral equations for the equivalent magnetic currents on the dielectric interfaces. The integral equations are solved by Galerkin's method. The far-scattered field and the radar cross section for both polarization are obtained in terms of the equivalent magnetic currents on the dielectric interfaces. The analysis is specialized to the problem of a conducting strip loaded by an inhomogeneous dielectric cylinder, as well as to the case of plane wave excitation. It is also shown that the radar cross section is reduced by increasing the dielectric constant of the dielectric portions of the composite circular cylinder.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131484054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISDN coin phone","authors":"K. Bender","doi":"10.1109/SECON.1994.324321","DOIUrl":"https://doi.org/10.1109/SECON.1994.324321","url":null,"abstract":"Presents the ISDN coin phone concept (ICP). The ICP may be located at airports, convention centres, hotels or any other area where individuals need to get access to the network. The ICP will provide such services as voice telephony, videotelephony, database access, e-mail and fax.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A customer-oriented test-estimation test","authors":"Hede Ma","doi":"10.1109/SECON.1994.324307","DOIUrl":"https://doi.org/10.1109/SECON.1994.324307","url":null,"abstract":"In this paper, a customer-oriented test, estimation test (COTET), is presented, which is an application of estimation theory into compact testing, to speed up error detection with optimized test quality in VLSI circuits. An algorithm is developed for customers to estimate and generate test parameters efficiently in COTET. Finally, the COTET will be evaluated by simulation to prove its efficiency. The results of the simulation will be given in presentation.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using operating system routines for control and I/O applications","authors":"W. Subbarao","doi":"10.1109/SECON.1994.324287","DOIUrl":"https://doi.org/10.1109/SECON.1994.324287","url":null,"abstract":"In the present day industrial environment, microcomputers such as IBM PC or Apple Macintosh have become very handy tools and subsystems for control and automation. Most of the software routines are written in higher level and transportable languages such as C or Pascal. Most of these microcomputers are networked together and the intelligence is shared to perform several other tasks, including task distributions. Many times, data needs to be entered into host system and is to be examined. Similarly, many times data need to be displayed on to the terminal for examination and further action. These operations involve some of the built in input/output functions of host system under consideration. Fortunately, the operating system of the host computer contains some of the I/O routines written in assembly and optimized for performance. A knowledge about these routines and how to use them with other software modules will greatly help utilization of these computers as host systems. We present some of the most widely used I/O routines for the IBM PC family of computers and case studies involving these built in routines. We also present some of the applications involving these routines which will help in the industrial use of these systems as host computers.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133084095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The use of wavelet transform as a preprocessor for the neural network detection of EEG spikes","authors":"T. Kalayci, O. Ozdamar, N. Erdol","doi":"10.1109/SECON.1994.324252","DOIUrl":"https://doi.org/10.1109/SECON.1994.324252","url":null,"abstract":"In this study, the wavelet transform is used to process EEG data as input to a feed forward neural network for the detection of epileptogenic transient waveforms. The compression capability of wavelet transform provided the inclusion of data before and after the spike for contextual information without increasing input size of the neural network. The network is trained for the detection of spikes and non-spikes. The results show that wavelet transform can be used to provide more relevant information for improving the detection of epileptogenic spikes for automated EEG monitoring of seizure patients.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"26 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 3-tier structured access protocol to control unfairness in DQDB MANs","authors":"L. Kumar, A. D. Bovopoulos","doi":"10.1109/SECON.1994.324269","DOIUrl":"https://doi.org/10.1109/SECON.1994.324269","url":null,"abstract":"Presents a 3-tier structured access protocol to address the unfairness problems in DQDB. These domains subdivide the access mechanism (depending on the aggregate network traffic) and address the dominating cause of unfairness. At low loads, the 802.6 mechanism is retained. The second domain addresses latency-related unfairness. At heavy loads, access protection is applied. Emphasis is given to the graded (or symmetric) load type, which is the most natural load pattern in a unidirectional channel. The proposed fair access protocol is studied under different load types and traffic demand. A tuning scheme is also outlined that extends the potential for dynamic bandwidth allocation.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123586962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of issues relating to traffic restoration in wide area communication networks","authors":"K. Balakrishnan, S. Menon, D. Tipper","doi":"10.1109/SECON.1994.324312","DOIUrl":"https://doi.org/10.1109/SECON.1994.324312","url":null,"abstract":"In this paper, we compare two different criteria for the traffic restoration process at a node in a wide area communication network. The issue of the timing of the reconnection is compared with the issue of ordering the virtual circuits that need reconnection. In the first scheme, an algorithm is developed to minimize the amount of time the network is congested while the latter scheme tries to minimize the probability of blocking of calls during the reconnection process. The feasibility of implementing both these schemes simultaneously in a network is studied.<<ETX>>","PeriodicalId":119615,"journal":{"name":"Proceedings of SOUTHEASTCON '94","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123590061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}