{"title":"A novel MIMO fuzzy model","authors":"Jian Qiu Zhang, S. Ovaska, X. Gao","doi":"10.1109/SECON.1999.766081","DOIUrl":"https://doi.org/10.1109/SECON.1999.766081","url":null,"abstract":"A novel method for the construction of multi-input-multi-output (MIMO) fuzzy logic systems is proposed. A training algorithm for this MIMO fuzzy model, based on the backpropagation (BP) technique, is also given. Comparing to the conventional modeling method, the MIMO fuzzy model described is less complex due to a smaller number of adjustable parameters. Besides, its training time is decreased as much as 30% of the conventional method. Consequently, the proposed method is especially suitable for real world MIMO modeling applications.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation of a real-time experimental/analysis system for the energy conversion laboratory","authors":"O. Mohammed, R. Sebastien, G. Roig","doi":"10.1109/SECON.1999.766110","DOIUrl":"https://doi.org/10.1109/SECON.1999.766110","url":null,"abstract":"This paper presents a system for visually analyzing the electromagnetic fields of electrical machines used in the energy conversion laboratory. The system utilizes the finite element method as well as various modules to achieve a real-time effect in the analysis of electrical machines while hands-on experimentation is in progress. The proposed system is aimed at developing a tool that would help improve the student's understanding of electromagnetic fields inside these machines and its use in calculating performance measures as well as operational concepts pertaining to the practical study of electrical machines.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116403726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent-host mutual authentication","authors":"O. Ba-Rukab, M. M. Shahsavari","doi":"10.1109/SECON.1999.766120","DOIUrl":"https://doi.org/10.1109/SECON.1999.766120","url":null,"abstract":"As an alternative to the present client/server applications on the Internet, researchers in universities and industry are trying to define a secure agent infrastructure which can protect both the agent and the agent place (server, ducking place). The main advantage of the agent is that it can move (roam) on the Internet searching for answers for the users. Such feature saves a lot of bandwidth as more people demand their home and office environments to be available to them on their notebook computers with wireless communications with significantly lower bandwidth. In order for the agent to perform its task(s), it must be able to protect its resources against any malicious act and the same thing applies for the hosting place. The purpose of this paper is to provide a protocol for mutual authentication between the agent and the host. This protocol is such that it works with different agent paradigms.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121918418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of algorithms for detection of the number of signal sources","authors":"A. Sekmen, Z. Bingul","doi":"10.1109/SECON.1999.766094","DOIUrl":"https://doi.org/10.1109/SECON.1999.766094","url":null,"abstract":"Some procedures for detection of the number of signal sources in presence of noise are compared. Two kinds of noise are considered. First, signals in the presence of Gaussian white noise under an additive model are examined. In this case, the problem is just to find the multiplicity of the smallest eigenvalue of the covariance matrix of the observation vector. Second, signals in presence of noise with arbitrary covariance matrix are investigated. In this case, the problem is to find the multiplicity of the smallest eigenvalue of the multiplicity of the covariance matrix of the observation vector and the inverse of the covariance matrix of the noise vector. For both cases methods based on information theoretic criteria are used. Specifically, the AIC method introduced by Akaike (1972), Schwartz's (1978) method, Rissanen's (1978) MDL, and Zhao, Krishnaih and Bai's (1986) method are used.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121924677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced light emission from a silicon n/sup +/pn CMOS structure","authors":"L. Snyman, A. Biber","doi":"10.1109/SECON.1999.766132","DOIUrl":"https://doi.org/10.1109/SECON.1999.766132","url":null,"abstract":"A special Si n/sup +/pn CMOS technology compatible device has been designed and which yields an optical emission intensity 2 nW per 2 micron diameter of chip area. The electrical-to-optical conversion efficiency is 1.5/spl times/10/sup 6/ which is nearly three orders of magnitude higher than previously published values for Si LED devices that operate in the avalanche mode. The design of the device was based on Monte Carlo simulations and predictions which showed that about 3 orders magnitude increase could be obtained for the photon emission rate if the prevailing electric field in a pn junction was increased to 600 kV cm/sup -1/. The high emission intensity in the small spot area the higher conversion efficiencies, and the complete CMOS compatibility of the device, the fact that the emission intensity is about three orders of magnitude higher than the detectability limit of detector devices of similar size, all predict some promising technological applications in future generation LSI and VLSI silicon optoelectronic circuitry.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122579165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microcellular handoff control using robust prediction techniques","authors":"N. Savkoor, R. Sankar","doi":"10.1109/SECON.1999.766152","DOIUrl":"https://doi.org/10.1109/SECON.1999.766152","url":null,"abstract":"A new handoff schedule based on user mobility patterns and signal strength prediction for microcellular wireless networks is proposed. The signal strength prediction is based on the least mean square (LMS) adaptation algorithm and user mobility pattern is determined by a heuristic next-cell prediction technique. The handoffs previously performed can be used to predict the next visited cell of the user, once adequate information regarding past mobility patterns are available. In addition, signal strength-based prediction on the selected next-cell can aid in reduction of unnecessary handoffs to neighboring cells, not in the routine path of the user. Results show a significant reduction in the mean number of handoffs by the proposed combined prediction scheme.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Past and present methods for computing the dielectric constant of lattices of spheres","authors":"K.W. Whites","doi":"10.1109/SECON.1999.766134","DOIUrl":"https://doi.org/10.1109/SECON.1999.766134","url":null,"abstract":"The computation of the effective electromagnetic material parameters for a composite material is a complex and well-visited problem. For collections of spheres in a static field, the celebrated Clausius-Mossotti equation provides extremely good dielectric constant values when mutual interaction between particles is negligible. When mutual coupling is not negligible and identical spheres are arrayed on an infinite lattice, accurate values for the dielectric constant can be found using techniques described by Rayleigh and later refined by McPhedran and McKenzie (1978) and McKenzie et al. (1978). In this paper, we first provide a brief look at the effective dielectric constant methods developed for infinite lattices of identical particles. This is followed by developments in this area using a new T-matrix identity and subsequent extraction of the effective dielectric constant.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling of a phase-locked loop servo controller with encoder feedback","authors":"C. A. Adkins, M.A. Marra","doi":"10.1109/SECON.1999.766091","DOIUrl":"https://doi.org/10.1109/SECON.1999.766091","url":null,"abstract":"This paper presents a model of a phase-locked loop servo control mechanism using describing function analysis. A closed-loop control system is obtained by replacing the voltage-controlled oscillator of the phase-locked loop with a servo system with encoder feedback. In this way, the velocity of the servo is controlled via the phase-locked loop. A model of the system is obtained using describing function methodology. Control analysis of the resulting nonlinear system is also discussed.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127596075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion prevention technique for ATM networks","authors":"Emad AI-Hammadi, M. M. Shahsavari","doi":"10.1109/SECON.1999.766098","DOIUrl":"https://doi.org/10.1109/SECON.1999.766098","url":null,"abstract":"ATM networks do not operate in an effective and stable way without preventing congestion. Traffic management is concerned with the design of mechanisms which ensure that the network bandwidth, buffer and resources are efficiently utilized, while meeting the various quality of service (QoS) guarantees given to sources as part of a traffic contract. In this paper, a new and improved congestion control scheme is proposed to support the best-effort ABR traffic, as a result of investigating the most widely recognized congestion control schemes for ABR service. Some of these schemes show either lack of scalability or fairness while other well-behaved schemes may require a highly complex switch algorithm that is unsuitable for implementation in cell-switching high-speed ATM networks. Our algorithm provides the congestion avoidance ability with high throughput and low delay, in addition of achieving the max-min fairness allocation.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining the effect of sidelobe structure on angle of arrival measurements using monopulse techniques","authors":"J.W. Kemp, L. Corey","doi":"10.1109/SECON.1999.766148","DOIUrl":"https://doi.org/10.1109/SECON.1999.766148","url":null,"abstract":"The sidelobe structure of a transmitting antenna can cause errors of angle-of-arrival (AOA) measurements by a receiving antenna. This paper addresses the conditions necessary for these measurement errors to occur by examining sidelobe data for three antennas. In addition, a maximum limit on the possible AOA measurement errors is determined.","PeriodicalId":126922,"journal":{"name":"Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132070561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}