{"title":"A fractional-n PLL frequency synthesizer design","authors":"Seon-Keun Kim, Youngsik Kim","doi":"10.1109/SECON.2005.1423222","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423222","url":null,"abstract":"This paper proposes a fractional-N phase-locked loop (PLL) frequency synthesizer using 3rd order /spl Delta//spl Sigma/ modulator for 915 MHz medium speed FSK wireless link. The voltage-controlled oscillator (VCO), pre-scaler of divide-by-8, phase frequency detector (PFD), and charge pump (CP) have been developed with 0.25-/spl mu/m CMOS process. A 3rd order external loop filter has been optimized to reduce the lock-in time. The fractional-N divider and 3rd order /spl Delta//spl Sigma/ modulator have been designed with the VHDL codes, and implemented through the FPGA board of the Xilinx Spartan2E. The VCO has been designed to span from 900 MHz to 950 MHz band using LC resonator, and a fractional-N divider uses a 36/37 modulus and 3rd order /spl Delta//spl Sigma/ modulator to reduce the fractional spur. The measured result shows that the RF output power of the frequency synthesizer is -10 dBm, the phase noise is -78 dBc/Hz at 100 KHz offset frequency, the minimum frequency step is 10 kHz, and the maximum lock-in time is around 800 ms with 10 MHz step change.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127175151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel VQ-based speech recognition approach for mobile terminals","authors":"Xing He, M. Scordilis, Gongjun Li","doi":"10.1109/SECON.2005.1423283","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423283","url":null,"abstract":"The ability to deploy speech recognition in mobile terminals, such as cellular telephones, has been limited to simple tasks due to restricted computational power and available memory. In this paper we present a new acoustic model based on vector quantization (VQ), which is better-suited for the limitations of the mobile environment. The proposed model is contrasted against finite state vector quantization (FSVQ), a commonly used technique is such environments. Performance enhancements include temporal restrictions to state generation, a flexible number of vectors per state, and updates of the traditional state transition function to a higher order. Experimental results show that the new model improves the recognition rate and reduces the computation load.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116835149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rule induction algorithm for continuous data using analysis of variance","authors":"R. Konda, K. Rajurkar","doi":"10.1109/SECON.2005.1423292","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423292","url":null,"abstract":"Knowledge acquisition continues to be a challenging and time consuming task in building decision support systems. Among the dominant methods, rule induction algorithms such as ID3 and C4.5 are widely used to extract rules from examples. The thrust of these algorithms is how they discriminate the given attributes based on information measure for building and determining the nodes in the decision tree. In particular, the main focus of these algorithms is on how to select the most appropriate attribute at each level of the decision tree process. This paper proposes an algorithm for rule induction for continuous data. The proposed algorithm uses an analysis of variance criterion for information measure in discriminating the given attributes for building the decision tree for continuous data.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework of critical drivers in successful business-to-business e-commerce","authors":"R. A. Robertson","doi":"10.1109/SECON.2005.1423276","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423276","url":null,"abstract":"This paper explores the literature in the field of business-to-business (B2B) electronic-commerce (e-commerce) emphasizing small-medium sized businesses. The paper takes a conceptual approach to reviewing the literature and identifying critical drivers that make an e-commerce project successful. Critical success factor models are explored to provide a theoretical foundation to the drivers that have filtered to the top of current research in the field of B2B. The paper is structured to first provide the theoretical foundation of the models in this area and the associated drivers for each model. Second, common drivers are identified and generalized to apply to all businesses. Third, additional research areas are derived from the existing literature.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-authorization: a methodology for secured network access in a distributed paradigm","authors":"T. R. Campbell","doi":"10.1109/SECON.2005.1423275","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423275","url":null,"abstract":"One of the key concerns of system designs in enterprise networks is security. Security from a systems perspective involves limiting and controlling accessibility to the services provided by that system. Existing authorization mechanisms do not provide the tools for the ever-changing paradigm associated with distributed networks such as the Internet, and deployment of mobile and pervasive computing devices that users attach to these networks. A self-authorizing system for authentication in a distributed environment is a concept that addresses some of the inadequacies of a traditional authentication mechanism. This paper examines existing authorization and authentication methods and their respective inadequacies, while developing the concept of self-authorization and the basic principles that underlie transparency and re-authentication.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SeaWinds radiometer (SRad) brightness temperature calibration and validation","authors":"M. Rastogi, W. Jones, I. Adams","doi":"10.1109/SECON.2005.1423261","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423261","url":null,"abstract":"NASA's SeaWinds scatterometer, on Japan's ADEOS-II satellite, is a special purpose radar remote sensor used to measure ocean surface wind vector (speed and direction). The paper presents a novel use of this instrument as a SeaWinds radiometer (SRad) to measure the ocean microwave emissions (brightness temperature). The derivation of the SRad radiometric transfer function is presented, which is used to calculate the apparent brightness temperature collected simultaneously with the radar scattering measurement. Results are presented for the on-orbit calibration and validation of the SRad brightness temperature algorithm performed using simultaneous measurements from the advanced microwave scanning radiometer (AMSR) also on the ADEOS-II.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-cost advanced encryption standard (AES) VLSI architecture: a minimalist bit-serial approach","authors":"O. Hernandez, T. Sodon, M. Adel","doi":"10.1109/SECON.2005.1423230","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423230","url":null,"abstract":"This paper presents a novel minimum cost architecture for the advanced encryption standard (AES) algorithm. This architecture uses a bit-serial approach, and it is suitable for VLSI implementations. By utilizing a true bit-serial design, this architecture can be used for cost sensitive applications that require high security, such as security system human interfaces, point of sale terminals, and infotainment kiosks. This AES architecture can be used as a coprocessor integrated with an inexpensive microcontroller in a system-on-a-chip (SoC) platform. The prototyping of the architecture is presented as well.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distance learning framework for automatic instructor replies: articulable tacit knowledge used for feedback upon request","authors":"M. Richards, J. Schiffel","doi":"10.1109/SECON.2005.1423315","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423315","url":null,"abstract":"Distance learning has many facets, ranging from technology implementations to assessment methods. The last decade has seen an increased number of tools to facilitate virtual classrooms and collaboration. However, feedback and evaluation are only partially automated in online courses. This paper largely follows knowledge management theories and artificial intelligent techniques, developing a framework to capture and manage automated responses to student replies. The instructor's tacit knowledge plays a direct role in augmenting class participation, learning communities, and feedback evaluation. Conceptual graphs are proposed to extract tacit knowledge from instructors written responses and to assist in externalizing it for future re-use. A question answering task is presented to illustrate the relationship between mental models and conceptual graphs and the mechanism to select responses through keyword match.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JXPL: an XML-based scripting language for workflow execution in a grid environment","authors":"C. Hunt, C. Ferner, J. Brown","doi":"10.1109/SECON.2005.1423270","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423270","url":null,"abstract":"JXPL is a new functional scripting language that uses XML syntax. JXPL is intended to be a workflow language that easily interacts with web and grid services. There are built in web and grid clients that can communicate with a variety of services. This facilitates the creation of workflow editors and other applications designed for grid environments and leaves application developers free to concentrate on the implementation of the user interface. In this paper, we give our motivation for JXPL and describe JXPL so that others may use the language. To aid our discussion, we introduce the grammar for JXPL using the extended Backus Naur form (EBNF). We also include examples and detail predefined functions. We conclude with current and future work.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIP end-to-end security between Ipv4 domain and Ipv6 domain","authors":"Xing Jiang, J. Atwood","doi":"10.1109/SECON.2005.1423294","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423294","url":null,"abstract":"The session initiation protocol (SIP) carries the endpoint IP addresses, as part of its message format. When one end-point is in an IPv4 addressing domain, and the other is in an IPv6 addressing domain, a NAT-PT gateway must be used at the network level, to translate the protocol headers. The message bodies are altered by an application level gateway (ALG), to reflect the changed addresses. However, this alteration causes end-to-end security mechanisms to fail. We describe a proposal for a SIP end-to-end security mechanism between IPv4 networks and IPv6 stub domains, which overcomes the failure. We have validated the proposal using the PROMELA formal specification language and the SPIN validation system.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}