Proceedings. IEEE SoutheastCon, 2005.最新文献

筛选
英文 中文
A fractional-n PLL frequency synthesizer design 分数n锁相环频率合成器的设计
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423222
Seon-Keun Kim, Youngsik Kim
{"title":"A fractional-n PLL frequency synthesizer design","authors":"Seon-Keun Kim, Youngsik Kim","doi":"10.1109/SECON.2005.1423222","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423222","url":null,"abstract":"This paper proposes a fractional-N phase-locked loop (PLL) frequency synthesizer using 3rd order /spl Delta//spl Sigma/ modulator for 915 MHz medium speed FSK wireless link. The voltage-controlled oscillator (VCO), pre-scaler of divide-by-8, phase frequency detector (PFD), and charge pump (CP) have been developed with 0.25-/spl mu/m CMOS process. A 3rd order external loop filter has been optimized to reduce the lock-in time. The fractional-N divider and 3rd order /spl Delta//spl Sigma/ modulator have been designed with the VHDL codes, and implemented through the FPGA board of the Xilinx Spartan2E. The VCO has been designed to span from 900 MHz to 950 MHz band using LC resonator, and a fractional-N divider uses a 36/37 modulus and 3rd order /spl Delta//spl Sigma/ modulator to reduce the fractional spur. The measured result shows that the RF output power of the frequency synthesizer is -10 dBm, the phase noise is -78 dBc/Hz at 100 KHz offset frequency, the minimum frequency step is 10 kHz, and the maximum lock-in time is around 800 ms with 10 MHz step change.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127175151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel VQ-based speech recognition approach for mobile terminals 一种基于vq的移动终端语音识别方法
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423283
Xing He, M. Scordilis, Gongjun Li
{"title":"A novel VQ-based speech recognition approach for mobile terminals","authors":"Xing He, M. Scordilis, Gongjun Li","doi":"10.1109/SECON.2005.1423283","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423283","url":null,"abstract":"The ability to deploy speech recognition in mobile terminals, such as cellular telephones, has been limited to simple tasks due to restricted computational power and available memory. In this paper we present a new acoustic model based on vector quantization (VQ), which is better-suited for the limitations of the mobile environment. The proposed model is contrasted against finite state vector quantization (FSVQ), a commonly used technique is such environments. Performance enhancements include temporal restrictions to state generation, a flexible number of vectors per state, and updates of the traditional state transition function to a higher order. Experimental results show that the new model improves the recognition rate and reduces the computation load.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116835149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A rule induction algorithm for continuous data using analysis of variance 使用方差分析的连续数据规则归纳算法
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423292
R. Konda, K. Rajurkar
{"title":"A rule induction algorithm for continuous data using analysis of variance","authors":"R. Konda, K. Rajurkar","doi":"10.1109/SECON.2005.1423292","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423292","url":null,"abstract":"Knowledge acquisition continues to be a challenging and time consuming task in building decision support systems. Among the dominant methods, rule induction algorithms such as ID3 and C4.5 are widely used to extract rules from examples. The thrust of these algorithms is how they discriminate the given attributes based on information measure for building and determining the nodes in the decision tree. In particular, the main focus of these algorithms is on how to select the most appropriate attribute at each level of the decision tree process. This paper proposes an algorithm for rule induction for continuous data. The proposed algorithm uses an analysis of variance criterion for information measure in discriminating the given attributes for building the decision tree for continuous data.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework of critical drivers in successful business-to-business e-commerce 成功的企业对企业电子商务的关键驱动程序框架
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423276
R. A. Robertson
{"title":"A framework of critical drivers in successful business-to-business e-commerce","authors":"R. A. Robertson","doi":"10.1109/SECON.2005.1423276","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423276","url":null,"abstract":"This paper explores the literature in the field of business-to-business (B2B) electronic-commerce (e-commerce) emphasizing small-medium sized businesses. The paper takes a conceptual approach to reviewing the literature and identifying critical drivers that make an e-commerce project successful. Critical success factor models are explored to provide a theoretical foundation to the drivers that have filtered to the top of current research in the field of B2B. The paper is structured to first provide the theoretical foundation of the models in this area and the associated drivers for each model. Second, common drivers are identified and generalized to apply to all businesses. Third, additional research areas are derived from the existing literature.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Self-authorization: a methodology for secured network access in a distributed paradigm 自我授权:分布式范例中安全网络访问的一种方法
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423275
T. R. Campbell
{"title":"Self-authorization: a methodology for secured network access in a distributed paradigm","authors":"T. R. Campbell","doi":"10.1109/SECON.2005.1423275","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423275","url":null,"abstract":"One of the key concerns of system designs in enterprise networks is security. Security from a systems perspective involves limiting and controlling accessibility to the services provided by that system. Existing authorization mechanisms do not provide the tools for the ever-changing paradigm associated with distributed networks such as the Internet, and deployment of mobile and pervasive computing devices that users attach to these networks. A self-authorizing system for authentication in a distributed environment is a concept that addresses some of the inadequacies of a traditional authentication mechanism. This paper examines existing authorization and authentication methods and their respective inadequacies, while developing the concept of self-authorization and the basic principles that underlie transparency and re-authentication.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SeaWinds radiometer (SRad) brightness temperature calibration and validation 海风辐射计(SRad)亮度温度校准和验证
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423261
M. Rastogi, W. Jones, I. Adams
{"title":"SeaWinds radiometer (SRad) brightness temperature calibration and validation","authors":"M. Rastogi, W. Jones, I. Adams","doi":"10.1109/SECON.2005.1423261","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423261","url":null,"abstract":"NASA's SeaWinds scatterometer, on Japan's ADEOS-II satellite, is a special purpose radar remote sensor used to measure ocean surface wind vector (speed and direction). The paper presents a novel use of this instrument as a SeaWinds radiometer (SRad) to measure the ocean microwave emissions (brightness temperature). The derivation of the SRad radiometric transfer function is presented, which is used to calculate the apparent brightness temperature collected simultaneously with the radar scattering measurement. Results are presented for the on-orbit calibration and validation of the SRad brightness temperature algorithm performed using simultaneous measurements from the advanced microwave scanning radiometer (AMSR) also on the ADEOS-II.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low-cost advanced encryption standard (AES) VLSI architecture: a minimalist bit-serial approach 低成本高级加密标准(AES) VLSI架构:一种极简的位串行方法
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423230
O. Hernandez, T. Sodon, M. Adel
{"title":"Low-cost advanced encryption standard (AES) VLSI architecture: a minimalist bit-serial approach","authors":"O. Hernandez, T. Sodon, M. Adel","doi":"10.1109/SECON.2005.1423230","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423230","url":null,"abstract":"This paper presents a novel minimum cost architecture for the advanced encryption standard (AES) algorithm. This architecture uses a bit-serial approach, and it is suitable for VLSI implementations. By utilizing a true bit-serial design, this architecture can be used for cost sensitive applications that require high security, such as security system human interfaces, point of sale terminals, and infotainment kiosks. This AES architecture can be used as a coprocessor integrated with an inexpensive microcontroller in a system-on-a-chip (SoC) platform. The prototyping of the architecture is presented as well.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A distance learning framework for automatic instructor replies: articulable tacit knowledge used for feedback upon request 一个远程学习框架的自动讲师答复:清晰的隐性知识用于反馈的要求
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423315
M. Richards, J. Schiffel
{"title":"A distance learning framework for automatic instructor replies: articulable tacit knowledge used for feedback upon request","authors":"M. Richards, J. Schiffel","doi":"10.1109/SECON.2005.1423315","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423315","url":null,"abstract":"Distance learning has many facets, ranging from technology implementations to assessment methods. The last decade has seen an increased number of tools to facilitate virtual classrooms and collaboration. However, feedback and evaluation are only partially automated in online courses. This paper largely follows knowledge management theories and artificial intelligent techniques, developing a framework to capture and manage automated responses to student replies. The instructor's tacit knowledge plays a direct role in augmenting class participation, learning communities, and feedback evaluation. Conceptual graphs are proposed to extract tacit knowledge from instructors written responses and to assist in externalizing it for future re-use. A question answering task is presented to illustrate the relationship between mental models and conceptual graphs and the mechanism to select responses through keyword match.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
JXPL: an XML-based scripting language for workflow execution in a grid environment JXPL:用于在网格环境中执行工作流的基于xml的脚本语言
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423270
C. Hunt, C. Ferner, J. Brown
{"title":"JXPL: an XML-based scripting language for workflow execution in a grid environment","authors":"C. Hunt, C. Ferner, J. Brown","doi":"10.1109/SECON.2005.1423270","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423270","url":null,"abstract":"JXPL is a new functional scripting language that uses XML syntax. JXPL is intended to be a workflow language that easily interacts with web and grid services. There are built in web and grid clients that can communicate with a variety of services. This facilitates the creation of workflow editors and other applications designed for grid environments and leaves application developers free to concentrate on the implementation of the user interface. In this paper, we give our motivation for JXPL and describe JXPL so that others may use the language. To aid our discussion, we introduce the grammar for JXPL using the extended Backus Naur form (EBNF). We also include examples and detail predefined functions. We conclude with current and future work.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SIP end-to-end security between Ipv4 domain and Ipv6 domain Ipv4域和Ipv6域之间的SIP端到端安全
Proceedings. IEEE SoutheastCon, 2005. Pub Date : 2005-04-08 DOI: 10.1109/SECON.2005.1423294
Xing Jiang, J. Atwood
{"title":"SIP end-to-end security between Ipv4 domain and Ipv6 domain","authors":"Xing Jiang, J. Atwood","doi":"10.1109/SECON.2005.1423294","DOIUrl":"https://doi.org/10.1109/SECON.2005.1423294","url":null,"abstract":"The session initiation protocol (SIP) carries the endpoint IP addresses, as part of its message format. When one end-point is in an IPv4 addressing domain, and the other is in an IPv6 addressing domain, a NAT-PT gateway must be used at the network level, to translate the protocol headers. The message bodies are altered by an application level gateway (ALG), to reflect the changed addresses. However, this alteration causes end-to-end security mechanisms to fail. We describe a proposal for a SIP end-to-end security mechanism between IPv4 networks and IPv6 stub domains, which overcomes the failure. We have validated the proposal using the PROMELA formal specification language and the SPIN validation system.","PeriodicalId":129377,"journal":{"name":"Proceedings. IEEE SoutheastCon, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信