{"title":"Model checking of the Fairisle ATM switch fabric using FormalCheck","authors":"L. Barakatain, S. Tahar","doi":"10.1109/CCECE.2001.933562","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933562","url":null,"abstract":"We describe the model checking of an asynchronous transfer mode (ATM) network switch fabric using the FormalCheck tool. The switch we considered is in use for real applications in the Cambridge Fairisle network. For the current verification in FormalCheck, we used the same Verilog HDL code as Lu and Tahar (see Proc. IEEE 8th Great Lakes Symposium on VLSI, Lafayette, Louisiana, USA, p.368-73, 1998) with some modifications. We specified and verified in FormalCheck a set of liveness and safety properties against several model sizes of the switch fabric. First, we verified an abstracted (1-bit) model of the switch fabric, which was already verified using VIS. Then, we accomplished the verification of a 4-bit model, and the full 8-bit model. We furthermore provide a comparative study between the verification results in VIS and FormalCheck.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical analysis of nonlinear current-mode circuits","authors":"F. Yuan","doi":"10.1109/CCECE.2001.933748","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933748","url":null,"abstract":"This paper presents an efficient statistical analysis method for nonlinear current-mode circuits. The method is based on Volterra functional series representation of nonlinear systems and piecewise linear interpolation. The mean and variance of the response of nonlinear current-mode circuits with multiple nonlinear elements are computed at equi-distance points of time. The method presented in this paper has been implemented in a computer program. A second-generation current-mode memory cell is analyzed and the results are presented, together with those from Monte Carlo simulation.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA implementation of MD5 hash algorithm","authors":"J. Deepakumara, H. Heys, R. Venkatesan","doi":"10.1109/CCECE.2001.933564","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933564","url":null,"abstract":"In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC. The Message Digest 5 (MD5) is one of the algorithms, which has been specified for use in Internet Protocol Security (IPSEC), as the basis for an HMAC. The input message may be arbitrarily large and is processed in 512-bit blocks by executing 64 steps involving the manipulation of 128-bit blocks. There is an increasing interest in high-speed cryptographic accelerators for IPSEC applications such as virtual private networks. As we show, it is reasonable to construct cryptographic accelerators using hardware implementations of HMACs based on a hash algorithm such as MD5. Two different architectures, iterative and full loop unrolling, of MD5 have been implemented using field programmable gate arrays (FPGAs). The performance of these implementations is discussed.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radiometric equalization of remote sensing data by utilization of laser scan data","authors":"J. Buckner, M. Pahl, O. Stahlhut","doi":"10.1109/CCECE.2001.933597","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933597","url":null,"abstract":"This contribution describes a new approach for detection of shadow areas appearing in remote sensing image data. Identification of objects like streets or vehicles is frequently disturbed by illumination effects like hard shadows or inhomogeneous darkening due to varying tilt angles of the processed terrain. To increase the reliability of the recognition process, we apply a sensor fusion of elevation data from laser scanning and optical image data. The represented algorithm improves the results iteratively. The different results are discussed and then used for further processing within a radiometric equalization.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Input state feedback linearization control of a three-phase three-level neutral point clamped rectifier","authors":"L. Yacoubi, F. Fnaiech, K. Al-haddad, L. Dessaint","doi":"10.1109/CCECE.2001.933544","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933544","url":null,"abstract":"An exact nonlinear multiple-input multiple-output (MIMO) state space mathematical model of the power circuit of pulse-width-modulation (PWM) three-phase three-level neutral point clamped AC/DC rectifier was developed. Using this nonlinear model, an input/output feedback linearization was then designed. Analytical expressions of the linearizing control law (LCL) were derived. The resulting linearized model is simply a decoupled linear system equation. Linear state feedback control law is then applied based on a pole placement strategy. Computer simulation results are presented to verify the effectiveness of the proposed closed loop system.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Morphological skeleton algorithm for PDP production line inspection","authors":"R. Ge, David A Clausi","doi":"10.1109/CCECE.2001.933598","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933598","url":null,"abstract":"Morphological skeletonization is an image processing technique that reduces complex, thick-lined images to a series of single pixel lines that accurately represent the original shapes. This procedure is especially useful to simplify automated applications requiring simple shape analysis and continuity checking by reducing the amount of redundant image data. In the semiconductor inspection field, skeletonization is a process that can be used to detect defects during plasma display panel (PDP) inspection. This paper introduces a novel morphological skeletonization algorithm developed for electrode pattern inspection of PDPs. This algorithm has been successfully integrated within a commercial machine vision system.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117113546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-based media adaptation in pervasive computing","authors":"Zhijun Lei, N. Georganas","doi":"10.1109/CCECE.2001.933563","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933563","url":null,"abstract":"In pervasive computing applications, computer embedded devices are used to perform control tasks and access the Internet or other information sources. However, most content of current information sources was designed with desktop computers and high-speed network connections in mind. They contain rich media data, which are not suitable for those pervasive devices with limited capabilities. Moreover, for different user preference and application scenarios, not all of the data are relevant and critical to the application. Context-based media adaptation is mainly concerned with selecting different qualities of single media types or selecting different media types, and then delivering information to different context. Some related issues for building a general context-based media adaptation framework are discussed. These issues include context description and exchange schemes, adaptable model for managing and manipulating multimedia content, adaptation techniques and architectural issues.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114981902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specific applications of the transistor converter in excitation systems of synchronous generators","authors":"G. Erceg, R. Erceg","doi":"10.1109/CCECE.2001.933558","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933558","url":null,"abstract":"This paper shows possibilities and specific usage of transistor (IGBT) converters developed for electric motor drives in static excitation systems of synchronous generators. Today, static excitation systems of the synchronous generators are represented with thyristor converters. Beside that, in brushless excitation systems transistor converters are rarely encountered. Basic comparatively characteristics of generators' static excitation systems with thyristor and transistor converters are shown. Eventually it can be concluded that transistor converters can be successfully applied in excitation systems of the generators.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fractals in circuits","authors":"L. Lazareck, G. Verch, A.F. Peter","doi":"10.1109/CCECE.2001.933750","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933750","url":null,"abstract":"The relationship between fractals and feedback circuits is discussed. First, fractals are defined as irregular shapes built by the \"replacement rule.\" Second, three requirements for chaos within a physical system are defined. The paper employs the Tacoma Narrows Bridge system, models its equivalent circuit and simulates it using PSPICE software from MicroSim. This model with its three sub-circuits for negative, zero and positive damping does not represent a chaotic system. The system, although non-chaotic, is graphically visualized using -performance mapping\". The reason for this visualization, in comparison with Julia and Mandelbrot set techniques, is discussed. Finally, fractal information dimension is defined as a measure of complexity and is calculated for each sub-model. It is hypothesized and proven that the unstable model is the most complex and thus yields the higher fractal dimension value. The paper concludes with a final summation of the fractal-feedback circuit relationship.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic identification using artificial neural network [Internet traffic]","authors":"A. Ali, R. Tervo","doi":"10.1109/CCECE.2001.933764","DOIUrl":"https://doi.org/10.1109/CCECE.2001.933764","url":null,"abstract":"The paper investigates the use of artificial neural networks (ANN) to unconventionally classify Internet traffic. Structurally and functionally, the classifier used is a feedforward multilayer layer perceptron (FFMLP) network trained using backpropagation. The inputs are random samples of bits from a bit stream (i.e. all the inputs are either 1 or 0). The data was collected and pre-processed, then used to train, test and evaluate the classifier. Despite the lower capability to identify certain data types, the algorithm has shown that it has very good features as a classifier. SMTP, TELNET, FTP, HTTP, IP TELEPHONY and UDP data types were used in the investigation.","PeriodicalId":184523,"journal":{"name":"Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}