2012 Proceedings of IEEE Southeastcon最新文献

筛选
英文 中文
Least squares estimation of dynamic system parameters using LabVIEW 动态系统参数的最小二乘估计
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196962
J. Turner, B. Samanta
{"title":"Least squares estimation of dynamic system parameters using LabVIEW","authors":"J. Turner, B. Samanta","doi":"10.1109/SECON.2012.6196962","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196962","url":null,"abstract":"A precursor to control system design is the development of a mathematical model describing the behavior of a system to be controlled. This paper presents the utilization of a least squares technique to determine parameters of a system model using LabVIEW. The effect of noise on accurate determination of the system model parameters is discussed along with the method used to filter noise from the data. The procedure is illustrated using the dynamics of a DC motor. The simulated response of the identified system model is compared with the measured response of the physical plant to validate the identification process.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of gas turbines used in saudi electricity company-south operating area (SEC-SOA): A survey 沙特电力公司南部作业区(SEC-SOA)燃气轮机使用评价:调查
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196977
M. BenSaleh, Syed Manzoor Qasim, A. Hennache
{"title":"Evaluation of gas turbines used in saudi electricity company-south operating area (SEC-SOA): A survey","authors":"M. BenSaleh, Syed Manzoor Qasim, A. Hennache","doi":"10.1109/SECON.2012.6196977","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196977","url":null,"abstract":"The Gas turbine technology has steadily advanced since its inception and emerged as a strong force in the generation market. It has been an active area of research. Research and development was one of the major keys to its success. The objective of this paper is to present a survey of two gas turbine designs available from two different companies i.e., General Electric (GE) and Westinghouse used in Saudi Electricity Company for south operating area (SEC-SOA). The paper also presents a thorough study of the fuel system used in these gas turbines.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127919008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simple model for biometric identification technology using fingerprint scanning 一个简单的模型用于指纹扫描的生物特征识别技术
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6197071
S. Musa, T. Jefferson, M. Sadiku
{"title":"A simple model for biometric identification technology using fingerprint scanning","authors":"S. Musa, T. Jefferson, M. Sadiku","doi":"10.1109/SECON.2012.6197071","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197071","url":null,"abstract":"This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
NORMATIC: A visual tool for modeling Non-Functional Requirements in agile processes NORMATIC:为敏捷过程中的非功能需求建模的可视化工具
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196989
W. M. Farid, F. Mitropoulos
{"title":"NORMATIC: A visual tool for modeling Non-Functional Requirements in agile processes","authors":"W. M. Farid, F. Mitropoulos","doi":"10.1109/SECON.2012.6196989","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196989","url":null,"abstract":"There is consensus in the research community that agile software development methodologies, such as Scrum, are becoming more and more popular in delivering quality Functional Requirements (FRs). However, agile methodologies have not adequately modeled Non-Functional Requirements (NFRs) and their potential solutions (operationalizations) with FRs in early development phases-let alone having tools to support such initiatives. This research proposes NORMATIC, a Java-based simulation tool for modeling non-functional requirements for semi-automatic agile processes. NORMATIC is the semi-automatic tool that supports the more general Non-Functional Requirements Modeling for Agile Processes (NORMAP) Methodology. Early results show that the tool can potentially help agile software development teams in reasoning about and visually modeling NFRs as first-class artifacts early on during requirements gathering and analysis phases. The tool can also aid project managers and Scrum teams in user story estimate and risk calculations as well as risk-driven planning and visualization of the proposed plans.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Single chip spectrum sensing module in CMOS with digital frequency synthesizer and digital output 带有数字频率合成器和数字输出的CMOS单片频谱传感模块
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6197076
R. Mulagada, Yi Yang, T. Weldon, D. Lieu
{"title":"Single chip spectrum sensing module in CMOS with digital frequency synthesizer and digital output","authors":"R. Mulagada, Yi Yang, T. Weldon, D. Lieu","doi":"10.1109/SECON.2012.6197076","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197076","url":null,"abstract":"In a congested wireless environment, an increasing number of applications require the capability to measure frequency spectrum. This motivates the development of a spectrum-sensing module comprised of a minimal architecture spectrum analyzer with integrated frequency synthesized tuning. The module features a frequency synthesizer with digital frequency controlled inputs and an integrated analog-to-digital converter to digitize the output. This module can be incorporated as a basic component in more complex system that require spectral sensing such as spectrum monitoring systems and dynamic spectrum access systems. The proposed single-chip spectrum-sensing module with digital output was fabricated in a standard 0.5 micron CMOS process. Measured results of a prototype are presented for operating range of 20 to 180 MHz.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comprehensive survey of optimization techniques used for Distributed Generator siting and sizing 分布式发电机选址和尺寸优化技术的综合调查
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196992
Priyanka Paliwal, N. P. Patidar, R. Nema
{"title":"A comprehensive survey of optimization techniques used for Distributed Generator siting and sizing","authors":"Priyanka Paliwal, N. P. Patidar, R. Nema","doi":"10.1109/SECON.2012.6196992","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196992","url":null,"abstract":"Distributed Generation (DG) resources have gained a lot of attention in recent times due to their positive impact on distribution system. Optimal planning of distribution system with distributed generation resources is not only concerned with the sizing of distributed generators but gives due weightage to the placement of generators as well. The installation of DG at optimum location boosts the performance of distribution system as well as presents a cost effective solution thus giving a new dimension to distribution system planning. The positive impacts of optimal distributed generator placement are reflected in terms of improved distribution system reliability, reduced customer interruption costs, reduction in losses and improvement in voltage profile as well as power quality at the consumer terminal. In order to enable electric utilities to obtain maximum benefits, the placement problem calls for state of art optimization techniques capable of handling multiple objective simultaneously in order to present the best feasible solution. This paper aims at providing an overview of several methodologies which have been adopted for finding out optimal location of distributed Generator in distribution system in order to maximize benefits.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A reconfigurable hardware networking platform for Smart Grid 面向智能电网的可重构硬件网络平台
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196910
R. Amiri, O. Elkeelany
{"title":"A reconfigurable hardware networking platform for Smart Grid","authors":"R. Amiri, O. Elkeelany","doi":"10.1109/SECON.2012.6196910","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196910","url":null,"abstract":"Embedded system cores for communications networks are becoming much important recently due to the demands placed by Smart Grid, sensor mobile networks, etc. However, embedded system designs have unique metrics such as cost, flexibility, and size. Tuning these metrics during embedded system designs will definitely impact the cost and performance of Smart Grid devices and systems. In this research, we are aiming to achieve secure and high performance network communication platform based on various implementation of the TCP/IP protocol stack. Firstly, we deployed NicheStack TCP/IP for an embedded Web server application. Then, we integrated the ECC (Elliptic Curve Cryptography) C code within the web server source code to achieve a secure communication. Consequently, we showed that the integrated system: the web server, and the ECC program hides information if the secret is not provided. We used an http client to access the web server through the Internet. The client sends an encrypted data securely through the network to the embedded web server application. Secondly, we are in a stage to design a complete open TCP/IP hard core on an FPGA. Preliminary simulation result via ModelSim confirms proper operation of decode instruction module at the hardware level. All Modules will be synchronized to the same clock and reset signals.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"84 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Decision fusion methodologies in Structural Health Monitoring systems 结构健康监测系统中的决策融合方法
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6197066
M. Mikhail, S. Zein-Sabatto, M. Bodruzzaman
{"title":"Decision fusion methodologies in Structural Health Monitoring systems","authors":"M. Mikhail, S. Zein-Sabatto, M. Bodruzzaman","doi":"10.1109/SECON.2012.6197066","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197066","url":null,"abstract":"Structural Health Monitoring (SHM) is a process of continuous monitoring of the physical condition of a structure for purpose of ensuring the integrity of the structure. SHM techniques have been employed to reduce maintenance and repair costs while maintaining safety and reliability of aircrafts. In this paper we have investigated the benefits provided by integrating decision fusion algorithms to SHM systems. The decisions made by classifiers acting on sensory data are combined using decision fusion algorithms to arrive at unified final decisions regarding the status of the monitored structure. First, synthetic decisions were generated and used for testing and performance evaluation of the different decision fusion algorithms. Second, several different decision fusion algorithms were developed and tested on the synthetic decisions. The Dempster-Shafer theory of evidence, fuzzy logic type-1, and fuzzy logic-type2 were used for development of the decision-fusion algorithms. Finally, the fusion algorithms were tested on decisions extracted from experimental data to validate their performances. The testing and evaluation results showed significant improvement due to fusion process integrated at the end of the feature classification process. The development of the fusion algorithms, their testing results on the synthetic decisions and decisions extracted from real experiment are reported in this paper. Also, performance analysis of decision fusion algorithms is provided in the paper.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vehicular Network simulation propagation loss model parameter standardization in ns-3 and beyond ns-3及以后车载网络仿真传播损耗模型参数标准化
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196929
Joseph Benin, Michael Nowatkowski, H. Owen
{"title":"Vehicular Network simulation propagation loss model parameter standardization in ns-3 and beyond","authors":"Joseph Benin, Michael Nowatkowski, H. Owen","doi":"10.1109/SECON.2012.6196929","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196929","url":null,"abstract":"Vehicular Networks (VANETs) continue to mature and their installation is becoming a reality. Meanwhile, simulation has become an indispensable tool for validating design and providing insight into how complex systems work. Yet the results of a simulation are only as good as the simulator's configuration. The network simulator 3 (ns-3) provides a host of propagation loss models, some of which are applicable to VANETs. In this work, we evaluate these models and then offer standard values for the propagation loss model parameters in an effort to normalize VANET simulation and provide researchers the ability to compare their work. The proposed values are then demonstrated to achieve the desired effective range as empirically determined in other work.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"38 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
An iterative ellipsoid-based anomaly detection technique for intrusion detection systems 基于迭代椭球的入侵检测系统异常检测技术
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196956
S. Suthaharan
{"title":"An iterative ellipsoid-based anomaly detection technique for intrusion detection systems","authors":"S. Suthaharan","doi":"10.1109/SECON.2012.6196956","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196956","url":null,"abstract":"Intrusion detection datasets play a major role in evaluating machine learning techniques for Intrusion Detection Systems. The Intrusion detection datasets are generally very large and contain many noncontributing features and redundant data. These drawbacks lead to inaccurate intrusion detection and increased computational cost when machine learning techniques are evaluated. Several data cleaning techniques have been proposed to eliminate redundant records and noncontributing features. These techniques reduce the size of the datasets significantly and make the characteristics of the data closer to the characteristics of intrusions in a real network. This paper identifies anomaly problems in normal and intrusion attacks data, and proposes an ellipsoid-based technique to detect anomalies and clean the intrusion detection datasets further. Publically available KDD'99 and NSL-KDD datasets are used to demonstrate its performance. It reveals an interesting property, i.e. monotonically decreasing behavior, of the NSL-KDD dataset.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信