{"title":"Least squares estimation of dynamic system parameters using LabVIEW","authors":"J. Turner, B. Samanta","doi":"10.1109/SECON.2012.6196962","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196962","url":null,"abstract":"A precursor to control system design is the development of a mathematical model describing the behavior of a system to be controlled. This paper presents the utilization of a least squares technique to determine parameters of a system model using LabVIEW. The effect of noise on accurate determination of the system model parameters is discussed along with the method used to filter noise from the data. The procedure is illustrated using the dynamics of a DC motor. The simulated response of the identified system model is compared with the measured response of the physical plant to validate the identification process.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of gas turbines used in saudi electricity company-south operating area (SEC-SOA): A survey","authors":"M. BenSaleh, Syed Manzoor Qasim, A. Hennache","doi":"10.1109/SECON.2012.6196977","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196977","url":null,"abstract":"The Gas turbine technology has steadily advanced since its inception and emerged as a strong force in the generation market. It has been an active area of research. Research and development was one of the major keys to its success. The objective of this paper is to present a survey of two gas turbine designs available from two different companies i.e., General Electric (GE) and Westinghouse used in Saudi Electricity Company for south operating area (SEC-SOA). The paper also presents a thorough study of the fuel system used in these gas turbines.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127919008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple model for biometric identification technology using fingerprint scanning","authors":"S. Musa, T. Jefferson, M. Sadiku","doi":"10.1109/SECON.2012.6197071","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197071","url":null,"abstract":"This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NORMATIC: A visual tool for modeling Non-Functional Requirements in agile processes","authors":"W. M. Farid, F. Mitropoulos","doi":"10.1109/SECON.2012.6196989","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196989","url":null,"abstract":"There is consensus in the research community that agile software development methodologies, such as Scrum, are becoming more and more popular in delivering quality Functional Requirements (FRs). However, agile methodologies have not adequately modeled Non-Functional Requirements (NFRs) and their potential solutions (operationalizations) with FRs in early development phases-let alone having tools to support such initiatives. This research proposes NORMATIC, a Java-based simulation tool for modeling non-functional requirements for semi-automatic agile processes. NORMATIC is the semi-automatic tool that supports the more general Non-Functional Requirements Modeling for Agile Processes (NORMAP) Methodology. Early results show that the tool can potentially help agile software development teams in reasoning about and visually modeling NFRs as first-class artifacts early on during requirements gathering and analysis phases. The tool can also aid project managers and Scrum teams in user story estimate and risk calculations as well as risk-driven planning and visualization of the proposed plans.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single chip spectrum sensing module in CMOS with digital frequency synthesizer and digital output","authors":"R. Mulagada, Yi Yang, T. Weldon, D. Lieu","doi":"10.1109/SECON.2012.6197076","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197076","url":null,"abstract":"In a congested wireless environment, an increasing number of applications require the capability to measure frequency spectrum. This motivates the development of a spectrum-sensing module comprised of a minimal architecture spectrum analyzer with integrated frequency synthesized tuning. The module features a frequency synthesizer with digital frequency controlled inputs and an integrated analog-to-digital converter to digitize the output. This module can be incorporated as a basic component in more complex system that require spectral sensing such as spectrum monitoring systems and dynamic spectrum access systems. The proposed single-chip spectrum-sensing module with digital output was fabricated in a standard 0.5 micron CMOS process. Measured results of a prototype are presented for operating range of 20 to 180 MHz.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive survey of optimization techniques used for Distributed Generator siting and sizing","authors":"Priyanka Paliwal, N. P. Patidar, R. Nema","doi":"10.1109/SECON.2012.6196992","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196992","url":null,"abstract":"Distributed Generation (DG) resources have gained a lot of attention in recent times due to their positive impact on distribution system. Optimal planning of distribution system with distributed generation resources is not only concerned with the sizing of distributed generators but gives due weightage to the placement of generators as well. The installation of DG at optimum location boosts the performance of distribution system as well as presents a cost effective solution thus giving a new dimension to distribution system planning. The positive impacts of optimal distributed generator placement are reflected in terms of improved distribution system reliability, reduced customer interruption costs, reduction in losses and improvement in voltage profile as well as power quality at the consumer terminal. In order to enable electric utilities to obtain maximum benefits, the placement problem calls for state of art optimization techniques capable of handling multiple objective simultaneously in order to present the best feasible solution. This paper aims at providing an overview of several methodologies which have been adopted for finding out optimal location of distributed Generator in distribution system in order to maximize benefits.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reconfigurable hardware networking platform for Smart Grid","authors":"R. Amiri, O. Elkeelany","doi":"10.1109/SECON.2012.6196910","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196910","url":null,"abstract":"Embedded system cores for communications networks are becoming much important recently due to the demands placed by Smart Grid, sensor mobile networks, etc. However, embedded system designs have unique metrics such as cost, flexibility, and size. Tuning these metrics during embedded system designs will definitely impact the cost and performance of Smart Grid devices and systems. In this research, we are aiming to achieve secure and high performance network communication platform based on various implementation of the TCP/IP protocol stack. Firstly, we deployed NicheStack TCP/IP for an embedded Web server application. Then, we integrated the ECC (Elliptic Curve Cryptography) C code within the web server source code to achieve a secure communication. Consequently, we showed that the integrated system: the web server, and the ECC program hides information if the secret is not provided. We used an http client to access the web server through the Internet. The client sends an encrypted data securely through the network to the embedded web server application. Secondly, we are in a stage to design a complete open TCP/IP hard core on an FPGA. Preliminary simulation result via ModelSim confirms proper operation of decode instruction module at the hardware level. All Modules will be synchronized to the same clock and reset signals.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"84 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision fusion methodologies in Structural Health Monitoring systems","authors":"M. Mikhail, S. Zein-Sabatto, M. Bodruzzaman","doi":"10.1109/SECON.2012.6197066","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197066","url":null,"abstract":"Structural Health Monitoring (SHM) is a process of continuous monitoring of the physical condition of a structure for purpose of ensuring the integrity of the structure. SHM techniques have been employed to reduce maintenance and repair costs while maintaining safety and reliability of aircrafts. In this paper we have investigated the benefits provided by integrating decision fusion algorithms to SHM systems. The decisions made by classifiers acting on sensory data are combined using decision fusion algorithms to arrive at unified final decisions regarding the status of the monitored structure. First, synthetic decisions were generated and used for testing and performance evaluation of the different decision fusion algorithms. Second, several different decision fusion algorithms were developed and tested on the synthetic decisions. The Dempster-Shafer theory of evidence, fuzzy logic type-1, and fuzzy logic-type2 were used for development of the decision-fusion algorithms. Finally, the fusion algorithms were tested on decisions extracted from experimental data to validate their performances. The testing and evaluation results showed significant improvement due to fusion process integrated at the end of the feature classification process. The development of the fusion algorithms, their testing results on the synthetic decisions and decisions extracted from real experiment are reported in this paper. Also, performance analysis of decision fusion algorithms is provided in the paper.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicular Network simulation propagation loss model parameter standardization in ns-3 and beyond","authors":"Joseph Benin, Michael Nowatkowski, H. Owen","doi":"10.1109/SECON.2012.6196929","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196929","url":null,"abstract":"Vehicular Networks (VANETs) continue to mature and their installation is becoming a reality. Meanwhile, simulation has become an indispensable tool for validating design and providing insight into how complex systems work. Yet the results of a simulation are only as good as the simulator's configuration. The network simulator 3 (ns-3) provides a host of propagation loss models, some of which are applicable to VANETs. In this work, we evaluate these models and then offer standard values for the propagation loss model parameters in an effort to normalize VANET simulation and provide researchers the ability to compare their work. The proposed values are then demonstrated to achieve the desired effective range as empirically determined in other work.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"38 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An iterative ellipsoid-based anomaly detection technique for intrusion detection systems","authors":"S. Suthaharan","doi":"10.1109/SECON.2012.6196956","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196956","url":null,"abstract":"Intrusion detection datasets play a major role in evaluating machine learning techniques for Intrusion Detection Systems. The Intrusion detection datasets are generally very large and contain many noncontributing features and redundant data. These drawbacks lead to inaccurate intrusion detection and increased computational cost when machine learning techniques are evaluated. Several data cleaning techniques have been proposed to eliminate redundant records and noncontributing features. These techniques reduce the size of the datasets significantly and make the characteristics of the data closer to the characteristics of intrusions in a real network. This paper identifies anomaly problems in normal and intrusion attacks data, and proposes an ellipsoid-based technique to detect anomalies and clean the intrusion detection datasets further. Publically available KDD'99 and NSL-KDD datasets are used to demonstrate its performance. It reveals an interesting property, i.e. monotonically decreasing behavior, of the NSL-KDD dataset.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}