{"title":"A fingertip detection and tracking system as a virtual mouse, a signature input device and an application selector","authors":"A. Sanghi, H. Arora, K. Gupta, V. B. Vats","doi":"10.1109/SECON.2008.4494346","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494346","url":null,"abstract":"This paper presents vision-based fingertip detection and tracking system on a 2D plane using a camera as an input interface to the computer. An intensity based approach is used to detect the arbitrary shaped, uniform colored 2D area on which the hand operates, and then the fingertip is effectively detected and tracked using the sampled hand contour. Grid sampling approach is used for a fast implementation. The system achieves speeds of up to 30 fps. Tip pointers such as a stylus or a pen can be used in place of the fingertip, making the device user-friendly. The system is used to implement a virtual mouse, a signature input device and an application selector.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121615209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interest points detection based on local frequency information of an image","authors":"J. Khan, R. Adhami, S. Bhuiyan","doi":"10.1109/SECON.2008.4494358","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494358","url":null,"abstract":"In this paper we propose a novel technique for detecting rotation and scale invariant interest points from the local frequency representation of an image. Local or instantaneous frequency is the spatial derivative of the local phase, where the local phase of any signal can be found from its Hilbert transform. Local frequency estimation can detect edge, ridge, corner and texture information at the same time and shows high values at those dominant features of an image. For each pixel, we select an appropriate width of the window for computing the derivative of the phase. In order to select the width of the window for any given pixel, we make use of the measure of the extent to which the phases, in the neighborhood of that pixel, are in the same direction. The local frequency map, thus obtained, is then thresholded by employing a global thresholding approach to detect the interest or feature points. Repeatability rate, a performance evaluation criterion for an interest points detector, is used to check the geometric stability of the proposed method under different transformations. We present simulation results of the detection of feature points from an image and the repeatability rate as a function of image rotation and scale changes. The results prove the efficacy of the proposed feature points detection algorithm.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"83 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120896864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watermarking with wavelets: Simplicity leads to robustness","authors":"E. Brannock, M. Weeks, R. Harrison","doi":"10.1109/SECON.2008.4494361","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494361","url":null,"abstract":"With ubiquitous computing comes the access of copyrighted work across computing platforms. One may have the same image (or video) on an iPod, as well as a laptop and desktop computer. Safeguarding creative content and intellectual property in a digital form has become increasingly difficult as technologies, such as the Internet, broadband availability and mobile access, advance. It has grown to be progressively easier to copy, modify and redistribute digital media, resulting in great declines in business profits. Digital watermarking is a steganographic technique that has been proposed as a possible solution to this problem. This paper examines a technique for digital watermarking which utilizes properties of the Discrete Wavelet Transform (DWT). The digital watermarking algorithm uses a database of multiple images with various properties. Eight families of wavelets, both orthogonal and biorthogonal, are compared for efficacy. To objectively measure the success of the algorithm and the influence of the mother wavelet, the PSNR for each wavelet family and image is obtained. Noise is introduced to simulate various attacks. Objective measures are used to determine the performance of the algorithm. We find that the simpler wavelet transforms, e.g. the Haar wavelet, outperform the more complex ones.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of time-dependent problems using the Exodus method","authors":"M. Sadiku, C. Akujuobi, S. Musa, S. Nelatury","doi":"10.1109/SECON.2008.4494314","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494314","url":null,"abstract":"The Monte Carlo method is well known for solving static problems such as Laplace's or Poisson 's equation. In this paper, we extend the applicability of the conventional Monte Carlo method to solve time-dependent (heat) problems. We apply the Exodus method to these problems, which is not subject to randomness, as are the classical Monte Carlo methods. We present results in one- dimensional (1-D) and two-dimensional (2-D) that agree with the exact solutions.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sliding mode control of a unity power factor 3-phase AC/DC boost converter","authors":"S. Baev, Y. Shtessel, M. Sheffield","doi":"10.1109/SECON.2008.4494344","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494344","url":null,"abstract":"A problem of power factor correction for a class of 3- phase boost AC/DC power converters is addressed in the paper. A full-bridge hardware topology is studied and used to address the basics of the efficient power conversion with high values of power factor. The sliding mode control drives the output voltage to the desired DC level in the presence of external disturbances and internal parameter uncertainties, while providing close to unity (greater than 97%) value of power factor. Sliding mode observers are employed to estimate variation in load and phase resistances - subject of realtime adjustment in the control law. Multi-rate numerical simulation illustrates the efficiency of the proposed methodology and proves its ability to be implemented in digital form.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115250711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transient response analysis of semiconductor lasers at high frequency large signal pulse modulation","authors":"H. Kaatuzian","doi":"10.1109/SECON.2008.4494332","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494332","url":null,"abstract":"This paper presents analytical and numerical analysis of the pulse modulation response of semiconductor lasers. It pays a special attention to the transient response of semiconductor lasers under large signal modulation. The results from numerical solution of the rate equations reveal the difference between the more accurate nonlinear model and the small signal approximation. According to the study carried out in this paper, increasing the ratio of the amplitude of injection current to the threshold current can appreciably cut down the transient delays and so enhance considerably the speed of modulation. The idea has been examined on a typical commercial semiconductor laser. For example, the data from numerical solution shows 90 MHz signal modulation when the amplitude of signal is 3Ith, while increasing the amplitude to 6lth, makes it possible for the laser to handle signal up to 260 MHz. Although the idea is examined in subGHz modulation, it may easily be extended to state of art semiconductor lasers at the range of several GHz.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-walled carbon nanotube-based field-effect transistors (non-reviewed)","authors":"H. Sharma, Z. Xiao","doi":"10.1109/SECON.2008.4494263","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494263","url":null,"abstract":"Summary form only given. Single-walled carbon nanotubes (SWCNTs) have been considered as a promising nanostructured material for the realization of future nanoelectronic devices because of their unique electrical properties such as the ballistic transportation of electrons or holes in SWCNTs. In this paper, we report the fabrication of single-walled carbon nanotube field- effect transistors (CNTFETs) with metal and semiconductor materials as the source and drain materials. Ultra-purified HiPCO-grown single-walled carbon nanotubes (SWCNTs) from Carbon Nanotechnologies, Inc. (CNI) were used for the fabrication of CNTFETs. N-methyl pyrrolidone (NMP), dimethyl formamide (DMF), toluene and trifluoroacetic acid were used to disperse SWCNTs in solutions. The dispersion of SWCNTs in the solvents were ultrasonically assisted, and then centrifuged at 14000 rpm. The solubility of SWCNTs in the solvents was finally compared, and the degree of dispersion was examined by SEM. Dielectrophoresis (DEP) method was used to deposit, align, and assemble carbon nanotubes (CNTs) across the source and drain of CNTFETs to form the channel. Microfabrication techniques such as UV lithography and e-beam lithography were used to fabricate the CNTFETs. The gap between the source and drain varied from 800 nm to 3 um. Both metals such as gold and semiconductors such as bismuth telluride (Bi2Te3) were used as the source and drain materials for the CNTFETs. The fabricated CNTFET has a backside gate with the substrate as the gate contact. Silicon dioxide was used as the gate oxide. Electron-beam evaporation and sputtering deposition were used for the deposition of the thin film layers in this research.The drain-source current (IDS) versus drain-source voltage (VDS) and gate voltage (VG) was characterized for the fabricated CNTFETs. It was found that the I-V behavior of metal electrode-based CNTFETs is dependent on the type (metallic or semiconducting) of aligned carbon nanotubes across the electrodes and the I-V behavior of semiconductor electrode-based CNTFETs is independent of the type of carbon nanotubes. This property makes the semiconductor electrode-based CNTFETs more promising than the metal electrode-based CNTFETs. The developed carbon nanotube field-effect transistors (CNTFETs) can be a good candidate for the application of nanoelectronics and integrated circuits with a high mobility and fast switching.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124698195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interface paradigms in Energy Management System","authors":"Y. Liao","doi":"10.1109/SECON.2008.4494343","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494343","url":null,"abstract":"An Energy Management System (EMS) is a complex computer system for controlling the real time operation of electric power systems. An EMS consists of a set of subsystems that are composed of various applications, tools, and data stores. These different parts of the system interface with each other in terms of function invocation and data exchange. An EMS may also need to interact with external systems or external data stores. Different types of interactions have their own characteristics and requirements. This paper presents possible interface paradigms in the EMS and feasible ways of realizing such interfaces.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting IP covert timing channels by correlating packet timing with memory content","authors":"R. Stillman","doi":"10.1109/SECON.2008.4494286","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494286","url":null,"abstract":"Current covert timing channel detection relies upon discerning the underlying regularity that must be present in the packet interarrival times (PIATs) in order for the channel to carry information. But, it is not hard for a determined adversary to defeat detection. Existing algorithms look only at the PIATs. We hypothesized that detection could be improved by also exploiting knowledge about the system from which the exfiltration is occurring. In particular, the bits that are being extruded likely reside in memory at some point during the transmission. Any correlation between memory content and interpacket time delays-even a remote one-is no coincidence. It suggests an active timing channel. Furthermore, even if the data has been encrypted prior to transmission, at least a portion of the corresponding ciphertext should reside somewhere in the address space used by the rogue process. We tested this approach against an adversary applying increasingly sophisticated schemes to conceal an IP timing channel. Even when the attack escalated well beyond the level at which other detection methods failed, our method identified (and decoded) the covert communication.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relative humidity measurement using capacitive sensors","authors":"A. Hassanzadeh, R. Lindquist, A. Borghei","doi":"10.1109/SECON.2008.4494326","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494326","url":null,"abstract":"This paper presents a method that has been employed to measure on line relative humidity of paper sheets during manufacturing process. Two parallel plate capacitive sensors measure the relative humidity. This method provides on line contact less humidity measurement and control. The sensor is linear up to 24% RH and has 0.2% sensitivity within the range of measurement.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}