{"title":"Application to shear force sensors by homeotropic liquid crystal (LC) orientation (non-reviewed)","authors":"J. Namkung, R. Lindquist, A. Abu Abed","doi":"10.1109/SECON.2008.4494260","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494260","url":null,"abstract":"Application to sensors using liquid crystals is widely investigated by the orientation order of the liquid crystal molecules. In this paper, the capacitance by tracking for LC molecules uses the shear force sensor. The shear force sensor is applied the different direction of 0deg, 45deg and 90deg. At each significant angle, it is important that the director of liquid crystals is defined by the direction of the shear force. Homeotropic liquid crystal orientation is very sensitive to change by external shear forces. An interesting point is to use the electrical property using the capacitive sensing because of excellent tracking positions by involving digitized capacitance instead of the optical property using the visual sensing. In the paper, the shear force sensor is designed by the tracking theory of liquid crystal alignment. In addition, this paper also modifies some parameters to the capacitive transduction such as temperature, measurement frequency and measurement voltage. Recently, a liquid crystal sensor is one of the interesting areas because of low cost, low power consumption and portability. The mechanical properties between a liquid and a crystal are totally different. The orientation order of the liquid is random, but the orientation order of the crystal is one direction. Liquid crystal is the interstate between these two states. The liquid crystal is an anisotropic material which has different permittivity by the average molecule director. From this property of LC, the chemical and biological sensors are exploited because these sensors can excellently detect the chemical and biological agents by the orientation order of the liquid crystal molecules. For example, a homeotropic alignment of LC can change to homogeneous alignment by Abbott in detecting part-per- billion concentration of dimethylmethylphosphonate (DMMP). The objective of this paper is to illustrate how the shear force sensor works using the homeotropic alignment of nematic liquid crystals. As mentioned, the dielectric constants of LC are changed by the average molecule director depended on thetas and phi. The first step is to find the capacitance depended on the director n which is defined the average direction of molecule alignment. The representation of the director n is consisted by two different angles such as thetas and phi by static continuum theory of liquid crystals. The capacitance occurs between the orientation of the director n for LCs and the orientation with influence by the shear force. The electrode structure of capacitive tracking is designed by the inter- digital capacitance (IDC) for analysis in the fringing field. The shear force sensor is the investigated three different directions of phi such as 0deg, 45deg and 90deg when the director n of LCs is the homeotropic alignment that the angle thetas is 0deg. The capacitance is increased from 78pF to 83pF by the fringing field when phi is 90deg. On the other hand, the capacitance is decreased from 78pF to 71p","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"35 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recalculation of keys -Solution to the eavesdrop attack","authors":"P. Suri, S. Rani","doi":"10.1109/SECON.2008.4494364","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494364","url":null,"abstract":"In this paper we have given the problem of bluetooth fixed address. It is a unique number used to identify a bluetooth device. The bluetooth device address is also used in authentication and in generation of frequency hop sequences. We have given the role of using bluetooth address in the authentication process. We have given the proposed solution for improving the concept of using bluetooth fixed address in the process of authentication.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Printer optimization for Lenticular screening","authors":"J. Armour, D. Lau","doi":"10.1109/SECON.2008.4494290","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494290","url":null,"abstract":"Digital Halftoning refers to any process used to convert continuous-tone images into an arrangement of black and white pixels, creating the illusion of a continuous-tone image. Lenticular screening is the process of multiplexing multiple images together column-wise into a single image which is then printed onto the flat side of a lenticular lens array such that from a given angle only one of the component images is visible. Lenticular screening presents a unique challenge to digital halftoning as a new generation of halftoning algorithms are needed in order to reduce the errors in lenticular prints caused by both lack of correlation between neighboring pixels and printer distortion. In this paper, we have addressed the issue of printer distortion, attempting to reduce error in lenticular prints by achieving a higher level of control over the printer being used for the print. We took into account the influence of a printed pixel on the resulting gray-level of surrounding pixels, adjusting printer resolution to account for dot overlap from various channels in order to reduce blurring within prints.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel kinetic particle-in-cell code simulation of astrophysical plasmas affecting magnetic reconnection (non-reviewed)","authors":"B. Wells, N. Singh, T. Somarouthu","doi":"10.1109/SECON.2008.4494299","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494299","url":null,"abstract":"An important goal for astrophysical researchers is to develop a better analytical and empirical understanding of what commonly called \"space weather\". This term refers to the electromagnetic conditions on the sun, solar wind, thermosphere, ionosphere, and magnetosphere. A better understanding of the space weather phenomena is needed to insure the safety of human kind and electronic and electric systems on earth and in space during periods of high solar activity. To adequately study space weather requires the use of advanced computational science methodologies to model and simulate the electromagnetic behavior of space weather phenomena in various regions of its continuum. The results of these simulations can then be compared to empirical data collected from satellite observations. To minimize the amount of computation required to effectively simulate the phenomena and to facilitate parallel processing, Particle-in- Cell (PIC), techniques have often been employed. In these simulations, the medium under consideration is described by a large number of \"macroparticles\", where each macroparticle is used to model the combined effects of a certain number of electrons or ions. All macroparticles must reside within a simulation space, which has finite geometric boundaries along each physical dimension. The simulation space is further subdivided into regions of space, called as cells, which can be one, two, or three- dimensional. The simulation can employ either a subset of Maxwell's equations or a full electromagnetic encoding. The trade-off is that the computational resources (both memory and computing time) greatly increase as the dimension of the simulation space increases and the computational set governing equations becomes more extensive. The focus of this paper is to highlight the parallel processing aspects of applying PIC techniques to the general problem of Magnetic Reconnection (MR), which is one of the major open problems in the area of space weather research. A better understanding of this phenomenon is applicable to astrophysical plasmas such as solar flares, Coronal Mass Ejections (CMEs), solar jets, and geomagnetic sub-storms. Such phenomenon is powered by the conversion of stored magnetic energy into kinetic energy of plasma particles and electromagnetic energy. The energy conversion is accompanied with MR, which in cases of impulsive events occurs at a faster time scales. In order to study this problem adequately, it requires the extensive use of distributed, multi-core, multi-threaded and parallel processing technology. The research outlined in this paper requires the development of fully kinetic simulations of plasma instabilities in current sheets using 3-dimensional electromagnetic PIC codes. These parallel representations have been written in a general manner utilizing standard Multiple Instruction Single Program (MISP), programming methods that can be ported across a wide range of parallel computing platforms. The parallel represen","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"186 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed active response architecture for preventing SSH dictionary attacks","authors":"J. L. Thames, R. Abler, D. Keeling","doi":"10.1109/SECON.2008.4494264","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494264","url":null,"abstract":"Dictionary attacks against Internet servers that provide the secure shell (SSH) service for secure, remote login is very common. The dictionary attack is an attempt to gain unauthorized access to a server by continuously guessing username and password pairs using sophisticated brute force techniques. Solutions exist that can detect and prevent this attack for a local host. However, a technique that distributes the detection and prevention information to a server's trusted neighbors can provide a gain in security by way of preemptive protection. This paper describes a distributed active response architecture that provides proactive, preemptive protection against the SSH dictionary attack.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A real time motion estimation for traffic monitoring using sloped diamond search","authors":"T. Johri, V. Bahri, R. Sahu","doi":"10.1109/SECON.2008.4494348","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494348","url":null,"abstract":"This paper focus on fast block based motion estimation for traffic monitoring using a stationary camera. As the traffic needs to be monitored continuously a real time motion estimation algorithm is required which could provide good match as well. Most of the existing block matching algorithms fail to give good match when the speed of motion varies too much. This algorithm (RTME-SDS) overcomes this problem by estimating the initial position to be searched using the motion vector of previous frame. At this position we apply sloped diamond search. Since the traffic move along a fixed path at different speed, this algorithm gives a good initial position to continue with the estimation. RTME-SDS improves over the above mentioned algorithm by more than 45% in terms of complexity giving a match close to above mentioned algorithm.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data and process mapping of sparse graph systems in a distributed environment (non-reviewed)","authors":"A. Scott","doi":"10.1109/SECON.2008.4494296","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494296","url":null,"abstract":"Methods employed for extracting parallel grains from a given sparse graph are varied and heuristic in nature, since it is NP-Hard to find the maximally balanced connected partition for a general graph [1]. In many cases, e.g. the GR -\"Greedy Algorithm\" [2], PI - \"Principal Inertia\" algorithms [3], RGB - \"Recursive Graph Bisection\" [4], 1DTF - The \"ID Topology Frontal\"; algorithm [5] and RSB - \"Recursive Spectral Bisection\" [6,7], systems are decomposed based upon the number of available processors without regard to the graph topology, which leads to inefficient data structuring (i.e. redundant storage, high communication costs and indiscriminate load balancing). An efficient methodology for regrouping and mapping a given decomposition is developed in this work. It is based on the \"elimination-tree,\" or e-tree, data structure of [8]. The e-tree is a spanning tree for the given graph, and is utilized as a data structure to guide parallel processing. The mapping function assigns a \"label,\" gamma, to each vertex: V rarr {1,2,...,n}. \"Label classes\" are defined as an ordered set, or list, of labels and contain vertices which can be processed in parallel after the vertices of all previously defined classes have been processed. A symbolic factorization technique is used to create these label classes, or sub-graphs, from G(A).","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity analysis of an ultrawideband active RFID system","authors":"F. Kheiri, B. Dewberry, L. Joiner, Dongsheng Wu","doi":"10.1109/SECON.2008.4494267","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494267","url":null,"abstract":"A novel pulsed ultra-wideband active RFID system is introduced. One of the primary questions of such a system is estimation of the optimum number of tags that can be detected by the receiver. To solve this problem, we define a vulnerable time and transmission rate for each tag. We show for a large number of tags, the number of tags read for the first time in a time period can be estimated by the total number of tags in that time period. The number of tags is modeled as interarrival times for a renewal process. The total scanning time which is a multiple of time period is the renewal process. Since finding distribution function for the unique tags read in each time period is very complicated, applying renewal process results and formulas can be very helpful and useful to have a correct perception of the system in general. Finally, experimental results are provided using experimental hardware.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130506445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid visualization Hidden Markov Model approach to identifying CG-islands in DNA sequences","authors":"G. Rambally, R. Rambally","doi":"10.1109/SECON.2008.4494244","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494244","url":null,"abstract":"CG-islands arc runs of DNA where the CG dinucleotide has much higher-than-normal frequency, indicating the likely presence of important molecular genetic biomarkers. Given a DNA sequence. the CG-island location problem involves finding regions of the DNA sequence where there are high frequencies of the CG dinucleolide, without any prior knowledge of what these regions look like. This paper proposes a hybrid visualization Hidden Markov Model (HMM) algorithm for finding CG-islands in DNA sequences. In the proposed method, each nucleotide base {A, T, C, G} in a DNA sequence is assigned a unique integer as a function of its immediate subsequent base, allowing the DNA sequence to be mapped to a corresponding numeric sequence. This numeric sequence is then plotted in 3-D space from which approximate regions with high frequencies of the CG dinucleotide are identified. These regions are represented as Hidden Markov Models from which we calculate the precise endpoints of the CG-islands. The major advantage of the proposed hybrid visualization HMM algorithm for locating CG-islands is its low computational complexity compared to other widely used algorithms.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127210338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metal fill profile detection in Lost Foam Casting process using capacitive sensors","authors":"W. Deabes, M. Abdelrahman","doi":"10.1109/SECON.2008.4494324","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494324","url":null,"abstract":"Electrical capacitive tomography (ECT) provides a simple noninvasive and ruggedized visualization technique for acquiring the metal fill profile in lost foam casting process (LFC) process. The mutual capacitance change caused by variation of the grounded metal inside the target area is measured by using an array of capacitive electrodes mounted around a target area. This paper implements a new technique for determining the metal fill profile. The proposed system has been made wireless and using a limited number of measurements which lower the cost of the hardware. An iterative linear back projection (ILBP) technique for reconstructing the metal images is adapted. Experiments are carried using a LFC simulated environment to test the performance of the system. The proposed method is able to detect the position of the metal using only 6 measurements from the sensors. Reconstructed images for the metal profile show the ability of the proposed system to identify the location and amount of the metal inside the foam pattern.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}