IEEE SoutheastCon 2008最新文献

筛选
英文 中文
Evolving an emotion-based neural control architecture 进化一种基于情绪的神经控制体系结构
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494328
N. Ackovska, S. Bozinovski, L. Bozinovska
{"title":"Evolving an emotion-based neural control architecture","authors":"N. Ackovska, S. Bozinovski, L. Bozinovska","doi":"10.1109/SECON.2008.4494328","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494328","url":null,"abstract":"This work addresses a central problem in evolvable systems - evolution of a neural based emotion integrated learning phenotype from an initial genotype. It describes morphogenesis of a cognitive system based on a neural network, starting from a single genotype having a modulon control structure. It further presents an axon growing mechanism as second step of neural evolution. The neural architecture presented here has the ability to evolve to an emotion integrated neural leaning architecture.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126755141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating mobile phone handoff behavior using chi-square statistical test 用卡方统计检验评价手机交接行为
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494322
S.A. Rajput, A. Pandya, S. Saxena, S. Ostroff
{"title":"Evaluating mobile phone handoff behavior using chi-square statistical test","authors":"S.A. Rajput, A. Pandya, S. Saxena, S. Ostroff","doi":"10.1109/SECON.2008.4494322","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494322","url":null,"abstract":"Mobile networks reuse frequency bands based on a color map to increase the capacity of the network. A handoff should occur when a mobile unit moves from the influence of one base station with weaker signal into another's that has stronger signal. Handoff behavior of all units is an important factor in quality of service of a mobile phone service. Handoff decisions, also called mobility decisions, are made by mobile phone based on the observed power from base stations. Premature, delayed or exceedingly sensitive decisions are considered poor decisions. Excessive poor decisions result in degradation of service quality in otherwise a healthy mobile system. Conventional research focuses on improving hand-off algorithms. Most of the published work on verification of effectiveness of handoff algorithms is analytical or focuses on data collected under pristine laboratory conditions. A unit that makes good mobility decisions, theoretically or in the laboratory, may not behave as expected in the real world however. We propose a process of evaluating hand off behavior using large amount of diagnostic phone data collected in the real world that is used for identification of adverse trends or aberrant behavior of various models. In this paper, we discuss a chi-square statistical test to evaluate the performance of specific mobile unit model by comparing the behavior of a test mobile unit against a well- established behavior profile. If the behavior of the test model deviates significantly from the well-established profile, it is considered deficient in its handoff behavior that deserves further analysis. The test was developed in such a way that a large amount of units can quickly be tested. The same test can be used to compare performance of all mobile phones in one region to performance of same mobile phones in other regions. Furthermore, our test is useful in determining difference of handoff behavior when the mobile units are moving in opposite directions.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introducing SB-CoRLA, a schema-based constructivist robot learning architecture 介绍基于模式的建构主义机器人学习架构SB-CoRLA
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494288
Yifan Tang, L. Parker
{"title":"Introducing SB-CoRLA, a schema-based constructivist robot learning architecture","authors":"Yifan Tang, L. Parker","doi":"10.1109/SECON.2008.4494288","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494288","url":null,"abstract":"We introduce the SB-CoRLA architecture that we have developed by extending our previously developed centralized ASyMTRe architecture (CA) to enable constructivist learning for multi-robot team tasks. We believe that the schema-based approach used in ASyMTRe is a useful abstraction for enabling constructivist learning. The CA algorithm only finds complete solutions for the entire team and is not well-suited for identifying useful schema chunks that can be used to find future task solution. Thus, we explore an evolutionary learning (EL) technique for the offline learning of schema chunks. We compare the solutions discovered by the EL algorithm with those that are found using CA, as well as with a third algorithm that randomizes the CA algorithm, called RA. Four different applications in simulation are used to evaluate the techniques. Our results show that the EL approach finds solutions of comparable quality to the CA technique, while also providing the added benefit of learning highly fit schema chunks.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Easy-to-use communication interfaces for data acquisition 易于使用的通信接口的数据采集
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494269
G. Singh, J. Conrad
{"title":"Easy-to-use communication interfaces for data acquisition","authors":"G. Singh, J. Conrad","doi":"10.1109/SECON.2008.4494269","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494269","url":null,"abstract":"The purpose of a data acquisition system is to provide reliable and timely information. The received information can then be analyzed in real-time or remotely to estimate the state of the measured environment. This work is an effort towards the development of communication interfaces for data acquisition systems. The developed interfaces can be used to provide reliable communication between a host-PC and an embedded target. The motivation for the work was to reduce the problem of developing interfaces for the host-PC. This work is justified by the increased need of host side software, which can be used to communicate with an embedded target using a variety of communication interfaces. This work provides a simplified interface solution for three major communication protocols that can be used by developers with reasonable software design skills. A multithreaded application has been further developed to address the implementation of these interfaces.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computing the VCO sweep rate limit for a second-order PLL 计算二阶锁相环的压控振荡器扫描速率限制
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494256
John L. Stensby
{"title":"Computing the VCO sweep rate limit for a second-order PLL","authors":"John L. Stensby","doi":"10.1109/SECON.2008.4494256","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494256","url":null,"abstract":"Phase-locked loops serve important roles in receivers, coherent transponders and similar radio-frequency-based applications. For many of these uses, the bandwidth of the loop must be kept small to limit the detrimental influence of noise, and this requirement makes the natural PLL pull-in process too slow and/or unreliable. To aid the acquisition process in these cases, an external sweep voltage can be applied to the VCO when the loop is unlocked. Hopefully, the sweep voltage will effect a rapid decrease in closed-loop frequency error to a point where phase lock is achieved quickly. For a second-order loop containing a perfect integrator loop filter, there is a maximum VCO sweep rate magnitude, denoted as Rm rad/sec2, for which phase lock is guaranteed. If the actual VCO sweep rate magnitude is less than Rm, the loop cannot sweep past a stable phase-lock state without locking correctly. For an applied sweep rate greater than Rm, the loop may sweep past a lock point and fail to achieve phase lock. In the PLL literature, only a trial-and-error approach has been described for approximating Rm given values of loop damping factor p and natural frequency omegan. Furthermore, no plot exists of Rm/omegan 2 versus rho. This dearth of results is remedied here. A new numerical algorithm is given that converges to the maximum sweep rate magnitude Rm. It is used to generate a plot of Rm/omegan 2 versus rho, a never-before-explored relationship in the PLL literature.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"418 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123429669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of a virtual level of detail scene graph for terrain modeling in Java3D (non-reviewed) 在Java3D中开发用于地形建模的虚拟细节级场景图(未回顾)
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494297
M. Pendergast
{"title":"Development of a virtual level of detail scene graph for terrain modeling in Java3D (non-reviewed)","authors":"M. Pendergast","doi":"10.1109/SECON.2008.4494297","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494297","url":null,"abstract":"Summary form only given. Three-dimensional modeling of geographic information systems has become a reality due to the low cost of relatively powerful workstations, improved performance and memory capabilities of graphics hardware, and the introduction of cross-platform standards such as OpenGL and Java3d. The work presented in this paper is part of an ongoing project whose goal is to create efficient algorithms that support real-time display and fly through capabilities of large virtual world based on NASA and USGS mapping data. The size and resolution of the virtual world should not be limited to the size of RAM or even virtual memory; rather the segments should be loaded, as they are required. This requires the creation of a virtual level of detail segments (LOD) (based on Java3D geometry objects) that are dynamically retrieved as the user moves through the virtual world. To accomplish this it is necessary to have both an efficient storage and retrieval mechanisms and employ efficient rendering techniques. The algorithms employed should use a reasonable amount of disk space and does not unduly burden the network or processor. In addition to having efficient use of resources, the algorithm should minimize visual artefacts associated with LOD processing, namely gaps and checker boarding.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115640560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Probabilistic analysis of the ASW protocol using PRISM 基于PRISM的反潜战协议的概率分析
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494277
S. Islam, M. Zaid
{"title":"Probabilistic analysis of the ASW protocol using PRISM","authors":"S. Islam, M. Zaid","doi":"10.1109/SECON.2008.4494277","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494277","url":null,"abstract":"Increased interest in e-commerce protocols and reliable exchange of information over the Internet have created needs of fair exchange protocols for contract signing and other purposes. The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the aid of a trusted third party in case of a dispute. In our study, we have analyzed the key security objectives of ASW protocol, fairness, effectiveness and timeliness, using a probabilistic model checking tool, PRISM. First, we model the roles of the participants and the trusted third party in PRISM code. Next, we express the security objectives using a temporal logic, PCTL. Finally, the model is analyzed using these PCTL expressions; different outputs confirm the fairness of the ASW protocol. Moreover, the effectiveness and the timeliness of the protocol are also established.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of substrate permittivity effects on the gain of planar inverted-F antennas 基板介电常数对平面倒f天线增益影响的研究
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494307
Y.-T. Jean-Charles, V. Ungvichian, J. A. Barbosa
{"title":"A Study of substrate permittivity effects on the gain of planar inverted-F antennas","authors":"Y.-T. Jean-Charles, V. Ungvichian, J. A. Barbosa","doi":"10.1109/SECON.2008.4494307","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494307","url":null,"abstract":"A planar inverted-F antenna (PIFA) of fixed dimensions, with a 4.92 cm x 2.13 cm radiating element 4.4 mm high above the ground plane is evaluated with different substrates. The resonance frequency, the bandwidth and the gain are studied in relation to the relative dielectric constant of the perfect and lossy substrates. The results reveal that the normalized resonance frequency (Deltaf/f) decreases logarithmically and the gain drops linearly with a slope of 2 dB per decade.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CMOS-based VLSI design of a specific integrated circuit (ASIC) sensor interface IC chip (non-reviewed) 基于cmos的VLSI专用集成电路(ASIC)传感器接口IC芯片的设计(未回顾)
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494261
K. Williams, H. Penn, T. Tarver, A. Odeh, Z. Xiao
{"title":"CMOS-based VLSI design of a specific integrated circuit (ASIC) sensor interface IC chip (non-reviewed)","authors":"K. Williams, H. Penn, T. Tarver, A. Odeh, Z. Xiao","doi":"10.1109/SECON.2008.4494261","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494261","url":null,"abstract":"A CMOS-based application specific integrated circuit (ASIC) has been designed, simulated and fabricated for the application of carbon nanotube-based strain sensor interface circuit. The ASIC consists of high performance operational amplifier (OPA), low-pass filter, and 12-bit dual-slope analog-to-digital converter (ADC). The ADC contains an integrator, a comparator, a counter, latch, and digital control logic. The low-pass filter was designed to remove the noise from the sensor. The ASIC was expected to be integrated with a carbon nanotube- based strain sensor to form a strain detection system. The Tanner design tools were used for the design and simulation of the mixed-signal integrated circuit, where L-Edit was used for the layout of circuit and T-SPICE was used for the simulation. Because of the limitation of the 2.2 mm times 2.2 mm chip size for fabrication in MOSIS, we modified the 12-bit ADC into a 4-bit ADC in the ASIC for the fabrication. After layout and post-simulation, the ASIC has been implemented on a 2.2 mm times 2.2 mm silicon chip die and fabricated by using MOSIS AMI 1.5 mum mixed- signal CMOS process technology available through MOSIS.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of noise sensitivity and reconstruction accuracy of Tchebichef moments 切比切夫矩噪声敏感性及重构精度分析
IEEE SoutheastCon 2008 Pub Date : 2008-04-03 DOI: 10.1109/SECON.2008.4494350
S. M. Elshoura, D. Megherbi
{"title":"Analysis of noise sensitivity and reconstruction accuracy of Tchebichef moments","authors":"S. M. Elshoura, D. Megherbi","doi":"10.1109/SECON.2008.4494350","DOIUrl":"https://doi.org/10.1109/SECON.2008.4494350","url":null,"abstract":"One of the main contributions of this paper is to show that contrary to the common belief Tchebichef moments are more sensitive to noise added to the image than Zernike moments. We show this by imposing different types and levels of noise on various images and measuring the error due to the added noise alone after image reconstruction. To calculate the error due to added noise alone, the image reconstruction error is subtracted from the total error, which initially includes both reconstruction and added noise errors. Another contribution of this paper is to present some analysis and compare the reconstruction capability of Tchebichef moments to that of Zernike and Legendre moments in noise free environments independent of the image used. We show this by spectrally analyzing the performance of Tchebichef, Legendre, and Zernike moments using single frequency images. Here the total reconstruction error of an arbitrary image is equal to the integration of the spectral errors, whose transfer functions are calculated using single frequency images, for all frequencies.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信