2009 IEEE Long Island Systems, Applications and Technology Conference最新文献

筛选
英文 中文
RFID for personal asset tracking 用于个人资产跟踪的RFID
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031570
Steven Chan, Adam Connell, Eribel Madrid, Dongkuk Park, R. Kamoua
{"title":"RFID for personal asset tracking","authors":"Steven Chan, Adam Connell, Eribel Madrid, Dongkuk Park, R. Kamoua","doi":"10.1109/LISAT.2009.5031570","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031570","url":null,"abstract":"The proposed mobile device uses Radio Frequency Identification (RFID) to keep track of registered objects that are within range of the user. The goal is to provide a new security solution for keeping belongings that are carried around. The device consists of a mobile RFID reader and a control program with a graphical user interface. The assets are attached with RFID tags with unique identifiers for each tag by using EPC Gen2. The graphic interface allows the user to create a catalog of objects that are to be kept track of. Personal items such as keys, wallets, passports, jewelry, watches, glasses, medicine, portable flash drives, electronic devices (cell phone, PDAs, laptops, mp3 players, calculators) can be tracked using this system.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Lunar regolith control and resource utilization 月壤控制与资源利用
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031560
M. Digiuseppe, R. Pirich, Val Kraut
{"title":"Lunar regolith control and resource utilization","authors":"M. Digiuseppe, R. Pirich, Val Kraut","doi":"10.1109/LISAT.2009.5031560","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031560","url":null,"abstract":"The major process for weathering and erosion on the moon is micro-meteorite impact. This produces the outer blanket of the moon known as lunar regolith or soil, which consists of numerous particles of various sizes. Lunar dust (defined as particles ≪20um) makes up about 20 wt% of the typical lunar soil. Dust contamination causes serious problems for equipment and vehicles vital to space mission applications. Lunar “weathering” has left the lunar soil with a relatively fine texture compared to terrestrial dust particle size distributions. The electrostatic charging of the lunar surface is caused by its interaction with the local plasma environment and solar UV and X-ray induced photoemission of electrons. According to observations by astronauts, lunar dust is electrostatically charged, difficult to remove, and appears to get everywhere. The lunar thermal environment poses a unique challenge to materials since it is characterized by large temperature variations, long hot and cold soak times, and reduced heat rejection capability due to the presence of the lunar regolith. Previous investigations have indicated a lunar regolith deposition rate of about 1 cm per 2–3 million years, but the deposition rate is expected to be both geographically variable and also to vary over time. Dust gathers on sensors and actual pieces of the vehicle inhibiting motion and data gathering. Devices that require transparency to light for maximum efficiency such as solar photovoltaic power systems, video cameras, optical or infrared detectors, and windshields for various types of vehicles including rovers and spacecraft will suffer from the dust accumulation. Another potential hazard is the unintentional capture of extraterrestrial bacteria or spores on the surfaces of the equipment, to the extent that can be anticipated, that might bring inadvertent and possibly catastrophic contamination of human environment. We are attempting to design an integrated approach to solving the dust problems and to actually leverage the unique properties associated with the lunar regolith's many elements through insitu resource utilization and processing. This paper highlights some of the aspects of cost-effective, lightweight, self-cleaning and anti-contamination coatings to mitigate accumulation of lunar dust on critical power and optical system elements and some unique approaches to lunar regolith processing to extract potentially valuable resources that can be used to support a lunar habitat.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133913905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resource scheduling heuristics for data intensive networks 数据密集型网络的资源调度启发式算法
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031558
K. Choi, K. Shroff, D. Katramatos, D. Yu, T. Robertazzi
{"title":"Resource scheduling heuristics for data intensive networks","authors":"K. Choi, K. Shroff, D. Katramatos, D. Yu, T. Robertazzi","doi":"10.1109/LISAT.2009.5031558","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031558","url":null,"abstract":"In this work, we consider the adaptive capacity utilization problem for real-time heterogeneous data intensive MPLS (Multiprotocol Label Switching) networks consisting of multiple source and destination nodes. We account for a file transfer scenario taking into account node capacity, file size, file transfer start time, and the deadline of files when determining the explicit capacity of Virtual Paths (VPs) across the backbone. We propose two heuristic algorithms referred to as the Most Conservative (MC) algorithm and the Load Balancing (LB) algorithm using a newly introduced parameter, capacity utilization. These heuristic algorithms are designed to react to file transfers according to the temporal capacity of VPs for multiple source and destination networks.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TDR-inspection of vast tracts of forests or plants. Tract of plants as an environmental hazard detector tdr——对大片森林或植物的检查。植物作为环境危害探测器
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031564
M. Krinker, A. Goykadosh
{"title":"TDR-inspection of vast tracts of forests or plants. Tract of plants as an environmental hazard detector","authors":"M. Krinker, A. Goykadosh","doi":"10.1109/LISAT.2009.5031564","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031564","url":null,"abstract":"A new method to monitor vast tracts of plants and forests was introduced in the former USSR in the 80's and was developed later in the USA. The method is based on a Time Domain Reflectometer, TDR, which deals with propagating a flat electromagnetic wave initiated by an electric pulse traveling along an electric line. While propagating, the pulse experiences reflections from the heterogeneities of the line, which is displayed on the screen of TDR-instrument.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scientific computing with graphical system Design 科学计算与图形系统设计
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031557
R. Berger
{"title":"Scientific computing with graphical system Design","authors":"R. Berger","doi":"10.1109/LISAT.2009.5031557","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031557","url":null,"abstract":"Competing in today's global economy requires companies to rapidly enter the market with innovative products that offer increased functionality and operate flawlessly. The graphical system design approach for test, control, and embedded design meets this need by providing a unified platform for designing, prototyping, and deploying applications. Graphical system Design empowers engineers to integrate real-world signals sooner for earlier error detection, reuse code for maximum efficiency, benefit immediately from advances in computing technology, and optimize system performance in a way that outpaces traditional design methodologies.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122216978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of marine current turbines to reduce hurricane intensity in the Gulf of Mexico 使用海流涡轮机来减少墨西哥湾的飓风强度
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031565
R. Larosa
{"title":"Use of marine current turbines to reduce hurricane intensity in the Gulf of Mexico","authors":"R. Larosa","doi":"10.1109/LISAT.2009.5031565","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031565","url":null,"abstract":"The installation of arrays of turbines in the water passages between the Antilles Islands may be a way of reducing hurricane damage to the Gulf Coast and to the industries in the Gulf of Mexico (GoM) while supplying non-polluting electric power to the Islands. The back pressure of the turbines should cause some water to divert around the Caribbean Sea and the GoM, and feed directly into the Gulf Stream. The Loop Current (LC) in the GoM influences the intensification of hurricanes, so reducing LC strength should reduce the volume and change the location of the warm water that accumulates and supplies energy to passing hurricanes. The response of the LC to the installation of turbines is studied with the aid of a simple model in which wind and other forces drive tropical water into the GoM and raise its level above that of the Atlantic. Gravity causes the GoM to drain back into the Atlantic via the Straits of Florida and the Florida Current. The model relates reduction of LC throughput to the power extracted or diverted by the turbines, and helps to explain why the LC follows a narrow hairpin-shaped path. The model fails to predict that the turbines will cause a significant shortening of the hairpin path that would keep it away from New Orleans and the rest of the Gulf Coast, thereby reducing the hurricane danger. Future refinements of the model may validate the hurricane reduction benefit of the turbines. A robust prediction of significant hurricane protection is necessary in order to induce Gulf Coast governments and industries to invest in turbines whose power output would benefit the Antilles Islands. This paper also suggests that the proper location for large installations of turbines is in the Antilles water passages rather than the usually-proposed Florida Straits or Florida Current. Turbines in these GoM outlets will retard drainage of the GoM, raise its sea level, and increase the hurricane danger.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting signal sparseness for reduced-rate sampling 利用信号稀疏性进行低速率采样
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031567
D. Mesecher, L. Carin, I. Kadar, R. Pirich
{"title":"Exploiting signal sparseness for reduced-rate sampling","authors":"D. Mesecher, L. Carin, I. Kadar, R. Pirich","doi":"10.1109/LISAT.2009.5031567","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031567","url":null,"abstract":"The rate at which signals are sampled in their native form (e.g. the “time domain” for many signals of interest) in order to capture all of the information of a signal - the so-called Nyquist rate in traditional sampling - equals one over twice the Fourier bandwidth of the signal. This process exploits knowledge of the finite bandwidth of the signal. Alternatively, if the signal's Fourier spectrum were available, the signal could be sampled in the Fourier domain, and if it were known that some of the Fourier coefficients were negligible, the number of samples required to capture all of the signal's information could be reduced. If it were known that the signal had such a property - called sparseness - in the Fourier domain, would it be possible instead to sample the signal at a reduced rate in its native form while still capturing the signal's information? Moreover, would it be possible to do so without knowing exactly which Fourier coefficients were negligible? In this paper we examine a recently introduced approach called compressive sampling (CS) which attempts to go beyond the exploitation of a signal's finite bandwidth, and exploit signal sparseness to allow signals to be “under sampled” without losing information. We will develop the concept of CS based on signal sparseness and provide a justification for the compressive-sampling process, including an explanation for the need for randomness in the process, and subsequent signal reconstruction from the CS samples. In addition, examples of applications of CS will be provided, along with simulation results.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing user experience at museums using smart phones with RFID 使用具有射频识别功能的智能手机提升博物馆的用户体验
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031573
Ashish Mody, Muneeb Akram, K. Rony, Muhammad Sajjad Aman, R. Kamoua
{"title":"Enhancing user experience at museums using smart phones with RFID","authors":"Ashish Mody, Muneeb Akram, K. Rony, Muhammad Sajjad Aman, R. Kamoua","doi":"10.1109/LISAT.2009.5031573","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031573","url":null,"abstract":"With the advancement in cell phone technologies and its increased use as a multimedia platform, we can extend its application to enhance the experience of museum visitors. Smart phones can be used to provide full personalized multimedia presentations in a museum environment. This design proposal is aimed at increasing museum visitors and, boosting profits, and greatly reducing maintenance costs for museum operators. We propose a new technique to interface a museum's artifact specific multimedia files on the network to smart phones. Our design offers an RFID based interface that can be used for educational purposes in museums or conference settings. The design aims at the interaction between the user and specific artifacts by providing additional data sent wirelessly through the museum or conference database to a portable device such as the Motorola Q smart phone. The smart phone will contain the RFID reader and a tag that will store its MAC address. A central RFID reader will be used to provide internet access to each user by scanning the MAC address on the smart phone tag and allowing wireless access for it. The RFID reader on the smart phone will read the tags embedded in the artifacts and corresponding data will be fetched from the network and transmitted to the device via WiFi or other wireless technologies, such as Bluetooth. We will first demonstrate the functionality of our design using an RFID reader interfaced with a laptop, which has wireless internet connectivity. Different tags will be used as artifact identifiers and appropriate information from the internet will be obtained and displayed on the laptop. This will include programming the reader to retrieve data matched to the artifact. The next step in the design would be to implement it using the MC9090, which is a handheld mobile device with an integrated RFID reader and WiFi. The program for the design implementation will be loaded on this device and the system functionality will be verified.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
MIL-STD-461: The basic military EMC specification and it's evolution over the years MIL-STD-461:基本军用EMC规范及其多年来的演变
2009 IEEE Long Island Systems, Applications and Technology Conference Pub Date : 2009-05-01 DOI: 10.1109/LISAT.2009.5031566
S. Mazzola
{"title":"MIL-STD-461: The basic military EMC specification and it's evolution over the years","authors":"S. Mazzola","doi":"10.1109/LISAT.2009.5031566","DOIUrl":"https://doi.org/10.1109/LISAT.2009.5031566","url":null,"abstract":"In 2007, MIL-STD-461 celebrated its 40th birthday. In 2007, the DOD released MIL-STD-461F, the latest version of the fundamental military Electromagnetic Compatibility (EMC) specification. This paper discusses Electromagnetic Interference (EMI) Specifications prior to MIL-STD-461 and will outline the evolution and changes that MIL-STD-461 has undergone over its first 40 years of existence.","PeriodicalId":262512,"journal":{"name":"2009 IEEE Long Island Systems, Applications and Technology Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信