{"title":"New insights into sampling strategies for imaging strongly scattering targets","authors":"U. Shahid, M. Fiddy","doi":"10.1109/SECON.2010.5453837","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453837","url":null,"abstract":"Recent advances in methods to invert data from strongly scattering targets has revealed the need to rethink how best to sample the scattered field. For strongly scattering targets, the inversion procedure is inherently nonlinear and we show that usual sampling procedures based on Shannon sampling concepts are inadequate and some prior knowledge of the maximum permittivity or refractive index of the target plays an important role.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of cognitive radio architectures","authors":"A. Amanna, Jeffrey H. Reed","doi":"10.1109/SECON.2010.5453869","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453869","url":null,"abstract":"Cognitive Radio and Cognitive Networking are emerging fields of research that has the potential for transformative changes to the current status quo. Cognitive systems utilize environmental observations such as spectrum or network conditions to change operational configurations in order to optimize performance at individual node or over end-to-end goals. This paper surveys some of these origin cognitive frameworks and correlates these frameworks to cognitive radio implementations of today. Several definitive implementations and cognitive radio architectures are reviewed and compared. This paper also identifies area of need and suggests directions forward for novel research in this area through interdisciplinary collaboration with the cognitive sciences, integrating prediction and proactive operation into cognitive radio/network architectures and identifying less researched artificial intelligence algorithms that show promise towards cognitive radio architecture.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131377460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Panday, B. Joshi, A. Ravindran, Jong-Ho Byun, H. Zaveri
{"title":"Study of data locality for real-time biomedical signal processing of streaming data on Cell Broadband Engine","authors":"A. Panday, B. Joshi, A. Ravindran, Jong-Ho Byun, H. Zaveri","doi":"10.1109/SECON.2010.5453907","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453907","url":null,"abstract":"High performance computing is becoming critical in the medical area to aid real-time processing of complex analysis of biological signals. In this paper parallel schemes for real-time computations of pair-wise correlation (PWC) of electroencephalogram (EEG) signals, which belongs to streaming-data class of applications, are proposed and implemented and their performances are evaluated. Currently most of the EEG based diagnosis for epilepsy is done off-line. However, there is a growing need to perform these diagnoses in real-time to aid health care providers, including surgeons, in decision-making process that will lead to improved quality of life and prevent undesirable consequences, such as readmission to hospitals resulting in prolonged suffering and higher health care costs. Systematic study of the PWC problem and the IBM Cell Broadband Engine (CBE) architecture led us to a model that is well suited for the Cell architecture and GPUs. Measurements on the CBE indicate that speedup of 33.91 is possible over the serial code running on Intel Xeon processor and the schemes can be used for real-time signal processing.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-certified public key implicit certificate scheme for drivers' anonymity in Vehicle-to-Vehicle communication networks","authors":"N. M. Rabadi","doi":"10.1109/SECON.2010.5453848","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453848","url":null,"abstract":"In Vehicle-to-Vehicle (V2V) communication networks, vehicles will broadcast their safety-critical information, such as speed, position and direction, to alert nearby vehicles of possible collisions. The use of a standard public key certificate to secure the broadcast of the safety-critical information will allow unauthorized entities to identify and trace movements and locations a driver visits using the driver's unique public key in the certificate. In this paper, we propose a self-certified public key implicit certificate scheme for use in V2V communication networks to preserve the anonymity of drivers. In our proposed scheme, recipients of a broadcasted message in V2V communication networks can authenticate and validate the integrity of the message without identifying the transmitter. In case of a dispute and malicious activities, the identity of the vehicle which broadcasted the disputed message can be revealed only by a trusted authority. Using an elliptic-curve key-length of 256 bits, we show that our proposed scheme adds 238 bytes to the vehicle's safety-critical information in the broadcasted message.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Take chances, make mistakes, get dirty","authors":"Rebecca F. Bruce, Susan Reiser","doi":"10.1109/SECON.2010.5453892","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453892","url":null,"abstract":"This paper describes a compilation of projects designed to provide hands-on experience with technology for first semester freshman. All projects engage students in engineering design within an active learning environment. Each project has been crafted to increase the academic success and retention of freshman by challenging them to master engineering design while facilitating their success. The learning outcomes associated with these projects include an increased awareness of social responsibility, improved communication skills, experience in system design and project management, increased effectiveness in teamwork practices, and the development of a student community. These projects have been situated in the new Integrated Liberal Studies program at UNC Asheville, but they could be offered as part of any engineering program in support of ABET accreditation requirements.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Nasipuri, H. Alasti, Priyanka Puthran, Robert Cox, J. Conrad, L. van der Zel, B. Rodriguez, R. McKosky, J. Graziano
{"title":"Vibration sensing for equipment's health monitoring in power substations using wireless sensors","authors":"A. Nasipuri, H. Alasti, Priyanka Puthran, Robert Cox, J. Conrad, L. van der Zel, B. Rodriguez, R. McKosky, J. Graziano","doi":"10.1109/SECON.2010.5453872","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453872","url":null,"abstract":"The paper describes the design, test, and development of vibration sensing nodes for a wireless sensor network (WSN) that is used for health monitoring of high voltage (HV) equipment in power substations. The principal objective of the project is to investigate the viability of using inexpensive and low-power wireless sensors for power system monitoring applications. Laboratory tests and experimental results that demonstrate the performance of the sensors are presented.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive control of sychronization for multi-axis motion system","authors":"M. Cheng, S. Salekeen, E. Bakhoum, Cheng-Yi Chen","doi":"10.1109/SECON.2010.5453823","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453823","url":null,"abstract":"This paper investigate on motion synchronization of multiple axes systems. Two different control strategies, a cross-coupling controller in feedback loop and an adaptive controller, were used to synthesize the synchronization compensator with the cross-coupling dynamics among the axes. By using these strategies, the asymptotic convergence of both tracking and synchronization errors are achieved. The comparison of the two controllers of the nominal plant is discussed. Experimental results of a three-axis motion system that include system uncertainties are also illustrated to verify the effectiveness of the proposed approach.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122689975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. W. Dziczkowski, B. Geltz, T. V. Trimeloni, J. A. Berlier, J. M. McCollum
{"title":"A low-cost solution for automated solder paste application","authors":"Z. W. Dziczkowski, B. Geltz, T. V. Trimeloni, J. A. Berlier, J. M. McCollum","doi":"10.1109/SECON.2010.5453912","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453912","url":null,"abstract":"In electrical and computer engineering, prototyping is a process through which an original concept is represented in a physical system. Creating such a prototype might only necessitate the use of a soldering iron, but specialized equipment can facilitate or in some cases be requisite for complex designs and smaller component packages. This equipment, however, can be prohibitively expensive. This paper proposes a machine which eliminates most of the above issues, a computer numerically-controlled (CNC) solder paste dispenser. To apply solder paste to a design, the machine uses a X/Y gantry to precisely position a syringe of paste and dispense a measured amount.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"153 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125895962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient computational design for an antenna with a finite ground plane","authors":"K. Takei","doi":"10.1109/SECON.2010.5453825","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453825","url":null,"abstract":"An efficient method for computational design for an antenna with a finite ground plane was devised. A matrix equation by means of using voltage flows was formulated by using an inverse-matrix/reverse-equation method within the method-of-moment (MoM) framework. Double-layered -zigzag-indexing for discretized induced currents provides a matrix equation incorporating a small work area. The radiation power expressed by voltage flows that appear only in this area is derived. Matrix equation based on voltage flow and radiation power enables practical computational design of an antenna by using a commercial PC with small memory.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126759861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power aware design of second level cache for multicore embedded systems","authors":"M. Rani, A. Asaduzzaman","doi":"10.1109/SECON.2010.5453931","DOIUrl":"https://doi.org/10.1109/SECON.2010.5453931","url":null,"abstract":"Designing efficient cache, memory, and storage subsystem for modern embedded systems supporting a variety of applications is a great need. Embedded systems are being deployed with multicore processors to help parallel and distributed computing in order to meet the requirements for increased processing speed. Multiple cores offer manifold options to organize multi-level caches. A mixture of cache memory hierarchies are proposed to satisfy the requirements of high-performance low-power multicore embedded systems. In this paper, we investigate the impact of CL2 organizations on the performance and power consumption for multicore embedded systems. We simulate two 4-core architectures, one with shared CL2 and the other one with private CL2s. We use MPEG4, FFT, MI, and DFT applications/algorithms in our experiment. Simulation results depict that the mean delay and total power consumption significantly vary with the variations of CL2 organization and applications. It is observed that reductions in total power consumption and mean delay per task of up to 43% and 36%, respectively, are possible with optimized CL2, with an optimal choice of 256KB CL2 cache, 64 B CL2 line size, and 8-way CL2 associativity level.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}