{"title":"Measuring Performance of Web Applications: Empirical Techniques and Results","authors":"J. Cane","doi":"10.1109/SECON.2004.1287928","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287928","url":null,"abstract":"Performance of web applications is a key determinant of operating costs, quality of user experience, and, therefore of business outcome for any web site. Objective procedures for testing web applications alone have not been found in the literature. A procedure has been developed for making such measurements. This paper reports further progress in measuring performance of web applications in a laboratory local-area-network (LAN) environment. Experimental procedures and data analysis have been refined. Test workloads have been improved so as to provide more intensive, and more varied demands on the server web application. Recent results are reported, which show that there are significant differences in performance among web application classes, depending on the type of data requested.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127310293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Viable Torque Control Schemes of Induction Motor for Electric Vehicles","authors":"M. Vasudevan, R. Arumugam","doi":"10.1109/SECON.2004.1287930","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287930","url":null,"abstract":"This paper presents the results of an investigation into suitable torque control schemes for an electric vehicle application. The electric vehicle drive consists of rewound induction motors and a three-level IGBT inverter. The schemes investigated are Field Oriented Control, Direct Torque Control (DTC), and DTC using Space Vector Modulation. The results of Matlab-Simulink simulations and a comparison between the control schemes are presented. It is found that the DTC using Space Vector Modulation scheme is best for this application.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtual and Augmented Reality System Design to Assist Operations at the Chattanooga Creek Superfund Cleanup Site","authors":"S. Vadlamudi, D. B. Koch","doi":"10.1109/SECON.2004.1287899","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287899","url":null,"abstract":"Virtual reality involves reproducing all the details of a real-world physical object or environment that needs to be simulated graphically with a computer. Augmented reality is the mixing of computer-generated information with the user¿s view of the real world. This paper presents the results of designing an interactive virtual reality simulation and augmented reality simulation of the Chattanooga Creek superfund cleanup site located in Chattanooga, TN. The augmented reality portion of the design provides a wearable system for use by personnel working at the site.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of TVQ as an Image Coding Technique","authors":"C. Shavers, R. Li","doi":"10.1109/SECON.2004.1287915","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287915","url":null,"abstract":"We propose an approach to a TVQ-based image coding technique that out performs DCT-based JPEG compression. The approach presented in this paper eliminates the artifacts generated in JPEG compression, and yields higher peak signal-to-noise ratios (PSNR), higher compression ratios (CR), and lower bit rate allocation. Our approach is based on the combined use of the Discrete Cosine Transform (DCT) and Vector Quantization (VQ). This type of image coding is referred to as Transform Vector Quantization (TVQ).","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPSec Offload Performance","authors":"J. Raissi","doi":"10.1109/secon.2004.1287968","DOIUrl":"https://doi.org/10.1109/secon.2004.1287968","url":null,"abstract":"This paper presents the results of a case study that tested the performance of IPSec Offload feature of Microsoft Windows 2000 Server using 3COM 10/100 Mbps PCI Server NIC 3XP Processors. Based on the results of the benchmark, it was concluded that, in a few cases, a fast CPU with ample RAM and CACHE could yield better performance than a 3DES NIC using the IPSec Offload feature of Microsoft Windows 2000 Server. In most cases, with the IPSec Offload turned on, there was improvement in overall performance of the system. This paper concludes that in order to yield and maintain peak performance, the selection of encryption protocols and devices ought to be dynamic and based on runtime environmental factors.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Digital System Design Methodology with SystemC Register Transfer Level Modeling","authors":"M.C. Zabawa, S. Wunnava","doi":"10.1109/secon.2004.1287966","DOIUrl":"https://doi.org/10.1109/secon.2004.1287966","url":null,"abstract":"In this competitive industrial market, maximizing time compression for new product development and release is paramount to achieving and sustaining strategic position. Designing applications for complex integrated circuits (IC) composed of tens of millions of transistors is the norm. These systems are composed of complex hardware modules integrated to create a System-On-Chip (SoCs) design. In today¿s technology, Register Transfer Level (RTL) digital system designs and associated modeling of complex ICs have been based on two prominent hardware description language (HDLs)s known as VHDL and Verilog. However, a new arising HDL language being integrated in the design of these complex system is known as SystemC. The authors will discuss the digital designs around SystemC.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Injection Modeling and Sequential Power Flow Algorithm for FACTS Devices","authors":"N. Talebi, M. Ehsan, S. Bathaee","doi":"10.1109/secon.2004.1287961","DOIUrl":"https://doi.org/10.1109/secon.2004.1287961","url":null,"abstract":"","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121756106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":".NET Security: IPSec vs SSL","authors":"J. Raissi","doi":"10.1109/secon.2004.1287958","DOIUrl":"https://doi.org/10.1109/secon.2004.1287958","url":null,"abstract":"This paper presents the results of work by the author on application and comparative performance of IP Security (IPSec) and Secure Socket Layer (SSL) protocols in a Microsoft .NET 3-tier client-server network. A preliminary analysis of the collected data sheds light on performance of IPSec and SSL in Microsoft .NET environment. It also suggests that in pathways where SSL and IPSec could be used interchangeably, the selection of the most suitable security protocol ought to be dynamic.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114558828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}