{"title":"Improved lead-acid battery management techniques","authors":"S.P. Sacarisen, J. Parvereshi","doi":"10.1109/SOUTHC.1995.516075","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516075","url":null,"abstract":"The consumer and industrial markets are experiencing unprecedented demand for battery management technology. Consumer appetite for the convenience of battery-powered portable equipment such as cellular phones and small form-factor computers is continuing to expand. The industrial market is being besieged by governmental regulations and consumer concerns on environmental pollution. This has increased development emphasis on electric motor-driven tools and vehicles. The secondary-battery industry is under competitive pressure to produce a cell that weighs almost nothing, takes up little space, and has ideal charge/discharge performance. Secondary battery technologies including lead-acid are being challenged to meet the lighter weight, smaller size, and higher performance requirements of these emerging market opportunities. Specifically, lead-acid battery technology is being improved by several innovative techniques that are well published. The battery charging and battery management techniques must keep pace with these improvements and meet or exceed consumer expectations. This paper describes some techniques that enhance the charging and battery management methods available for lead acid batteries. These include voltage rate termination, battery conditioning, and auto-cycle charge algorithms.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On balanced realizations of 2-D delta-operator formulated discrete-time systems","authors":"K. Premaratne, M. M. Ekanayake, P. Bauer","doi":"10.1109/SOUTHC.1995.516071","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516071","url":null,"abstract":"Delta-operator based implementations can avoid the numerical ill-conditioning usually associated with the high speed shift-operator based implementations of discrete-time systems. Moreover, it provides a unified methodology for tackling both continuous- and discrete-time systems. In particular, it has been shown that, delta-operator based balanced realizations can offer superior coefficient sensitivity properties under fixed-point arithmetic. The authors address computation of balanced realizations. For this purpose, given a discrete-time system, the relationship between its shift- and delta-operator formulated balanced realizations is presented.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microprocessor tutorial using toolbook","authors":"T. Giuma, T. Randolph","doi":"10.1109/SOUTHC.1995.516090","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516090","url":null,"abstract":"In this paper, we describe an MS-Windows based interactive tutorial that provides the students in electrical/computer engineering and/or computer science programs with an easy-to-use reference and overview of a course in microprocessors and their applications. This tutorial is designed to give these students an enhanced understanding of microprocessors and their applications. This multimedia-based system covers topics that start with introductory basic concepts in computer organization/operation and conclude with advanced and detailed concepts in microprocessor-based design systems using the Intel 8086 microprocessor and its associated peripheral devices.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An identification algorithm for the 2-D separable-in-denominator filter","authors":"J. Ramos","doi":"10.1109/SOUTHC.1995.516070","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516070","url":null,"abstract":"Subspace algorithms that rely on robust numerical linear algebra are becoming increasingly important in areas such as array processing, mobile telephones, system identification, etc. The class of linear subspace system identification algorithms has already been shown to be successful for industrial as well as environmental applications. These subspace identification algorithms use input/output data directly contrary to other classical state-space identification algorithms that use Markov parameters. The advantages of the subspace algorithms are the automatic structure identification (system order), geometrical insights (notions of angle between subspaces), and the fact that they rely on robust numerical procedures (singular value decomposition). the authors extend the linear subspace identification algorithm to the class of 2-D balanced state space models, having separable horizontal/vertical structure.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133161237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware strategies for end-point detection","authors":"S. Varada, Ravi Sankar","doi":"10.1109/SOUTHC.1995.516096","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516096","url":null,"abstract":"End-point detection of a speech signal is an important process in isolated-word recognition. Several approaches were suggested to isolate speech signal from the back-ground noise. One such approach is using energy and zero crossing rate. In the paper, a variation of this algorithm is considered for hardware implementations for both on-the-fly (real time applications) and off-the-fly (non-real time applications) methods. This algorithm is chosen because of its simplicity and hardware suitability for implementation. The reason for hardware implementation is to achieve better speed performance over software approaches. The speed of energy magnitude computations alone, in off-the-fly approach, is O(k); where k is the frame, of arbitrary length, count. The approach in on-the-fly method is the most suitable for end-point detection implementation for real time applications.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133756637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of the ITU/ISO video compression standards to CCTV","authors":"T. L. Glatt","doi":"10.1109/SOUTHC.1995.516113","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516113","url":null,"abstract":"Closed circuit television offers some interesting applications for the ITU/ISO video compression recommendations. Among those uses are public network transmission and digital storage. The main components to the paper are compression, transmission, storage, and their application to CCTV. A brief description and comparison of H.261, MPEG, and JPEG is presented. Also discussed are ISDN, plain old telephone service and LANs. A description of CCTV and loss prevention technology is provided. Some design considerations are presented with respect to the background information and, finally, a look into what the future might hold is given.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132945653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accuracy of MOM calculations for scattering from simple objects","authors":"L. D. Vann, J. Bagby","doi":"10.1109/SOUTHC.1995.516134","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516134","url":null,"abstract":"Summarizes a study of applications of massively parallel high performance computing to analysis of electromagnetic scattering from a number of targets. Specifically, the paper focuses on the use of advanced numerical techniques and massively parallel computing in implementation of the method of moments (MOM) to numerical solution of integral equation electromagnetic scattering formulations. The goal of the paper is to increase numerical accuracy without sacrificing computational efficiency. The main thrust is to explore several strategies for improving the accuracy of method of moments (MOM) calculations of electromagnetic scattering from metallic, dielectric, and resistive bodies. These strategies, involving more intensive computation than less accurate conventional techniques, are ideally suited for implementation on a massively parallel high-performance computer. The paper emphasizes strategies to minimize computation time and storage requirements. Some of these strategies include adaptive partitioning of the scattering body; non-uniform partitioning of the body; and the usage of alternative basis functions, including basis functions incorporating correct singular behavior near edges. The residual and the singular value decomposition (SVD) are used to diagnose solution convergence and accuracy. Specific cases presented include application of the strategies outlined to the cases of scattering from 2-dimensional metallic and dielectric scatterers.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal control of a moving missile tracking a roving target","authors":"O. Ansary, A. Rahrooh","doi":"10.1109/SOUTHC.1995.516088","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516088","url":null,"abstract":"This paper presents the formulations for optimizing the control inputs of a specific class of tracking system. In particular, the optimization of a missile-target intercept scenario under various performance constraints is proposed. An analytical solution as well as numerical examples for the developed method are also presented.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123011120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A slotted counter rotating metropolitan area ring network","authors":"Kwok Choi, M. Ilyas","doi":"10.1109/SOUTHC.1995.516115","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516115","url":null,"abstract":"In this paper, we propose and analyze a new architecture for metropolitan area networks (MANs). The architecture is based on ring topology and is called counter rotating slotted ring (CRSR). The proposed MAN (CRSR) has a dual-ring architecture and consists of two unidirectional transmission media that are shared among all network users. The information is transmitted by using fixed size slots. The flow of information in two rings is in the opposite direction. As each user is connected to both the rings, each user has two possible routes to send the information to a desired destination. The evaluation of CRSR under various conditions is also presented in this paper. Simulation and analytical modeling are used for evaluating the proposed MAN architecture. The results show that CRSR provides better performance in comparison with other similar MANs.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a graphical user interface for an automated surface mount circuit board rework cell","authors":"lsmail Fidan, L. Ruff, Stephen Derby","doi":"10.1109/SOUTHC.1995.516095","DOIUrl":"https://doi.org/10.1109/SOUTHC.1995.516095","url":null,"abstract":"As the piece cost of completed circuit boards increases and production quantities decrease, reworking of defective boards has become an important part of the production process. The lead-pitch of surface mount components has also been decreasing, which has required increased training and skill level of the rework operators. Fully-automated rework provides a solution to these problems. In order to simplify the control of automated rework of surface mount circuit boards from an operator's viewpoint, an interface was developed at Rensselaer for an automated rework cell that uses the Apple Macintosh Graphical Interface. The interface reduces operator skill and training requirements for the operation of the automated cell. The paper includes a description of the fully-automated rework cell created at Rensselaer and describes the user interface development and its final structure.","PeriodicalId":341055,"journal":{"name":"Proceedings of Southcon '95","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114162549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}