Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)最新文献

筛选
英文 中文
EEG signal analysis for human workload classification 脑电信号分析用于人类工作负荷分类
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-04-01 DOI: 10.1109/SECON.2001.923101
C. Ling, H. Goins, A. Ntuen, R. Li
{"title":"EEG signal analysis for human workload classification","authors":"C. Ling, H. Goins, A. Ntuen, R. Li","doi":"10.1109/SECON.2001.923101","DOIUrl":"https://doi.org/10.1109/SECON.2001.923101","url":null,"abstract":"This paper provides the results of determining the state of a human pilot operator by using electroencephalograph (EEG) data. The state of a human operator is used to represent the mental (cognitive) workload experienced during task execution. This study used EEG data gathered from a crew-simulation laboratory environment. By using EEG data from twelve subjects encountering six simulated pilot workload levels, we set up a neural network to obtain an overall mean classification accuracy of over 80%. A comparison between the conventional backpropagation method and the resilient backpropagation method also shows that a significant reduction in training time can be achieved.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Open-loop motor speed control with LabView 开环电机速度控制与LabView
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-04-01 DOI: 10.1109/SECON.2001.923126
P. Olden, K. Robinson, K. Tanner, R. Wilson, A. Basher
{"title":"Open-loop motor speed control with LabView","authors":"P. Olden, K. Robinson, K. Tanner, R. Wilson, A. Basher","doi":"10.1109/SECON.2001.923126","DOIUrl":"https://doi.org/10.1109/SECON.2001.923126","url":null,"abstract":"An open-loop DC motor speed control system is developed using National Instrument's Data Acquisition (DAQ) Board (Model 6040E) and LabVIEW software package. A pulse width modulation (PWM) technique is employed to control motor speed. A VI (virtual instrument) is developed with LabVIEW that allows the DAQ to read a user selected reference voltage continuously. The VI also generates a suitable triangular wave that with the help of the reference signal produces the desired PWM signal. PWM is an analog signal that switches between two predefined limits. The switching interval of the PWM, controlled by the reference signal, determines the average power delivered to the motor circuit. The PWM signal is sent through the output port of the DAQ by the VI which in turn controls the motor speed. User from the front panel of the VI may input the amplitude and the frequency of the triangular wave, sampling rate of the reference signal, and the desired amplitude of the PWM. As the reference voltage increases, the width of the PWM (duty cycle) increases which in turn increases the speed of the motor. The varying nature of the motor speed is demonstrated in the laboratory by changing the reference signal. The principle developed in this project will be utilized in future endeavor toward controlling robot motion remotely via Internet.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133890119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A scalar network analyzer based on detector-log amplifier RFIC chips 基于检测-对数放大器RFIC芯片的标量网络分析仪
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-04-01 DOI: 10.1109/SECON.2001.923078
M. Alam, C.E. Smith
{"title":"A scalar network analyzer based on detector-log amplifier RFIC chips","authors":"M. Alam, C.E. Smith","doi":"10.1109/SECON.2001.923078","DOIUrl":"https://doi.org/10.1109/SECON.2001.923078","url":null,"abstract":"The objective of this paper is to present the design, development, and implementation of a low-cost, compact, and moderately accurate Scalar Network Analyzer (SNA) using two radio frequency integrated circuit (RFIC) detector-logarithmic (or detector-log) and limiting IF (intermediate frequency) amplifier chips. The AD8309 is one such advanced detector-log and limiting amplifier RFIC chip that is used in this development. The primacy function of a scalar network analyzer is to take the ratio of the incident signal and the transmitted or reflected signal in order to determine the magnitude characteristics of various active and passive microwave devices. Using the detector-log RFIC chip makes it simple because it defects the envelope of the input RF (radio frequency) signal and converts it into a logarithmic dc (direct current) output voltage. This logarithmic transformation makes the ratio calculations much easier because the ratios become the difference of two log type voltages (log A/B=log A-log B). The proposed SNA has an operating frequency of 50 MHz to 520 MHz and has a dynamic range of greater than 50 dB.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time anomaly detection using soft-computing techniques 利用软计算技术进行实时异常检测
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-04-01 DOI: 10.1109/SECON.2001.923097
J. Copeland, R.C. Garcia
{"title":"Real-time anomaly detection using soft-computing techniques","authors":"J. Copeland, R.C. Garcia","doi":"10.1109/SECON.2001.923097","DOIUrl":"https://doi.org/10.1109/SECON.2001.923097","url":null,"abstract":"This body of work sheds light on the current problems related to network security and applies intelligent tools to some of these problems. While the use of intelligent tools in network security is new, the few papers that have been published offer promising results. Of particular interest is the application of neural networks, fuzzy logic, and evolutionary computation to network security problems (sniffing, IP spoofing, denial of service attacks, etc.). The work here develops a technique that utilizes soft computing tools in order to detect anomalous network behavior, detect and have real-time applicability.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125183247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A noninverting buck-boost converter with reduced components using a microcontroller 一种使用微控制器的非反相降压-升压变换器
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-04-01 DOI: 10.1109/SECON.2001.923091
R. Weissbach, K. Torres
{"title":"A noninverting buck-boost converter with reduced components using a microcontroller","authors":"R. Weissbach, K. Torres","doi":"10.1109/SECON.2001.923091","DOIUrl":"https://doi.org/10.1109/SECON.2001.923091","url":null,"abstract":"This paper presents a simple method for the microcontroller implementation of a noninverting buck-boost converter. The converter requires two switches, but only one set of controls. As compared to a cascaded buck converter/boost converter topology, the noninverting buck-boost converter requires one less capacitor and inductor. The system operates as a buck converter for duty cycles between 0-50% in the microcontroller, and as a boost converter (up to a gain of twice the input voltage) for duty cycles between 50-100%. The system is therefore also advantageous because the microcontroller algorithm prevents a dead short from occurring during operation in the boost converter mode. Experimental and PSpice results prove that both buck and boost operation are possible using this topology. The effect of the load resistance on the results is discussed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A novel conversion scheme from a redundant binary number to two's complement binary number for parallel architectures 一种新的并行结构中冗余二进制数到二补二进制数的转换方案
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923115
I. Choo, R. G. Deshmukh
{"title":"A novel conversion scheme from a redundant binary number to two's complement binary number for parallel architectures","authors":"I. Choo, R. G. Deshmukh","doi":"10.1109/SECON.2001.923115","DOIUrl":"https://doi.org/10.1109/SECON.2001.923115","url":null,"abstract":"This paper introduces a novel direct conversion method to convert a redundant binary number to two's complement number. The method is based on the rules developed in this paper and is used to remove carry propagation during conversion. Therefore, the conversion process is truly parallel and the latency is fixed to 1 digit conversion time regardless of the word size. This converter receives one redundant binary number and converts it into one two's complement number. A redundant binary number is converted into two redundant binary numbers by using the rules. The new converted numbers are then added with a redundant binary number adder to produce a final sum. The last step is to convert the final sum into its correct two's complement number.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Applying absorbing Markov chains to solve Poisson's equation in inhomogeneous regions 应用吸收马尔可夫链求解非齐次区域泊松方程
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923108
R. Garcia, M. Sadiku, Keming Gu
{"title":"Applying absorbing Markov chains to solve Poisson's equation in inhomogeneous regions","authors":"R. Garcia, M. Sadiku, Keming Gu","doi":"10.1109/SECON.2001.923108","DOIUrl":"https://doi.org/10.1109/SECON.2001.923108","url":null,"abstract":"Monte Carlo methods are generally known for solving field problems one point at a time unlike other numerical methods such as the finite difference and finite element methods which provide simultaneously the solution at all of the grid nodes. This work presents an absorbing Markov chain method to solve Poisson's equation with Dirichlet boundary conditions for intractable inhomogeneous problems.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129607009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple path planning for a group of mobile robot in a 2-D environment using genetic algorithms 基于遗传算法的二维环境中移动机器人多路径规划
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923089
R. Ramakrishnan, S. Zein-Sabatto
{"title":"Multiple path planning for a group of mobile robot in a 2-D environment using genetic algorithms","authors":"R. Ramakrishnan, S. Zein-Sabatto","doi":"10.1109/SECON.2001.923089","DOIUrl":"https://doi.org/10.1109/SECON.2001.923089","url":null,"abstract":"Considers the development and implementation of an approach using genetic algorithms for finding optimum paths for a group of mobile robots located at arbitrary starting positions to a given number of targets in a known multi-obstacle environment. The factors considered for finding the optimum paths for the group of mobile robots are the location and size of obstacles in the environment. The environment is first converted into a grid map. Each grid is assigned a weight value, which indicates the level of confidence for the robots to move on that grid. The grid map contains information about the positions of the robots, the targets, the obstacle locations and sizes. Two genetic algorithms modules have been developed to find the optimum paths for the mobile robots. The first genetic algorithm module takes information about the environment from the grid map and finds an obstacle-free optimum path for each mobile robot to each target. The second genetic algorithm module finds the best combination of mobile robots to move to a given number of targets.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"72 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Jitter analysis and simulation of constant bit rate ATM multiplexers 恒比特率ATM多路复用器的抖动分析与仿真
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923085
T.H. Nguyen, M. Sadiku
{"title":"Jitter analysis and simulation of constant bit rate ATM multiplexers","authors":"T.H. Nguyen, M. Sadiku","doi":"10.1109/SECON.2001.923085","DOIUrl":"https://doi.org/10.1109/SECON.2001.923085","url":null,"abstract":"ATM is a standard transport mechanism to integrate various services such as data, voice, image and video in a single network. Constant bit rate (CBR) and variable bit rate (VBR) are the major sources in ATM networks. Such sources may have stringent delay and loss requirements. Clearly, if the network is not properly designed, dimensioned, and controlled, extensive cell delay and cell delay variation or jitter may deteriorate the performance of the network to an unacceptable level. This paper analyzes and simulates the jitter in a CBR and cell based multiplexer. The effects of various parameters such as the background traffic streams, periodic traffic, and utilization are investigated.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptive network modeling scheme 自适应网络建模方案
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923098
S.V. Wumnava, G. Crosby, A. Kapasi
{"title":"Adaptive network modeling scheme","authors":"S.V. Wumnava, G. Crosby, A. Kapasi","doi":"10.1109/SECON.2001.923098","DOIUrl":"https://doi.org/10.1109/SECON.2001.923098","url":null,"abstract":"As the network based economy has entered new dimension, there is more need than ever for network performance modeling and optimization. These things will help the proper routing and protection of data elements traversing the networks. Currently, network service providers (NSPs) use TCP/IP (Transmission Control Protocol/Internet Protocol) extensively. The NSPs focus the delivery of hybrid services and features such as voice over IP (VOIP), and virtual private networks (VPNs), over single or multiple IP connections. For network-based applications to be efficient and effective, they must have adequate quality of service (QoS) support and guarantees. User level QoS violations are events, which can be described using traditional rare-event reliability and availability network models. Network parameters such as: the performance matrices, end to end congestion, network delay, average download response times, throughput blocking probabilities, and packet loss rates, should be modeled successfully to implement QoS. The authors have developed an operating model for a practical wide area network using industry standard tools such as OPNET Modeler. In addition, the network modeling schemes available from the UNIX and windows platforms have been analyzed and the corresponding results are compared for the modeling accuracy and integration. The authors present the parameters for the dynamic service delivery on a unified network core using network modeling schemes. In addition, one of the scenarios dealing with network performance and QoS using OPNET simulation tools are presented.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信