SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925276
Joshua Haney, Sungkyun Lim, R. Chong
{"title":"Automated sleep data extraction and streaming using Zeo sleep personal manager and Raspberry Pi","authors":"Joshua Haney, Sungkyun Lim, R. Chong","doi":"10.1109/SECON.2017.7925276","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925276","url":null,"abstract":"This paper presents an automated sleep data streaming system using a commercial electroencephalography (EEG) sleep monitoring device. The code collects data generated by the device on 30 second intervals and stores them into a text file that is sent to a desired recipient after a full night of sleep. The system is designed to be used easily for subjects with Parkinson's disease as a one-step solution. Once the system is set up, it automatically streams the data continuously without user input. The system was tested and verified showing a complete night worth of data. The final design is inexpensive and easy to implement.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128132490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925356
Goker Ariyak, Monique Kirkman-Bey, N. Dogan, Zhijian Xie, M. Ketel
{"title":"A W-band constructive wave oscillator in 130-nm SiGe BiCMOS","authors":"Goker Ariyak, Monique Kirkman-Bey, N. Dogan, Zhijian Xie, M. Ketel","doi":"10.1109/SECON.2017.7925356","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925356","url":null,"abstract":"In this paper we present a deterministic W-band constructive-wave oscillator (CWO) designed and simulated in 130-nm SiGe BiCMOS. A six-section CWO produces 95 GHz multi-phase oscillation signals that are distributed along the ring with 60 degree phases. The CWO circuit occupies a total area of 0.59 mm × 0.53 mm and dissipates 67 mW from a 2V supply. The six-phase CWO operating at 95 GHz has −10 dBm output power into 50 ohm load with a phase noise of −81 dBc per Hz at 1 MHz offset.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128190796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925398
Taosha Jiang, P. Cairoli, Rostan Rodrigues, Yu Du
{"title":"Inrush current limiting for solid state devices using NTC resistor","authors":"Taosha Jiang, P. Cairoli, Rostan Rodrigues, Yu Du","doi":"10.1109/SECON.2017.7925398","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925398","url":null,"abstract":"This paper proposes a passive method to limit inrush currents for solid state switching devices, such as circuit breakers, contactors, relays, and other electrical apparatuses. The method proposes to limit inrush currents with a negative temperature coefficient resistor in series connection with the power semiconductor switching device and integrated into the switching device. This new configuration permits to avoid excessive overrating of power semiconductor devices and thus to reduce the cost of solid state switching devices. In the event of an inrush current at closing of the device, the negative temperature coefficient resistor limits the current to an acceptable level. In this way, overheating and failure of power semiconductor switching devices can be avoided.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131876482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925340
S. Thorpe, Miguel Bernard
{"title":"Graph mining for forensic databases","authors":"S. Thorpe, Miguel Bernard","doi":"10.1109/SECON.2017.7925340","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925340","url":null,"abstract":"This paper provides an important proof of concept study for collecting and interrogating ballistic data used in informing forensic data investigations in territories like these. The work is grounded in the well-established forensic model frameworks for digital investigations. The experimental analysis provided in this study uses R studio to simulate and interpret the results collected against a NO-SQL graph database called Neo4J. We then apply graph mining techniques to determine levels of precision and accuracy against the compiled ballistic data sets (i.e. firearm data, and associated gang like activities related to such firearms). The findings of this study provide motivational case arguments to support law enforcement and the judicial process with regards to intelligence-led policing and prosecution by the courts.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134185114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925283
James B. Fraley, J. Cannady
{"title":"The promise of machine learning in cybersecurity","authors":"James B. Fraley, J. Cannady","doi":"10.1109/SECON.2017.7925283","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925283","url":null,"abstract":"Over the last few years' machine learning has migrated from the laboratory to the forefront of operational systems. Amazon, Google and Facebook use machine learning every day to improve customer experiences, suggested purchases or connect people socially with new applications and facilitate personal connections. Machine learning's powerful capability is also there for cybersecurity. Cybersecurity is positioned to leverage machine learning to improve malware detection, triage events, recognize breaches and alert organizations to security issues. Machine learning can be used to identify advanced targeting and threats such as organization profiling, infrastructure vulnerabilities and potential interdependent vulnerabilities and exploits. Machine learning can significantly change the cybersecurity landscape. Malware by itself can represent as many as 3 million new samples an hour. Traditional malware detection and malware analysis is unable to pace with new attacks and variants. New attacks and sophisticated malware have been able to bypass network and end-point detection to deliver cyber-attacks at alarming rates. New techniques like machine learning must be leveraged to address the growing malware problem. This paper describes how machine learning can be used to detect and highlight advanced malware for cyber defense analysts. The results of our initial research and a discussion of future research to extend machine learning is presented.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133909133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925334
Isong Idio, Rahmira Rufus, A. Esterline
{"title":"Artificial registration of network stress to self-Monitor an autonomic computing system","authors":"Isong Idio, Rahmira Rufus, A. Esterline","doi":"10.1109/SECON.2017.7925334","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925334","url":null,"abstract":"The objective of this research is to associate artificial registrations of unauthorized network activity with stress knowledge representations to self-Monitor an autonomic computing system, which is a self-Managing system. Utilization of the danger theory perspective in artificial immune systems (AIS) is employed to illustrate how an AIS classification method contributes to four properties of autonomic computation: self-Configuration, self-Optimization, self-Healing, and self-Protection— known as the self-C.H.O.P. properties. When the stress knowledge representation is detected via self-Monitoring, then an autonomic response to self-C.H.O.P. is executed. The AIS senses its environment by monitoring system activity (components and performance) to detect activity that signals a self-C.H.O.P. property synonymous to the collaborative efforts performed by the natural immune system (NIS) and the autonomic nervous system (ANS), where involuntary bodily function regulation is achieved. The AIS is an embedded sensoring system component for the autonomic system that assists the autonomic system with signaling the registration of C.H.O.P. properties when approaching a stress threshold classified as dangerous.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925264
Md. Rishad Hossain, Md. Kamal Hossain, M. Ali, Yusheng Luo, R. Hovsapian
{"title":"Synchronous generator stabilization by thyristor controlled supercapacitor energy storage system","authors":"Md. Rishad Hossain, Md. Kamal Hossain, M. Ali, Yusheng Luo, R. Hovsapian","doi":"10.1109/SECON.2017.7925264","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925264","url":null,"abstract":"A thyristor-controlled supercapacitor energy storage (SES) system is proposed in this work to improve the transient stability of a synchronous generator located in a power network. To check how effective the proposed SES in augmenting the transient stability of the generator is, its performance is compared to that of a thyristor-controlled superconductive magnetic energy storage (SMES) system. Both symmetrical and unsymmetrical faults are considered in the power network. Simulation results demonstrate the effectiveness and validity of the proposed method in enhancing the transient stability of the synchronous generator. Moreover, the performance of proposed SES is found to be better than that of SMES. Overall, it can be inferred that the proposed thyristor-controlled SES technique provides a simple and effective means of transient stability improvement of synchronous generator.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116381162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925278
Maneli Malek Pour, Arash Anzalchi, A. Sarwat
{"title":"A review on cyber security issues and mitigation methods in smart grid systems","authors":"Maneli Malek Pour, Arash Anzalchi, A. Sarwat","doi":"10.1109/SECON.2017.7925278","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925278","url":null,"abstract":"The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber-attacks on these devices has a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115374014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925397
J. Ventura, J. Qualls, M. Ventura, Raymond McGinnis, Chad Baker, Breeana Nikaido
{"title":"Development of a Video Game Design program in the college of engineering","authors":"J. Ventura, J. Qualls, M. Ventura, Raymond McGinnis, Chad Baker, Breeana Nikaido","doi":"10.1109/SECON.2017.7925397","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925397","url":null,"abstract":"The global video game industry's revenues reached 7.2 billion in 2007 and over $65 billion in 2012 with projected growth over $80 billion by 2017. As new consoles, PC, and mobile devices penetrate more foreign markets, revenues derived from these devices and software will continue to increase. In a nationally representative sample of U.S. teens, 99% of boys and 94% of girls played video games. Over 45% of women play video games and 30% of people over the age of 50 play games on a regular basis. Overall, 72% of Americans play video games in the U.S. and the amount of time spent playing games continues to increase, as do foreign markets. The increased market capitalization of the industry increases demand of qualified applicants. Other industries leveraging similar technology are beginning to grow and have topped over $10 billion in revenue in 2014. Students with expertise in game and related technology will have an advantage in these new job opportunities. Christian Brothers University (CBU) seeks to fill this need by the creation of a Bachelor of Science in Engineering Management (BSEM - Information Management) in Video Game Design. This degree will give students the skills needed to pursue a career within the game industry and others while developing engineering skills.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SoutheastCon 2017Pub Date : 2017-03-01DOI: 10.1109/SECON.2017.7925321
Aparna Tatavarti, J. Papadakis, A. Willis
{"title":"Towards real-time segmentation of 3D point cloud data into local planar regions","authors":"Aparna Tatavarti, J. Papadakis, A. Willis","doi":"10.1109/SECON.2017.7925321","DOIUrl":"https://doi.org/10.1109/SECON.2017.7925321","url":null,"abstract":"This article describes an algorithm for efficient segmentation of point cloud data into local planar surface regions. This is a problem of generic interest to researchers in the computer graphics, computer vision, artificial intelligence and robotics community where it plays an important role in applications such as object recognition, mapping, navigation and conversion from point clouds representations to 3D surface models. Prior work on the subject is either computationally burdensome, precluding real time applications such as robotic navigation and mapping, prone to error for noisy measurements commonly found at long range or requires availability of coregistered color imagery. The approach we describe consists of 3 steps: (1) detect a set of candidate planar surfaces, (2) cluster the planar surfaces merging redundant plane models, and (3) segment the point clouds by imposing a Markov Random Field (MRF) on the data and planar models and computing the Maximum A-Posteriori (MAP) of the segmentation labels using Bayesian Belief Propagation (BBP). In contrast to prior work which relies on color information for geometric segmentation, our implementation performs detection, clustering and estimation using only geometric data. Novelty is found in the fast clustering technique and new MRF clique potentials that are heretofore unexplored in the literature. The clustering procedure removes redundant detections of planes in the scene prior to segmentation using BBP optimization of the MRF to improve performance. The MRF clique potentials dynamically change to encourage distinct labels across depth discontinuities. These modifications provide improved segmentations for geometry-only depth images while simultaneously controlling the computational cost. Algorithm parameters are tunable to enable researchers to strike a compromise between segmentation detail and computational performance. Experimental results apply the algorithm to depth images from the NYU depth dataset which indicate that the algorithm can accurately extract large planar surfaces from depth sensor data.","PeriodicalId":368197,"journal":{"name":"SoutheastCon 2017","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115561137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}