{"title":"HVDC transmission to mitigate electric energy crisis in the United States","authors":"K. Meah, S. Ula","doi":"10.1109/TPSD.2006.5507422","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507422","url":null,"abstract":"United States has abundant resources of fossil fuel, such as coal and natural gas. But fossil fuels are not equally distributed through out the country and some highly developed large industrial states can not burn the cheapest fossil fuel coal due to strict environmental regulations. Both the East and West coasts of the country are facing electric energy shortages and burn costly fuels such as natural gas to satisfy the increasing demand. On the other hand, Rocky Mountain States are rich in fossil fuels and Wyoming alone produces 40% of the US coal every year. But Wyoming generates only 1% of the total US electric energy which has the second lowest price of electricity in the US. The geographic location of Wyoming is suitable to mitigate the electric energy crisis in Eastern, Western and Southern USA by using HVDC transmission lines. In this paper, technical and economical analysis of the proposed HVDC lines will be discussed.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The good intentions of IEEE standard 1180, may it rest in peace","authors":"K. Vollmar","doi":"10.1109/TPSD.2006.5507447","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507447","url":null,"abstract":"The 8×8 IDCT (Inverse Discrete Cosine Transform) is an integral component of many standard digital image and video compression schemes, including JPEG baseline and the MPEG family of standards. A statistically-oriented standard, ANSI/IEEE 1180–1990, specifies the accuracy for a compliant 8×8 IDCT. ANSI/IEEE 1180–1990 has a checkered history, including being twice administratively withdrawn, notwithstanding that the standard has continuously been referenced by the MPEG family of standards. The standard was withdrawn for the second time in February 2003 and is not currently supported by either ANSI or IEEE. In response to the withdrawal of the standard, the MPEG family has initiated procedures to replace the reference with self-contained wording. This paper examines the intent and some implications of the now-withdrawn ANSI/IEEE 1180-1990 IDCT standard.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault-tolerant FPGAs by online ECC verification and restoration","authors":"E. Hjortland, Li Chen","doi":"10.1109/TPSD.2006.5507454","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507454","url":null,"abstract":"In this paper, an new approach is introduced for FPGAs to perform online verification and restoration. The whole FPGA is considered as a static memory whose content is the configuration data. Hamming codes - an error correcting code, are used to detect and correct the configuration data written to FPGA. The extra Hamming parity data are stored in the Block Memory of the FPGA when configuring the device. A configuration controller that consumes a small portion of the FPGA resources is specifically used to implement the operations of readback, verification, correcting the configuration data and partial re-configuration. The FPGA itself continuously performs the self-checking and restoration after the initial configuration is completed. There is no extra memory or controlling device required outside the FPGA.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of active filtering with multipulse input current shaping techniques for AC-DC converters","authors":"M. Peterson, Brij N. Singh","doi":"10.1109/TPSD.2006.5507429","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507429","url":null,"abstract":"AC-DC converters are used in a variety of power supply systems. The simple diode bridge rectifier realizes a six-pulse AC-DC converter circuit to feed R-L and R-C equivalent loads at its DC bus. However, the diode bridge rectifier suffers from the problem of current harmonics. There are two main stream techniques emerging that solve the problem of current harmonics. These are active current shaping and passive current shaping. The multipulse converters fall within the category of passive current shaping, and the active filter method falls within the category of active current shaping. The active current shaping methods also include a variety of boost AC-DC converters. This paper proposes a variety of multipulse current shaping methods followed by a detailed mathematical modeling of multipulse AC-DC converters. Performance of multipulse AC- DC converters is compared with that of active filter based current shaping.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114703067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Agaian, Ravindranath Cherukuri, Ronnie R. Sifuentes
{"title":"A new secure adaptive steganographic algorithm using Fibonacci numbers","authors":"S. Agaian, Ravindranath Cherukuri, Ronnie R. Sifuentes","doi":"10.1109/TPSD.2006.5507446","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507446","url":null,"abstract":"In this paper, we investigate the common problems encountered in adaptive steganography. The focus of these systems is on security and thus capacity is severely limited. An algorithm combining T-order statistics with Fibonacci based image decomposition is introduced. As the T-order statistics enables the embedding of secret data only in the noisy regions making any changes to the cover undetectable. The decomposition of an image based on Fibonacci numbers creates a higher number of bit planes compared to the 8 associated with traditional image decomposition. As a result, the distribution of data over an increased number of bit layers enhances the available capacity. In addition, the impact caused by image modifications necessary when embedding secret information is reduced. Computer simulations were performed over 50 color and 50 grayscale bitmap images varying in size, color, and classes of image features. In comparison with other existing adaptive and non-adaptive embedding methods, the proposed method shows a greater resistance to detection against various steganalysis tools while offering a marked increase in available capacity.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cut saturation for p-cycle design","authors":"Khalid Al-Snaie, D. Thompson","doi":"10.1109/TPSD.2006.5507423","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507423","url":null,"abstract":"Preconfigured protection cycles (p-cycles) provide recovery times for mesh networks that are near the recovery times of BLSR ring networks while providing lower spare-to-working capacity ratios. However, the efficiency of p-cycles defined by the spare-to-working capacity ratio is affected by the topology of the network. An efficient method for adding links to an existing network is required to take advantage of p-cycles. In this work, a heuristic called p-cycle cut saturation (PCUT) is proposed. It extends the well-known cut saturation heuristic to strategically add links to an existing network to lower the spare-to-working capacity ratios in networks using p-cycles. PCUT is applied to a 28-node network to add spans and lowers the spare-to-working capacity ratio by 20%.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"425 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phongphun Kijsanayothin, R. Hewett, Jingsong Wang, Meinhard Peters
{"title":"Software hazard generation with model checking","authors":"Phongphun Kijsanayothin, R. Hewett, Jingsong Wang, Meinhard Peters","doi":"10.1109/TPSD.2006.5507458","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507458","url":null,"abstract":"The problem of finding hazards associated with software becomes more necessary if not critical as modern systems increasingly rely on software to provide their main functionalities. While verification and validation can help determine whether software behaves correctly according to its specifications and user needs, they cannot guarantee that software will not lead to system hazards particularly when it interacts with the environments unanticipated by the software designer. Most existing hazard identification techniques require laborious and time-consuming analysis that often either ignores detailed software properties or does not specifically address software-related hazards. This paper presents an approach that facilitates a semi-automated hazard identification of computer-based systems by a novel application of model checking, a technique traditionally used for automated software verification. Our work is in a preliminary stage. The paper describes the approach and illustrates its use to identify hazardous conditions that could lead to violation of system safety.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianning Wang, Jason Roland, J. Popp, X. Zhu, C. Hutchens, Yumin Zhang
{"title":"High performance RF SOI MOSFET varactor modeling and design","authors":"Jianning Wang, Jason Roland, J. Popp, X. Zhu, C. Hutchens, Yumin Zhang","doi":"10.1109/TPSD.2006.5507455","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507455","url":null,"abstract":"This paper presents an RF model of an accumulation-mode MOS varactor with a high capacitance tuning range in a multi-finger layout. This model is based on the physical parameters of the device, and it can describe the voltage dependent capacitance, as well as the parasitic circuit elements. It employs a single topology with lumped elements derived from the device, so that it can be easily integrated into common circuit simulators, as well as directly linked to a p-cell. A Verilog-A model of the varactor has been presented and verified with Cadence for circuit simulation. Good agreements between measured data and simulation results were obtain in the frequency range of 0.1 to 10 GHz by de-embedding from the test frame.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of two-stage massive correlator architecture for fast acquisition of GPS signals","authors":"D. Akopian, P. Sagiraju, S. Turunen","doi":"10.1109/TPSD.2006.5507444","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507444","url":null,"abstract":"A typical operation of GPS receivers assumes a search of the satellites visible on the sky by synchronizing locally generated replica with the transmitted pseudo-random noise (PRN) code sequence. This synchronization is initially performed by finding the highest correlation between the incoming signal and replica, a process known as “acquisition”. Highest correlation is observed as a correlator peak response which is compared with a certain threshold to identify availability and values of unknown code phase and frequency of a residual carrier modulation. If the peak is not detected or the decision is wrong then acquisition stage should be repeated many times which is quite a time consuming task. State-of-the-art advanced receivers use massive correlators which parallelize the acquisition process. While massive correlators improve significantly the sensitivity of the receivers, so-called multiple peak selection approach provides an opportunity to save computations by sharing tasks between the massive correlator and validation system [1]. In this paper we study a performance of two stage correlator consisting of massive and supplementary implementations. The massive correlator is not making firm decisions each time it finds a peak, but provides several possible options (a limited set of highest peaks) to supplementary system.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A one gigaFLIPS fuzzy logic control chip using only combinational logic and Field Programmable Gate Arrays","authors":"Lars Terum, Brian Hernmelman","doi":"10.1109/TPSD.2006.5507464","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507464","url":null,"abstract":"A real-time fully parallelized fuzzy logic control chip has been designed and implemented in a Xillinx Spartan IIe Field Programmable Gate Array. The current design handles two inputs and one output. Five membership functions are used to fuzzify each input signal, and five membership functions are used to defuzzify the output. Mamdani fuzzy inference is used to evaluate the 25 rules in the rule matrix. Two defuzzification schemes, weighted average and Hemmelman's average have been implemented and evaluated. Fuzzification, rule evaluation, and defuzzification are all performed in a parallel architecture that utilizes only combinational logic. Testing indicates a worst case delay of approximately 25 ns, although typical propagation delays are approximately 18 ns. The worst case delay corresponds to an effective throughput of one billion fuzzy logic inferences per second (one gigaFLIPS).","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}