2006 IEEE Region 5 Conference最新文献

筛选
英文 中文
HVDC transmission to mitigate electric energy crisis in the United States 高压直流输电缓解美国电力危机
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507422
K. Meah, S. Ula
{"title":"HVDC transmission to mitigate electric energy crisis in the United States","authors":"K. Meah, S. Ula","doi":"10.1109/TPSD.2006.5507422","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507422","url":null,"abstract":"United States has abundant resources of fossil fuel, such as coal and natural gas. But fossil fuels are not equally distributed through out the country and some highly developed large industrial states can not burn the cheapest fossil fuel coal due to strict environmental regulations. Both the East and West coasts of the country are facing electric energy shortages and burn costly fuels such as natural gas to satisfy the increasing demand. On the other hand, Rocky Mountain States are rich in fossil fuels and Wyoming alone produces 40% of the US coal every year. But Wyoming generates only 1% of the total US electric energy which has the second lowest price of electricity in the US. The geographic location of Wyoming is suitable to mitigate the electric energy crisis in Eastern, Western and Southern USA by using HVDC transmission lines. In this paper, technical and economical analysis of the proposed HVDC lines will be discussed.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The good intentions of IEEE standard 1180, may it rest in peace IEEE 1180标准的美好愿望,愿它安息吧
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507447
K. Vollmar
{"title":"The good intentions of IEEE standard 1180, may it rest in peace","authors":"K. Vollmar","doi":"10.1109/TPSD.2006.5507447","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507447","url":null,"abstract":"The 8×8 IDCT (Inverse Discrete Cosine Transform) is an integral component of many standard digital image and video compression schemes, including JPEG baseline and the MPEG family of standards. A statistically-oriented standard, ANSI/IEEE 1180–1990, specifies the accuracy for a compliant 8×8 IDCT. ANSI/IEEE 1180–1990 has a checkered history, including being twice administratively withdrawn, notwithstanding that the standard has continuously been referenced by the MPEG family of standards. The standard was withdrawn for the second time in February 2003 and is not currently supported by either ANSI or IEEE. In response to the withdrawal of the standard, the MPEG family has initiated procedures to replace the reference with self-contained wording. This paper examines the intent and some implications of the now-withdrawn ANSI/IEEE 1180-1990 IDCT standard.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-tolerant FPGAs by online ECC verification and restoration 通过在线ECC验证和恢复的容错fpga
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507454
E. Hjortland, Li Chen
{"title":"Fault-tolerant FPGAs by online ECC verification and restoration","authors":"E. Hjortland, Li Chen","doi":"10.1109/TPSD.2006.5507454","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507454","url":null,"abstract":"In this paper, an new approach is introduced for FPGAs to perform online verification and restoration. The whole FPGA is considered as a static memory whose content is the configuration data. Hamming codes - an error correcting code, are used to detect and correct the configuration data written to FPGA. The extra Hamming parity data are stored in the Block Memory of the FPGA when configuring the device. A configuration controller that consumes a small portion of the FPGA resources is specifically used to implement the operations of readback, verification, correcting the configuration data and partial re-configuration. The FPGA itself continuously performs the self-checking and restoration after the initial configuration is completed. There is no extra memory or controlling device required outside the FPGA.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of active filtering with multipulse input current shaping techniques for AC-DC converters 交直流变换器有源滤波与多脉冲输入电流整形技术的比较
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507429
M. Peterson, Brij N. Singh
{"title":"Comparison of active filtering with multipulse input current shaping techniques for AC-DC converters","authors":"M. Peterson, Brij N. Singh","doi":"10.1109/TPSD.2006.5507429","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507429","url":null,"abstract":"AC-DC converters are used in a variety of power supply systems. The simple diode bridge rectifier realizes a six-pulse AC-DC converter circuit to feed R-L and R-C equivalent loads at its DC bus. However, the diode bridge rectifier suffers from the problem of current harmonics. There are two main stream techniques emerging that solve the problem of current harmonics. These are active current shaping and passive current shaping. The multipulse converters fall within the category of passive current shaping, and the active filter method falls within the category of active current shaping. The active current shaping methods also include a variety of boost AC-DC converters. This paper proposes a variety of multipulse current shaping methods followed by a detailed mathematical modeling of multipulse AC-DC converters. Performance of multipulse AC- DC converters is compared with that of active filter based current shaping.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114703067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new secure adaptive steganographic algorithm using Fibonacci numbers 一种基于斐波那契数的安全自适应隐写算法
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507446
S. Agaian, Ravindranath Cherukuri, Ronnie R. Sifuentes
{"title":"A new secure adaptive steganographic algorithm using Fibonacci numbers","authors":"S. Agaian, Ravindranath Cherukuri, Ronnie R. Sifuentes","doi":"10.1109/TPSD.2006.5507446","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507446","url":null,"abstract":"In this paper, we investigate the common problems encountered in adaptive steganography. The focus of these systems is on security and thus capacity is severely limited. An algorithm combining T-order statistics with Fibonacci based image decomposition is introduced. As the T-order statistics enables the embedding of secret data only in the noisy regions making any changes to the cover undetectable. The decomposition of an image based on Fibonacci numbers creates a higher number of bit planes compared to the 8 associated with traditional image decomposition. As a result, the distribution of data over an increased number of bit layers enhances the available capacity. In addition, the impact caused by image modifications necessary when embedding secret information is reduced. Computer simulations were performed over 50 color and 50 grayscale bitmap images varying in size, color, and classes of image features. In comparison with other existing adaptive and non-adaptive embedding methods, the proposed method shows a greater resistance to detection against various steganalysis tools while offering a marked increase in available capacity.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cut saturation for p-cycle design p循环设计的切割饱和度
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507423
Khalid Al-Snaie, D. Thompson
{"title":"Cut saturation for p-cycle design","authors":"Khalid Al-Snaie, D. Thompson","doi":"10.1109/TPSD.2006.5507423","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507423","url":null,"abstract":"Preconfigured protection cycles (p-cycles) provide recovery times for mesh networks that are near the recovery times of BLSR ring networks while providing lower spare-to-working capacity ratios. However, the efficiency of p-cycles defined by the spare-to-working capacity ratio is affected by the topology of the network. An efficient method for adding links to an existing network is required to take advantage of p-cycles. In this work, a heuristic called p-cycle cut saturation (PCUT) is proposed. It extends the well-known cut saturation heuristic to strategically add links to an existing network to lower the spare-to-working capacity ratios in networks using p-cycles. PCUT is applied to a 28-node network to add spans and lowers the spare-to-working capacity ratio by 20%.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"425 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software hazard generation with model checking 软件危险生成与模型检查
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507458
Phongphun Kijsanayothin, R. Hewett, Jingsong Wang, Meinhard Peters
{"title":"Software hazard generation with model checking","authors":"Phongphun Kijsanayothin, R. Hewett, Jingsong Wang, Meinhard Peters","doi":"10.1109/TPSD.2006.5507458","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507458","url":null,"abstract":"The problem of finding hazards associated with software becomes more necessary if not critical as modern systems increasingly rely on software to provide their main functionalities. While verification and validation can help determine whether software behaves correctly according to its specifications and user needs, they cannot guarantee that software will not lead to system hazards particularly when it interacts with the environments unanticipated by the software designer. Most existing hazard identification techniques require laborious and time-consuming analysis that often either ignores detailed software properties or does not specifically address software-related hazards. This paper presents an approach that facilitates a semi-automated hazard identification of computer-based systems by a novel application of model checking, a technique traditionally used for automated software verification. Our work is in a preliminary stage. The paper describes the approach and illustrates its use to identify hazardous conditions that could lead to violation of system safety.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High performance RF SOI MOSFET varactor modeling and design 高性能RF SOI MOSFET变容器建模与设计
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507455
Jianning Wang, Jason Roland, J. Popp, X. Zhu, C. Hutchens, Yumin Zhang
{"title":"High performance RF SOI MOSFET varactor modeling and design","authors":"Jianning Wang, Jason Roland, J. Popp, X. Zhu, C. Hutchens, Yumin Zhang","doi":"10.1109/TPSD.2006.5507455","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507455","url":null,"abstract":"This paper presents an RF model of an accumulation-mode MOS varactor with a high capacitance tuning range in a multi-finger layout. This model is based on the physical parameters of the device, and it can describe the voltage dependent capacitance, as well as the parasitic circuit elements. It employs a single topology with lumped elements derived from the device, so that it can be easily integrated into common circuit simulators, as well as directly linked to a p-cell. A Verilog-A model of the varactor has been presented and verified with Cadence for circuit simulation. Good agreements between measured data and simulation results were obtain in the frequency range of 0.1 to 10 GHz by de-embedding from the test frame.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance of two-stage massive correlator architecture for fast acquisition of GPS signals GPS信号快速采集的两级海量相关器结构性能
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507444
D. Akopian, P. Sagiraju, S. Turunen
{"title":"Performance of two-stage massive correlator architecture for fast acquisition of GPS signals","authors":"D. Akopian, P. Sagiraju, S. Turunen","doi":"10.1109/TPSD.2006.5507444","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507444","url":null,"abstract":"A typical operation of GPS receivers assumes a search of the satellites visible on the sky by synchronizing locally generated replica with the transmitted pseudo-random noise (PRN) code sequence. This synchronization is initially performed by finding the highest correlation between the incoming signal and replica, a process known as “acquisition”. Highest correlation is observed as a correlator peak response which is compared with a certain threshold to identify availability and values of unknown code phase and frequency of a residual carrier modulation. If the peak is not detected or the decision is wrong then acquisition stage should be repeated many times which is quite a time consuming task. State-of-the-art advanced receivers use massive correlators which parallelize the acquisition process. While massive correlators improve significantly the sensitivity of the receivers, so-called multiple peak selection approach provides an opportunity to save computations by sharing tasks between the massive correlator and validation system [1]. In this paper we study a performance of two stage correlator consisting of massive and supplementary implementations. The massive correlator is not making firm decisions each time it finds a peak, but provides several possible options (a limited set of highest peaks) to supplementary system.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A one gigaFLIPS fuzzy logic control chip using only combinational logic and Field Programmable Gate Arrays 一种仅使用组合逻辑和现场可编程门阵列的千兆模糊逻辑控制芯片
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507464
Lars Terum, Brian Hernmelman
{"title":"A one gigaFLIPS fuzzy logic control chip using only combinational logic and Field Programmable Gate Arrays","authors":"Lars Terum, Brian Hernmelman","doi":"10.1109/TPSD.2006.5507464","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507464","url":null,"abstract":"A real-time fully parallelized fuzzy logic control chip has been designed and implemented in a Xillinx Spartan IIe Field Programmable Gate Array. The current design handles two inputs and one output. Five membership functions are used to fuzzify each input signal, and five membership functions are used to defuzzify the output. Mamdani fuzzy inference is used to evaluate the 25 rules in the rule matrix. Two defuzzification schemes, weighted average and Hemmelman's average have been implemented and evaluated. Fuzzification, rule evaluation, and defuzzification are all performed in a parallel architecture that utilizes only combinational logic. Testing indicates a worst case delay of approximately 25 ns, although typical propagation delays are approximately 18 ns. The worst case delay corresponds to an effective throughput of one billion fuzzy logic inferences per second (one gigaFLIPS).","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信