Proceedings 2007 IEEE SoutheastCon最新文献

筛选
英文 中文
CIGSeS thin film solar cell research and development at the Florida Solar Energy Center 佛罗里达太阳能中心CIGSeS薄膜太阳能电池的研究和发展
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342972
N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar
{"title":"CIGSeS thin film solar cell research and development at the Florida Solar Energy Center","authors":"N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar","doi":"10.1109/SECON.2007.342972","DOIUrl":"https://doi.org/10.1109/SECON.2007.342972","url":null,"abstract":"Research and development of CuIn1-xGaxSe2-ySy (CIGSeS) thin film solar cells on various types of substrates and techniques is being carried out at the Florida Solar Energy Center (FSEC) Photovoltaics Materials Laboratory (PV Mat Lab) since 1990. Excellent facilities have been developed over the years for the preparation of the copper chalcogenide thin film solar cells. Highly efficient, CIGSeS thin film solar cells are being prepared and analyzed. This paper presents the facilities and research activities that have led to the preparation of highly efficient CIGSeS thin film solar cells.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishing trust in black-box programs 建立对黑箱程序的信任
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342945
Ying H. Xia, K. Fairbanks, H. Owen
{"title":"Establishing trust in black-box programs","authors":"Ying H. Xia, K. Fairbanks, H. Owen","doi":"10.1109/SECON.2007.342945","DOIUrl":"https://doi.org/10.1109/SECON.2007.342945","url":null,"abstract":"Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Electric utility migration to regional transmission operations: A case study 电力公司向区域输电业务迁移:一个案例研究
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342889
J. Greene
{"title":"Electric utility migration to regional transmission operations: A case study","authors":"J. Greene","doi":"10.1109/SECON.2007.342889","DOIUrl":"https://doi.org/10.1109/SECON.2007.342889","url":null,"abstract":"Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ML decoding for convolutional code for short codeword of short constraint length and alternate use of block code ML解码卷积码短码字的短约束长度和替代使用的块码
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342882
A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam
{"title":"ML decoding for convolutional code for short codeword of short constraint length and alternate use of block code","authors":"A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam","doi":"10.1109/SECON.2007.342882","DOIUrl":"https://doi.org/10.1109/SECON.2007.342882","url":null,"abstract":"This paper primarily deals with the error correction for the error correcting code, convolutional code. Viterbi decoding algorithm is the well known algorithm to decode convolutional code. Some of its limitations are overcome by the proposed algorithm in (Saifullah and Al-Mamun, 2004). This paper shows the improvement made by maximum likelihood (ML) decoding in simple form over the Viterbi algorithm and the proposed algorithm in (Saifullah and Al-Mamun, 2004) for short codeword and constraint length because of its low complexity. With this ML decoding, alternate use of block and convolutional code saves receiver's decoding power as well as computational complexity.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of significant process parameters in variable frequency microwave curing 变频微波固化中重要工艺参数的识别
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342971
Daniel Cepeda, Cleon Davis, Gary May
{"title":"Identification of significant process parameters in variable frequency microwave curing","authors":"Daniel Cepeda, Cleon Davis, Gary May","doi":"10.1109/SECON.2007.342971","DOIUrl":"https://doi.org/10.1109/SECON.2007.342971","url":null,"abstract":"Variable frequency microwave (VFM) curing of polymer dielectrics can reduce process time compared to conventional thermal methods drastically without compromising intrinsic material properties. However, the interactions that occur during VFM curing are not well understood. This paper presents a statistical experimental design to determine the significance of VFM processing parameters. A D-optimal experiment is performed on samples of polyimide spin-cast on silicon wafers cured in a VFM furnace. During VFM processing, the temperature of the polyimide samples is ramped to a specific temperature and held for a selected amount of time. Temperature calibration is conducted to guarantee accurate temperature exposure. The input variables analyzed are cure time, ramp rate, hold temperature, center frequency, bandwidth, and sweep rate. The output variables of interest are the in-plane and through-plane indices of refraction, birefringence, and the percent of imidization of polyimide. The percent imidization is measured using attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. Birefringence is derived from the in-plane and through-plane indices of refraction, both of which are measured with a metricon prism coupler. Analysis of variance (ANOVA) is used to determine the input variables with the greatest effect. Cure time is found to be the only significant parameter.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software development and related security issues 软件开发和相关的安全问题
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.343000
Jeff Zadeh, Dennis DeVolder
{"title":"Software development and related security issues","authors":"Jeff Zadeh, Dennis DeVolder","doi":"10.1109/SECON.2007.343000","DOIUrl":"https://doi.org/10.1109/SECON.2007.343000","url":null,"abstract":"Security is a serious problem in software development, and may become much worse in the future. Unfortunately there is no simple solution to the software security problem. Today's software developers must deal with large numbers of defects in released software. Many security issues result from these defects - defects that occur during software design and development. These defects are unintentional, and their prevalence can be reduced during the development process in order to enhance security. Security must be integrated into the software development life cycle from the beginning and continue until the product is in use. This paper discusses security issues in the design and development of the software.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cryptography versus cryptanalysis in wireless sensor networks 无线传感器网络中的密码学与密码分析
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342920
S.S. Laster, K. Pace
{"title":"Cryptography versus cryptanalysis in wireless sensor networks","authors":"S.S. Laster, K. Pace","doi":"10.1109/SECON.2007.342920","DOIUrl":"https://doi.org/10.1109/SECON.2007.342920","url":null,"abstract":"Maintaining a cryptanalysis free environment determines the success of a sensor network. Nevertheless, the ability to maintain a cryptanalysis free environment is the ultimate goal of a wireless sensor network. In the paper, the focus is to show the importance maintaining an efficient cryptographic wireless sensor network versus a cryptanalysis wireless sensor network.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel 4G MAC protocol guaranteeing high QoS and capacity in CBR communications networks by continuous group divisions and resource re-allocations to considerably reduce contention mini-slot collisions 一种新颖的4G MAC协议,通过连续分组和资源重新分配来保证CBR通信网络的高QoS和高容量,从而大大减少争用小时隙冲突
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342867
A. Kamal
{"title":"A novel 4G MAC protocol guaranteeing high QoS and capacity in CBR communications networks by continuous group divisions and resource re-allocations to considerably reduce contention mini-slot collisions","authors":"A. Kamal","doi":"10.1109/SECON.2007.342867","DOIUrl":"https://doi.org/10.1109/SECON.2007.342867","url":null,"abstract":"The authors previously showed that high QoS and capacity in CBR communications networks can be achieved by the user-group-division method. The novel MAC protocol based on this method and fundamental theories and postulates (supported by the CBR network environment) required to develop the protocol are presented here. No change in hardware or standards is required to implement this protocol and the protocol can be executed on the mobile stations (ms) or cable modems (cm) from the base station (BS) or head-end (HE). Initially, the protocol divides up the network into groups formed by one contention mini-slot (cms) per region and a group of users (with the group size equals the avg. number of users per cms in the network) allocated to that particular cms. Afterwards, the cms bandwidth is re-allocated inter-regionally (regrouped) and the total channel bandwidth is re-distributed between the cms and ds (data slot) based on the feedback received on the collision and available resource (bandwidth) conditions of the network during the previous round-trip time (rtt). The protocol is executed in the network at each rtt by running the feedback mechanism, regrouping, and re-distributing the bandwidth. The advanced network simulator (ANS-1) written in MATLAB using my novel abstractions and the novel Nasrin traffic generation and distribution model are used to evaluate the protocol in a flexible and reliable network simulation environment. The results showed high fair utilization and low waste of the required cms and data bandwidth with high collision reduction. The proposed approach accomplishes a record 80% cms collision reduction and 85% cms and 100% data bandwidth utilization (guaranteeing high QoS and capacity) while providing high controllability to the BS/HE for reducing the probability of collisions. The protocol achieves these improvements by distributing the cms to small groups of users (reducing the probabilities of uncontrollable and high collisions), repeating its execution (thinning the accumulation and repetitions of collisions), and managing the ds and cms resource requirements with feedback to allocate the resources to the needy regions (reducing the probabilities of buildup and recurrences of collisions).","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle identifications using acoustic sensing 利用声感应进行车辆识别
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342963
R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen
{"title":"Vehicle identifications using acoustic sensing","authors":"R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen","doi":"10.1109/SECON.2007.342963","DOIUrl":"https://doi.org/10.1109/SECON.2007.342963","url":null,"abstract":"Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Systems engineering challenges in inkjet biofabrication 喷墨生物制造中的系统工程挑战
Proceedings 2007 IEEE SoutheastCon Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342931
T. Burg, R. Groff, K. Burg, M. Hill, T. Boland
{"title":"Systems engineering challenges in inkjet biofabrication","authors":"T. Burg, R. Groff, K. Burg, M. Hill, T. Boland","doi":"10.1109/SECON.2007.342931","DOIUrl":"https://doi.org/10.1109/SECON.2007.342931","url":null,"abstract":"Inkjet biofabrication describes the application of \"bioink\" via an inkjet printing mechanism in order to build two- and three-dimensional tissue constructs for medical treatment. The bioinks may include active compounds such as drugs and living cells as well as non active, scaffolding materials. The technology faces several limitations that present interesting sensing, actuation, and control problems. The nature and scope of these problems is discussed.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信