N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar
{"title":"CIGSeS thin film solar cell research and development at the Florida Solar Energy Center","authors":"N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar","doi":"10.1109/SECON.2007.342972","DOIUrl":"https://doi.org/10.1109/SECON.2007.342972","url":null,"abstract":"Research and development of CuIn1-xGaxSe2-ySy (CIGSeS) thin film solar cells on various types of substrates and techniques is being carried out at the Florida Solar Energy Center (FSEC) Photovoltaics Materials Laboratory (PV Mat Lab) since 1990. Excellent facilities have been developed over the years for the preparation of the copper chalcogenide thin film solar cells. Highly efficient, CIGSeS thin film solar cells are being prepared and analyzed. This paper presents the facilities and research activities that have led to the preparation of highly efficient CIGSeS thin film solar cells.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishing trust in black-box programs","authors":"Ying H. Xia, K. Fairbanks, H. Owen","doi":"10.1109/SECON.2007.342945","DOIUrl":"https://doi.org/10.1109/SECON.2007.342945","url":null,"abstract":"Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electric utility migration to regional transmission operations: A case study","authors":"J. Greene","doi":"10.1109/SECON.2007.342889","DOIUrl":"https://doi.org/10.1109/SECON.2007.342889","url":null,"abstract":"Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam
{"title":"ML decoding for convolutional code for short codeword of short constraint length and alternate use of block code","authors":"A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam","doi":"10.1109/SECON.2007.342882","DOIUrl":"https://doi.org/10.1109/SECON.2007.342882","url":null,"abstract":"This paper primarily deals with the error correction for the error correcting code, convolutional code. Viterbi decoding algorithm is the well known algorithm to decode convolutional code. Some of its limitations are overcome by the proposed algorithm in (Saifullah and Al-Mamun, 2004). This paper shows the improvement made by maximum likelihood (ML) decoding in simple form over the Viterbi algorithm and the proposed algorithm in (Saifullah and Al-Mamun, 2004) for short codeword and constraint length because of its low complexity. With this ML decoding, alternate use of block and convolutional code saves receiver's decoding power as well as computational complexity.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of significant process parameters in variable frequency microwave curing","authors":"Daniel Cepeda, Cleon Davis, Gary May","doi":"10.1109/SECON.2007.342971","DOIUrl":"https://doi.org/10.1109/SECON.2007.342971","url":null,"abstract":"Variable frequency microwave (VFM) curing of polymer dielectrics can reduce process time compared to conventional thermal methods drastically without compromising intrinsic material properties. However, the interactions that occur during VFM curing are not well understood. This paper presents a statistical experimental design to determine the significance of VFM processing parameters. A D-optimal experiment is performed on samples of polyimide spin-cast on silicon wafers cured in a VFM furnace. During VFM processing, the temperature of the polyimide samples is ramped to a specific temperature and held for a selected amount of time. Temperature calibration is conducted to guarantee accurate temperature exposure. The input variables analyzed are cure time, ramp rate, hold temperature, center frequency, bandwidth, and sweep rate. The output variables of interest are the in-plane and through-plane indices of refraction, birefringence, and the percent of imidization of polyimide. The percent imidization is measured using attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. Birefringence is derived from the in-plane and through-plane indices of refraction, both of which are measured with a metricon prism coupler. Analysis of variance (ANOVA) is used to determine the input variables with the greatest effect. Cure time is found to be the only significant parameter.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software development and related security issues","authors":"Jeff Zadeh, Dennis DeVolder","doi":"10.1109/SECON.2007.343000","DOIUrl":"https://doi.org/10.1109/SECON.2007.343000","url":null,"abstract":"Security is a serious problem in software development, and may become much worse in the future. Unfortunately there is no simple solution to the software security problem. Today's software developers must deal with large numbers of defects in released software. Many security issues result from these defects - defects that occur during software design and development. These defects are unintentional, and their prevalence can be reduced during the development process in order to enhance security. Security must be integrated into the software development life cycle from the beginning and continue until the product is in use. This paper discusses security issues in the design and development of the software.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptography versus cryptanalysis in wireless sensor networks","authors":"S.S. Laster, K. Pace","doi":"10.1109/SECON.2007.342920","DOIUrl":"https://doi.org/10.1109/SECON.2007.342920","url":null,"abstract":"Maintaining a cryptanalysis free environment determines the success of a sensor network. Nevertheless, the ability to maintain a cryptanalysis free environment is the ultimate goal of a wireless sensor network. In the paper, the focus is to show the importance maintaining an efficient cryptographic wireless sensor network versus a cryptanalysis wireless sensor network.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel 4G MAC protocol guaranteeing high QoS and capacity in CBR communications networks by continuous group divisions and resource re-allocations to considerably reduce contention mini-slot collisions","authors":"A. Kamal","doi":"10.1109/SECON.2007.342867","DOIUrl":"https://doi.org/10.1109/SECON.2007.342867","url":null,"abstract":"The authors previously showed that high QoS and capacity in CBR communications networks can be achieved by the user-group-division method. The novel MAC protocol based on this method and fundamental theories and postulates (supported by the CBR network environment) required to develop the protocol are presented here. No change in hardware or standards is required to implement this protocol and the protocol can be executed on the mobile stations (ms) or cable modems (cm) from the base station (BS) or head-end (HE). Initially, the protocol divides up the network into groups formed by one contention mini-slot (cms) per region and a group of users (with the group size equals the avg. number of users per cms in the network) allocated to that particular cms. Afterwards, the cms bandwidth is re-allocated inter-regionally (regrouped) and the total channel bandwidth is re-distributed between the cms and ds (data slot) based on the feedback received on the collision and available resource (bandwidth) conditions of the network during the previous round-trip time (rtt). The protocol is executed in the network at each rtt by running the feedback mechanism, regrouping, and re-distributing the bandwidth. The advanced network simulator (ANS-1) written in MATLAB using my novel abstractions and the novel Nasrin traffic generation and distribution model are used to evaluate the protocol in a flexible and reliable network simulation environment. The results showed high fair utilization and low waste of the required cms and data bandwidth with high collision reduction. The proposed approach accomplishes a record 80% cms collision reduction and 85% cms and 100% data bandwidth utilization (guaranteeing high QoS and capacity) while providing high controllability to the BS/HE for reducing the probability of collisions. The protocol achieves these improvements by distributing the cms to small groups of users (reducing the probabilities of uncontrollable and high collisions), repeating its execution (thinning the accumulation and repetitions of collisions), and managing the ds and cms resource requirements with feedback to allocate the resources to the needy regions (reducing the probabilities of buildup and recurrences of collisions).","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen
{"title":"Vehicle identifications using acoustic sensing","authors":"R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen","doi":"10.1109/SECON.2007.342963","DOIUrl":"https://doi.org/10.1109/SECON.2007.342963","url":null,"abstract":"Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systems engineering challenges in inkjet biofabrication","authors":"T. Burg, R. Groff, K. Burg, M. Hill, T. Boland","doi":"10.1109/SECON.2007.342931","DOIUrl":"https://doi.org/10.1109/SECON.2007.342931","url":null,"abstract":"Inkjet biofabrication describes the application of \"bioink\" via an inkjet printing mechanism in order to build two- and three-dimensional tissue constructs for medical treatment. The bioinks may include active compounds such as drugs and living cells as well as non active, scaffolding materials. The technology faces several limitations that present interesting sensing, actuation, and control problems. The nature and scope of these problems is discussed.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}