Marciano S. Calayag, Sarah Isolde T. Servano, Kristina R. Tuazon, R. U. Lorenzo, J. Marciano
{"title":"FPGA implementation of a space-time trellis decoder","authors":"Marciano S. Calayag, Sarah Isolde T. Servano, Kristina R. Tuazon, R. U. Lorenzo, J. Marciano","doi":"10.1109/SCORED.2009.5443323","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443323","url":null,"abstract":"This paper describes the real-time implementation of a space-time trellis encoder and decoder using the Xilinx Virtex-4™FX12 FPGA. The code uses a generator matrix designed for 4-state space-time trellis (STT) that uses Quadrature Phase Shift Keying (QPSK) modulation scheme. The decoding process was done using Maximum Likelihood (ML) through the Viterbi Algorithm. The results show that the STT decoder can successfully decipher the encoded symbols from the STT encoder and that it can fully recover the original data in the absence of noise. The data rate of the decoder was 6.25 Msymbols/s. It was shown that 14% of the logic elements in Virtex 4 FPGA were used in implementing an encoder-decoder system.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116168057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contingency evaluation for voltage security assessment of power systems","authors":"M. Akorede, H. Hizam, I. Aris, M. Kadir","doi":"10.1109/SCORED.2009.5443005","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443005","url":null,"abstract":"The demand for electricity is expected to continue to increase given the recent world population projection of about 30 % increase in the next three decades. Consequently power systems are equally expected to be more heavily loaded than before. Unfortunately the environmental and economic constraints restrict the expansion of the existing power system facilities. This scenario requires a constant attention since it could result to voltage collapse which could in turn lead to a total blackout. This paper presents the procedure required to carry out a contingency assessment and ranking of the load buses and lines of power systems for voltage security. This would ensure that power systems are operated above a desired voltage stability margin to forestall voltage collapse. The impact of single line outage contingency on the static voltage stability margin, as well as the available transfer capability across the areas of the test system, are examined in the paper.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125923171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junaid Ali, Shahid Nasim, T. Ali, Naveed Ahmed, Syed Riaz un Nabi
{"title":"Implementation of GSM based commercial automobile tracker using PIC 18F452 and development of Google Earth embedded monitoring software","authors":"Junaid Ali, Shahid Nasim, T. Ali, Naveed Ahmed, Syed Riaz un Nabi","doi":"10.1109/SCORED.2009.5443760","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443760","url":null,"abstract":"The vehicle tracker system uses conventional GSM based communication to monitor the location of an automobile at a remote monitoring station and allow stopping the vehicle when required. The system presents the vehicle driver an option to generate an alert signal at the monitoring station using a secreted switch, when in danger. The system also monitors tracker temperature and operating voltage to ensure the correct operation of the system. The PIC18F452 controller employed provides a single unit compact module with built-in ADC and UART modules. The monitoring software is developed for a user friendly GUI with visual indication of location on Google Earth and easy to understand controls. Continuous or intermittent updating of location is possible as demanded by the situation and status of the monitored vehicle. The system is designed for commercial trackers and can be used for local guidance systems.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of effective network features to detect Smurf attacks","authors":"Gholam Reza Zargar, P. Kabiri","doi":"10.1109/SCORED.2009.5443345","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443345","url":null,"abstract":"Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)","authors":"Anas Mohd Nazlee, F. Hussin, N. Ali","doi":"10.1109/SCORED.2009.5443190","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443190","url":null,"abstract":"CUDA is a platform developed by Nvidia for general purpose computing on Graphic Processing Unit to utilize the parallelism capabilities. Serpent encryption is considered to have high security margin as its advantage; however it lacks in speed as its disadvantage. We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA's parallel processing capability. The proposed methodology could be used to quickly port a CPU-based algorithm for a quick gain in performance. Further tweaking, as described in this paper through the use of a profiler, would further increase the performance gain. Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100 MB/s or more than 7X performance gain.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"1.5V high performance OP AMP using self cascode structure","authors":"Kshitij Bhardwaj, S. S. Rajput","doi":"10.1109/SCORED.2009.5443054","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443054","url":null,"abstract":"An operational amplifier (Op Amp) based on self cascode structure is proposed that works with a supply voltage of ± .75 volt. It provides an open loop gain of 52dB with a unity gain frequency of about 17 MHz, with 145 microwatt of power consumption. Simulation results are based on p-spice simulation for 0.25μm CMOS technology.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness of pre-employment screening methods","authors":"Meshack Muderedzwa, Emanuel Nyakwende","doi":"10.1109/SCORED.2009.5443256","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443256","url":null,"abstract":"This work looks at employment background screening methods. Effective pre-employment screening is a necessity not an option. The research assesses the effectiveness of employment background screening methods. Statistical analysis of quantitative information obtained from an email survey questionnaire, illustrates the effectiveness of background screening methods. It was discovered that background screening methods are the same. The study proposes two issues the development of an integrated online background screening approach and national online databases, in order to comprehensively screen data over the internet.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sagar Kumar, Nishant Mittal, Shubham Gupta, N. Kalyanasundaram, R. Jain
{"title":"An energy-efficient and low latency (E2L2) MAC protocol for low traffic wireless sensor networks","authors":"Sagar Kumar, Nishant Mittal, Shubham Gupta, N. Kalyanasundaram, R. Jain","doi":"10.1109/SCORED.2009.5443412","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443412","url":null,"abstract":"Medium Access Control (MAC) protocols are application specific in nature. This paper proposes E2L2 MAC protocol for applications involving low network traffic but requiring prompt delivery of data. The wireless sensor networks' application area of medical monitoring and treatment is an example which encompasses such characteristics and requirements. Sensor nodes operate in half duplex mode and are defined to have two communication channels- data and control channel. While handshakes, to avoid collision between the contending sensor nodes, are done on the control channel using modified RTS and CTS packets, the data channel is utilized for data transmission. Low traffic on the network allows node reservation chain to be formed with the help of control channel handshakes, at the same time when data is flowing on the data channel. A packet reception algorithm is utilized to decide on the type of scheduling behavior to be used by the sensor nodes. Significant advantages in energy efficiency and latency are obtained as a direct impact of the protocol.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Shah, Syed Adeel Ali Shah, U. A. Rind, G. Das Menghwar
{"title":"Discrete-time queueing analysis of communication buffer with multiserver","authors":"W. Shah, Syed Adeel Ali Shah, U. A. Rind, G. Das Menghwar","doi":"10.1109/SCORED.2009.5443427","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443427","url":null,"abstract":"Discrete time queues are the significant tools which are used to analyze and model any kind of digital networks. Discrete time analysis of queues are the most important way to efficiently analyze the today's communication systems based on the digital technology. In this paper the buffer of communication network is analyzed through infinite capacity discrete time queue with multiserver. A model of network buffer is presented and performance measures of the network buffer are evaluated such as Mean number in the queue.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116498277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a mini solar power system","authors":"Tan Yu Hee, M. Isa","doi":"10.1109/SCORED.2009.5443015","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443015","url":null,"abstract":"This paper presents the design of mini solar power system. The mini solar power system is designed based on photovoltaic cell generation and 12V direct current system. The main part of the solar power system is the charge controller that is analysed and presented in this paper. The overall system will be constructed for measurement and testing.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}