2009 IEEE Student Conference on Research and Development (SCOReD)最新文献

筛选
英文 中文
FPGA implementation of a space-time trellis decoder 一个时空网格解码器的FPGA实现
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443323
Marciano S. Calayag, Sarah Isolde T. Servano, Kristina R. Tuazon, R. U. Lorenzo, J. Marciano
{"title":"FPGA implementation of a space-time trellis decoder","authors":"Marciano S. Calayag, Sarah Isolde T. Servano, Kristina R. Tuazon, R. U. Lorenzo, J. Marciano","doi":"10.1109/SCORED.2009.5443323","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443323","url":null,"abstract":"This paper describes the real-time implementation of a space-time trellis encoder and decoder using the Xilinx Virtex-4™FX12 FPGA. The code uses a generator matrix designed for 4-state space-time trellis (STT) that uses Quadrature Phase Shift Keying (QPSK) modulation scheme. The decoding process was done using Maximum Likelihood (ML) through the Viterbi Algorithm. The results show that the STT decoder can successfully decipher the encoded symbols from the STT encoder and that it can fully recover the original data in the absence of noise. The data rate of the decoder was 6.25 Msymbols/s. It was shown that 14% of the logic elements in Virtex 4 FPGA were used in implementing an encoder-decoder system.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116168057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contingency evaluation for voltage security assessment of power systems 电力系统电压安全评估中的应急评估
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443005
M. Akorede, H. Hizam, I. Aris, M. Kadir
{"title":"Contingency evaluation for voltage security assessment of power systems","authors":"M. Akorede, H. Hizam, I. Aris, M. Kadir","doi":"10.1109/SCORED.2009.5443005","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443005","url":null,"abstract":"The demand for electricity is expected to continue to increase given the recent world population projection of about 30 % increase in the next three decades. Consequently power systems are equally expected to be more heavily loaded than before. Unfortunately the environmental and economic constraints restrict the expansion of the existing power system facilities. This scenario requires a constant attention since it could result to voltage collapse which could in turn lead to a total blackout. This paper presents the procedure required to carry out a contingency assessment and ranking of the load buses and lines of power systems for voltage security. This would ensure that power systems are operated above a desired voltage stability margin to forestall voltage collapse. The impact of single line outage contingency on the static voltage stability margin, as well as the available transfer capability across the areas of the test system, are examined in the paper.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125923171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of GSM based commercial automobile tracker using PIC 18F452 and development of Google Earth embedded monitoring software 利用pic18f452实现基于GSM的商用车跟踪器,开发谷歌Earth嵌入式监控软件
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443760
Junaid Ali, Shahid Nasim, T. Ali, Naveed Ahmed, Syed Riaz un Nabi
{"title":"Implementation of GSM based commercial automobile tracker using PIC 18F452 and development of Google Earth embedded monitoring software","authors":"Junaid Ali, Shahid Nasim, T. Ali, Naveed Ahmed, Syed Riaz un Nabi","doi":"10.1109/SCORED.2009.5443760","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443760","url":null,"abstract":"The vehicle tracker system uses conventional GSM based communication to monitor the location of an automobile at a remote monitoring station and allow stopping the vehicle when required. The system presents the vehicle driver an option to generate an alert signal at the monitoring station using a secreted switch, when in danger. The system also monitors tracker temperature and operating voltage to ensure the correct operation of the system. The PIC18F452 controller employed provides a single unit compact module with built-in ADC and UART modules. The monitoring software is developed for a user friendly GUI with visual indication of location on Google Earth and easy to understand controls. Continuous or intermittent updating of location is possible as demanded by the situation and status of the monitored vehicle. The system is designed for commercial trackers and can be used for local guidance systems.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Identification of effective network features to detect Smurf attacks 识别有效的网络特征,检测Smurf攻击
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443345
Gholam Reza Zargar, P. Kabiri
{"title":"Identification of effective network features to detect Smurf attacks","authors":"Gholam Reza Zargar, P. Kabiri","doi":"10.1109/SCORED.2009.5443345","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443345","url":null,"abstract":"Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) 基于CUDA的蛇形加密算法实现
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443190
Anas Mohd Nazlee, F. Hussin, N. Ali
{"title":"Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)","authors":"Anas Mohd Nazlee, F. Hussin, N. Ali","doi":"10.1109/SCORED.2009.5443190","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443190","url":null,"abstract":"CUDA is a platform developed by Nvidia for general purpose computing on Graphic Processing Unit to utilize the parallelism capabilities. Serpent encryption is considered to have high security margin as its advantage; however it lacks in speed as its disadvantage. We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA's parallel processing capability. The proposed methodology could be used to quickly port a CPU-based algorithm for a quick gain in performance. Further tweaking, as described in this paper through the use of a profiler, would further increase the performance gain. Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100 MB/s or more than 7X performance gain.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
1.5V high performance OP AMP using self cascode structure 采用自级联码结构的1.5V高性能运放
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443054
Kshitij Bhardwaj, S. S. Rajput
{"title":"1.5V high performance OP AMP using self cascode structure","authors":"Kshitij Bhardwaj, S. S. Rajput","doi":"10.1109/SCORED.2009.5443054","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443054","url":null,"abstract":"An operational amplifier (Op Amp) based on self cascode structure is proposed that works with a supply voltage of ± .75 volt. It provides an open loop gain of 52dB with a unity gain frequency of about 17 MHz, with 145 microwatt of power consumption. Simulation results are based on p-spice simulation for 0.25μm CMOS technology.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effectiveness of pre-employment screening methods 就业前筛选方法的有效性
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443256
Meshack Muderedzwa, Emanuel Nyakwende
{"title":"Effectiveness of pre-employment screening methods","authors":"Meshack Muderedzwa, Emanuel Nyakwende","doi":"10.1109/SCORED.2009.5443256","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443256","url":null,"abstract":"This work looks at employment background screening methods. Effective pre-employment screening is a necessity not an option. The research assesses the effectiveness of employment background screening methods. Statistical analysis of quantitative information obtained from an email survey questionnaire, illustrates the effectiveness of background screening methods. It was discovered that background screening methods are the same. The study proposes two issues the development of an integrated online background screening approach and national online databases, in order to comprehensively screen data over the internet.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An energy-efficient and low latency (E2L2) MAC protocol for low traffic wireless sensor networks 针对低流量无线传感器网络的节能低延迟(E2L2) MAC协议
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443412
Sagar Kumar, Nishant Mittal, Shubham Gupta, N. Kalyanasundaram, R. Jain
{"title":"An energy-efficient and low latency (E2L2) MAC protocol for low traffic wireless sensor networks","authors":"Sagar Kumar, Nishant Mittal, Shubham Gupta, N. Kalyanasundaram, R. Jain","doi":"10.1109/SCORED.2009.5443412","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443412","url":null,"abstract":"Medium Access Control (MAC) protocols are application specific in nature. This paper proposes E2L2 MAC protocol for applications involving low network traffic but requiring prompt delivery of data. The wireless sensor networks' application area of medical monitoring and treatment is an example which encompasses such characteristics and requirements. Sensor nodes operate in half duplex mode and are defined to have two communication channels- data and control channel. While handshakes, to avoid collision between the contending sensor nodes, are done on the control channel using modified RTS and CTS packets, the data channel is utilized for data transmission. Low traffic on the network allows node reservation chain to be formed with the help of control channel handshakes, at the same time when data is flowing on the data channel. A packet reception algorithm is utilized to decide on the type of scheduling behavior to be used by the sensor nodes. Significant advantages in energy efficiency and latency are obtained as a direct impact of the protocol.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discrete-time queueing analysis of communication buffer with multiserver 多服务器通信缓冲区的离散时间排队分析
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443427
W. Shah, Syed Adeel Ali Shah, U. A. Rind, G. Das Menghwar
{"title":"Discrete-time queueing analysis of communication buffer with multiserver","authors":"W. Shah, Syed Adeel Ali Shah, U. A. Rind, G. Das Menghwar","doi":"10.1109/SCORED.2009.5443427","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443427","url":null,"abstract":"Discrete time queues are the significant tools which are used to analyze and model any kind of digital networks. Discrete time analysis of queues are the most important way to efficiently analyze the today's communication systems based on the digital technology. In this paper the buffer of communication network is analyzed through infinite capacity discrete time queue with multiserver. A model of network buffer is presented and performance measures of the network buffer are evaluated such as Mean number in the queue.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116498277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a mini solar power system 小型太阳能发电系统的设计
2009 IEEE Student Conference on Research and Development (SCOReD) Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443015
Tan Yu Hee, M. Isa
{"title":"Design of a mini solar power system","authors":"Tan Yu Hee, M. Isa","doi":"10.1109/SCORED.2009.5443015","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443015","url":null,"abstract":"This paper presents the design of mini solar power system. The mini solar power system is designed based on photovoltaic cell generation and 12V direct current system. The main part of the solar power system is the charge controller that is analysed and presented in this paper. The overall system will be constructed for measurement and testing.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信