{"title":"The Application of Cross Correlation Technique for Estimating Impulse Response and Frequency Response of Wireless Communication Channel","authors":"Z. Sharif, A. Sha'ameri","doi":"10.1109/SCORED.2007.4451386","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451386","url":null,"abstract":"Cross correlation technique is one of the most commonly used methods to estimate the channel impulse response such as a wireless communication channel. This paper looks at the use of two different types of signals that is applied in the cross correlation technique. The signals are phase shift keying (PSK) and linear FM signals (Chirps). Pseudo random sequence (PRS) is used in the generation of the PSK signals. The parameters of the PRS are varied according to the sequence lengths, sampling frequency and bit rate. From the cross correlation functions and the cross spectrum, the channel impulse response and channel frequency response are respectively estimated. Besides PSK signals, linear FM signal is also used as an input to estimate the channel impulse response. Both PSK and linear FM signals are chosen due to their auto correlation properties that are similar to an impulse function. Thus, the channel impulse response can be estimated based on the cross correlation between the output and the input signals. The desired and the estimated channel impulse responses and channel frequency response are respectively estimated and compared based on the mean squared error (MSE).","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis and Optimization of User Space versus Kernel Space Network Application","authors":"Koh Minghao, Khong Yun Chyang, E. Karuppiah","doi":"10.1109/SCORED.2007.4451372","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451372","url":null,"abstract":"Operating systems such as Linux cater to numerous network applications ranging from daemons that provide services namely HTTPd and SSHd to client programs that access these services. Traditionally, these programs are written in user space and use system calls to switch to the kernel so that operations such as establishing a socket, read or write can be executed. This paper discusses the alternative to the above method which is to implement these user space applications in the kernel. In this research, the performance of LDP implementations of server and client programs in the user space are compared to running them in the kernel space. It proofs the concept that implementing applications in the kernel space reduces the CPL load and enables slightly faster goodput rate due to lesser context-switching between the user and kernel space.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125302147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnosis of XLPE Cable using the Recovery Voltage Measurement Method","authors":"N. Bashir, H. Ahmad","doi":"10.1109/SCORED.2007.4451441","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451441","url":null,"abstract":"This paper presents a preliminary investigation on the evaluation of ageing in 11 kV XLPE cable using return voltage measurement (RVM) method. Accelerated ageing using AC voltage was performed on new XLPE cable samples. Within the period of ageing, the state of insulation was investigated and assessed. The result of the diagnosis using the RVM showed a good correlation between aging time and the return voltage initial slopes (dU,/dt) of the aged XLPE cables, indicating the samples have undergone thermal ageing. The RVM technique, which was initially proposed for diagnosis of oil-paper insulation systems, was found to be able to detect ageing in XLPE cables, and thus insulation diagnosis using this technique could be extended to extruded-polymeric insulation systems.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Modeling of the Copper-Indium-Selenium (CIS) based Solar Cell Performance by AMPS-1D","authors":"N. Amin, M. Tang, K. Sopian","doi":"10.1109/SCORED.2007.4451382","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451382","url":null,"abstract":"This paper analyzes the copper-indium-selenium (CIS) and copper-indium-gallium-selenium (CIGS) based solar cell performance by AMPS-1D numerical modeling. Various factors which affect the solar cell's performance are investigated, carefully referring to practical cells, to obtain the optimum parameters for the CIS and CIGS solar cells. Among the factors studied are thickness and bandgap energy of absorber layer, thickness of buffer layer of the cells. In this study, an efficiency of 19.4% has been achieved with CdS based buffer layer with performance parameters of 0.68 V for open circuit voltage (Voc), 35 mA/cm2 for short circuit current (Jsc) and 0.82 for fill factor (FF). This solar cell has been used as a base case for simulation. It is found that the optimum solar cell, regardless whether it is CIS or CIGS type, has the absorber thickness between 2000 nm and 3000 nm. Moreover, the optimum bandgap of the CIS and CIGS absorber layer are found to be 1.04 eV and 1.15 eV, respectively. The thickness of buffer layer has been found in the range of 40 nm to 50 nm as the optimum value.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126506640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Voltage Collapse Prediction on a Practical Power System Using Power Transfer Stability Index","authors":"M. Nizam, A. Mohamed, A. Hussain","doi":"10.1109/SCORED.2007.4451398","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451398","url":null,"abstract":"This paper presents a combined static and dynamic voltage stability analysis method to predict dynamic voltage collapse in a practical power system using the power transfer stability index (PTSI). In the static voltage stability analysis, the contingencies due to load increase at all the load buses are ranked so as to determine the critical contingencies based on the maximum permissible load. Then, dynamic simulations are carried out only for the critical contingency cases. The performance of the PTSI in predicting voltage collapse is evaluated by comparing it with the voltage collapse proximity indicator. To illustrate the effectiveness of the proposed PTSI, simulations were carried out on a practical power system using the PSS/E software. The effects of induction motors and line outage contingency on dynamic voltage collapse were also investigated. Test results prove the accuracy of the PTSI in predicting voltage collapse in a practical power system.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"100 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121000805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Capacity of Correlated MIMO Channels for Informed and Uninformed Transmitter at Different Antenna Configurations","authors":"A. Saad, M. Ismail, N. Misran","doi":"10.1109/SCORED.2007.4451423","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451423","url":null,"abstract":"Modern wireless systems continue to demand higher data rates and better reliabilities. These demands can be met by using multiple antennas at both sides of the wireless link i.e. Multiple-Input Multiple-Output (MIMO). The capacity of MIMO correlated Rayleigh channels for different antenna configurations with and without channel knowledge (CSI) at the transmitter is simulated. When CSI is available at the transmitter (i.e. informed transmitter), waterfilling algorithm is used to allocate the power among the transmitter antennas. Simulations show that capacity is improved significantly when CSI is known at the transmitter. It also shows that the lack in channel knowledge (i.e. uninformed transmitter) can be compensated for by increasing the number of antennas in the receiver (Mr). When the number of antennas in the transmitter is larger than those in the receiver, using waterfilling becomes necessary to get the optimum capacity.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In Silico Information Processing for DNA Computing Readout Method based on DNA Engine Opticon 2 System","authors":"M.F. Mohamed Saaid, Z. Ibrahim","doi":"10.1109/SCORED.2007.4451406","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451406","url":null,"abstract":"In this paper, a novel readout approach for the Hamiltonian path problem (HPP) in DNA computing based on the real-time polymerase chain reaction (PCR) is proposed. Based on this approach, real-time amplification was performed with the TaqMan probes and the TaqMan detection mechanism was exploited for the design and development of the proposed readout approach. The readout approach consists of two phases: real-time amplification in vitro using TaqMan- based real-time PCR, followed by information processing in silico to assess the results of real-time amplification, which in turn, enables the extraction of the Hamiltonian path. In this paper, instead of using manual clustering of two different reactions in real-time PCR, a computer system is developed such that the clustering can be done automatically. This clustering process can be done quickly based on the number of nodes in the HPP problems and the TaqMan reactions and the data obtained previously is used to extract the correct Hamiltonian path.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"7 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new Hash Function Based on Combination of Existing Digest Algorithms","authors":"H. Mirvaziri, K. Jumari, M. Ismail, Z. MohdHanapi","doi":"10.1109/SCORED.2007.4451409","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451409","url":null,"abstract":"Hash functions were introduced in cryptology as a tool to protect the authenticity of information. SHA-1, MD5, and RIPEMD are among the most commonly-used hash function message digest algorithms. Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so the purpose of this paper is combination of some function to reinforce these functions. Recent works have presented collision attacks on SHA-1, MD5 hash functions so the natural response to overcome this threat was assessing the weak points of these protocols that actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function. Other options involve altering the protocol in some way. This work suggests a different option. We present several simple message pre-processing techniques and show how the techniques can be combined with MD5 or SHA-1 so that applications are no longer vulnerable to the known collision attacks.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 1.4GHz CMOS Low-Phase Noise Voltage-Controlled Ring Oscillator","authors":"Ahmad Akmal Abd Ghani, A. Saparon","doi":"10.1109/SCORED.2007.4451431","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451431","url":null,"abstract":"This paper describes a voltage controlled ring oscillator (VCO) with low-phase-noise. The VCO consists of two-stage fully differential delay cells proposed by Yan, has been analyzed and redesigned for its full switching performance using TSMC 0.18 mum CMOS technology with 2 V power supply. A fully switching differential delay cell is employed to reduce the phase noise of the ring oscillator. It utilizes dual-delay path techniques to achieve high oscillation frequency and obtain a wide tuning range. The VCO exhibits a very wide tuning range from 523 to 2111 MHz, which corresponds to a tuning range of 49.4%. Its power consumption is only 14.79 mW and its phase noise is about -103.3 dBc/Hz at 600 kHz offset from 1400 MHz. The phase noise of the VCO can be improved when more stages are applied in this VCO. Four-stages of differential delay are implemented later and it achieves -113.0595 dBc/Hz of phase noise which is 7.06 dB less than the first design. However, its power consumption is increased substantially to 100.3360 mW.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131345001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sulaiman, N. Tahir, A.M.M. Shah, A. Hussain, S. Samad
{"title":"Human Motion Analysis using Virtual Reality","authors":"S. Sulaiman, N. Tahir, A.M.M. Shah, A. Hussain, S. Samad","doi":"10.1109/SCORED.2007.4451359","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451359","url":null,"abstract":"This paper presents two different algorithms to detect human motion using the sum of absolute difference (SAD) and area-based detection methods. Both methods have the same objective that is to detect moving pixels in video sequences. The SAD block will determine the similarity between the input image and the background image that acted as the reference template, by performing the sum of absolute differences. As for the area- based detection, it uses the pre defined range of total 0-value pixels (black pixels) in binary image that depends on the size of the foreground image. The differences are indicated by the moving pixels in the input image that represented the detected object(s). Subsequently the identified objects will undergo some morphological processes such as dilation and erosion to filter the noise pixels, for precise means of detection. Next, the system will perform the boundary box plotting to denote the detected object. The entire system is developed in the virtual reality environment and later be deemed for application in an intelligent surveillance system, pedestrian detection and human activity recognition.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}