By Topic

SoutheastCon, 2007. Proceedings. IEEE

Date 22-25 March 2007

Filter Results

Displaying Results 1 - 25 of 178
  • Welcome to SoutheastCon 2007

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (53 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE SoutheastCon 2007 Planning Committee

    Publication Year: 2007, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • IEEE Region 3 Executive Committee - 2007

    Publication Year: 2007, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • IEEE SoutheastCon 2007 Referees

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2007, Page(s):xvii - xxv
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • IEEE SoutheastCon 2007 - Links

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (983 KB) | HTML iconHTML
    Freely Available from IEEE
  • Copyright - 2007

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (939 KB)
    Freely Available from IEEE
  • Web application clusters

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (777 KB) | HTML iconHTML

    Businesses face increasing expectations from a global market requiring new services that fit consumers' immediate needs with a high degree of reliability, scalability and performance. Traditional architectures can sometimes have trouble meeting these expectations, so more fault-tolerant architectures are needed to fulfil these needs. This article introduces the concept of computer clustering for a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Java 1.5 network API for use in peer-to-peer and client-server applications

    Publication Year: 2007, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Summary form only given. Since its inception in the mid 1990's Java has steadily gained acceptance by programmers, supplanting both C and C++ as the language of choice. NASA chose to use Java for processing Mars mission data because of increased productivity by their programmers. Other companies cite Java's portability, robustness, and well defined APIs as reasons for change. The December 2006 TIO... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pitch conversion based on pitch mark mapping

    Publication Year: 2007, Page(s):8 - 13
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Voice conversion is a subject of major research interest these days, due to its numerous applications including dubbing, text to speech synthesis and multimedia. Pitch conversion is an important building block for efficient voice conversion. This paper focuses on the implementation of pitch scaling and pitch conversion. Effective silence removal, voice/unvoiced detection, pitch extraction, pitch m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced speaker recognition based on score level fusion of AHS and HMM

    Publication Year: 2007, Page(s):14 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    Speaker recognition history dates back to some four decades, and yet it has not been reliable enough to be considered as a standalone security system. This paper focuses on the enhancement of speaker recognition through fusion of likelihood scores generated by arithmetic harmonic sphericity (AHS) and hidden Markov model (HMM) techniques. Due to the contrastive nature of AHS and HMM, we have observ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low complexity image authentication for mobile applications

    Publication Year: 2007, Page(s): 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB)

    Summary form only given. This paper presents a general technique to simplify processing modular arithmetic in environments having low computational capability such as mobile equipments. We proposed a technique for fast public-key image authentication using fuzzy-computations for El-Gamal authentication technique. The fuzzy operations are embedded carefully in the signature computations to authenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D real-time database

    Publication Year: 2007, Page(s): 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB) | HTML iconHTML

    Summary form only given. A SIMD architecture consists of one instruction processor (IP) with a separate memory for instructions, and a set of processing elements (PEs), each with its own separate memory. The instructions issued by the IP are sent to every PE simultaneously. When memory is addressed, the value in memory for each PE is simultaneously sent to its PE. Thus, thousands of data elements ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arithmetic cryptography protocol for secure multi-party computation

    Publication Year: 2007, Page(s): 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (99 KB)

    In this paper, we propose a cryptographic solution for secure multi-party computation (SMC). SMC is also called secure function evaluation, which is extensively studied in classical cryptography. SMC protocol allows n participants p1...pn to compute an n-input data through trusted third party (TTP) without revealing the information of the parties. All the parties may perform ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of mobile agents and related security issues

    Publication Year: 2007, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of routing protocols in a sensor network using resource based models

    Publication Year: 2007, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Energy efficiency is of paramount importance in sensor networks that are constrained by limited resources. Designing an efficient routing protocol for a sensor network is challenging due to factors such as limited resources, concentration of load in a limited portion of the network, and routing of redundant information. An object oriented programming (OOP) paradigm was used to develop a resource-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time varying stochastic channel modeling of wireless DS-CDMA ad-hoc networks using different mobility models

    Publication Year: 2007, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    The time varying nodes mobility and environmental changes in traditional ad-hoc channel creates limitation in signal propagation. In this study, a stochastic dynamic ad-hoc channel model is introduced with state space representation to overcome these limitations. The model's parameters are computed from the approximation of Doppler spectrum. The performance of this stochastic ad-hoc direct sequenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicle identification using wireless sensor networks

    Publication Year: 2007, Page(s):41 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    We studied the possibility of using wireless sensor networks for vehicle identification. It is interesting because it is not only challenging but also practical. It is challenging to develop algorithms and/or protocols for sensor nodes to execute since each sensor node has limited computation and communication capabilities, and these limitations prohibit the use of algorithms and/or protocols deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of ultra miniature 1-french sensors for wireless radial arterial pressure monitoring

    Publication Year: 2007, Page(s):47 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    Miniaturized pressure sensors attached to catheters have numerous applications in the biomedical and life science fields including the monitoring of arterial, ventricular, intracranial and intraocular pressures. Recent advances in MEMS (microelectromechanical systems) technology and its associated fabrication processes, such as DRIE (deep reactive ion etching), have allowed for further miniaturiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduced current class AB radio receiver stages using novel superlinear transistors with parallel NMOS and PMOS transistors at one GHz

    Publication Year: 2007, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Class AB amplifier stages are commonly used to conserve power in radio transmitters. In this paper, a Class AB amplifier stage is investigated for use in radio receivers to reduce power consumption. In this, a novel superlinear three-terminal transistor consisting of an NMOS transistor in parallel with a PMOS transistor is used to improve Class AB linearity to a level approaching Class A performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coping with process variations in ultra-low power CMOS analog integrated circuits

    Publication Year: 2007, Page(s):54 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Ultra-low power analog/RF CMOS circuits are critical for battery-operated electronics. Low-supply voltage and current requirements are met by operating MOS transistors in weak to moderate inversions and very small overdrive voltages. The advantage of this technique comes with the price of complex and aggressive design burdens to be achieved. Therefore designers should have control over the behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High brightness field emission from carbon nanosheets and back-gated devices

    Publication Year: 2007, Page(s): 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    A 2D atomically thin nanostructure, carbon nanosheet, was synthesized via radio frequency plasma enhanced chemical vapor deposition. Carbon nanosheets are free-standing, and have flat surface morphologies, atomically thin edges, and defective graphitic structures. Field electron emission from carbon nanosheets was measured under diode mode. Carbon nanosheets samples have turn-on fields of 5-10 V/m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the signal detection and simulation of universal serial bus 2.0 IP core circuit system

    Publication Year: 2007, Page(s):59 - 62
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Universal serial bus 2.0 systems consist of USB host control chip and equipment interface control chip, i.e. peripheral device chip. The traditional USB developing is only to develop USB peripheral devices, USB2.0 peripheral devices IP core has great application foregrounds. In USB2.0 system, peripheral devices are connected with host to achieve all kinds of transactions, such as bulk, interrupt, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated test stand for HEV capacitor testing

    Publication Year: 2007, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    As capacitor manufacturers race to meet the needs of the hybrid-electric vehicle (HEV) of the future, many trade-offs at the system level as well as the component level must be considered. Even though the ultra-capacitor has the spot light for recent research and development (R&D) for HEVs, the electrostatic capacitor is also the subject of R&D (for HEVs as well as wireless communications)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.