Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Electro/Information Technology, 2007 IEEE International Conference on

Date 17-20 May 2007

Filter Results

Displaying Results 1 - 25 of 121
  • Joule heating and phonon transport in nanoscale silicon MOSFETs

    Publication Year: 2007 , Page(s): 70 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2062 KB) |  | HTML iconHTML  

    This work examines the generation of heat in silicon MOSFETs using self-consistent Monte Carlo device simulation with full electron bandstructure and a full phonon dispersion computed from the Adiabatic Bond Charge model. We devise an efficient algorithm for the inclusion of full phonon dispersion in order to account for anisotropy and details of heat transport with great accuracy. We compute the density-of-states (DOS) and the lattice thermal energy numerically and use them to generate maps of local temperatures in a representative small-channel MOSFET device. Our results show that most heat is dissipated in the form of optical g-type phonons in a small region in the drain, and that the heat flows in a preferred direction aligned with the flow of the electron current. We also show that the distribution of generated phonons in energy closely follows the phonon DOS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First failure data capture in embedded system

    Publication Year: 2007 , Page(s): 183 - 187
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    First failure data capture (FFDC) is a technology that is used to capture diagnostic information when errors occur. This information reduces the need to reproduce errors. FFDC involves all firmware components. The processes and techniques of FFDC are crucial to the success of an embedded system. With a good FFDC implementation, software engineers can collect diagnostic data quickly and fix defects without impacting customer's operation. One of the challengers with FFDC is collecting the useful data. There are cases where the volume of data collected is huge but only covers a short amount of time. In other cases, the collected data cover a long period time, but only gather a few variables or items. A new FFDC technique has been developed to capture useful data. This new FFDC technique captures very detail data for a short period of time and captures much less detail data for a long period of time. This paper first introduces three FFDC techniques. The three techniques are general dump, event trace and error log. Second, it analyzes the problems of current FFDC techniques. Third, it discusses a new FFDC technique. This new FFDC technique is low cost, efficient and good for data collection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple ports remote embedded debugger server

    Publication Year: 2007 , Page(s): 493 - 497
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (115 KB) |  | HTML iconHTML  

    This paper describes a study related to multiple ports remote debugger server. Multiple ports remote debugger server supports one parallel port and multiple serial ports. User could connect to target serial port and parallel port from one local workstation or multiple workstations at the same time with serial cables or a parallel cable. All debugger communication ports could receive debug commands from hosts. When a remote debugger server returns data to host machine, it selects a port as a receiver to send out data automatically. If command comes from parallel port host, the parallel debug port will raise an interrupt to a remote debugger server. If a command comes from a serial port, the serial port will raise an interrupt to a remote debugger server. Multiple ports remote debug server is reliable, low cost, portable and efficient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of the radiation pattern of a GPS antenna on several vehicle platforms

    Publication Year: 2007 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (821 KB) |  | HTML iconHTML  

    This paper studies the radiation pattern of a global positioning system (GPS) antenna on a ground plane and five distinct vehicle platforms. The antenna was mounted under the instrument panel (IP) in all vehicle platforms. Vehicle-level radiation pattern of a GPS antenna is measured on the five vehicle platforms in an automotive antenna range. Results are presented to show the impact of the vehicle platform on the GPS antenna radiation pattern. Vehicle-level antenna radiation patterns are compared to the radiation pattern of the same antenna on a ground-plane. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a redundant binary input acceptable multiplier

    Publication Year: 2007 , Page(s): 323 - 326
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1106 KB) |  | HTML iconHTML  

    A multiplier which can accept redundant binary number inputs is proposed using available unsigned multiplier (array multiplier, carry-save-addition tree multiplier, or multiplier using redundant binary representations). The proposed multiplier is applicable in redundant binary ALU unit or redundant binary processor. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth efficient coded modulation and its implementation on FPGA

    Publication Year: 2007 , Page(s): 38 - 42
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (469 KB) |  | HTML iconHTML  

    A method of bandwidth efficient coded modulation and its implementation on FPGA is presented. The proposed coding technique parses the input data into two blocks corresponding to ODD parity block and EVEN parity block, calculates and appends the vertical parity from the columns, and transmits the coded blocks across the channel. Horizontal parity bits from the rows are not calculated since they are ODD and EVEN corresponding to the respective blocks. This technique reduces the number of redundant bits and enhances bandwidth efficiency. Simulation results are presented to verify the concept. The method will be experimentally verified in the laboratory by implementing it on a field programmable gate array (FPGA). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural networks for image processing: New edge detection algorithm

    Publication Year: 2007 , Page(s): 498 - 502
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (901 KB) |  | HTML iconHTML  

    Neural networks can be very useful for image processing applications. This paper exploits the cellular neural network (CNN) paradigm to develop a new edge detection algorithm. The approach makes use of rigorous model of the image contours, and takes into account some electrical restrictions of existing CNN-based hardware implementations. Four benchmark video sequences are analyzed, that is, Car-phone, Miss America, Stefan, and Foreman. The analysis shows that the proposed algorithm yields accurate results, better than the ones achievable by other CNN-based methods. Finally, comparisons with standard edge detection techniques (i.e., LoG edge detector and Canny algorithm) further confirm the capability of the developed approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lossless coding scheme for images using cross-point regions for modeling

    Publication Year: 2007 , Page(s): 96 - 101
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1281 KB) |  | HTML iconHTML  

    This paper presents CRIC (cross-point regions for lossless image compression), a scheme for losslessly encoding and decoding images, especially medical images, by optimizing on the probability of cross points that neighbor points of grey levels 2n. The base of this statement is the effect of Gray coding on cross points. At first, the effect of Gray codes is determined on an adjacent data set because images characteristically contain data that does not change much in a specific area; then this effect is generalized for real data without losing generality for their statistical properties. This is especially true for medical images that have many regions with the same grey levels. The Gray code transformation makes the bit states of cross points change from the original data bits, so first the probabilities of data bits on specific bit planes in cross point regions and then the entropies of the messages are changed. These probabilities are estimated and compared with the probabilities of the original data bits. This change of probability has important effects on the encoding and decoding processes in lossless medical image compression. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A microwave absorption spectrometer based on three-ray propagation

    Publication Year: 2007 , Page(s): 503 - 506
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (426 KB) |  | HTML iconHTML  

    The classical Fresnel zone criterion is used to examine microwave propagation through an open ended cylindrical metallic tube. It is shown that there exists a near free-space propagation region between the transmit antenna and the receive antenna. This principle is used to develop a microwave absorption spectrometer. Experimental results are presented to validate the concept. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A decoupling technique on switch factor based analysis of RLC interconnects

    Publication Year: 2007 , Page(s): 73 - 78
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1204 KB) |  | HTML iconHTML  

    In recent years, as the density of the components in the integrated circuit grows, the distance between the on-chip wires becomes smaller. The crosstalk is more important and will change the signal waveform or generate logic failures and then degrade the performance and the reality of the circuit. In this paper, we focus on the response of the transmission line and the value of the crosstalk noise. We propose a new method to obtain the equivalent circuit, and it is of a closed form which is suitable for the coupled circuit composed of multiple coupling capacitors and mutual inductors. In one general coupled circuit with two lines in which there are different resistances and capacitances between line and ground and different slopes of the source voltages, we refer to the parameters in other papers and use our approach to estimate the propagation delay. By comparing with the result obtained from simulating the circuit with HSPICE, we achieve an average error rate around 5%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated exploration of design concepts

    Publication Year: 2007 , Page(s): 351 - 355
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (793 KB) |  | HTML iconHTML  

    Modern product engineering faces the challenge of making numerous design tradeoffs for high-dimensional, interdisciplinary nonlinear systems. This paper presents a new method for exploring product concepts, including an insightful definition of design concept, an algorithmic approach to evaluating high-level design options, and a concise way to communicate simulation and optimization results to product designers and architects. The feasible landscape of architectural alternatives is described in terms of a list of optimized designs, unique design concepts, and implementation rules. Our implementation of automated concept exploration (ACE), which includes very broad mapping of the design space, gradient-based optimization, and rule mining, is demonstrated for the design of a high-performance liquid crystal display (LCD). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of an intrusion detection system for wireless sensor networks

    Publication Year: 2007 , Page(s): 507 - 512
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (852 KB) |  | HTML iconHTML  

    As a relatively recent and emerging technology, wireless sensor networks (WSNs) are beginning to be deployed frequently in a wide variety of environments ranging from military and emergency environments to natural and embedded environments. For example, a security system may be deployed using WSNs as outlined in M. Turon, J. Suh (Apr. 2005), and P. Dutta., et al., (Apr. 2005). Furthermore, WSNs are of particular interest to adversaries due to their frequent deployments in open and unprotected environments. Preventive mechanisms can sometimes be applied to protect WSNs from an assortment of attacks. However, in many cases, a more sophisticated methodology needs to be applied for situations in which intrusions or attacks cannot necessarily be anticipated in advance. In such instances, an intrusion detection system is warranted. For WSNs, one of the primary concerns deals with availability of the network and individual nodes. Denial of service (DoS) attacks are a particularly great threat to WSNs. The effects of a DoS attack are described extensively in A.D. Wood and J.A. Stankovic (Oct. 2002),and http://www.tinyos.net. WSNs are particularly vulnerable to failure under such attacks because of their limited energy, processing capacity, and storage. An effective DoS attack merely has to deplete the resources of the nodes to render them unavailable. In this paper we design and implement a preliminary intrusion detection system (IDS) for WSNs that addresses the security concern of DoS attacks and fits the demands and restrictions of WSNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of digital PID controllers for DC-DC converters using digital signal processors

    Publication Year: 2007 , Page(s): 306 - 311
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (782 KB) |  | HTML iconHTML  

    Implementation of digital PID controllers for DC-DC converters is discussed in this paper. The primary advantages of digital control over analog control are higher immunity to environmental changes such as temperature and aging of components, increased flexibility by changing the software, more advanced control techniques and reduced number of components. Analog PID and PI controllers were first designed using frequency response techniques, then converted into digital controllers. Digital PID and PI controllers are then implemented using digital signal processors (DSPs). Two possible choices of DSPs are introduced. The first one is the TMS320F2812 DSP from Texas Instrument, and the second one is the Si8250 digital power controller from silicon laboratories. Main features and development tools for both DSPs are introduced. Digital PID and PI controllers were implemented on the TI TMS320F2812 DSP. Experimental results for a prototype buck converter are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring the reliability of existing web servers

    Publication Year: 2007 , Page(s): 356 - 361
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (594 KB) |  | HTML iconHTML  

    As the usage of the Internet increases and more critical functions rely on the World Wide Web for operation, it is important that network researchers have current and accurate information from a real-world standpoint of the achieved reliability of the Internet. Anecdotal evidence suggests that Web outages are a serious issue from a cost standpoint. However, there have been few mainstream studies showing the reliability of the existing web infrastructure. As the Internet has changed, so to has its capabilities and its reliability. Yet, there have been few independent studies which have provided quantitative measurement of actual Web reliability. This article provides results from a controlled experiment intended to measure the reliability of the existing web infrastructure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Media searching on mobile devices

    Publication Year: 2007 , Page(s): 126 - 129
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (534 KB) |  | HTML iconHTML  

    Mobile devices such as cellular phones are now capable of storing a significant amount of multimedia files and personal data. However these devices still use traditional directory browsing which offers little in terms of usability for searching and retrieving specific files. In this paper we design and implement a prototype media search engine for a mobile phone. We use modified versions of open source search and metadata extraction libraries along with scrollable instant search results and an auto-fill feature. The prototype has acceptable performance in terms of resource requirement and execution speed. Potential applications may include multimedia file searching in distributed mobile computing and peer-to-peer file sharing environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Photon barrier and photon tunneling in optical waveguide structure

    Publication Year: 2007 , Page(s): 6 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1097 KB) |  | HTML iconHTML  

    Based on the well-known electron coherent tunneling phenomenon, a photonic tunneling Alter fabricated on an optical waveguide is proposed. The Bragg grating structure is applied as the photonic barrier. Two identical photonic barriers form a coherent resonance cavity or photon confinement quantum well so that at a specific wavelength in the forbidden band of the barrier, the photon can be tunneling through the waveguide with 100% transmission and very narrow bandwidth. Additionally, to facilitate the engineering design of this kind of photonic tunneling filter, a phase-shifted asymmetric-barrier structure is implemented. It is demonstrated that in this asymmetric-barrier structure, the tunneling wavelength is exactly the same as the Bragg wavelength of the grating, which is at the center of the barrier stop band. Some key parameters such as cavity/well and barrier lengths are investigated in order to control the filter bandwidth. Therefore the photon filter proposed should be easily designed for a specific wavelength and bandwidth and will have great applications in wavelength division multiplexing optic communication system and optical sensing. Finally it is pointed out that this tunneling filter is clearly related to the distributed-Bragg-grating-reflection laser diode. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel model of software reliability by the grey system theory

    Publication Year: 2007 , Page(s): 513 - 516
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (585 KB) |  | HTML iconHTML  

    The software system must work in an acceptable degree of reliability and quality. There are lots of interpretative methods to forecast the reliability of software system, such as stochastic modelling, queueing systems and network models, neural networks models, etc. But these approaches contain some limitations. A grey system theory approach is proposed in this paper. It gives the grey model for software system reliability estimation. Forecast data is got by grey model, and compared with the actual data. It is fitting well between these two data sets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method for estimation of software system reliability in neural networks

    Publication Year: 2007 , Page(s): 188 - 191
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (507 KB) |  | HTML iconHTML  

    There are lots of papers to model the software system reliability based on stochastic processes. But it is not the best fit with statistical methods for the estimation software reliability. The paper gives a new method to perform the estimation for software reliability. The neural networks have been described. And four data sets from large software system development are analyzed with the model of neural networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced EMS and its application to Shanghai Power Grid

    Publication Year: 2007 , Page(s): 312 - 317
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (690 KB) |  | HTML iconHTML  

    A kind of hybrid control approach to aim at realizing multi-objective approximation of optimization for control and dispatch of power systems is presented in this paper. The essence of the approach is to have the task and function for eliminating all of the categories of events which are defined as all of the classifications of the states of a power system which are unsatisfactory for the multi-objective of the power system operation. By applying the means of "control command, C" which is produced by the highest level and delivered to the middle one and the means of "operating order, O" which is delivered from the middle level, the operating power system is dispatched and controlled. The paper builds up a uniform architecture in order to implement the hybrid control approach of power systems. The advanced energy management system (AEMS) of Shanghai Power grid mainly on the basis of the hybrid control theory and method above mentioned, is explained as a typical case. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Qualitatively troubleshooting electronic circuits using fuzzy cognitive maps

    Publication Year: 2007 , Page(s): 327 - 332
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (557 KB) |  | HTML iconHTML  

    Fuzzy cognitive maps are used as a qualitative modeling technique for troubleshooting electronic circuits. Because they compare states to states, a trade off exists in their use. Qualitative evaluation is substituted for complexity. The map qualitatively evaluates how changes in underlying concepts represented by its nodes cause changes in other concepts represented by other nodes. Evaluation of a set of possible causes in a map can be done in two ways. In the first, nodal changes are applied to a set of nodes and the causality propagated through to output nodes of interest. In the second a reachability matrix can be construct red to identify which nodes can in fact affect the output node. Other nodes are then eliminated from further evaluation. Fuzzy cognitive maps have several potential advantages. The system map can be constructed by piecing together submaps individually constructed. Because changes in state are compared to changes in state inferring output nodal values, a common numeric metric is not necessary when incorporating different concepts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new generation of middleware solutions for a near-real-time data warehousing architecture

    Publication Year: 2007 , Page(s): 192 - 197
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (741 KB) |  | HTML iconHTML  

    The term "middleware" is used to identify software services and products that enable an integration communication model between application, data, business process, and web services especially in heterogeneous environments to be created and supported. In this paper, I propose that the enterprise service bus (ESB) middleware under the service-oriented architecture (SOA) can enable communication between the front and back-end layers of SOA integration that connects users with a data management layer. Including in this data management layer is a near-real-time data warehouse in addition to routing, security, message processing, and modeling capabilities. An ESB is one platform that helps achieve and support enterprise-wide SOA. The main issue to be addressed is the provision of access to a company-wide view of data wherever it resides. This is accomplished by building the SOA integration on top of the data warehouse. This will also use ESB middleware for integration solutions for existing applications and new business processes, along with the ability to pass data to any integration level. Most companies in the 21st century face increasing challenges to stay competitive, and accessibility and accuracy of information have become critical success factors. The traditional role of a data warehouse has been to support strategic decision making. This role has expanded to include more critical business tasks that support both strategic decisions and operational business processes. ESB has become an important part of the architectural framework for a business intelligence solution and is considered a critical component in the architecture of advanced near-real-time data warehouses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Side channel resistance quantification and verification

    Publication Year: 2007 , Page(s): 130 - 134
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (369 KB) |  | HTML iconHTML  

    In this paper, a formal method for quantifying the side channel resistance based on a statistical approach is developed and a formal CAD method for verifying the side channel resistance of a circuit design is presented. Our analysis indicates that designs which have small means for the difference in power consumption between key bits and high standard deviations for the difference can achieve higher security. Our analytical results for quantifying side channel resistance indicate that it is not feasible to achieve 280 security against side channel attacks with low standard deviation or with large means in the difference between key bit runs. Additionally, our analytical results for a preliminary CAD approach to detecting side channel leakage show that significant computing resources are required to gain enough statistics on the power consumption of a circuit to make reasonable approximations about the system's side channel resistance performance prior to implementation when the side channel attacks are unknown; however, our results indicate that it is feasible to detect individual side channel vulnerabilities when the side channel attacks are known. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of the performance of four exact string matching algorithms

    Publication Year: 2007 , Page(s): 333 - 336
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    There are numerous exact string matching algorithms that have similar performance characteristics. Which algorithm is best depends on the length of the pattern being searched for, the number of letters in the alphabet and the particular architecture where the program is being executed. Results of experiments on different recent microprocessors, with different word lengths are reported. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic and hyperchaotic dynamics in Chua’s circuits: The Adomian decomposition approach

    Publication Year: 2007 , Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (779 KB) |  | HTML iconHTML  

    In the field of electrical engineering, it is well-known that Chua's circuit represents a paradigm for studying chaotic phenomena. This paper focuses on the numerical study of chaotic and hyperchaotic dynamics in Chua's circuits via the Adomian decomposition method. The approach, which provides series solutions of the system equations, is first applied to the single Chua's circuit with cubic nonlinearity. Then the method is successfully utilized for analyzing hyperchaotic multi-scroll attractors generated in two coupled Chua's circuits with Hermite interpolating polynomials as nonlinearities. The reported examples show that the proposed approach presents two main features, i.e., the system nonlinearity is preserved and the chaotic solution is provided in a closed form. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equivalent circuit validation of a prototype flux concentrator for ILC positron matching

    Publication Year: 2007 , Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (584 KB) |  | HTML iconHTML  

    A pulsed normal conducting flux concentrator is an optional scheme of the ILC positron source adiabatic matching device (AMD). In order to facilitate the design of flux concentrator based AMD, an equivalent circuit model was proposed. A prototype flux concentrator was built and tested to validate the model. Good agreement was obtained between the measurement results and simulations based on the model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.