By Topic

Date 25-28 March 1999

Filter Results

Displaying Results 1 - 25 of 75
  • Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • Authors list

    Publication Year: 1999, Page(s):340 - 341
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Linear discriminant analysis for signal processing problems

    Publication Year: 1999, Page(s):78 - 81
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Linear discriminant analysis (LDA) and principal components analysis (PCA) are two common techniques used for classification and dimensionality reduction. These techniques typically use a linear transformation which can either be implemented in a class-dependent or class-independent fashion. PCA is a feature classification technique in which the data in the input space is transformed to a feature ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of the latest high speed LAN adapters: 100 Mbps token ring; Gbps Ethernet

    Publication Year: 1999, Page(s):98 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    We present TCP/IP throughputs and processor utilizations (both send and receive) obtained for the latest high speed LAN adapter technologies-100 Mbps token ring (with 100 Mbps Ethernet discussed, for comparison) and Gbps (Gigabit) Ethernet-for Microsoft Windows operating systems. Included is a discussion of the factors that influence observed performance, as well as methods for noninvasively measu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic system control using slack descriptor models

    Publication Year: 1999, Page(s):67 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Various techniques have been developed for controlling dynamic systems subject to model or input uncertainties. The slack descriptor systems model proposed by Holloway (1993) addresses such uncertainties as well as systems that have observation cost (uncertainty due to lack of samples). Here we consider some preliminary approaches to the control of systems modeled by slack descriptors, and show si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Past and present methods for computing the dielectric constant of lattices of spheres

    Publication Year: 1999, Page(s):249 - 252
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The computation of the effective electromagnetic material parameters for a composite material is a complex and well-visited problem. For collections of spheres in a static field, the celebrated Clausius-Mossotti equation provides extremely good dielectric constant values when mutual interaction between particles is negligible. When mutual coupling is not negligible and identical spheres are arraye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods for boundary scan access of built-in self-test for field programmable gate arrays

    Publication Year: 1999, Page(s):210 - 216
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    In this paper we present four methods for accessing BIST for FPGAs via the IEEE 1149.1 standard boundary scan interface along with the advantages and disadvantages of each approach. Each method is evaluated with consideration to test time, logic overhead, diagnostics resolution, usability in FPGAs, and architectural features which would be required to implement the approach. These methods can be u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determination of midband gain of Sallen-key filters

    Publication Year: 1999, Page(s):305 - 308
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    This article discusses the definition and evaluation of midband gain for active filters with positive feedback and two widely separated poles. It is shown that two different definitions yield two different frequency responses. These responses differ by a factor of 0.04 db. The results of analytical expressions are checked with simulation. Agreement is excellent View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feedback on a ball balancer

    Publication Year: 1999, Page(s):64 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The open loop transfer function of a ball balancer shows it to be unstable. Application of a feedback loop is required to stabilize it. This paper provides a practical touch to the undergraduate linear control systems course, where compensation is commonly and theoretically applied in various control systems to achieve stability and in which no practical insight is provided as to what constitutes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of audio compression transforms

    Publication Year: 1999, Page(s):253 - 257
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    This paper provides a subjective quality analysis of transforms used in audio compression algorithms for a class of music signals. An analysis with the discrete wavelet packet transform (DWPT) compares performances of an eight-level non-uniform critical-band frequency split versus a five-level uniform subband frequency split used in MPEG. Another analysis compares the performances of the DWPT vers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-host mutual authentication

    Publication Year: 1999, Page(s):180 - 184
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    As an alternative to the present client/server applications on the Internet, researchers in universities and industry are trying to define a secure agent infrastructure which can protect both the agent and the agent place (server, ducking place). The main advantage of the agent is that it can move (roam) on the Internet searching for answers for the users. Such feature saves a lot of bandwidth as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of power factor and harmonics in switched-mode power supplies

    Publication Year: 1999, Page(s):278 - 283
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    Power factor and harmonic characteristics of high frequency switched-mode power supply systems operating in discontinuous inductor current mode are studied in this paper. The study is based on the fact that virtually all power factor correction (PFC) converters use a few basic converter topologies as their input stages. It is found that these converters present distinctive harmonic behaviors. Harm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved quadtree decomposition/recomposition algorithm for fractal image compression

    Publication Year: 1999, Page(s):258 - 263
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    We present a fractal image compression algorithm that combine aspects of the classical quadtree decomposition (QD) scheme and the quadtree recomposition scheme (QR) proposed by the authors in earlier papers. For all types of images, the new approach exhibits a superior runtime performance when compared to both the QD and QR schemes, while maintaining high fidelity for compressed images. Quantitati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scale and rotation insensitive algorithm for label location and identification

    Publication Year: 1999, Page(s):264 - 267
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Image recognition is crucial for today's unmanned reconnaissance vehicles. This paper focuses on an image recognition algorithm designed to be insensitive to scaling and rotation. In addition the algorithm runs in real-time and functions well at low resolutions. The problem of locating and identifying toxic waste labels using an unmanned vehicle is discussed and used as an example for how this alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion prevention technique for ATM networks

    Publication Year: 1999, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    ATM networks do not operate in an effective and stable way without preventing congestion. Traffic management is concerned with the design of mechanisms which ensure that the network bandwidth, buffer and resources are efficiently utilized, while meeting the various quality of service (QoS) guarantees given to sources as part of a traffic contract. In this paper, a new and improved congestion contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breakdown voltage behavior of PET thermoplastics at DC and AC voltages

    Publication Year: 1999, Page(s):284 - 287
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The demand on thermoplastic encapsulation of coils and electronic devices has been increased recently as an alternative to thermosets for electrical insulation, heat dissipation and physical protection of the encapsulated devices from harsh environmental operating conditions. Compared with thermosets, thermoplastics offer excellent electrical properties, superior surface hardness, excellent dimens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of algorithms for detection of the number of signal sources

    Publication Year: 1999, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    Some procedures for detection of the number of signal sources in presence of noise are compared. Two kinds of noise are considered. First, signals in the presence of Gaussian white noise under an additive model are examined. In this case, the problem is just to find the multiplicity of the smallest eigenvalue of the covariance matrix of the observation vector. Second, signals in presence of noise ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining the effect of sidelobe structure on angle of arrival measurements using monopulse techniques

    Publication Year: 1999, Page(s):319 - 322
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    The sidelobe structure of a transmitting antenna can cause errors of angle-of-arrival (AOA) measurements by a receiving antenna. This paper addresses the conditions necessary for these measurement errors to occur by examining sidelobe data for three antennas. In addition, a maximum limit on the possible AOA measurement errors is determined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network analysis of a multi-node net with a tactical communications protocol

    Publication Year: 1999, Page(s):44 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The U.S. Army Research Laboratory (ARL) has conducted hardware-in-the loop experiments using combat net radios, message drivers, and tactical communications protocols to quantify the effects of network load parameters on the throughput and delay of a small combat radio net. A virtual reality network management tool will enhance the data analysis. The Situation Awareness Virtual Environment for Com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-system reprogrammable (ISR) units provide dynamic online automation and control

    Publication Year: 1999, Page(s):74 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    In modern control systems, there is a tremendous demand and requirement to implement the necessary control dynamically and also remotely. In addition, with the availability of the programmable devices such as complex programmable logic devices (CPLD) and field programmable gate arrays, it is now possible to design the systems with these type of devices and reprogram them online from remote locatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive and delayless filtering system for sinusoids with varying frequency

    Publication Year: 1999, Page(s):149 - 153
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Accurate current reference is important for an active power filter to efficiently suppress harmonics caused by power electronics devices. The reference signal can be generated by applying an adaptive predictive filter to extract the sinusoidal primary signal from a noisy source. In this paper, the authors propose an FIR (finite impulse response) filter whose coefficients are updated by the LMS (le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote instrumentation access and control (RIAC) through inter-networking

    Publication Year: 1999, Page(s):116 - 121
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    In the modern electronics, communication, controls, and computer industries, systems are becoming very complex and highly integrated. In addition, most of these systems are also becoming programmable to increase the flexibility and adaptability of operation. These systems can not be easily tested or characterized at bench level testing. Sophisticated test equipment, personnel are needed. It is nei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correlating software modelling and hardware responses for VHDL and Verilog based designs

    Publication Year: 1999, Page(s):122 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    Modern digital system designs have been predominantly software driven, using the hardware description languages. While there are many different types of the hardware description languages, the most commonly used are VHDL (very high-speed integrated circuit hardware description language) and the Verilog. Both lend themselves to the successful realizations of the digital systems. However, even the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video communication system using portrait animation

    Publication Year: 1999, Page(s):309 - 314
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Novel video and speech communication schemes are investigated for implementing a chat-style communications system that can be applied to mobile communications environments characterized by limited terminal performance and transmission throughputs. A method is developed of automatically generating simplified portraits that capture the essence of a person's unique facial features from photos taken w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of a phase-locked loop servo controller with encoder feedback

    Publication Year: 1999, Page(s):59 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    This paper presents a model of a phase-locked loop servo control mechanism using describing function analysis. A closed-loop control system is obtained by replacing the voltage-controlled oscillator of the phase-locked loop with a servo system with encoder feedback. In this way, the velocity of the servo is controlled via the phase-locked loop. A model of the system is obtained using describing fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.