By Topic

Southeastcon 2000. Proceedings of the IEEE

Date 9-9 April 2000

Filter Results

Displaying Results 1 - 25 of 103
  • Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (492 KB)
    Freely Available from IEEE
  • Z-module reasoning and proving the commutativity of rings of exponent n/spl ges/2

    Publication Year: 2000, Page(s):322 - 325
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    We address a well-known problem in the field of automated reasoning that has been used to test the effectiveness of reasoning systems. The problem is the following: for a given integer e greater than two, if a ring R has exponent e, then must R be commutative?. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 2000, Page(s):541 - 542
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • An interactive real-time electromagnetic field analysis system for educational purposes

    Publication Year: 2000, Page(s):158 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    An interactive real-time electromagnetic field analysis system FieldVIEW is being developed at Florida International University with the intention of visualizing the electromagnetic process inside electrical machinery. The proposed system utilizes the finite element method with several hardware and software modules to achieve a real-time analysis of the electromagnetic field in a machine on which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power disturbance identification through pattern recognition system

    Publication Year: 2000, Page(s):154 - 157
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    This paper presents an artificial intelligent system to identify and classify the power disturbance waveforms that are obtained from the monitoring system in a power control station. The pattern recognition technique used in this paper is a combination of Bayes' linear classifier and artificial neural network (ANN). Simulated disturbance waveforms are transformed by the fast Fourier transformation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer relationship management in e-commerce: the call center solution

    Publication Year: 2000, Page(s):391 - 394
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    E-commerce is not just the transaction, it is also the customer service. The advent of interactive e-commerce has without doubt made buying and selling on the Web successful. However, it continues to lack the quality of personal contact with the customer, which is essential in building and sustaining customer relationships on the Internet. “Real-time” text communication currently used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uniform formal modeling of human and non-human agents using CSP and VDM

    Publication Year: 2000, Page(s):429 - 432
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    The paper focuses on human computer integration and the modeling of agent systems using CSP and the VDM specification language. In order to accomplish goals, agents in a given environment must adhere to the societal rules (norms) associated with that environment. The commitment rules governing a society of agents ensures that goals are accomplished and tasks are performed in an orderly fashion and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The logic of action in the deontic transaction model

    Publication Year: 2000, Page(s):456 - 459
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    To secure the integrity of extended multiagent actions, we subsume them under the transaction abstraction. Traditional transaction processing systems have the four ACID properties, which make for transaction security, but exceptions are often needed in long-lived applications. Our transaction model uses deontic logic, the logic of normative reasoning, and agent communication is via speech acts, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling societies of agents using modal logics

    Publication Year: 2000, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Presents a framework that shows how epistemic logic and deontic logic can be used to model a multi-agent system consisting of humans and non-human agents. Modeling agents with epistemic and deontic logic also captures the interdependencies between human and non-human agents. Epistemic logic addresses belief and knowledge (notably common knowledge), and, in many applications in computer science, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating systems: visualization technique for teaching and learning

    Publication Year: 2000, Page(s):387 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Due to rapid pace of technology advancement in the computer science discipline, both educators and students in universities have experienced difficulties in the teaching and learning of number of computer-oriented subjects. These include operating systems, computer organization and computer networking. Because of the nature of the material covered in these subjects, they must be taught using a pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia streaming on a personal computer for virtual music video television station

    Publication Year: 2000, Page(s):425 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Over the last few years, streaming video and audio content over the Internet has become increasingly popular. Communication industries and individuals have successfully created various types of streaming media including live and pre-recorded television and radio programs, stereo-quality music, and various types of video and audio files. The purpose of this paper is to create a cost-effective virtu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer organization teaching: a create your own workbook approach

    Publication Year: 2000, Page(s):193 - 196
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    An approach to teaching computer architecture and organization is illustrated, where students are made aware of their college computing environment at an early stage of the course. Students are required to create a workbook of their own, which forms a solid basis to understanding of their own environment. This approach reduces cultural difficulties, usually observed in students with nontraditional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of two nonlinear adaptive control strategies

    Publication Year: 2000, Page(s):449 - 455
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The performance of two adaptive controllers has been compared based on a simulation platform. The control schemes are composed of model based adaptive control and adaptive backstepping with MT-filter. Both of the adaptive controllers have been evaluated in terms of estimated parameter convergence, dynamic performance, and ability of disturbance rejection under the same nonlinear system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using low Earth orbit satellite system and DS-CDMA scheme for mobile voice and data communication

    Publication Year: 2000, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    We propose a low Earth orbiting (LEO) satellite system that implements a direct sequence code division multiple access (DS-CDMA) scheme to provide increased coverage and greater system capacity. All system design aspects are described, including system antennas, modulation, frequency allocation, satellite network altitude, and data/voice transmission speeds. This is then followed by capacity calcu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phase shift of the electromagnetic waves due to dry snow

    Publication Year: 2000, Page(s):150 - 153
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Based on the point matching technique, the phase shift of the electromagnetic waves due to dry snow is computed. The analysis is restricted to the forward-scattering direction from oblate spheroidal dry snow. Numerical results are obtained for two orthogonal polarizations of the incident wave. The calculations are made for various microwave frequencies, between 6 and 100 GHz, and also for differen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Navigational task-planning of distributed cooperative robotic vehicles

    Publication Year: 2000, Page(s):237 - 244
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Real time obstacle avoidance is one of the intelligent tasks for intelligent mobile robots. Mobile robots should possess the ability to act autonomously in the presence of uncertainty and to adjust their action based on sensed information. They also should be capable of accepting high level mission oriented commands, integrate several kinds of data, including task specification, able to handle inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical multi-agent motion planning in a static environment

    Publication Year: 2000, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    This hierarchical approach to motion planning has good asymptotic complexity and, when the assumptions are met, gives near-optimal solutions. We address adaptations of our heuristics (a clear method encapsulating an arbitrary set of points) to handle situations where our assumptions do not quite hold View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JavaMonte: a new programming language for Monte Carlo simulation

    Publication Year: 2000, Page(s):305 - 308
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The JavaMonte language serves as a superset to the Java language developed by Sun Microsystems. A developer can code in JavaMonte taking advantage of the features of a language targeting boundary value problems while at the same time integrating an OO language with cross-platform capabilities. The major objective in the design of JavaMonte is to simplify coding using a more powerful tool in terms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplified analysis of PWM converters operating in discontinuous conduction mode using alternate forms of the PWM switch models

    Publication Year: 2000, Page(s):505 - 509
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The discontinuous conduction mode (DCM) PWM converter is modeled as a transformer by Vorperian's PWM switch model. The recognition that any of the three transformer terminals can serve as the common terminal leads to two alternate PWM transformer models and the corresponding two alternate PWM switch models. For a given PWM DC-DC converter, one of the three PWM switch models is more “natural&... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of an ATM network using an on-off model

    Publication Year: 2000, Page(s):467 - 470
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    ATM is a connection-oriented technique that supports both connection-oriented as well as connectionless services. Analytical models in existence for ATM networks tend to be complicated due to the unpredictable and random nature of ATM traffic. This paper describes the simulation of ATM network and presents the results along with some analytical model results. The on-off model is considered in deta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies in multi-agent systems

    Publication Year: 2000, Page(s):91 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    This paper addresses the interaction of agents in a multi-agent system with their environment and with each other. The central notion is that of a strategy. We consider how this notion is handled by game theory, especially evolutionary game theory, and how some of the issues that arise are handled by deontic logic View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy BDI architecture for social agents

    Publication Year: 2000, Page(s):68 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    We present a fuzzy belief, desire and intention (BDI) architecture as a useful framework for modeling co-operative societies of artificial agents. We outline the social conditions necessary for agents to form joint intentions and joint actions. Our architecture facilitates the inference of a mutual belief by the agents of the society. We see this as critical because mutual belief is the starting p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of an autonomous robot

    Publication Year: 2000, Page(s):213 - 216
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Student participation in SoutheastCon has increased with more and more Universities entering the autonomous robot competition. Beginning students entering the competition are often bewildered on how to start or where to start. This paper guides the beginner and provides advice based on past experiences of students in the construction of an autonomous robot View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time virtual circuit management for the integrated services architecture

    Publication Year: 2000, Page(s):315 - 321
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Supporting the integrated services architecture (ISA) in an IP to asynchronous transfer mode (ATM) edge device opens up new possibilities for the management of quality of service flows over virtual circuits. This work proposes a unified model based on the four virtual circuit (VC) management models proposed by the Internet Engineering Task Force (IETF); the aggregate, homogeneous, full and limited... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise-wide computing with Java

    Publication Year: 2000, Page(s):383 - 386
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    As the first language designed from the bottom up with networking and distributed computing in mind, Java makes it easy for computers to cooperate. The explosive growth in e-commerce applications is fueling the growth of Java and Java is now in a position to deliver enterprise-wide solutions. This paper focuses on the requirements of enterprise-wide computing and how Java supports these requiremen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.