Southeastcon 2000. Proceedings of the IEEE

9-9 April 2000

Filter Results

Displaying Results 1 - 25 of 103
  • Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (492 KB)
    Freely Available from IEEE
  • Z-module reasoning and proving the commutativity of rings of exponent n/spl ges/2

    Publication Year: 2000, Page(s):322 - 325
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    We address a well-known problem in the field of automated reasoning that has been used to test the effectiveness of reasoning systems. The problem is the following: for a given integer e greater than two, if a ring R has exponent e, then must R be commutative?. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 2000, Page(s):541 - 542
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Pattern recognition techniques applied to the classification of swing curves generated in a power system transient stability study

    Publication Year: 2000, Page(s):493 - 496
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    This paper presents two approaches to determine the stability of power system based on pattern recognition techniques using artificial neural network (ANN) and linear classification. The two major states of power system operations are termed stable and unstable. The performance index can be expressed by the patterns and then be recognized by a properly trained neural network or a linear discrimina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infusing adaptability, autonomy and cooperation into an information visualisation system

    Publication Year: 2000, Page(s):282 - 288
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    Information visualization has been formalised as a continuous process of displaying information on computers. Information visualization systems used today are comprised of control and learning processes, however, they suffer from the incapability to automated job completion at the right time. Intelligent agents and multi-agent techniques have been employed to solve the real problem in which the ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies in multi-agent systems

    Publication Year: 2000, Page(s):91 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    This paper addresses the interaction of agents in a multi-agent system with their environment and with each other. The central notion is that of a strategy. We consider how this notion is handled by game theory, especially evolutionary game theory, and how some of the issues that arise are handled by deontic logic View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-based distributed network management

    Publication Year: 2000, Page(s):460 - 466
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Computer networks such as the Internet, intranets, and extranet are becoming the lifeline of business, entertainment, education and government information dissemination. The growth of networks in size, heterogeneity, functionality and the demand for its high availability require an efficient, scalable, dynamic network management model. Prevalent centralized network management has failed to meet th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance estimation techniques for power system dynamic stability using least squares, Kalman filtering and genetic algorithms

    Publication Year: 2000, Page(s):489 - 492
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    This paper presents performance comparison of three optimal estimation techniques for on-line assessment of power system dynamic stability of single-machine infinite-bus system. The stability assessment approach is based on estimating the synchronizing and damping torque coefficients of the synchronous machine using three optimum estimation techniques including least squares (LS), Kalman filtering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of portable intellectual property blocks for FPGAs

    Publication Year: 2000, Page(s):531 - 534
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    In the world of digital electronics, the use of intellectual property (IP) is becoming increasingly more popular in the design of field-programmable gate arrays (FPGAs). Reuse of IP cuts down on the time-to-market for a product and the overall cost for producing that product. Verified IP blocks can also serve as examples, which speed up the learning curve for a beginning engineer because a learn-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple computation of the coupling coefficient due to a rectangular current loop for loaded circular cavities

    Publication Year: 2000, Page(s):278 - 281
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    A simple method is described to compute the coupling coefficient due to a rectangular loop in a circular cavity that may be loaded with a dielectric resonator. The resonant frequency and the unloaded Q-factor are computed from the modal solution without the presence of the loop. An equivalent circuit is obtained for the unloaded cavity and the loop coupling is represented by a series inductance. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A genetic algorithm perspective to distributed systems design

    Publication Year: 2000, Page(s):83 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Distributed computing systems (DCSs) have the potential for high reliability. When the topology of a DCS is fixed, the DCS's reliability depends mainly on the allocation of various resources. One of the important resources to be allocated in a DCS are various files. In this paper, a genetic algorithm (GA) based file allocation and design scheme has been developed for distributed systems. In this s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The logic of action in the deontic transaction model

    Publication Year: 2000, Page(s):456 - 459
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    To secure the integrity of extended multiagent actions, we subsume them under the transaction abstraction. Traditional transaction processing systems have the four ACID properties, which make for transaction security, but exceptions are often needed in long-lived applications. Our transaction model uses deontic logic, the logic of normative reasoning, and agent communication is via speech acts, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel multidimensional dynamic super high speed communication in functional media

    Publication Year: 2000, Page(s):485 - 488
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    This paper analyzes a super high speed communication system, consisting of multidimensional white noise transmission through novel multidimensional optimal GAMMA media and reversible (unlimited and limited) receiver. It is shown that, in order to achieve variable limit speed, a chemical transmission theory is needed to unify various concepts of chaotic, propagation, optimal and differential equati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection of varistor for surge protection purposes based on their voltage-current characteristic

    Publication Year: 2000, Page(s):162 - 165
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The use of metal-oxide varistors in surge protection modules for telecommunication systems was evaluated. For this purpose, the definition of the device model and its voltage-current characteristics were defined and analyzed in detail. A high voltage impulse generator was developed to generate double exponential currents, in order to recreate the effects of indirect lightning strikes and switching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method of lines solution of axisymmetric problems

    Publication Year: 2000, Page(s):527 - 530
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The method of lines, a semianalytical procedure, has become one of the standard tools for solving practical, complex electromagnetic field problems. The method of lines is used in solving axisymmetrical problems involving Laplace's equation. One numerical example is used to verify the procedure. The results obtained compare well with an analytical solution View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A trust region-based approach to the solution of nonlinear circuits

    Publication Year: 2000, Page(s):275 - 277
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    Problem in DC nonlinear circuits and steady state solutions demonstrate slow convergence using Newton-Raphson (NR) methods. This paper presents a technique for dealing with the convergence problems that the NR methods encounter. This technique is simple and practical for finding the solution of nonlinear circuits. It is based on a trust region concept and a hyperplane as used in the predictor-corr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling societies of agents using modal logics

    Publication Year: 2000, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Presents a framework that shows how epistemic logic and deontic logic can be used to model a multi-agent system consisting of humans and non-human agents. Modeling agents with epistemic and deontic logic also captures the interdependencies between human and non-human agents. Epistemic logic addresses belief and knowledge (notably common knowledge), and, in many applications in computer science, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human-robot interaction over the Internet

    Publication Year: 2000, Page(s):223 - 228
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    Describes two Java-based Internet control mechanisms, manual control and autonomous navigation, for a mobile robot to allow users to explore the robot's environment. In the manual control, a user sends control commands to the robot over the Internet to make the robot explore its environment. In the autonomous navigation mode, the user only needs to specify the target point and the rest of the task... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of two nonlinear adaptive control strategies

    Publication Year: 2000, Page(s):449 - 455
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The performance of two adaptive controllers has been compared based on a simulation platform. The control schemes are composed of model based adaptive control and adaptive backstepping with MT-filter. Both of the adaptive controllers have been evaluated in terms of estimated parameter convergence, dynamic performance, and ability of disturbance rejection under the same nonlinear system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A priority queue based approach to service subscriber profile: queries in cellular networks

    Publication Year: 2000, Page(s):479 - 484
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    To maintain a subscriber record in a cellular network, we must look at distributed database mechanism and call processing procedures. The overall system performance can be improved by prioritizing database accesses according to the nature of the query. By selectively altering the priority of the query, we can reduce the call set up time. A prioritized access approach is presented here and the nume... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phase shift of the electromagnetic waves due to dry snow

    Publication Year: 2000, Page(s):150 - 153
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Based on the point matching technique, the phase shift of the electromagnetic waves due to dry snow is computed. The analysis is restricted to the forward-scattering direction from oblate spheroidal dry snow. Numerical results are obtained for two orthogonal polarizations of the incident wave. The calculations are made for various microwave frequencies, between 6 and 100 GHz, and also for differen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer relationship management in e-commerce: the call center solution

    Publication Year: 2000, Page(s):391 - 394
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    E-commerce is not just the transaction, it is also the customer service. The advent of interactive e-commerce has without doubt made buying and selling on the Web successful. However, it continues to lack the quality of personal contact with the customer, which is essential in building and sustaining customer relationships on the Internet. “Real-time” text communication currently used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time virtual circuit management for the integrated services architecture

    Publication Year: 2000, Page(s):315 - 321
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Supporting the integrated services architecture (ISA) in an IP to asynchronous transfer mode (ATM) edge device opens up new possibilities for the management of quality of service flows over virtual circuits. This work proposes a unified model based on the four virtual circuit (VC) management models proposed by the Internet Engineering Task Force (IETF); the aggregate, homogeneous, full and limited... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of neural network architectures for the modeling of robot inverse kinematics

    Publication Year: 2000, Page(s):44 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB)

    Describes the use of neural networks to model the inverse kinematics of robot manipulators, including a redundant manipulator The use of multiple cooperating networks for the overall modeling of inverse kinematics was explored. A variety of network architectures was used, and their performance was compared. Neural networks were also used to train robots in specified obstacle-avoidance trajectories View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of streaming audio and video for online Web based courses using MySQL database server and PHP

    Publication Year: 2000, Page(s):523 - 526
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    Next generation database systems will need to support both textual data and other types of multimedia data. These two types of data differ in their organization and management. Multimedia data comprises static media like text and images, that do not vary with time, and dynamic or continuous media like audio and video, that varies with time and requires a guaranteed transfer rate. Conventional data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.