Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)

1-1 April 2001

Filter Results

Displaying Results 1 - 25 of 52
  • Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)

    Publication Year: 2001
    Request permission for commercial reuse | |PDF file iconPDF (330 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2001, Page(s):276 - 277
    Request permission for commercial reuse | |PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • System combination for improved automatic generation of N-best proper nouns pronunciation

    Publication Year: 2001, Page(s):208 - 212
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (388 KB) | HTML iconHTML

    Proper nouns present a challenging problem for current speech recognition technology since they often do not follow typical letter-to-sound conversion rules. Several different automated methods, Boltzmann machines, decision trees, and recurrent neural networks have been attempted in the literature, yet no single system has achieved an acceptable error rate. Since the project goal is the generation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cognitive engineering approach to portal management

    Publication Year: 2001, Page(s):93 - 95
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (224 KB) | HTML iconHTML

    Within a basic cognitive engineering context, a systematic approach to threat assessment and security requirements in a client-server environment is presented. The platform discussed is portals, i.e., Internet stations, where various transactions are taking place. This approach facilitates structured elicitation of multiple-level security requirements, identification of operational knowledge, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel data compression techniques for transmission of audio over networks

    Publication Year: 2001, Page(s):234 - 238
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (740 KB) | HTML iconHTML

    In multimedia transmissions and activities, often more emphasis is placed on image and video, when compared to audio data. This is due to the fact that images and real-time video consume a lot more bandwidth than audio. However, with the advent of multimedia presentations on the network, and computer based multimedia instructions, there are several audio frames that need to be transmitted for a si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel series approximation scheme for a fast floating point divider

    Publication Year: 2001, Page(s):202 - 207
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (384 KB) | HTML iconHTML

    This paper introduces a high-speed hybrid floating-point division method which uses an accurate piecewise linear approximation and parallel power-series iteration. The division process starts by getting an initial reciprocal approximation of the divisor from a reciprocal unit and calculating the quotient by successive iterations. To speed up the division process, the dividend is partitioned into t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Swing-free transport using variable structure model reference control

    Publication Year: 2001, Page(s):85 - 92
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (384 KB) | HTML iconHTML

    A variable structure model following control system design is proposed to reduce the vibrational motion of a suspended object transported by an overhead crane. The plant and the input matrices of the system are uncertain. The only information available about the uncertain parameters is the bounding sets in which they lie. A variable structure control law is developed to force the states of the unc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling speech-interfering noise with applied chaos theory

    Publication Year: 2001, Page(s):229 - 233
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB) | HTML iconHTML

    One of the primary difficulties involved with speech recognition is dealing with sounds other than speech that may occur while a person is speaking. There have been many techniques that attempt to deal with background “noise.” Many of these make use of some type of stochastic model to decrease the effect of the interfering signal. This paper, however, investigates the possibility of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel conversion scheme from a redundant binary number to two's complement binary number for parallel architectures

    Publication Year: 2001, Page(s):196 - 201
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (352 KB) | HTML iconHTML

    This paper introduces a novel direct conversion method to convert a redundant binary number to two's complement number. The method is based on the rules developed in this paper and is used to remove carry propagation during conversion. Therefore, the conversion process is truly parallel and the latency is fixed to 1 digit conversion time regardless of the word size. This converter receives one red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed security schemes for networks

    Publication Year: 2001, Page(s):114 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (304 KB) | HTML iconHTML

    This paper presents the design of a hardware based security processor module, for network-connected systems. The security processor is implemented based on data encryption standard (DES) using very high speed integrated circuit hardware description language (VHDL), the code is then targeted to a programmable logic device (PLD). The design techniques presented in this paper, present a product that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical prediction of magnetostrictive behavior in non-oriented electrical steel sheets

    Publication Year: 2001, Page(s):179 - 182
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (216 KB) | HTML iconHTML

    Due to the lack of experimental data of the magnetostrictive phenomenon in electrical steels (used in the manufacturing of electrical machines and transformers), an analytical model is proposed here. This analytical model creates directly the magnetostriction curve λ(H). The data generated by this analytical model can be used in implementing numerical models requiring such data such as coup... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A noninverting buck-boost converter with reduced components using a microcontroller

    Publication Year: 2001, Page(s):79 - 84
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (320 KB) | HTML iconHTML

    This paper presents a simple method for the microcontroller implementation of a noninverting buck-boost converter. The converter requires two switches, but only one set of controls. As compared to a cascaded buck converter/boost converter topology, the noninverting buck-boost converter requires one less capacitor and inductor. The system operates as a buck converter for duty cycles between 0-50% i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of four parameter selection techniques [force sensors]

    Publication Year: 2001, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (656 KB) | HTML iconHTML

    The objective of this research was to find the best combination of nine temperature sensors to model the output from a force sensor caused by temperature variations. The technical approach was to monitor the force sensor output under a variety of temperature gradient conditions but with no other external inputs. From this data, an empirical formulation could be made of the best combination of sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodology for synthesis, testing, and verification of pipelined architecture processors from behavioral-level-only HDL code and a case study example

    Publication Year: 2001, Page(s):143 - 149
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (500 KB) | HTML iconHTML

    A goal of computer designers is to reduce the development cycle time for complex pipelined architecture core processor systems. A research effort is described which had a major objective of determining if an approach and methodology could be developed which will allow complex pipelined architecture processors with stringent system functional, timing, and performance requirements to be correctly an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Independent information from visual features for multimodal speech recognition

    Publication Year: 2001, Page(s):221 - 228
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB) | HTML iconHTML

    The performance of audio-based speech recognition systems degrades severely when there is a mismatch between training and usage environments due to background noise. This degradation is due to a loss of ability to extract and distinguish important information from audio features. One of the emerging techniques for dealing with this problem is the addition of visual features in a multimodal recogni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad hoc network management with C2 data models

    Publication Year: 2001, Page(s):100 - 104
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (444 KB) | HTML iconHTML

    Military networks, particularly at tactical echelons, are bandwidth limited and are subject to reconfiguration at little or no notice. The US Army Research Laboratory (ARL) has been applying the concept of Default Operational Organizations (DOO) and Universal Surrogate Keys (USKs) to this military environment in order to develop a data model capable of supporting both military planning and technic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient division in the binary representation of complex numbers

    Publication Year: 2001, Page(s):188 - 195
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (488 KB) | HTML iconHTML

    Computer operations involving complex numbers, essential in such applications as digital signal processing and image processing, are usually performed in a “divide-and-conquer” approach dealing separately with the real and imaginary parts and then accumulating the results. There have been several proposals to treat complex numbers as a single unit but all seem to have floundered on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive network modeling scheme

    Publication Year: 2001, Page(s):109 - 113
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (448 KB) | HTML iconHTML

    As the network based economy has entered new dimension, there is more need than ever for network performance modeling and optimization. These things will help the proper routing and protection of data elements traversing the networks. Currently, network service providers (NSPs) use TCP/IP (Transmission Control Protocol/Internet Protocol) extensively. The NSPs focus the delivery of hybrid services ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable subband audio coding scheme for ATM environments

    Publication Year: 2001, Page(s):271 - 275
    Cited by:  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (412 KB) | HTML iconHTML

    A scalable audio coder is proposed for maintaining uninterrupted service in dynamically changing ATM network environments. Performance requirements include seamless switching between bit rates, which would gracefully vary the perceived signal quality. The encoder is similar to the MPEG-1 Layer 3 (MP3) standard but differs significantly in that the MDCT coefficients are quantized in a layered manne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open-loop motor speed control with LabView

    Publication Year: 2001, Page(s):259 - 262
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (244 KB) | HTML iconHTML

    An open-loop DC motor speed control system is developed using National Instrument's Data Acquisition (DAQ) Board (Model 6040E) and LabVIEW software package. A pulse width modulation (PWM) technique is employed to control motor speed. A VI (virtual instrument) is developed with LabVIEW that allows the DAQ to read a user selected reference voltage continuously. The VI also generates a suitable trian... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurate FDTD simulation of biological tissues for bioelectromagnetic applications

    Publication Year: 2001, Page(s):174 - 178
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (332 KB) | HTML iconHTML

    For practical bio-electromagnetic applications, such as the interaction of electromagnetic fields with the human head and body, accurate simulation of biological tissues is a key factor for reliable results. The characteristics of biological tissues are frequency dependent and thus called dispersive materials. For accurate FDTD simulation of biological tissues, a numerical technique is proposed to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The application of a current-dependent arc model to arcing at a main distribution panel, a sub-panel and a branch circuit

    Publication Year: 2001, Page(s):72 - 78
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (496 KB) | HTML iconHTML

    An arcing fault is a dangerous and unpredictable form of short circuit. Higher arcing-fault current magnitudes are often associated with greater levels of danger. Higher arc currents certainly correlate with greater potential arc-flash hazards and explosions. Within a building system, the largest arcing-fault current is available at the main distribution panel. Since an arcing fault at a sub-panel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of Internet and Web based tele training methodologies

    Publication Year: 2001, Page(s):249 - 253
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (268 KB) | HTML iconHTML

    The majority of educational institutions and industrial organizations are using online methodologies for inter communications and information transfers. In the modern and technology driven global environment, it has become very important for professionals to continuously retrain themselves in new breakthroughs and technical advancements. In the present times, there is an explosion of multimedia tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalar network analyzer based on detector-log amplifier RFIC chips

    Publication Year: 2001, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (164 KB) | HTML iconHTML

    The objective of this paper is to present the design, development, and implementation of a low-cost, compact, and moderately accurate Scalar Network Analyzer (SNA) using two radio frequency integrated circuit (RFIC) detector-logarithmic (or detector-log) and limiting IF (intermediate frequency) amplifier chips. The AD8309 is one such advanced detector-log and limiting amplifier RFIC chip that is u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendations on a new cellular encryption standard using elliptic curve cryptography

    Publication Year: 2001, Page(s):136 - 142
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (652 KB) | HTML iconHTML

    The explosion in wireless information technology has changed the way we live and work. However, the possibilities for improvement and expansion of these wireless services are immense. The planning of future wireless architectures has already begun and some of the pitfalls identified. This paper presents the security concerns in a novel implementation of a future (fourth and fifth generation) wirel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.