By Topic

Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)

1-1 April 2001

Filter Results

Displaying Results 1 - 25 of 52
  • Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (330 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2001, Page(s):276 - 277
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Adaptive wireless communication signaling algorithms for differential amplitude phase shift keying in fading channels

    Publication Year: 2001, Page(s):118 - 122
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The adaptation of a modulation scheme to changing channel conditions can provide improved average data rates over non-adaptive signaling. In this paper, an algorithm is presented for changing the modulation scheme based on the filter outputs used for demodulation. The number of transmitted bits per symbol is adjusted as a function of the filter outputs. Performance results show that the adaptive s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed security schemes for networks

    Publication Year: 2001, Page(s):114 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    This paper presents the design of a hardware based security processor module, for network-connected systems. The security processor is implemented based on data encryption standard (DES) using very high speed integrated circuit hardware description language (VHDL), the code is then targeted to a programmable logic device (PLD). The design techniques presented in this paper, present a product that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech annunciation from highway surface grooves

    Publication Year: 2001, Page(s):239 - 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    Grooves are embedded in the pavement along the shoulders of many interstate highways in the United States to alert straying drivers with a rumbling sound. Using specially encoded grooves, speech can be annunciated instead. A groove pattern was devised that resembles a recorded phrase of human speech. The original recording was filtered to remove high frequency noise and then dynamically compressed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel conversion scheme from a redundant binary number to two's complement binary number for parallel architectures

    Publication Year: 2001, Page(s):196 - 201
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    This paper introduces a novel direct conversion method to convert a redundant binary number to two's complement number. The method is based on the rules developed in this paper and is used to remove carry propagation during conversion. Therefore, the conversion process is truly parallel and the latency is fixed to 1 digit conversion time regardless of the word size. This converter receives one red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive network modeling scheme

    Publication Year: 2001, Page(s):109 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    As the network based economy has entered new dimension, there is more need than ever for network performance modeling and optimization. These things will help the proper routing and protection of data elements traversing the networks. Currently, network service providers (NSPs) use TCP/IP (Transmission Control Protocol/Internet Protocol) extensively. The NSPs focus the delivery of hybrid services ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and analyzing the vocal tract under normal and stressful talking conditions

    Publication Year: 2001, Page(s):213 - 220
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    In this research, we model and analyze the vocal tract under normal and stressful talking conditions. This research answers the question of the degradation in the recognition performance of text-dependent speaker identification under stressful talking conditions. This research can be used (for future research) to improve the recognition performance under stressful talking conditions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel data compression techniques for transmission of audio over networks

    Publication Year: 2001, Page(s):234 - 238
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    In multimedia transmissions and activities, often more emphasis is placed on image and video, when compared to audio data. This is due to the fact that images and real-time video consume a lot more bandwidth than audio. However, with the advent of multimedia presentations on the network, and computer based multimedia instructions, there are several audio frames that need to be transmitted for a si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-input square iterative learning control with bounded inputs

    Publication Year: 2001, Page(s):62 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Presents a very simple modification of the iterative learning control algorithm of Arimoto et al. (1984)] to the case where the inputs are bounded. The Jacobian condition presented in Avrachenkov (1998) is specified instead of the usual condition specified by Arimoto et al. In particular, the former is a condition for monotonicity in the distance to the solution instead of monotonicity in the outp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying absorbing Markov chains to solve Poisson's equation in inhomogeneous regions

    Publication Year: 2001, Page(s):166 - 168
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Monte Carlo methods are generally known for solving field problems one point at a time unlike other numerical methods such as the finite difference and finite element methods which provide simultaneously the solution at all of the grid nodes. This work presents an absorbing Markov chain method to solve Poisson's equation with Dirichlet boundary conditions for intractable inhomogeneous problems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of four parameter selection techniques [force sensors]

    Publication Year: 2001, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    The objective of this research was to find the best combination of nine temperature sensors to model the output from a force sensor caused by temperature variations. The technical approach was to monitor the force sensor output under a variety of temperature gradient conditions but with no other external inputs. From this data, an empirical formulation could be made of the best combination of sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient division in the binary representation of complex numbers

    Publication Year: 2001, Page(s):188 - 195
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Computer operations involving complex numbers, essential in such applications as digital signal processing and image processing, are usually performed in a “divide-and-conquer” approach dealing separately with the real and imaginary parts and then accumulating the results. There have been several proposals to treat complex numbers as a single unit but all seem to have floundered on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time anomaly detection using soft-computing techniques

    Publication Year: 2001, Page(s):105 - 108
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    This body of work sheds light on the current problems related to network security and applies intelligent tools to some of these problems. While the use of intelligent tools in network security is new, the few papers that have been published offer promising results. Of particular interest is the application of neural networks, fuzzy logic, and evolutionary computation to network security problems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System combination for improved automatic generation of N-best proper nouns pronunciation

    Publication Year: 2001, Page(s):208 - 212
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    Proper nouns present a challenging problem for current speech recognition technology since they often do not follow typical letter-to-sound conversion rules. Several different automated methods, Boltzmann machines, decision trees, and recurrent neural networks have been attempted in the literature, yet no single system has achieved an acceptable error rate. Since the project goal is the generation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling speech-interfering noise with applied chaos theory

    Publication Year: 2001, Page(s):229 - 233
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    One of the primary difficulties involved with speech recognition is dealing with sounds other than speech that may occur while a person is speaking. There have been many techniques that attempt to deal with background “noise.” Many of these make use of some type of stochastic model to decrease the effect of the interfering signal. This paper, however, investigates the possibility of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol for an optical WDM LAN

    Publication Year: 2001, Page(s):55 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    The Intelligent Hub Protocol (IHP) is introduced for use in packet switched optical LANs using a star topology. The essential element in this network is an intelligent hub, which controls the traffic flow and which provides controls for adding and removing new stations from the network. The hub provides for a network that is scalable, easy to administer and manage, and reduces the complexity of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jitter analysis and simulation of constant bit rate ATM multiplexers

    Publication Year: 2001, Page(s):44 - 48
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    ATM is a standard transport mechanism to integrate various services such as data, voice, image and video in a single network. Constant bit rate (CBR) and variable bit rate (VBR) are the major sources in ATM networks. Such sources may have stringent delay and loss requirements. Clearly, if the network is not properly designed, dimensioned, and controlled, extensive cell delay and cell delay variati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic multiobjective optimization of war resource allocation using adaptive genetic algorithms

    Publication Year: 2001, Page(s):160 - 165
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Genetic algorithms (GA) are often well suited for multiobjective optimization problems. The major objective of this research is to optimize the war resource allocations of sorties, for a given war scenario, using genetic algorithms. The war is simulated using THUNDER software. THUNDER software is a stochastic, two-sided, analytical simulation of campaign-level military operations. The simulation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalar network analyzer based on detector-log amplifier RFIC chips

    Publication Year: 2001, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    The objective of this paper is to present the design, development, and implementation of a low-cost, compact, and moderately accurate Scalar Network Analyzer (SNA) using two radio frequency integrated circuit (RFIC) detector-logarithmic (or detector-log) and limiting IF (intermediate frequency) amplifier chips. The AD8309 is one such advanced detector-log and limiting amplifier RFIC chip that is u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coupled magnetoelastic finite element formulation of anisotropic magnetostatic problems

    Publication Year: 2001, Page(s):183 - 187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    This paper presents a generalized 2-D tensor finite element model, which can be used to evaluate force components in electromagnetic devices including those due to the magnetostrictive phenomenon. Magnetostriction is a property of ferrous alloys in which the material will exhibit strain in the presence of a magnetic field. This strain is in addition to any other strains that might exist as a resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting anomalous behavior: optimization of network traffic parameters via an evolution strategy

    Publication Year: 2001, Page(s):34 - 39
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former refers to the detection of abnormal behavior in the use of network services and computing resources. Misuse detection, on the other hand, relies on the identification of “well defined patterns of attack that exploit” vulnerabilities in network and computer software. Most of the commercial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques in least-intrusive computer system performance monitoring

    Publication Year: 2001, Page(s):150 - 154
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    The paper discusses four techniques for computer system performance monitoring, and then compares the experimental data to show their relative intrusiveness. However, while other techniques are well known and understood and can be implemented relatively easily, the technique using a built-in performance counter is deemed difficult because of ambiguous proprietary information. To this end, the pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet enterprise engineering. A “zero-time” framework based on “T-strategy”

    Publication Year: 2001, Page(s):263 - 270
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    The Electronic Enterprise Engineering (EEE) is the collective best practices for the technology-driven architecting of enterprises to directly achieve enterprise objectives (M. Tanik; P. Ng; R. T. Yeh, 1998). Two important aspects of engineering enterprises are the time-to-market and the positioning of the enterprise in the market based on its core competency (R. T. Yeh; K. Pearlson; G. Kozmetsky,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad hoc network management with C2 data models

    Publication Year: 2001, Page(s):100 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    Military networks, particularly at tactical echelons, are bandwidth limited and are subject to reconfiguration at little or no notice. The US Army Research Laboratory (ARL) has been applying the concept of Default Operational Organizations (DOO) and Universal Surrogate Keys (USKs) to this military environment in order to develop a data model capable of supporting both military planning and technic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.