Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283)

5-7 April 2002

Filter Results

Displaying Results 1 - 25 of 95
  • Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283)

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s):481 - 482
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Stochastic/dynamic communication in a general Euniversal link

    Publication Year: 2002, Page(s):475 - 478
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB)

    This paper compares known long and short code sequence generation techniques with the proposed arbitrary multidimensional code pattern synthesis and super high resolved code beams generation methods to obtain amplitude dependent performance function (rather than minimize SNR dependent exponential Pe). Furthermore, this paper compares spread-spectrum shaping techniques with the proposed no-sidelobe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web based interactive education and learning scheme (WBIEL)

    Publication Year: 2002, Page(s):142 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB)

    With information technology ever growing, there has been an upsurge in the higher level technical and engineering education. In addition, several companies continuously upgrade their hardware and software products and the associated engineers, programmers, and scientists need to be retrained on a regular basis. This leads to an ever growing requirement for a continuous education and learning schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel redundant binary signed-digit (RBSD) Booth's encoding

    Publication Year: 2002, Page(s):426 - 431
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    This paper presents a novel redundant binary signed-digit Booth encoding (RBBE) for a multiplier, which directly generates the RBSD partial products and allows the use of Booth encoding for radix-4 and radix-8 without the need to generate any hard multiples. As for RBBE with higher than radix-8, the number of hard multiples is significantly reduced. Moreover, negation in RBSD requires only wire cr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The importation of an ACSL-based model into VTB

    Publication Year: 2002, Page(s):471 - 474
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB)

    The VTB (Virtual Test Bed) project is dedicated to developing a new environment for simulation and virtual prototyping of power electronic systems. This paper describes an experience of the importing of an ACSL (Advanced Continuous Simulation Language) model: the all-electrical icebreaker Healy of the US Coast Guard. The goal of the project is to support the multi-language capabilities of the VTB ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet collaboration: TWiki

    Publication Year: 2002, Page(s):137 - 141
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    This research paper covers TWiki, a Wiki clone, as a collaboration tool for the development of educational papers and technical projects. The need to conduct business and research in a collaborative manner will increase as a result of the downturn of the economy and a desire to reduce travel due to the events on September 11, 2001. The time has come to use Internet mechanisms to supplement face-to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving the Lorentz force equation from Maxwell's equations

    Publication Year: 2002, Page(s):422 - 425
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB)

    A derivation of the Lorentz force equation is presented here based on one of Maxwell's equations, Faraday's law. The presentation is intended to be understandable by those who have not recently studied electromagnetism View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advancing technology in wireless communications

    Publication Year: 2002, Page(s):468 - 470
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    This paper presents information on the recent advances of practical wireless networks for voice, data, image and video services in areas as small as an office and as large as the entire planet. This paper also addresses the potential economic and sociological impacts of mobile communications. We also discuss the next generation of cellular telephones, computer networks and pagers being developed t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges educators face in delivering computer instructions in "equipped" educational institutions in Jamaica

    Publication Year: 2002, Page(s):131 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB)

    The challenges teachers face in delivering computer instructions in equipped educational institutions in Jamaica are wide and varying. These range from micro individual student problems to macro problems that relate to policy issues for computer related aspects of the curriculum in schools. The usual barrier of not having appropriate facilities and equipment was removed in a number of institutions... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a robot power supply system

    Publication Year: 2002, Page(s):418 - 421
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB)

    Mobile robots often rely on a battery system as their main source of power. These systems typically produce a single voltage level, yet the robot subsystems may require a variety of voltage levels. Thus, a robot power supply must be designed to provide the subsystems with all of the necessary voltage and power demands. Student design work has progressed on a multifunctional robot project at Elizab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advantages of slowed electromagnetic waves

    Publication Year: 2002, Page(s):375 - 380
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB)

    The features of slowed electromagnetic waves and their advantages are considered. Examples of new methods and devices combining the advantages of relatively high and relatively low frequency bands are shown. Concentration of an electromagnetic field caused by wave deceleration leads to a significant increase in parameters of processes and devices based on slowed wave application. It is shown that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accessing devices using a Web service

    Publication Year: 2002, Page(s):463 - 467
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB)

    The time when embedded devices and factory-floor machines had only minimal interaction with humans is gone. Today, the ability to access a device from anywhere is expected. This is a significant challenge when we are heavily constrained by hardware size and costs. However, with commonly available software components and a little knowledge, we can incorporate a "universal" access interface for data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation and analysis of different traffic models for ATM networks

    Publication Year: 2002, Page(s):73 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB)

    In the past few years both conventional and unconventional traffic models have been proposed as accurate models for traffic transported by asynchronous transfer mode (ATM) networks. More especially, most of these models have attempted to capture the fractal stochastic processes of real-traffic such as the long-range dependence, slowly decaying variance, power law spectral density and the Hurst eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence theory for multi-input discrete-time iterative learning control with Coulomb friction, continuous outputs, and input bounds

    Publication Year: 2002, Page(s):287 - 293
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB)

    We consider the problem of discrete-time iterative learning control (ILC) for position trajectory tracking of multiple-input, multiple-output systems with Coulomb friction, bounds on the inputs, and equal static and sliding coefficients of friction. Only position measurements are assumed available. No velocity measurements are assumed available. We present an ILC controller and a proof of converge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real time DSP-based ringing detection and advanced warning system

    Publication Year: 2002, Page(s):391 - 395
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB)

    This paper focuses on the development of a real-time DSP-based system that will assist a patient that suffers from epileptic attacks that are specifically triggered by seizure inducing (SI) stimuli consisting of loud and sudden sounds from telephone ringing and pagers. It has been observed, however, that if the patient is forewarned of the impending occurrence of these sounds he is able to prepare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data encryption performance and evaluation schemes

    Publication Year: 2002, Page(s):234 - 238
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB)

    With the explosion in Internet-based electronic commerce, there is an increasing need to secure data and commercial transactions. While there are several encryption methodologies, such as the DES (Data Encryption Standard) and the RSA (Rivest, Shamir, Adleman) algorithm, there is a continuous need to develop other algorithms, especially taking into consideration the recent advances in hardware and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test results for the development of a novel region-based DOCSIS compliant cable plant system and protocol to optimally reduce contention mini-slot collisions and to support QoS on DOCSIS 1.1/1.2 networks

    Publication Year: 2002, Page(s):166 - 170
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB)

    Current Data-Over-Cable Service Interface Specification (DOCSIS) standards require meeting QoS objectives to enhance the multiple and fast service environment. We present results and a technique that achieves record reduction in contention mini-slot (CMS) collisions by means of dividing the stations in the network efficiently. A primary goal of the design is to keep the entire protocol at the head... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formulation of a computational model for determining the magnetic field produced by an in-service underground pipe-type cable

    Publication Year: 2002, Page(s):99 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB)

    A computational model for determining the magnetic field produced by a practical in-service underground pipe-type cable is formulated. In the formulation, the contribution from the circulating current in the steel pipe is taken into account. The first step of the formulation is to derive a set of integro-differential equations for the magnetic vector potentials and the source current densities, fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing network laboratory costs: demonstrating connectivity with ping reflectors

    Publication Year: 2002, Page(s):127 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A major problem faced in constructing a teaching laboratory for data networking is the cost of the equipment. Multiple pieces of equipment are often needed to do little more than demonstrate connectivity. This paper describes approaches to configuring computers in a TCP/IP network that meet this need at a lower cost. Particular emphasis is placed on techniques that can be used with remote access l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural network approach to system performance analysis

    Publication Year: 2002, Page(s):349 - 354
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB)

    Neural networks are used in a wide variety of situations to solve complex problems. Some of the categories for which neural networks are used include: prediction software, classification algorithms, data association environments, data conceptualization environments, and data filtering problems. This work described in this paper implements a neural network that spans both the prediction and data as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database programming using Java

    Publication Year: 2002, Page(s):220 - 225
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB)

    Focuses on database programming using Java. Java provides a very good approach to working with different database. A discussion is provided about database programming using Java for the Microsoft Access DBMS. Some concepts are reviewed along the way, like relational databases, components of databases, Open Database Connectivity (ODBC) data sources, the Java SQL package and methods. The Java progra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of software for mobile robot control over a radio frequency communications link

    Publication Year: 2002, Page(s):414 - 417
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    In the spring of 2001, work began on a mobile robot for an advanced computer engineering class. One of the key parts to the success of this robot would be the ability to control it from a computer terminal. In order to make this feasible, the computer would communicate to the robot through a wireless connection. The robot's on-board computer would perform any computations needed, so the robot woul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and design of a dual-band folded microstrip patch antenna for handheld device applications

    Publication Year: 2002, Page(s):255 - 258
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB)

    A wideband folded microstrip patch antenna is introduced for possible wireless local area network (WLAN) application in the 3.5-4 GHz frequency range. The antenna is integrated within the housing of a personal digital assistant (PDA), such as a PALM organizer. The total size of the antenna is 60 by 13 by 4 mm. The proposed antenna operates in a wide frequency band by utilizing a unique coupling me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integratable robot simulation tools

    Publication Year: 2002, Page(s):370 - 374
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB)

    A new graphical simulation package, which is capable of interoperability with other extensive programs, is proposed. A built-in LISP interpreter based on COMMON LISP allows a user to model and manipulate the robot while the result is displayed on a 3D graphical display. Other programming languages that are compatible with the component object model interface can also be applied to the modeling and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.