Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342924
O. Mohammed, N. Abed, Shuo Liu
This paper investigates the harmonic behavior of three phase power transformer under non linear load condition. The terminal behavior of the transformer was obtained by coupling the transformer transient FE model and external electric circuits. Such a technique would allow the physical representation of the nonlinear magnetization behavior of the transformer as well as the strong frequency dependence of the transformer parameters. The harmonic behavior of the transformer currents and the dc load current were analyzed using discrete wavelet transform (DWT).The results of applying the DWT are discussed.
{"title":"Characterization of transformer harmonic behavior using finite element analysis and discrete wavelet transforms","authors":"O. Mohammed, N. Abed, Shuo Liu","doi":"10.1109/SECON.2007.342924","DOIUrl":"https://doi.org/10.1109/SECON.2007.342924","url":null,"abstract":"This paper investigates the harmonic behavior of three phase power transformer under non linear load condition. The terminal behavior of the transformer was obtained by coupling the transformer transient FE model and external electric circuits. Such a technique would allow the physical representation of the nonlinear magnetization behavior of the transformer as well as the strong frequency dependence of the transformer parameters. The harmonic behavior of the transformer currents and the dc load current were analyzed using discrete wavelet transform (DWT).The results of applying the DWT are discussed.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132310385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342982
H. ElAarag, C. Hogg
This paper presents a new end-to-end transport protocol designed to enhance the performance of Internet friendly multimedia applications transmitted over a wireless network. This protocol is an enhancement of Internet friendly transport protocol (IFTP) that we designed to alleviate the TCP-friendly problem. Similar to IFTP, the proposed protocol is designed to avoid congestion, as indicated by either retransmission timer expiration or the receipt of multiple duplicate ACKs, by reducing the transmission flow. However, due to the relatively high bit error rate of most wireless mediums, packet drops are often not the result of network congestion. Hence, they result in unnecessary reduction of throughput. The proposed protocol differentiates between packet loss due to congestion and wireless errors and so maintains higher throughput in such environments. In addition, it still maintains its fairness and TCP-friendliness properties.
{"title":"Enhancement of IFTP for transmission over wireless access networks","authors":"H. ElAarag, C. Hogg","doi":"10.1109/SECON.2007.342982","DOIUrl":"https://doi.org/10.1109/SECON.2007.342982","url":null,"abstract":"This paper presents a new end-to-end transport protocol designed to enhance the performance of Internet friendly multimedia applications transmitted over a wireless network. This protocol is an enhancement of Internet friendly transport protocol (IFTP) that we designed to alleviate the TCP-friendly problem. Similar to IFTP, the proposed protocol is designed to avoid congestion, as indicated by either retransmission timer expiration or the receipt of multiple duplicate ACKs, by reducing the transmission flow. However, due to the relatively high bit error rate of most wireless mediums, packet drops are often not the result of network congestion. Hence, they result in unnecessary reduction of throughput. The proposed protocol differentiates between packet loss due to congestion and wireless errors and so maintains higher throughput in such environments. In addition, it still maintains its fairness and TCP-friendliness properties.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"255 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342928
Gyutae Kim, M. Ahad, M. Ferdjallah, G. Harris
The root mean square (RMS), the average rectified value (ARV), and the mean frequency (MNF) are indices of muscle fatigue. In this paper, the relationship between the muscle fatigue and these metrics was examined. The correlation among the muscle fatigue indices was also considered by plotting the normalized metrics of surface versus intramuscular EMG. The EMG data was divided into equal segments, and the metrics were calculated in each segment. The calculated metrics were plotted in time domain, and linear regression analysis was performed to find the tendencies and relationships between surface and intramuscular metrics. As the muscle fatigue progressed, the slope of RMS and ARV increased, while that of MNF deceased. For the normalized RMS, ARV, and MNF, the surface versus intramuscular EMG was plotted, and their correlations were examined. Compared with normalized RMS and AR Vplots, the normalized MNF showed a slower change-rate.
{"title":"Correlation of muscle fatigue indices between intramuscular and surface EMG signals","authors":"Gyutae Kim, M. Ahad, M. Ferdjallah, G. Harris","doi":"10.1109/SECON.2007.342928","DOIUrl":"https://doi.org/10.1109/SECON.2007.342928","url":null,"abstract":"The root mean square (RMS), the average rectified value (ARV), and the mean frequency (MNF) are indices of muscle fatigue. In this paper, the relationship between the muscle fatigue and these metrics was examined. The correlation among the muscle fatigue indices was also considered by plotting the normalized metrics of surface versus intramuscular EMG. The EMG data was divided into equal segments, and the metrics were calculated in each segment. The calculated metrics were plotted in time domain, and linear regression analysis was performed to find the tendencies and relationships between surface and intramuscular metrics. As the muscle fatigue progressed, the slope of RMS and ARV increased, while that of MNF deceased. For the normalized RMS, ARV, and MNF, the surface versus intramuscular EMG was plotted, and their correlations were examined. Compared with normalized RMS and AR Vplots, the normalized MNF showed a slower change-rate.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342879
S. Wanta, W. Rankin
Most HBCU institutions have had difficulties developing and sustaining independent programs in research. Thus, there is a paucity of underrepresented minority scientists who are pursuing successful research careers. Despite various initiatives, progress in realizing a significant increase in the number of underrepresented minority scientists who are competitive for significant national research grants has been slow. Major research centers and educational institutions are geographically dispersed organizations with well-organized programs for training scientists. These are organized units supported by the national funding agencies that conduct research; sponsor research training in the basic, clinical, and population sciences; provide information services; and develop and sustains educational and outreach programs that benefit surrounding communities. Yet, in general, the progress of these organizations in focusing on research issues of particular importance to minorities, in training underrepresented minority scientists, in reaching out to and partnering with different racial and ethnic minority populations in their communities, and in bringing the benefits of research to these populations has been slow and often disappointing. To bring the two entities together, this project was aimed at conducting a pilot study of and planning for a state-of-the-art teleconferencing network environment to fulfill research and educational involvement, integration, and interaction needs of the university community. This allows HBCU faculty to collaborate with other research and educational institutions in all fields more effectively.
{"title":"Establishment of global multinode teleconferencing environment infrastructure for research and education","authors":"S. Wanta, W. Rankin","doi":"10.1109/SECON.2007.342879","DOIUrl":"https://doi.org/10.1109/SECON.2007.342879","url":null,"abstract":"Most HBCU institutions have had difficulties developing and sustaining independent programs in research. Thus, there is a paucity of underrepresented minority scientists who are pursuing successful research careers. Despite various initiatives, progress in realizing a significant increase in the number of underrepresented minority scientists who are competitive for significant national research grants has been slow. Major research centers and educational institutions are geographically dispersed organizations with well-organized programs for training scientists. These are organized units supported by the national funding agencies that conduct research; sponsor research training in the basic, clinical, and population sciences; provide information services; and develop and sustains educational and outreach programs that benefit surrounding communities. Yet, in general, the progress of these organizations in focusing on research issues of particular importance to minorities, in training underrepresented minority scientists, in reaching out to and partnering with different racial and ethnic minority populations in their communities, and in bringing the benefits of research to these populations has been slow and often disappointing. To bring the two entities together, this project was aimed at conducting a pilot study of and planning for a state-of-the-art teleconferencing network environment to fulfill research and educational involvement, integration, and interaction needs of the university community. This allows HBCU faculty to collaborate with other research and educational institutions in all fields more effectively.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342850
S.S. Yang, Y. Kim, Hongsik Choi
We studied the possibility of using wireless sensor networks for vehicle identification. It is interesting because it is not only challenging but also practical. It is challenging to develop algorithms and/or protocols for sensor nodes to execute since each sensor node has limited computation and communication capabilities, and these limitations prohibit the use of algorithms and/or protocols developed for conventional computer and networks. It is practical since each sensor is dispensable and easily deployable, yet it can do meaningful works when it is collaborated as a networked cluster. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is two fold. First, we develop a simple vehicle sound identification algorithm enough to be implemented on capacity limited sensor nodes. Second, we propose architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Our preliminary results show the proposed architecture and protocols are promising.
{"title":"Vehicle identification using wireless sensor networks","authors":"S.S. Yang, Y. Kim, Hongsik Choi","doi":"10.1109/SECON.2007.342850","DOIUrl":"https://doi.org/10.1109/SECON.2007.342850","url":null,"abstract":"We studied the possibility of using wireless sensor networks for vehicle identification. It is interesting because it is not only challenging but also practical. It is challenging to develop algorithms and/or protocols for sensor nodes to execute since each sensor node has limited computation and communication capabilities, and these limitations prohibit the use of algorithms and/or protocols developed for conventional computer and networks. It is practical since each sensor is dispensable and easily deployable, yet it can do meaningful works when it is collaborated as a networked cluster. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is two fold. First, we develop a simple vehicle sound identification algorithm enough to be implemented on capacity limited sensor nodes. Second, we propose architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Our preliminary results show the proposed architecture and protocols are promising.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134403695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342846
D. Mishra, M. Chandwani
In this paper, we propose a cryptographic solution for secure multi-party computation (SMC). SMC is also called secure function evaluation, which is extensively studied in classical cryptography. SMC protocol allows n participants p1...pn to compute an n-input data through trusted third party (TTP) without revealing the information of the parties. All the parties may perform secure communication with TTP for computation. During the computation, TTP may undesirably extract data of all the parties for misuse. It may be risky if the data is sent out.
{"title":"Arithmetic cryptography protocol for secure multi-party computation","authors":"D. Mishra, M. Chandwani","doi":"10.1109/SECON.2007.342846","DOIUrl":"https://doi.org/10.1109/SECON.2007.342846","url":null,"abstract":"In this paper, we propose a cryptographic solution for secure multi-party computation (SMC). SMC is also called secure function evaluation, which is extensively studied in classical cryptography. SMC protocol allows n participants p1...pn to compute an n-input data through trusted third party (TTP) without revealing the information of the parties. All the parties may perform secure communication with TTP for computation. During the computation, TTP may undesirably extract data of all the parties for misuse. It may be risky if the data is sent out.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133330168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342980
M. Ozdem, Y. M. Erten
In this study we tested the average delay and packet loss performance of access networks under variable bit rate (VBR) video traffic. We used ns-2 simulator to perform the simulations, and actual as well as synthetically generated ON/OFF sources with ON and OFF times taken from exponential or Pareto distributions are used as inputs to the simulated networks. To make sure that the synthetic sources have VBR-video like characteristics we chose the parameters of these sources such that their Hurst parameter is as close to 1 as possible. We then tested the performance of a network when data produced by these sources is applied as input. The results show that both actual and synthetic sources produce similar results and that the access networks should have at least 1 Mbps speeds to support acceptable quality video transmission.
{"title":"Performance of distribution networks under VBR video traffic","authors":"M. Ozdem, Y. M. Erten","doi":"10.1109/SECON.2007.342980","DOIUrl":"https://doi.org/10.1109/SECON.2007.342980","url":null,"abstract":"In this study we tested the average delay and packet loss performance of access networks under variable bit rate (VBR) video traffic. We used ns-2 simulator to perform the simulations, and actual as well as synthetically generated ON/OFF sources with ON and OFF times taken from exponential or Pareto distributions are used as inputs to the simulated networks. To make sure that the synthetic sources have VBR-video like characteristics we chose the parameters of these sources such that their Hurst parameter is as close to 1 as possible. We then tested the performance of a network when data produced by these sources is applied as input. The results show that both actual and synthetic sources produce similar results and that the access networks should have at least 1 Mbps speeds to support acceptable quality video transmission.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342976
H. Altunbasak, Henry Owen
Network security has become a concern with the rapid and continuing expansion of the Internet. There are several methods and protocols available to provide security in the network, transport, or application layers of networks. However, the layered approach in implementations prevents a comprehensive view of the security of network architectures. Moreover, network models utilizing the concept of layers are dynamically changing with new network architectures proposed in the literature. This paper introduced a security inter-layering concept to link the layers in both existing and future network architectures.
{"title":"Security inter-layering for evolving and future network architectures","authors":"H. Altunbasak, Henry Owen","doi":"10.1109/SECON.2007.342976","DOIUrl":"https://doi.org/10.1109/SECON.2007.342976","url":null,"abstract":"Network security has become a concern with the rapid and continuing expansion of the Internet. There are several methods and protocols available to provide security in the network, transport, or application layers of networks. However, the layered approach in implementations prevents a comprehensive view of the security of network architectures. Moreover, network models utilizing the concept of layers are dynamically changing with new network architectures proposed in the literature. This paper introduced a security inter-layering concept to link the layers in both existing and future network architectures.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342894
R. Wu
This research paper review our recent work in component based implementation and use example in financial industry to review the design process from micro component design to macro component based service virtualization. Financial engineering rely on inter-banking third party to mediate its services virtualization, there are two key processes play crucial roles in this mediation: the micro component design and macro metadata framework, the supplementary solutions of these two processes construct the enterprise integration interoperability and service virtualization which is the priority in financial industry.
{"title":"Case study of component base integration in the financial industry","authors":"R. Wu","doi":"10.1109/SECON.2007.342894","DOIUrl":"https://doi.org/10.1109/SECON.2007.342894","url":null,"abstract":"This research paper review our recent work in component based implementation and use example in financial industry to review the design process from micro component design to macro component based service virtualization. Financial engineering rely on inter-banking third party to mediate its services virtualization, there are two key processes play crucial roles in this mediation: the micro component design and macro metadata framework, the supplementary solutions of these two processes construct the enterprise integration interoperability and service virtualization which is the priority in financial industry.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114355976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342899
W. N. Dale
In this article, the authors examine a class of transfer functions (the Nevanlinna class) and present a well known theorem about the location of the non-minimum phase zeros for the Nevanlinna class. Next, they relate the Nevanlinna class to the class of stabilizable transfer functions and find two necessary conditions for a transfer function to be stabilizable. One of the necessary conditions is a constraint on the non-minimum phase zeros of a plant and the other is a constraint on the unstable poles of the plant. The necessary condition is automatically satisfied by every finite dimensional plant, so our result is only interesting for infinite dimensional plants. Finally, the authors construct a transfer function that does not satisfy our condition and is not stabilizable. Upon examination of our example, they see a counterintuitive result: the transfer function does not have any unstable poles and the only reason it is unstable (and not stabilizable) is because of the non-minimum phase zeros.
{"title":"The role of non-minimum phase zeros in stability of infinite dimensional systems","authors":"W. N. Dale","doi":"10.1109/SECON.2007.342899","DOIUrl":"https://doi.org/10.1109/SECON.2007.342899","url":null,"abstract":"In this article, the authors examine a class of transfer functions (the Nevanlinna class) and present a well known theorem about the location of the non-minimum phase zeros for the Nevanlinna class. Next, they relate the Nevanlinna class to the class of stabilizable transfer functions and find two necessary conditions for a transfer function to be stabilizable. One of the necessary conditions is a constraint on the non-minimum phase zeros of a plant and the other is a constraint on the unstable poles of the plant. The necessary condition is automatically satisfied by every finite dimensional plant, so our result is only interesting for infinite dimensional plants. Finally, the authors construct a transfer function that does not satisfy our condition and is not stabilizable. Upon examination of our example, they see a counterintuitive result: the transfer function does not have any unstable poles and the only reason it is unstable (and not stabilizable) is because of the non-minimum phase zeros.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}