Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342911
G. Athalye, V. Dronamraju, J. Conrad
This paper presents the design and development of a daughter board consisting of stepper motor drivers and serial interfaces. The purpose of this board is to provide embedded systems students with a tool to design and develop automation applications using stepper motors and simple RS-232C serial communications. The stepper motors used is a bipolar six-wire configuration motor. Software drivers for serial communication and the stepper motors are written in the 'C' language using the High-performance Embedded Workshop (HEW) Integrated Development Environment provided with the Renesas Embedded Evaluation Board. The stepper motors are programmed to drive in full step, half step, and micro step mode. The circuit functionality was tested on a breadboard, and on compliance with the performance, a PCB was manufactured.
{"title":"A stepper motor and serial communication interface daughter board for educational use","authors":"G. Athalye, V. Dronamraju, J. Conrad","doi":"10.1109/SECON.2007.342911","DOIUrl":"https://doi.org/10.1109/SECON.2007.342911","url":null,"abstract":"This paper presents the design and development of a daughter board consisting of stepper motor drivers and serial interfaces. The purpose of this board is to provide embedded systems students with a tool to design and develop automation applications using stepper motors and simple RS-232C serial communications. The stepper motors used is a bipolar six-wire configuration motor. Software drivers for serial communication and the stepper motors are written in the 'C' language using the High-performance Embedded Workshop (HEW) Integrated Development Environment provided with the Renesas Embedded Evaluation Board. The stepper motors are programmed to drive in full step, half step, and micro step mode. The circuit functionality was tested on a breadboard, and on compliance with the performance, a PCB was manufactured.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120995123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342997
J. Roberts, A. Eastridge, D. Binkley, S. Thomas, R. Makki
An on-chip wideband CMOS transient supply current sensor is presented. The sensor permits on-chip transient supply current testing (iDDT) for circuits where supply current transients associated with circuit operation are measured and evaluated. The sensor was designed and fabricated in 0.5-mum CMOS technology and was physically demonstrated at 200 MHz sensing speeds. Measured results from the sensor show it is possible to distinguish between normal and faulty logic inverter operation. Extensions to the sensor design are presented including autozero circuitry to cancel MOS transistor mismatch.
提出了一种片上宽带CMOS瞬态电源电流传感器。该传感器允许对电路进行片上瞬态电源电流测试(iDDT),其中测量和评估与电路操作相关的电源电流瞬态。该传感器采用0.5 μ m CMOS技术设计和制造,并在200 MHz的感应速度下进行了物理演示。传感器的测量结果表明,可以区分正常和故障的逻辑逆变器操作。扩展了传感器的设计,包括自动归零电路,以消除MOS晶体管失配。
{"title":"A high speed dynamic power supply current sensor","authors":"J. Roberts, A. Eastridge, D. Binkley, S. Thomas, R. Makki","doi":"10.1109/SECON.2007.342997","DOIUrl":"https://doi.org/10.1109/SECON.2007.342997","url":null,"abstract":"An on-chip wideband CMOS transient supply current sensor is presented. The sensor permits on-chip transient supply current testing (iDDT) for circuits where supply current transients associated with circuit operation are measured and evaluated. The sensor was designed and fabricated in 0.5-mum CMOS technology and was physically demonstrated at 200 MHz sensing speeds. Measured results from the sensor show it is possible to distinguish between normal and faulty logic inverter operation. Extensions to the sensor design are presented including autozero circuitry to cancel MOS transistor mismatch.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116681446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342932
O. Mohammed, S. Ganu, N. Abed
This paper utilizes the wavelet packet transform to study the effects of change in the shape of the magnetic pole on the harmonic behavior of air gap flux density waveform. A surface mounted PM motor is used as an example. The original design contains 6 PM poles and 36 stator slots. The rotor and the stator winding are redesigned to have 4, 8, and 12 poles. The air gap flux density waveform is obtained from the finite element solutions. The results have been compared with different pole structure design. It has been found that there is not much difference in the harmonic content due to change in PM pole structure on the air gap flux density waveform.
{"title":"Effect of change in pole shape design on harmonic contents of PM synchronous motor air gap flux density waveform","authors":"O. Mohammed, S. Ganu, N. Abed","doi":"10.1109/SECON.2007.342932","DOIUrl":"https://doi.org/10.1109/SECON.2007.342932","url":null,"abstract":"This paper utilizes the wavelet packet transform to study the effects of change in the shape of the magnetic pole on the harmonic behavior of air gap flux density waveform. A surface mounted PM motor is used as an example. The original design contains 6 PM poles and 36 stator slots. The rotor and the stator winding are redesigned to have 4, 8, and 12 poles. The air gap flux density waveform is obtained from the finite element solutions. The results have been compared with different pole structure design. It has been found that there is not much difference in the harmonic content due to change in PM pole structure on the air gap flux density waveform.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342880
Y. Hu
As the Internet becomes more mature and a part of our daily life, technologies used to provide continuous services of the Internet under all circumstances become more crucial. Collectively, these technologies ensure that resources are always available and stable. Since network attack is very easy to deploy and has very low cost, it has become the main reason of network instability and is the most challenge of current network security professionals. In this paper, we have studied the factors that cause network instability and investigated the potential countermeasures that enhance network security. We have proposed a framework to indicate the requirements of future queue management algorithm design.
{"title":"Network attacks and countermeasures","authors":"Y. Hu","doi":"10.1109/SECON.2007.342880","DOIUrl":"https://doi.org/10.1109/SECON.2007.342880","url":null,"abstract":"As the Internet becomes more mature and a part of our daily life, technologies used to provide continuous services of the Internet under all circumstances become more crucial. Collectively, these technologies ensure that resources are always available and stable. Since network attack is very easy to deploy and has very low cost, it has become the main reason of network instability and is the most challenge of current network security professionals. In this paper, we have studied the factors that cause network instability and investigated the potential countermeasures that enhance network security. We have proposed a framework to indicate the requirements of future queue management algorithm design.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342992
Sen Xu, Chin-Tser Huang, M. Matthews
Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because many applications require access control and privacy. This issue is more sensitive to wireless network, which is lack of physical boundaries. IEEE 802.16 is the standard for next generation wireless network, which aims to provide the last mile access for wireless metropolitan area network (WirelessMAN). Multicast is also supported in IEEE 802.16, and a multicast and broadcast rekeying algorithm (MBRA) is proposed as an optional function for secure multicast. However, this algorithm does not provide backward and forward secrecy, and is not scalable to large group. This paper reviews the above two deficiencies of MBRA and proposes a new algorithm to address them. We also propose algorithms for secure multicast in different scenarios of WirelessMAN besides its basic scheme.
{"title":"Secure multicast in various scenarios of WirelessMAN","authors":"Sen Xu, Chin-Tser Huang, M. Matthews","doi":"10.1109/SECON.2007.342992","DOIUrl":"https://doi.org/10.1109/SECON.2007.342992","url":null,"abstract":"Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because many applications require access control and privacy. This issue is more sensitive to wireless network, which is lack of physical boundaries. IEEE 802.16 is the standard for next generation wireless network, which aims to provide the last mile access for wireless metropolitan area network (WirelessMAN). Multicast is also supported in IEEE 802.16, and a multicast and broadcast rekeying algorithm (MBRA) is proposed as an optional function for secure multicast. However, this algorithm does not provide backward and forward secrecy, and is not scalable to large group. This paper reviews the above two deficiencies of MBRA and proposes a new algorithm to address them. We also propose algorithms for secure multicast in different scenarios of WirelessMAN besides its basic scheme.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"58 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342885
Ihsan Akbar, William Tranter
The accurate modeling of error sequences that occur in wireless channels is necessary for a better understanding of network performance and for improving the design of communication system under study. Hidden Markov models are widely used for simulating such error traces produced by wireless channels. The primary advantage of using these models is rapid experimentation and prototyping. Although the parameter estimation of HMM has been studied extensively, its order estimation problem has been addressed only recently. Due to the lack of mathematical theory for HMM order estimation, we apply a simulation-based approach to study the order estimation of binary hidden Markov channel models. The order of a Markov process is defined as the minimum number of states required to model the data accurately. In HMMs, where the observation is probabilistic function of states, the order corresponds to the number of quantized state levels. To avoid local maxima, we run the Baum-Welch Algorithm (BWA) several times with different initial conditions (while keeping the number of states fixed), and use split-data log-likelihood to select the best model.
{"title":"Order estimation of binary hidden Markov wireless channel models in Rayleigh fading","authors":"Ihsan Akbar, William Tranter","doi":"10.1109/SECON.2007.342885","DOIUrl":"https://doi.org/10.1109/SECON.2007.342885","url":null,"abstract":"The accurate modeling of error sequences that occur in wireless channels is necessary for a better understanding of network performance and for improving the design of communication system under study. Hidden Markov models are widely used for simulating such error traces produced by wireless channels. The primary advantage of using these models is rapid experimentation and prototyping. Although the parameter estimation of HMM has been studied extensively, its order estimation problem has been addressed only recently. Due to the lack of mathematical theory for HMM order estimation, we apply a simulation-based approach to study the order estimation of binary hidden Markov channel models. The order of a Markov process is defined as the minimum number of states required to model the data accurately. In HMMs, where the observation is probabilistic function of states, the order corresponds to the number of quantized state levels. To avoid local maxima, we run the Baum-Welch Algorithm (BWA) several times with different initial conditions (while keeping the number of states fixed), and use split-data log-likelihood to select the best model.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"628 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131920650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342963
R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen
Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.
{"title":"Vehicle identifications using acoustic sensing","authors":"R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen","doi":"10.1109/SECON.2007.342963","DOIUrl":"https://doi.org/10.1109/SECON.2007.342963","url":null,"abstract":"Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342945
Ying H. Xia, K. Fairbanks, H. Owen
Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.
{"title":"Establishing trust in black-box programs","authors":"Ying H. Xia, K. Fairbanks, H. Owen","doi":"10.1109/SECON.2007.342945","DOIUrl":"https://doi.org/10.1109/SECON.2007.342945","url":null,"abstract":"Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342889
J. Greene
Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.
{"title":"Electric utility migration to regional transmission operations: A case study","authors":"J. Greene","doi":"10.1109/SECON.2007.342889","DOIUrl":"https://doi.org/10.1109/SECON.2007.342889","url":null,"abstract":"Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342934
H. Watson, M. Heimer, J. Andrian, A. Barreto
A polygraph is a tool which provides access, visualization and analysis for large amounts of recorded physiologic data. The goal of this work is to provide an open source framework for studying and detailing data. Recorded data, internal epochs, montages, and a graphic user interface (GUI) are linked together with this realization.
{"title":"Polygraph realization for data visualization and analysis","authors":"H. Watson, M. Heimer, J. Andrian, A. Barreto","doi":"10.1109/SECON.2007.342934","DOIUrl":"https://doi.org/10.1109/SECON.2007.342934","url":null,"abstract":"A polygraph is a tool which provides access, visualization and analysis for large amounts of recorded physiologic data. The goal of this work is to provide an open source framework for studying and detailing data. Recorded data, internal epochs, montages, and a graphic user interface (GUI) are linked together with this realization.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115426792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}