首页 > 最新文献

Proceedings 2007 IEEE SoutheastCon最新文献

英文 中文
CIGSeS thin film solar cell research and development at the Florida Solar Energy Center 佛罗里达太阳能中心CIGSeS薄膜太阳能电池的研究和发展
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342972
N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar
Research and development of CuIn1-xGaxSe2-ySy (CIGSeS) thin film solar cells on various types of substrates and techniques is being carried out at the Florida Solar Energy Center (FSEC) Photovoltaics Materials Laboratory (PV Mat Lab) since 1990. Excellent facilities have been developed over the years for the preparation of the copper chalcogenide thin film solar cells. Highly efficient, CIGSeS thin film solar cells are being prepared and analyzed. This paper presents the facilities and research activities that have led to the preparation of highly efficient CIGSeS thin film solar cells.
自1990年以来,佛罗里达太阳能中心(FSEC)光伏材料实验室(PV Mat Lab)一直在研究和开发各种衬底和技术上的CuIn1-xGaxSe2-ySy (CIGSeS)薄膜太阳能电池。近年来,在制备硫系铜薄膜太阳能电池方面已取得了良好的进展。高效的CIGSeS薄膜太阳能电池正在制备和分析中。本文介绍了制备高效CIGSeS薄膜太阳能电池的设备和研究活动。
{"title":"CIGSeS thin film solar cell research and development at the Florida Solar Energy Center","authors":"N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar","doi":"10.1109/SECON.2007.342972","DOIUrl":"https://doi.org/10.1109/SECON.2007.342972","url":null,"abstract":"Research and development of CuIn1-xGaxSe2-ySy (CIGSeS) thin film solar cells on various types of substrates and techniques is being carried out at the Florida Solar Energy Center (FSEC) Photovoltaics Materials Laboratory (PV Mat Lab) since 1990. Excellent facilities have been developed over the years for the preparation of the copper chalcogenide thin film solar cells. Highly efficient, CIGSeS thin film solar cells are being prepared and analyzed. This paper presents the facilities and research activities that have led to the preparation of highly efficient CIGSeS thin film solar cells.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishing trust in black-box programs 建立对黑箱程序的信任
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342945
Ying H. Xia, K. Fairbanks, H. Owen
Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.
加密二进制文件越来越多地被用作软件盗版和漏洞利用的威慑。但是,加密程序的应用程序会导致更多的安全问题,因为用户无法通过监视加密的可执行文件来识别恶意行为。本文提出了一种监视加密程序的方法,该方法可以确保用户系统上的黑箱程序没有违反任何安全问题。我们的方法是将一个系统调用监视工具嵌入到操作系统中,该工具监视系统调用内容是否存在可疑行为或缺乏可疑行为。
{"title":"Establishing trust in black-box programs","authors":"Ying H. Xia, K. Fairbanks, H. Owen","doi":"10.1109/SECON.2007.342945","DOIUrl":"https://doi.org/10.1109/SECON.2007.342945","url":null,"abstract":"Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Electric utility migration to regional transmission operations: A case study 电力公司向区域输电业务迁移:一个案例研究
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342889
J. Greene
Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.
许多工程师和规划人员可以从大西洋中部一家大型电力公司的经验和遇到的技术挑战中受益,该公司从传统的综合电力公司转变为几个功能独立的实体,以允许开放的电力传输通道。新的公用事业组织是基于1996年FERC(联邦能源监管委员会)第888和889号命令以及NERC(北美电力可靠性委员会)放松管制的市场定义的要求,其中包括对输电业主,发电业主,区域输电运营商(RTO)和其他实体的指导方针。审查在这一过渡过程中所取得的经验和克服的技术挑战应该对其他国家有益。
{"title":"Electric utility migration to regional transmission operations: A case study","authors":"J. Greene","doi":"10.1109/SECON.2007.342889","DOIUrl":"https://doi.org/10.1109/SECON.2007.342889","url":null,"abstract":"Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ML decoding for convolutional code for short codeword of short constraint length and alternate use of block code ML解码卷积码短码字的短约束长度和替代使用的块码
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342882
A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam
This paper primarily deals with the error correction for the error correcting code, convolutional code. Viterbi decoding algorithm is the well known algorithm to decode convolutional code. Some of its limitations are overcome by the proposed algorithm in (Saifullah and Al-Mamun, 2004). This paper shows the improvement made by maximum likelihood (ML) decoding in simple form over the Viterbi algorithm and the proposed algorithm in (Saifullah and Al-Mamun, 2004) for short codeword and constraint length because of its low complexity. With this ML decoding, alternate use of block and convolutional code saves receiver's decoding power as well as computational complexity.
本文主要研究纠错码——卷积码的纠错问题。Viterbi译码算法是卷积码译码的常用算法。在(Saifullah and Al-Mamun, 2004)中提出的算法克服了它的一些局限性。本文展示了简单形式的最大似然(ML)解码相对于Viterbi算法和(Saifullah and Al-Mamun, 2004)中提出的算法在短码字和约束长度方面的改进,因为它的复杂度较低。使用这种ML解码,块和卷积代码的交替使用节省了接收器的解码能力以及计算复杂性。
{"title":"ML decoding for convolutional code for short codeword of short constraint length and alternate use of block code","authors":"A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam","doi":"10.1109/SECON.2007.342882","DOIUrl":"https://doi.org/10.1109/SECON.2007.342882","url":null,"abstract":"This paper primarily deals with the error correction for the error correcting code, convolutional code. Viterbi decoding algorithm is the well known algorithm to decode convolutional code. Some of its limitations are overcome by the proposed algorithm in (Saifullah and Al-Mamun, 2004). This paper shows the improvement made by maximum likelihood (ML) decoding in simple form over the Viterbi algorithm and the proposed algorithm in (Saifullah and Al-Mamun, 2004) for short codeword and constraint length because of its low complexity. With this ML decoding, alternate use of block and convolutional code saves receiver's decoding power as well as computational complexity.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of significant process parameters in variable frequency microwave curing 变频微波固化中重要工艺参数的识别
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342971
Daniel Cepeda, Cleon Davis, Gary May
Variable frequency microwave (VFM) curing of polymer dielectrics can reduce process time compared to conventional thermal methods drastically without compromising intrinsic material properties. However, the interactions that occur during VFM curing are not well understood. This paper presents a statistical experimental design to determine the significance of VFM processing parameters. A D-optimal experiment is performed on samples of polyimide spin-cast on silicon wafers cured in a VFM furnace. During VFM processing, the temperature of the polyimide samples is ramped to a specific temperature and held for a selected amount of time. Temperature calibration is conducted to guarantee accurate temperature exposure. The input variables analyzed are cure time, ramp rate, hold temperature, center frequency, bandwidth, and sweep rate. The output variables of interest are the in-plane and through-plane indices of refraction, birefringence, and the percent of imidization of polyimide. The percent imidization is measured using attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. Birefringence is derived from the in-plane and through-plane indices of refraction, both of which are measured with a metricon prism coupler. Analysis of variance (ANOVA) is used to determine the input variables with the greatest effect. Cure time is found to be the only significant parameter.
与传统的热方法相比,变频微波(VFM)固化聚合物电介质可以大大缩短工艺时间,而不会影响材料的固有特性。然而,在VFM固化过程中发生的相互作用尚未得到很好的理解。本文提出了一个统计实验设计来确定VFM处理参数的显著性。对聚酰亚胺自旋浇铸在VFM炉固化硅片上的样品进行了d -优化实验。在VFM处理期间,聚酰亚胺样品的温度上升到特定温度并保持选定的时间。进行温度校准以保证准确的温度暴露。所分析的输入变量包括固化时间、斜坡速率、保持温度、中心频率、带宽和扫描速率。感兴趣的输出变量是面内和通过面折射率,双折射率和聚酰亚胺的亚胺化百分比。使用衰减全反射傅立叶变换红外光谱(ATR-FTIR)测量亚酰化的百分比。双折射是由平面内折射率和通过平面折射率推导出来的,这两个折射率都是用度量棱镜耦合器测量的。方差分析(ANOVA)用于确定影响最大的输入变量。发现固化时间是唯一有意义的参数。
{"title":"Identification of significant process parameters in variable frequency microwave curing","authors":"Daniel Cepeda, Cleon Davis, Gary May","doi":"10.1109/SECON.2007.342971","DOIUrl":"https://doi.org/10.1109/SECON.2007.342971","url":null,"abstract":"Variable frequency microwave (VFM) curing of polymer dielectrics can reduce process time compared to conventional thermal methods drastically without compromising intrinsic material properties. However, the interactions that occur during VFM curing are not well understood. This paper presents a statistical experimental design to determine the significance of VFM processing parameters. A D-optimal experiment is performed on samples of polyimide spin-cast on silicon wafers cured in a VFM furnace. During VFM processing, the temperature of the polyimide samples is ramped to a specific temperature and held for a selected amount of time. Temperature calibration is conducted to guarantee accurate temperature exposure. The input variables analyzed are cure time, ramp rate, hold temperature, center frequency, bandwidth, and sweep rate. The output variables of interest are the in-plane and through-plane indices of refraction, birefringence, and the percent of imidization of polyimide. The percent imidization is measured using attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. Birefringence is derived from the in-plane and through-plane indices of refraction, both of which are measured with a metricon prism coupler. Analysis of variance (ANOVA) is used to determine the input variables with the greatest effect. Cure time is found to be the only significant parameter.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software development and related security issues 软件开发和相关的安全问题
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.343000
Jeff Zadeh, Dennis DeVolder
Security is a serious problem in software development, and may become much worse in the future. Unfortunately there is no simple solution to the software security problem. Today's software developers must deal with large numbers of defects in released software. Many security issues result from these defects - defects that occur during software design and development. These defects are unintentional, and their prevalence can be reduced during the development process in order to enhance security. Security must be integrated into the software development life cycle from the beginning and continue until the product is in use. This paper discusses security issues in the design and development of the software.
安全性是软件开发中的一个严重问题,并且在未来可能会变得更糟。不幸的是,软件安全问题没有简单的解决方案。今天的软件开发人员必须处理已发布软件中的大量缺陷。许多安全问题都是由这些缺陷引起的——在软件设计和开发过程中出现的缺陷。这些缺陷是无意的,在开发过程中可以减少它们的流行,以增强安全性。安全性必须从一开始就集成到软件开发生命周期中,并一直持续到产品投入使用为止。本文讨论了软件设计和开发中的安全问题。
{"title":"Software development and related security issues","authors":"Jeff Zadeh, Dennis DeVolder","doi":"10.1109/SECON.2007.343000","DOIUrl":"https://doi.org/10.1109/SECON.2007.343000","url":null,"abstract":"Security is a serious problem in software development, and may become much worse in the future. Unfortunately there is no simple solution to the software security problem. Today's software developers must deal with large numbers of defects in released software. Many security issues result from these defects - defects that occur during software design and development. These defects are unintentional, and their prevalence can be reduced during the development process in order to enhance security. Security must be integrated into the software development life cycle from the beginning and continue until the product is in use. This paper discusses security issues in the design and development of the software.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cryptography versus cryptanalysis in wireless sensor networks 无线传感器网络中的密码学与密码分析
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342920
S.S. Laster, K. Pace
Maintaining a cryptanalysis free environment determines the success of a sensor network. Nevertheless, the ability to maintain a cryptanalysis free environment is the ultimate goal of a wireless sensor network. In the paper, the focus is to show the importance maintaining an efficient cryptographic wireless sensor network versus a cryptanalysis wireless sensor network.
保持无密码分析的环境决定了传感器网络的成功。然而,保持无密码分析环境的能力是无线传感器网络的最终目标。在本文中,重点是展示维护一个有效的加密无线传感器网络与密码分析无线传感器网络的重要性。
{"title":"Cryptography versus cryptanalysis in wireless sensor networks","authors":"S.S. Laster, K. Pace","doi":"10.1109/SECON.2007.342920","DOIUrl":"https://doi.org/10.1109/SECON.2007.342920","url":null,"abstract":"Maintaining a cryptanalysis free environment determines the success of a sensor network. Nevertheless, the ability to maintain a cryptanalysis free environment is the ultimate goal of a wireless sensor network. In the paper, the focus is to show the importance maintaining an efficient cryptographic wireless sensor network versus a cryptanalysis wireless sensor network.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel 4G MAC protocol guaranteeing high QoS and capacity in CBR communications networks by continuous group divisions and resource re-allocations to considerably reduce contention mini-slot collisions 一种新颖的4G MAC协议,通过连续分组和资源重新分配来保证CBR通信网络的高QoS和高容量,从而大大减少争用小时隙冲突
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342867
A. Kamal
The authors previously showed that high QoS and capacity in CBR communications networks can be achieved by the user-group-division method. The novel MAC protocol based on this method and fundamental theories and postulates (supported by the CBR network environment) required to develop the protocol are presented here. No change in hardware or standards is required to implement this protocol and the protocol can be executed on the mobile stations (ms) or cable modems (cm) from the base station (BS) or head-end (HE). Initially, the protocol divides up the network into groups formed by one contention mini-slot (cms) per region and a group of users (with the group size equals the avg. number of users per cms in the network) allocated to that particular cms. Afterwards, the cms bandwidth is re-allocated inter-regionally (regrouped) and the total channel bandwidth is re-distributed between the cms and ds (data slot) based on the feedback received on the collision and available resource (bandwidth) conditions of the network during the previous round-trip time (rtt). The protocol is executed in the network at each rtt by running the feedback mechanism, regrouping, and re-distributing the bandwidth. The advanced network simulator (ANS-1) written in MATLAB using my novel abstractions and the novel Nasrin traffic generation and distribution model are used to evaluate the protocol in a flexible and reliable network simulation environment. The results showed high fair utilization and low waste of the required cms and data bandwidth with high collision reduction. The proposed approach accomplishes a record 80% cms collision reduction and 85% cms and 100% data bandwidth utilization (guaranteeing high QoS and capacity) while providing high controllability to the BS/HE for reducing the probability of collisions. The protocol achieves these improvements by distributing the cms to small groups of users (reducing the probabilities of uncontrollable and high collisions), repeating its execution (thinning the accumulation and repetitions of collisions), and managing the ds and cms resource requirements with feedback to allocate the resources to the needy regions (reducing the probabilities of buildup and recurrences of collisions).
作者先前已经证明,在CBR通信网络中,通过用户组划分方法可以实现高QoS和高容量。本文介绍了基于该方法的新型MAC协议,以及开发该协议所需的基本理论和假设(在CBR网络环境的支持下)。实现该协议不需要改变硬件或标准,并且该协议可以在距离基站(BS)或前端(HE)的移动站(ms)或电缆调制解调器(cm)上执行。最初,该协议将网络划分为组,每个区域有一个竞争迷你槽(cms)和分配给该特定cms的一组用户(组的大小等于网络中每个cms的平均用户数)。然后,根据接收到的前一次往返时间(rtt)内网络的碰撞和可用资源(带宽)情况的反馈,在cms和ds(数据槽)之间重新分配cms带宽(regrouped)和信道总带宽(ds)。该协议通过运行反馈机制、重新分组和重新分配带宽在网络中每次rtt执行。使用MATLAB编写的先进网络模拟器(ANS-1)和新颖的Nasrin流量生成和分布模型,在灵活可靠的网络仿真环境中对协议进行了评估。结果表明,该算法对所需的cms和数据带宽的合理利用率高,浪费少,碰撞减少率高。提出的方法实现了创纪录的80% cms的碰撞减少,85% cms和100%的数据带宽利用率(保证高QoS和容量),同时为BS/HE提供了高可控性,以降低碰撞概率。该协议通过将cms分发给一小群用户(减少不可控和高冲突的概率)、重复执行(减少冲突的积累和重复)以及通过反馈管理ds和cms资源需求来将资源分配给需要的区域(减少冲突的积累和重复的概率)来实现这些改进。
{"title":"A novel 4G MAC protocol guaranteeing high QoS and capacity in CBR communications networks by continuous group divisions and resource re-allocations to considerably reduce contention mini-slot collisions","authors":"A. Kamal","doi":"10.1109/SECON.2007.342867","DOIUrl":"https://doi.org/10.1109/SECON.2007.342867","url":null,"abstract":"The authors previously showed that high QoS and capacity in CBR communications networks can be achieved by the user-group-division method. The novel MAC protocol based on this method and fundamental theories and postulates (supported by the CBR network environment) required to develop the protocol are presented here. No change in hardware or standards is required to implement this protocol and the protocol can be executed on the mobile stations (ms) or cable modems (cm) from the base station (BS) or head-end (HE). Initially, the protocol divides up the network into groups formed by one contention mini-slot (cms) per region and a group of users (with the group size equals the avg. number of users per cms in the network) allocated to that particular cms. Afterwards, the cms bandwidth is re-allocated inter-regionally (regrouped) and the total channel bandwidth is re-distributed between the cms and ds (data slot) based on the feedback received on the collision and available resource (bandwidth) conditions of the network during the previous round-trip time (rtt). The protocol is executed in the network at each rtt by running the feedback mechanism, regrouping, and re-distributing the bandwidth. The advanced network simulator (ANS-1) written in MATLAB using my novel abstractions and the novel Nasrin traffic generation and distribution model are used to evaluate the protocol in a flexible and reliable network simulation environment. The results showed high fair utilization and low waste of the required cms and data bandwidth with high collision reduction. The proposed approach accomplishes a record 80% cms collision reduction and 85% cms and 100% data bandwidth utilization (guaranteeing high QoS and capacity) while providing high controllability to the BS/HE for reducing the probability of collisions. The protocol achieves these improvements by distributing the cms to small groups of users (reducing the probabilities of uncontrollable and high collisions), repeating its execution (thinning the accumulation and repetitions of collisions), and managing the ds and cms resource requirements with feedback to allocate the resources to the needy regions (reducing the probabilities of buildup and recurrences of collisions).","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle identifications using acoustic sensing 利用声感应进行车辆识别
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342963
R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen
Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.
随着城市战场复杂性的增加,对相关领域车辆检测、分类、识别和跟踪技术提出了更高的要求。对这种高效技术的需求是由于环境的复杂性和传感器的局限性。多传感器数据融合可用于战场监视等实际应用中的车辆识别。多传感器数据融合具有单一传感器数据源无法比拟的优势。本研究的目的是设计和实现使用分布式声传感器网络的车辆监控应用的数据融合软件。数据融合软件将用于战场上的车辆交通监控以及安全区域的事件检测和跟踪。所开发软件的实现和测试结果均来自于民用和军用车辆的实际数据采集。
{"title":"Vehicle identifications using acoustic sensing","authors":"R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen","doi":"10.1109/SECON.2007.342963","DOIUrl":"https://doi.org/10.1109/SECON.2007.342963","url":null,"abstract":"Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Systems engineering challenges in inkjet biofabrication 喷墨生物制造中的系统工程挑战
Pub Date : 2007-03-22 DOI: 10.1109/SECON.2007.342931
T. Burg, R. Groff, K. Burg, M. Hill, T. Boland
Inkjet biofabrication describes the application of "bioink" via an inkjet printing mechanism in order to build two- and three-dimensional tissue constructs for medical treatment. The bioinks may include active compounds such as drugs and living cells as well as non active, scaffolding materials. The technology faces several limitations that present interesting sensing, actuation, and control problems. The nature and scope of these problems is discussed.
喷墨生物制造描述了“生物墨水”的应用,通过喷墨打印机制来构建用于医疗的二维和三维组织结构。所述生物墨水可包括活性化合物,如药物和活细胞以及非活性支架材料。这项技术面临着一些限制,这些限制带来了有趣的传感、驱动和控制问题。讨论了这些问题的性质和范围。
{"title":"Systems engineering challenges in inkjet biofabrication","authors":"T. Burg, R. Groff, K. Burg, M. Hill, T. Boland","doi":"10.1109/SECON.2007.342931","DOIUrl":"https://doi.org/10.1109/SECON.2007.342931","url":null,"abstract":"Inkjet biofabrication describes the application of \"bioink\" via an inkjet printing mechanism in order to build two- and three-dimensional tissue constructs for medical treatment. The bioinks may include active compounds such as drugs and living cells as well as non active, scaffolding materials. The technology faces several limitations that present interesting sensing, actuation, and control problems. The nature and scope of these problems is discussed.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings 2007 IEEE SoutheastCon
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1