Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342972
N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar
Research and development of CuIn1-xGaxSe2-ySy (CIGSeS) thin film solar cells on various types of substrates and techniques is being carried out at the Florida Solar Energy Center (FSEC) Photovoltaics Materials Laboratory (PV Mat Lab) since 1990. Excellent facilities have been developed over the years for the preparation of the copper chalcogenide thin film solar cells. Highly efficient, CIGSeS thin film solar cells are being prepared and analyzed. This paper presents the facilities and research activities that have led to the preparation of highly efficient CIGSeS thin film solar cells.
自1990年以来,佛罗里达太阳能中心(FSEC)光伏材料实验室(PV Mat Lab)一直在研究和开发各种衬底和技术上的CuIn1-xGaxSe2-ySy (CIGSeS)薄膜太阳能电池。近年来,在制备硫系铜薄膜太阳能电池方面已取得了良好的进展。高效的CIGSeS薄膜太阳能电池正在制备和分析中。本文介绍了制备高效CIGSeS薄膜太阳能电池的设备和研究活动。
{"title":"CIGSeS thin film solar cell research and development at the Florida Solar Energy Center","authors":"N. Dhere, Vinay Hadagali, Sachin Kulkarni, S. Pethe, P. Vasekar","doi":"10.1109/SECON.2007.342972","DOIUrl":"https://doi.org/10.1109/SECON.2007.342972","url":null,"abstract":"Research and development of CuIn1-xGaxSe2-ySy (CIGSeS) thin film solar cells on various types of substrates and techniques is being carried out at the Florida Solar Energy Center (FSEC) Photovoltaics Materials Laboratory (PV Mat Lab) since 1990. Excellent facilities have been developed over the years for the preparation of the copper chalcogenide thin film solar cells. Highly efficient, CIGSeS thin film solar cells are being prepared and analyzed. This paper presents the facilities and research activities that have led to the preparation of highly efficient CIGSeS thin film solar cells.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342945
Ying H. Xia, K. Fairbanks, H. Owen
Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.
{"title":"Establishing trust in black-box programs","authors":"Ying H. Xia, K. Fairbanks, H. Owen","doi":"10.1109/SECON.2007.342945","DOIUrl":"https://doi.org/10.1109/SECON.2007.342945","url":null,"abstract":"Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342889
J. Greene
Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.
{"title":"Electric utility migration to regional transmission operations: A case study","authors":"J. Greene","doi":"10.1109/SECON.2007.342889","DOIUrl":"https://doi.org/10.1109/SECON.2007.342889","url":null,"abstract":"Many engineers and planners can benefit from an account of the experiences and technical challenges encountered at one large Mid-Atlantic electric utility during the migration from a traditional, integrated utility into several functionally separate entities in order to allow open electric transmission access. The new utility organization is based on requirements given in the 1996 FERC (Federal Energy Regulatory Commission) Orders 888 & 889 and on NERC (North American Electric Reliability Council) deregulated market definitions that include guidelines for a transmission owner, a generation owner, a regional transmission operator (RTO), and other entities. A review of the experience gained and the technical challenges overcome in this transition should be of benefit to others.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342882
A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam
This paper primarily deals with the error correction for the error correcting code, convolutional code. Viterbi decoding algorithm is the well known algorithm to decode convolutional code. Some of its limitations are overcome by the proposed algorithm in (Saifullah and Al-Mamun, 2004). This paper shows the improvement made by maximum likelihood (ML) decoding in simple form over the Viterbi algorithm and the proposed algorithm in (Saifullah and Al-Mamun, 2004) for short codeword and constraint length because of its low complexity. With this ML decoding, alternate use of block and convolutional code saves receiver's decoding power as well as computational complexity.
本文主要研究纠错码——卷积码的纠错问题。Viterbi译码算法是卷积码译码的常用算法。在(Saifullah and Al-Mamun, 2004)中提出的算法克服了它的一些局限性。本文展示了简单形式的最大似然(ML)解码相对于Viterbi算法和(Saifullah and Al-Mamun, 2004)中提出的算法在短码字和约束长度方面的改进,因为它的复杂度较低。使用这种ML解码,块和卷积代码的交替使用节省了接收器的解码能力以及计算复杂性。
{"title":"ML decoding for convolutional code for short codeword of short constraint length and alternate use of block code","authors":"A. Al zaman, M.S.A. Khan, S. Sultana, S. M. Taohidul Islam","doi":"10.1109/SECON.2007.342882","DOIUrl":"https://doi.org/10.1109/SECON.2007.342882","url":null,"abstract":"This paper primarily deals with the error correction for the error correcting code, convolutional code. Viterbi decoding algorithm is the well known algorithm to decode convolutional code. Some of its limitations are overcome by the proposed algorithm in (Saifullah and Al-Mamun, 2004). This paper shows the improvement made by maximum likelihood (ML) decoding in simple form over the Viterbi algorithm and the proposed algorithm in (Saifullah and Al-Mamun, 2004) for short codeword and constraint length because of its low complexity. With this ML decoding, alternate use of block and convolutional code saves receiver's decoding power as well as computational complexity.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342971
Daniel Cepeda, Cleon Davis, Gary May
Variable frequency microwave (VFM) curing of polymer dielectrics can reduce process time compared to conventional thermal methods drastically without compromising intrinsic material properties. However, the interactions that occur during VFM curing are not well understood. This paper presents a statistical experimental design to determine the significance of VFM processing parameters. A D-optimal experiment is performed on samples of polyimide spin-cast on silicon wafers cured in a VFM furnace. During VFM processing, the temperature of the polyimide samples is ramped to a specific temperature and held for a selected amount of time. Temperature calibration is conducted to guarantee accurate temperature exposure. The input variables analyzed are cure time, ramp rate, hold temperature, center frequency, bandwidth, and sweep rate. The output variables of interest are the in-plane and through-plane indices of refraction, birefringence, and the percent of imidization of polyimide. The percent imidization is measured using attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. Birefringence is derived from the in-plane and through-plane indices of refraction, both of which are measured with a metricon prism coupler. Analysis of variance (ANOVA) is used to determine the input variables with the greatest effect. Cure time is found to be the only significant parameter.
{"title":"Identification of significant process parameters in variable frequency microwave curing","authors":"Daniel Cepeda, Cleon Davis, Gary May","doi":"10.1109/SECON.2007.342971","DOIUrl":"https://doi.org/10.1109/SECON.2007.342971","url":null,"abstract":"Variable frequency microwave (VFM) curing of polymer dielectrics can reduce process time compared to conventional thermal methods drastically without compromising intrinsic material properties. However, the interactions that occur during VFM curing are not well understood. This paper presents a statistical experimental design to determine the significance of VFM processing parameters. A D-optimal experiment is performed on samples of polyimide spin-cast on silicon wafers cured in a VFM furnace. During VFM processing, the temperature of the polyimide samples is ramped to a specific temperature and held for a selected amount of time. Temperature calibration is conducted to guarantee accurate temperature exposure. The input variables analyzed are cure time, ramp rate, hold temperature, center frequency, bandwidth, and sweep rate. The output variables of interest are the in-plane and through-plane indices of refraction, birefringence, and the percent of imidization of polyimide. The percent imidization is measured using attenuated total reflection Fourier transform infrared (ATR-FTIR) spectroscopy. Birefringence is derived from the in-plane and through-plane indices of refraction, both of which are measured with a metricon prism coupler. Analysis of variance (ANOVA) is used to determine the input variables with the greatest effect. Cure time is found to be the only significant parameter.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.343000
Jeff Zadeh, Dennis DeVolder
Security is a serious problem in software development, and may become much worse in the future. Unfortunately there is no simple solution to the software security problem. Today's software developers must deal with large numbers of defects in released software. Many security issues result from these defects - defects that occur during software design and development. These defects are unintentional, and their prevalence can be reduced during the development process in order to enhance security. Security must be integrated into the software development life cycle from the beginning and continue until the product is in use. This paper discusses security issues in the design and development of the software.
{"title":"Software development and related security issues","authors":"Jeff Zadeh, Dennis DeVolder","doi":"10.1109/SECON.2007.343000","DOIUrl":"https://doi.org/10.1109/SECON.2007.343000","url":null,"abstract":"Security is a serious problem in software development, and may become much worse in the future. Unfortunately there is no simple solution to the software security problem. Today's software developers must deal with large numbers of defects in released software. Many security issues result from these defects - defects that occur during software design and development. These defects are unintentional, and their prevalence can be reduced during the development process in order to enhance security. Security must be integrated into the software development life cycle from the beginning and continue until the product is in use. This paper discusses security issues in the design and development of the software.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342920
S.S. Laster, K. Pace
Maintaining a cryptanalysis free environment determines the success of a sensor network. Nevertheless, the ability to maintain a cryptanalysis free environment is the ultimate goal of a wireless sensor network. In the paper, the focus is to show the importance maintaining an efficient cryptographic wireless sensor network versus a cryptanalysis wireless sensor network.
{"title":"Cryptography versus cryptanalysis in wireless sensor networks","authors":"S.S. Laster, K. Pace","doi":"10.1109/SECON.2007.342920","DOIUrl":"https://doi.org/10.1109/SECON.2007.342920","url":null,"abstract":"Maintaining a cryptanalysis free environment determines the success of a sensor network. Nevertheless, the ability to maintain a cryptanalysis free environment is the ultimate goal of a wireless sensor network. In the paper, the focus is to show the importance maintaining an efficient cryptographic wireless sensor network versus a cryptanalysis wireless sensor network.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342867
A. Kamal
The authors previously showed that high QoS and capacity in CBR communications networks can be achieved by the user-group-division method. The novel MAC protocol based on this method and fundamental theories and postulates (supported by the CBR network environment) required to develop the protocol are presented here. No change in hardware or standards is required to implement this protocol and the protocol can be executed on the mobile stations (ms) or cable modems (cm) from the base station (BS) or head-end (HE). Initially, the protocol divides up the network into groups formed by one contention mini-slot (cms) per region and a group of users (with the group size equals the avg. number of users per cms in the network) allocated to that particular cms. Afterwards, the cms bandwidth is re-allocated inter-regionally (regrouped) and the total channel bandwidth is re-distributed between the cms and ds (data slot) based on the feedback received on the collision and available resource (bandwidth) conditions of the network during the previous round-trip time (rtt). The protocol is executed in the network at each rtt by running the feedback mechanism, regrouping, and re-distributing the bandwidth. The advanced network simulator (ANS-1) written in MATLAB using my novel abstractions and the novel Nasrin traffic generation and distribution model are used to evaluate the protocol in a flexible and reliable network simulation environment. The results showed high fair utilization and low waste of the required cms and data bandwidth with high collision reduction. The proposed approach accomplishes a record 80% cms collision reduction and 85% cms and 100% data bandwidth utilization (guaranteeing high QoS and capacity) while providing high controllability to the BS/HE for reducing the probability of collisions. The protocol achieves these improvements by distributing the cms to small groups of users (reducing the probabilities of uncontrollable and high collisions), repeating its execution (thinning the accumulation and repetitions of collisions), and managing the ds and cms resource requirements with feedback to allocate the resources to the needy regions (reducing the probabilities of buildup and recurrences of collisions).
{"title":"A novel 4G MAC protocol guaranteeing high QoS and capacity in CBR communications networks by continuous group divisions and resource re-allocations to considerably reduce contention mini-slot collisions","authors":"A. Kamal","doi":"10.1109/SECON.2007.342867","DOIUrl":"https://doi.org/10.1109/SECON.2007.342867","url":null,"abstract":"The authors previously showed that high QoS and capacity in CBR communications networks can be achieved by the user-group-division method. The novel MAC protocol based on this method and fundamental theories and postulates (supported by the CBR network environment) required to develop the protocol are presented here. No change in hardware or standards is required to implement this protocol and the protocol can be executed on the mobile stations (ms) or cable modems (cm) from the base station (BS) or head-end (HE). Initially, the protocol divides up the network into groups formed by one contention mini-slot (cms) per region and a group of users (with the group size equals the avg. number of users per cms in the network) allocated to that particular cms. Afterwards, the cms bandwidth is re-allocated inter-regionally (regrouped) and the total channel bandwidth is re-distributed between the cms and ds (data slot) based on the feedback received on the collision and available resource (bandwidth) conditions of the network during the previous round-trip time (rtt). The protocol is executed in the network at each rtt by running the feedback mechanism, regrouping, and re-distributing the bandwidth. The advanced network simulator (ANS-1) written in MATLAB using my novel abstractions and the novel Nasrin traffic generation and distribution model are used to evaluate the protocol in a flexible and reliable network simulation environment. The results showed high fair utilization and low waste of the required cms and data bandwidth with high collision reduction. The proposed approach accomplishes a record 80% cms collision reduction and 85% cms and 100% data bandwidth utilization (guaranteeing high QoS and capacity) while providing high controllability to the BS/HE for reducing the probability of collisions. The protocol achieves these improvements by distributing the cms to small groups of users (reducing the probabilities of uncontrollable and high collisions), repeating its execution (thinning the accumulation and repetitions of collisions), and managing the ds and cms resource requirements with feedback to allocate the resources to the needy regions (reducing the probabilities of buildup and recurrences of collisions).","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342963
R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen
Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.
{"title":"Vehicle identifications using acoustic sensing","authors":"R. Mgaya, S. Zein-Sabatto, A. Shirkhodaie, Wei Chen","doi":"10.1109/SECON.2007.342963","DOIUrl":"https://doi.org/10.1109/SECON.2007.342963","url":null,"abstract":"Increase in the complexity of battlefield fought in urban areas has brought a high demand for efficient techniques for vehicles detection, classification, identification and tracking in areas of interest. The demand for such efficient techniques is due to complexity of the environment and to sensor limitations. Multi-sensor data fusion can be used for vehicle identification in practical applications such as battlefield surveillance. Multi-sensor data fusion provides significant advantages over single sensor data source. The purpose of this research is to design and implement data fusion software for vehicle surveillance applications using a distributed network of acoustic sensors. The data fusion software will be used in vehicles traffic monitoring in a battlefield and events detection and tracking in secured areas. Implementation and testing results of the developed software are obtained from real data collect from civilian and military vehicles.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342931
T. Burg, R. Groff, K. Burg, M. Hill, T. Boland
Inkjet biofabrication describes the application of "bioink" via an inkjet printing mechanism in order to build two- and three-dimensional tissue constructs for medical treatment. The bioinks may include active compounds such as drugs and living cells as well as non active, scaffolding materials. The technology faces several limitations that present interesting sensing, actuation, and control problems. The nature and scope of these problems is discussed.
{"title":"Systems engineering challenges in inkjet biofabrication","authors":"T. Burg, R. Groff, K. Burg, M. Hill, T. Boland","doi":"10.1109/SECON.2007.342931","DOIUrl":"https://doi.org/10.1109/SECON.2007.342931","url":null,"abstract":"Inkjet biofabrication describes the application of \"bioink\" via an inkjet printing mechanism in order to build two- and three-dimensional tissue constructs for medical treatment. The bioinks may include active compounds such as drugs and living cells as well as non active, scaffolding materials. The technology faces several limitations that present interesting sensing, actuation, and control problems. The nature and scope of these problems is discussed.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}