Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686219
I. Zualkernan, Salim M Abu-Naaj
Mutation testing has been used to construct test cases and to evaluate the effectiveness of testing methods. Several methods have recently been proposed to generate test sequences from higher level design models such as UML state and activity diagrams. This paper presents a scalable web-services based architecture that can evaluate the effectiveness of these methods using mutation analysis. The architecture defines several mutation operators for activity diagrams based on the Hazmat classification. The paper also presents a case study using this architecture to evaluate automatically generated tests for designers. The architecture is implemented using the Apache Axis framework.
{"title":"A web services-based architecture for mutation analysis of UML activity diagrams","authors":"I. Zualkernan, Salim M Abu-Naaj","doi":"10.1109/IEEEGCC.2006.5686219","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686219","url":null,"abstract":"Mutation testing has been used to construct test cases and to evaluate the effectiveness of testing methods. Several methods have recently been proposed to generate test sequences from higher level design models such as UML state and activity diagrams. This paper presents a scalable web-services based architecture that can evaluate the effectiveness of these methods using mutation analysis. The architecture defines several mutation operators for activity diagrams based on the Hazmat classification. The paper also presents a case study using this architecture to evaluate automatically generated tests for designers. The architecture is implemented using the Apache Axis framework.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686193
T. Mundt
Location is part of the context of an ensemble of mobile nodes in a wireless mesh network. In this paper we present a concept and an architecture for a location aware Digital Rights Management system. This system uses signal strengths in a mobile ad-hoc or mesh network to determine the position of each node and to authenticate these position information. It enables devices to control access depending on their position. We describe algorithms, protocols, security threats, and a prototype.
{"title":"Authenticated location in wireless mesh networks","authors":"T. Mundt","doi":"10.1109/IEEEGCC.2006.5686193","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686193","url":null,"abstract":"Location is part of the context of an ensemble of mobile nodes in a wireless mesh network. In this paper we present a concept and an architecture for a location aware Digital Rights Management system. This system uses signal strengths in a mobile ad-hoc or mesh network to determine the position of each node and to authenticate these position information. It enables devices to control access depending on their position. We describe algorithms, protocols, security threats, and a prototype.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"125 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686199
N. Maricar
The excessive use of energy in industrial sectors necessitates the decision maker to always question on how the energy is being used efficiently. Energy used for air-conditioning and lighting in a medium industry counts for almost 60% of the total energy used. The small percentage of energy use reduction relates to the lower product cost and higher profit margins. Therefore, it is important to the decision makers of an industry to have a proper method to audit the building plant and to come up with the practical actions needed in optimizing the use of energy, while at the same time to improve the comfort and product quality. This paper shows the data mining web application for energy audit that can be used in a typical industrial site.
{"title":"Industrial energy audit web application using data mining model","authors":"N. Maricar","doi":"10.1109/IEEEGCC.2006.5686199","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686199","url":null,"abstract":"The excessive use of energy in industrial sectors necessitates the decision maker to always question on how the energy is being used efficiently. Energy used for air-conditioning and lighting in a medium industry counts for almost 60% of the total energy used. The small percentage of energy use reduction relates to the lower product cost and higher profit margins. Therefore, it is important to the decision makers of an industry to have a proper method to audit the building plant and to come up with the practical actions needed in optimizing the use of energy, while at the same time to improve the comfort and product quality. This paper shows the data mining web application for energy audit that can be used in a typical industrial site.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686220
F. Gity, V. Ahmadi, M. Noshiravani, K. Abedi
Microscopic voids in the die attachment solder layers of high power laser diodes (HPLDs) cause to degrade their overall thermal transfer performance. This paper presents the effects of voids on the thermal conductivity, leakage and threshold currents, characteristic temperature (T0) and output power of a single quantum well (SQW) HPLD. These effects are modeled by means of finite difference method (FDM). This numerical model calculates the time-dependent axial variations of photon density, carrier density and temperature in semiconductor laser self-consistently. The temperature dependence of the wavelength shift and the thermal mode hopping concept is also demonstrated.
{"title":"Numerical analysis of void-induced thermal effects on GaAs/AlGaAs high power quantum well laser diodes","authors":"F. Gity, V. Ahmadi, M. Noshiravani, K. Abedi","doi":"10.1109/IEEEGCC.2006.5686220","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686220","url":null,"abstract":"Microscopic voids in the die attachment solder layers of high power laser diodes (HPLDs) cause to degrade their overall thermal transfer performance. This paper presents the effects of voids on the thermal conductivity, leakage and threshold currents, characteristic temperature (T0) and output power of a single quantum well (SQW) HPLD. These effects are modeled by means of finite difference method (FDM). This numerical model calculates the time-dependent axial variations of photon density, carrier density and temperature in semiconductor laser self-consistently. The temperature dependence of the wavelength shift and the thermal mode hopping concept is also demonstrated.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686180
Ahmed J. Jameel, Hadeel Adnan, Y. Xiaohu
The objective of this paper is to simulate numerically the wireless channel and the V-BLAST architecture to compare the performance of these systems using linear nulling and symbol cancellation along linear nulling for a zero forcing (ZF) and a minimum mean-squared error (MMSE) receiver. We will also compare the performance of V-BLAST and the Successive Cancellation Receiver (SUC) against the QR decomposition as an approximation of V-BLAST, trying to develop a less calculation intensive algorithm. The simulation will compute the frame error rate in both cases for different values of SNR in a flat fading channel. The transmitted symbols will be modulated using a QPSK constellation with 4 transmitters and 6 receivers. The results will be compared to those measured in the laboratory of the optimum V-BLAST.
{"title":"Performance analysis of layered space-time codes in wireless communications channels","authors":"Ahmed J. Jameel, Hadeel Adnan, Y. Xiaohu","doi":"10.1109/IEEEGCC.2006.5686180","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686180","url":null,"abstract":"The objective of this paper is to simulate numerically the wireless channel and the V-BLAST architecture to compare the performance of these systems using linear nulling and symbol cancellation along linear nulling for a zero forcing (ZF) and a minimum mean-squared error (MMSE) receiver. We will also compare the performance of V-BLAST and the Successive Cancellation Receiver (SUC) against the QR decomposition as an approximation of V-BLAST, trying to develop a less calculation intensive algorithm. The simulation will compute the frame error rate in both cases for different values of SNR in a flat fading channel. The transmitted symbols will be modulated using a QPSK constellation with 4 transmitters and 6 receivers. The results will be compared to those measured in the laboratory of the optimum V-BLAST.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686183
S. Alqahtani, Ashraf S Mhmoud
The 3G cellular mobile systems which are based on WCDMA technology are expected to be interference limited. Soft capacity is one of the main characteristics of 3G (i.e, UMTS) and it requires new radio resource management strategies to serve diverse quality of service requirements. In this paper, a WCDMA prioritized uplink call admission control (CAC) algorithm for UMTS, which combines QoS negotiation and service differentiation by priority, is studied. This CAC scheme gives preferential treatment to high priority calls, such as soft handoff calls, by reserving some bandwidth margin (soft guard channel) to reduce handoff failures. In addition, queuing is also used to enhance the handoff success probability. The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. Finally, the study considers two types of services: voice and data calls. Results indicate that this algorithm reduces the drop handoff calls and increases the total system capacity; hence the GoS and the system performance can significantly be improved especially in case of high mobility environments.
{"title":"A QoS-Aware call admission control algorithm for 3G cellular wireless networks","authors":"S. Alqahtani, Ashraf S Mhmoud","doi":"10.1109/IEEEGCC.2006.5686183","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686183","url":null,"abstract":"The 3G cellular mobile systems which are based on WCDMA technology are expected to be interference limited. Soft capacity is one of the main characteristics of 3G (i.e, UMTS) and it requires new radio resource management strategies to serve diverse quality of service requirements. In this paper, a WCDMA prioritized uplink call admission control (CAC) algorithm for UMTS, which combines QoS negotiation and service differentiation by priority, is studied. This CAC scheme gives preferential treatment to high priority calls, such as soft handoff calls, by reserving some bandwidth margin (soft guard channel) to reduce handoff failures. In addition, queuing is also used to enhance the handoff success probability. The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. Finally, the study considers two types of services: voice and data calls. Results indicate that this algorithm reduces the drop handoff calls and increases the total system capacity; hence the GoS and the system performance can significantly be improved especially in case of high mobility environments.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686248
S. Ouamour, M. Guerti, H. Sayoud
In this paper we propose a new algorithm called ISI or “Interlaced Speech Indexing”, developed and implemented for the task of speaker detection and tracking. It consists in finding the identity of a well-defined speaker and the moments of his interventions inside an audio document, in order to access rapidly, directly and easily to his speech. Speaker Tracking can broadly be divided into two problems: Locating the points of speaker change (Segmentation of the document) and looking for the target speaker in each segment using a verification system in order to extract his global speech in the document: Speaker Detection. For the segmentation task, we developed a method based on an interlaced equidistant segmentation (IES) associated with the ISI algorithm. This approach uses a speaker identification method based on Second Order Statistical Measures (SOSM). As SOSM measures, we choose the “μGc” one, which is based on the covariance matrix. However, the experiments showed that this method needs, at least, a speech length of 2 seconds, which means that the segmentation resolution will be 2 seconds. By combining the SOSM with the new Indexing technique (ISI), we demonstrate that the average segmentation error is reduced to only 0.5 second, which is more accurate and more interesting for real-time applications. Results indicate that the association SOSM-ISI provides a high resolution and a high tracking performance: the tracking score (percentage of correctly labelled segments) is 95% on TIMIT database and 92.4% on Hub4 database.
{"title":"“ISI” a new method for automatic speaker tracking and detection","authors":"S. Ouamour, M. Guerti, H. Sayoud","doi":"10.1109/IEEEGCC.2006.5686248","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686248","url":null,"abstract":"In this paper we propose a new algorithm called ISI or “Interlaced Speech Indexing”, developed and implemented for the task of speaker detection and tracking. It consists in finding the identity of a well-defined speaker and the moments of his interventions inside an audio document, in order to access rapidly, directly and easily to his speech. Speaker Tracking can broadly be divided into two problems: Locating the points of speaker change (Segmentation of the document) and looking for the target speaker in each segment using a verification system in order to extract his global speech in the document: Speaker Detection. For the segmentation task, we developed a method based on an interlaced equidistant segmentation (IES) associated with the ISI algorithm. This approach uses a speaker identification method based on Second Order Statistical Measures (SOSM). As SOSM measures, we choose the “μGc” one, which is based on the covariance matrix. However, the experiments showed that this method needs, at least, a speech length of 2 seconds, which means that the segmentation resolution will be 2 seconds. By combining the SOSM with the new Indexing technique (ISI), we demonstrate that the average segmentation error is reduced to only 0.5 second, which is more accurate and more interesting for real-time applications. Results indicate that the association SOSM-ISI provides a high resolution and a high tracking performance: the tracking score (percentage of correctly labelled segments) is 95% on TIMIT database and 92.4% on Hub4 database.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134035581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686258
A. Vallavaraj, G. S. Brian, K. David, G. M. Francis
In this paper the performance of different convolutional code generator polynomials with constraint length 7 is examined in relation to OFDM transmissions. The performance is evaluated in terms to Bit Error Rate (BER) in white Gaussian noise and Peak-to-Average Power Ratio (PAPR). It is shown that convolutional codes with identical generator polynomials result in very poor BER performance, however surprisingly, identical polynomial combinations seem to possess the advantage of reducing slightly the PAPR. The standard convolution code (7, [171, 133]), commonly used in wireless systems, is shown to possess reasonably good BER and similar PAPR performance in comparison to other non-identical polynomial codes, but possesses a slightly higher average PAPR when compared to identical generator polynomial combinations.
{"title":"Optimizing the rate 1/2; convolutional code for OFDM applications in terms of bit-error-rate and Peak-to-Average Power Ratio","authors":"A. Vallavaraj, G. S. Brian, K. David, G. M. Francis","doi":"10.1109/IEEEGCC.2006.5686258","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686258","url":null,"abstract":"In this paper the performance of different convolutional code generator polynomials with constraint length 7 is examined in relation to OFDM transmissions. The performance is evaluated in terms to Bit Error Rate (BER) in white Gaussian noise and Peak-to-Average Power Ratio (PAPR). It is shown that convolutional codes with identical generator polynomials result in very poor BER performance, however surprisingly, identical polynomial combinations seem to possess the advantage of reducing slightly the PAPR. The standard convolution code (7, [171, 133]), commonly used in wireless systems, is shown to possess reasonably good BER and similar PAPR performance in comparison to other non-identical polynomial codes, but possesses a slightly higher average PAPR when compared to identical generator polynomial combinations.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686223
A. B. Sediq, M. El-Tarhuni
An improved technique for image transmission over wireless channel with flat Rayleigh fading is considered in this paper. The proposed scheme minimizes the mean-square error in image transmission rather than the bit error rate. The minimization is done by optimizing the power allocated to each bit according to its importance to the image quality along with the use of channel coding. An algorithm that works iteratively to achieve this goal is presented and analyzed in this paper. It is shown that the proposed technique provides significant gain compared to conventional schemes that send the same power for all bits. It also provides better performance compared to the case were power allocation alone or coding alone is used, with a gain of 2 to 3 dB. It also provides a good performance in terms of reducing the peak-to-average power ratio compared to the case of power allocation alone.
{"title":"Improved image transmission over wireless channels","authors":"A. B. Sediq, M. El-Tarhuni","doi":"10.1109/IEEEGCC.2006.5686223","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686223","url":null,"abstract":"An improved technique for image transmission over wireless channel with flat Rayleigh fading is considered in this paper. The proposed scheme minimizes the mean-square error in image transmission rather than the bit error rate. The minimization is done by optimizing the power allocated to each bit according to its importance to the image quality along with the use of channel coding. An algorithm that works iteratively to achieve this goal is presented and analyzed in this paper. It is shown that the proposed technique provides significant gain compared to conventional schemes that send the same power for all bits. It also provides better performance compared to the case were power allocation alone or coding alone is used, with a gain of 2 to 3 dB. It also provides a good performance in terms of reducing the peak-to-average power ratio compared to the case of power allocation alone.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686207
H. R. Karampoorian, Papi Gh, A. Vahedi, A. Zadehgol
In this paper a new approach for optimization of high frequency transformer design is presented. The presented design method is based on a restatement of the traditional transformer design equations to include non-sinusoidal switching waveforms and high frequency skin and proximity effects. In this optimization procedure both electric and thermal effects in the transformer is considered. Wave form of voltage and current, and maximum acceptable temperature rise, are used as input data. The aim of this procedure is the selection of the smallest core that can deliver desired power, and determination of optimum flux density and current density to reach a transformer with high power density and admissible temperature rise. Since the transformer is the major contributor to the volume and weight of the Power Supply, the results of this transformer analysis can be used for entire power supply optimization as well. Finally the validity of presented method is analyzed.
{"title":"Optimum design of high frequency transformer for compact and light weight switch mode power supplies (SMPS)","authors":"H. R. Karampoorian, Papi Gh, A. Vahedi, A. Zadehgol","doi":"10.1109/IEEEGCC.2006.5686207","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686207","url":null,"abstract":"In this paper a new approach for optimization of high frequency transformer design is presented. The presented design method is based on a restatement of the traditional transformer design equations to include non-sinusoidal switching waveforms and high frequency skin and proximity effects. In this optimization procedure both electric and thermal effects in the transformer is considered. Wave form of voltage and current, and maximum acceptable temperature rise, are used as input data. The aim of this procedure is the selection of the smallest core that can deliver desired power, and determination of optimum flux density and current density to reach a transformer with high power density and admissible temperature rise. Since the transformer is the major contributor to the volume and weight of the Power Supply, the results of this transformer analysis can be used for entire power supply optimization as well. Finally the validity of presented method is analyzed.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}