首页 > 最新文献

2009 IEEE Student Conference on Research and Development (SCOReD)最新文献

英文 中文
FPGA implementation of a space-time trellis decoder 一个时空网格解码器的FPGA实现
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443323
Marciano S. Calayag, Sarah Isolde T. Servano, Kristina R. Tuazon, R. U. Lorenzo, J. Marciano
This paper describes the real-time implementation of a space-time trellis encoder and decoder using the Xilinx Virtex-4™FX12 FPGA. The code uses a generator matrix designed for 4-state space-time trellis (STT) that uses Quadrature Phase Shift Keying (QPSK) modulation scheme. The decoding process was done using Maximum Likelihood (ML) through the Viterbi Algorithm. The results show that the STT decoder can successfully decipher the encoded symbols from the STT encoder and that it can fully recover the original data in the absence of noise. The data rate of the decoder was 6.25 Msymbols/s. It was shown that 14% of the logic elements in Virtex 4 FPGA were used in implementing an encoder-decoder system.
本文介绍了一种基于Xilinx Virtex-4™FX12 FPGA的时空网格编码器和解码器的实时实现。该代码使用一个为四态时空网格(STT)设计的生成器矩阵,该矩阵使用正交相移键控(QPSK)调制方案。解码过程通过Viterbi算法使用最大似然(ML)完成。实验结果表明,STT解码器能够成功地对STT编码器输入的编码符号进行译码,并能在无噪声的情况下完全恢复原始数据。解码器的数据速率为6.25 Msymbols/s。结果表明,Virtex 4 FPGA中14%的逻辑元件被用于实现编解码器系统。
{"title":"FPGA implementation of a space-time trellis decoder","authors":"Marciano S. Calayag, Sarah Isolde T. Servano, Kristina R. Tuazon, R. U. Lorenzo, J. Marciano","doi":"10.1109/SCORED.2009.5443323","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443323","url":null,"abstract":"This paper describes the real-time implementation of a space-time trellis encoder and decoder using the Xilinx Virtex-4™FX12 FPGA. The code uses a generator matrix designed for 4-state space-time trellis (STT) that uses Quadrature Phase Shift Keying (QPSK) modulation scheme. The decoding process was done using Maximum Likelihood (ML) through the Viterbi Algorithm. The results show that the STT decoder can successfully decipher the encoded symbols from the STT encoder and that it can fully recover the original data in the absence of noise. The data rate of the decoder was 6.25 Msymbols/s. It was shown that 14% of the logic elements in Virtex 4 FPGA were used in implementing an encoder-decoder system.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116168057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contingency evaluation for voltage security assessment of power systems 电力系统电压安全评估中的应急评估
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443005
M. Akorede, H. Hizam, I. Aris, M. Kadir
The demand for electricity is expected to continue to increase given the recent world population projection of about 30 % increase in the next three decades. Consequently power systems are equally expected to be more heavily loaded than before. Unfortunately the environmental and economic constraints restrict the expansion of the existing power system facilities. This scenario requires a constant attention since it could result to voltage collapse which could in turn lead to a total blackout. This paper presents the procedure required to carry out a contingency assessment and ranking of the load buses and lines of power systems for voltage security. This would ensure that power systems are operated above a desired voltage stability margin to forestall voltage collapse. The impact of single line outage contingency on the static voltage stability margin, as well as the available transfer capability across the areas of the test system, are examined in the paper.
鉴于最近世界人口预测在未来三十年将增长约30%,预计对电力的需求将继续增加。因此,预计电力系统的负荷也会比以前更大。不幸的是,环境和经济限制限制了现有电力系统设施的扩展。这种情况需要持续关注,因为它可能导致电压崩溃,进而导致完全停电。本文介绍了对电力系统的负荷母线和线路进行电压安全应急评估和排序的程序。这将确保电力系统运行在期望的电压稳定裕度之上,以防止电压崩溃。本文研究了单线停电事故对静态电压稳定裕度的影响,以及测试系统跨区域的可用传输能力。
{"title":"Contingency evaluation for voltage security assessment of power systems","authors":"M. Akorede, H. Hizam, I. Aris, M. Kadir","doi":"10.1109/SCORED.2009.5443005","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443005","url":null,"abstract":"The demand for electricity is expected to continue to increase given the recent world population projection of about 30 % increase in the next three decades. Consequently power systems are equally expected to be more heavily loaded than before. Unfortunately the environmental and economic constraints restrict the expansion of the existing power system facilities. This scenario requires a constant attention since it could result to voltage collapse which could in turn lead to a total blackout. This paper presents the procedure required to carry out a contingency assessment and ranking of the load buses and lines of power systems for voltage security. This would ensure that power systems are operated above a desired voltage stability margin to forestall voltage collapse. The impact of single line outage contingency on the static voltage stability margin, as well as the available transfer capability across the areas of the test system, are examined in the paper.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125923171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of GSM based commercial automobile tracker using PIC 18F452 and development of Google Earth embedded monitoring software 利用pic18f452实现基于GSM的商用车跟踪器,开发谷歌Earth嵌入式监控软件
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443760
Junaid Ali, Shahid Nasim, T. Ali, Naveed Ahmed, Syed Riaz un Nabi
The vehicle tracker system uses conventional GSM based communication to monitor the location of an automobile at a remote monitoring station and allow stopping the vehicle when required. The system presents the vehicle driver an option to generate an alert signal at the monitoring station using a secreted switch, when in danger. The system also monitors tracker temperature and operating voltage to ensure the correct operation of the system. The PIC18F452 controller employed provides a single unit compact module with built-in ADC and UART modules. The monitoring software is developed for a user friendly GUI with visual indication of location on Google Earth and easy to understand controls. Continuous or intermittent updating of location is possible as demanded by the situation and status of the monitored vehicle. The system is designed for commercial trackers and can be used for local guidance systems.
车辆跟踪系统使用传统的基于GSM的通信在远程监测站监视汽车的位置,并允许在需要时停止车辆。该系统为车辆驾驶员提供了一个选项,当遇到危险时,使用一个秘密开关在监测站产生警报信号。该系统还监测跟踪器的温度和工作电压,以确保系统的正确运行。采用的PIC18F452控制器提供了一个内置ADC和UART模块的单单元紧凑型模块。监控软件是为用户友好的GUI开发的,具有谷歌地球上的可视位置指示和易于理解的控制。根据被监控车辆的情况和状态要求,可以连续或间歇地更新位置。该系统是为商业跟踪器设计的,可用于局部制导系统。
{"title":"Implementation of GSM based commercial automobile tracker using PIC 18F452 and development of Google Earth embedded monitoring software","authors":"Junaid Ali, Shahid Nasim, T. Ali, Naveed Ahmed, Syed Riaz un Nabi","doi":"10.1109/SCORED.2009.5443760","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443760","url":null,"abstract":"The vehicle tracker system uses conventional GSM based communication to monitor the location of an automobile at a remote monitoring station and allow stopping the vehicle when required. The system presents the vehicle driver an option to generate an alert signal at the monitoring station using a secreted switch, when in danger. The system also monitors tracker temperature and operating voltage to ensure the correct operation of the system. The PIC18F452 controller employed provides a single unit compact module with built-in ADC and UART modules. The monitoring software is developed for a user friendly GUI with visual indication of location on Google Earth and easy to understand controls. Continuous or intermittent updating of location is possible as demanded by the situation and status of the monitored vehicle. The system is designed for commercial trackers and can be used for local guidance systems.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Identification of effective network features to detect Smurf attacks 识别有效的网络特征,检测Smurf攻击
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443345
Gholam Reza Zargar, P. Kabiri
Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.
入侵检测系统(IDS)用于检测对计算机系统的入侵企图。在入侵检测系统中,特征约简、特征提取和特征选择对提高分类精度和最小化计算复杂度具有重要意义。Smurf攻击是一种常见的拒绝服务攻击方法。本文采用主成分分析法进行特征选择和降维。实验使用了来自DARPA98数据集的TCP dump。提取了32个基本特征,用于选择TCP/IP报头中的有效特征来检测Smurf攻击。
{"title":"Identification of effective network features to detect Smurf attacks","authors":"Gholam Reza Zargar, P. Kabiri","doi":"10.1109/SCORED.2009.5443345","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443345","url":null,"abstract":"Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) 基于CUDA的蛇形加密算法实现
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443190
Anas Mohd Nazlee, F. Hussin, N. Ali
CUDA is a platform developed by Nvidia for general purpose computing on Graphic Processing Unit to utilize the parallelism capabilities. Serpent encryption is considered to have high security margin as its advantage; however it lacks in speed as its disadvantage. We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA's parallel processing capability. The proposed methodology could be used to quickly port a CPU-based algorithm for a quick gain in performance. Further tweaking, as described in this paper through the use of a profiler, would further increase the performance gain. Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100 MB/s or more than 7X performance gain.
CUDA是英伟达为图形处理单元开发的通用计算平台,以利用并行能力。蛇形加密被认为具有高安全裕度的优势;然而,它的缺点是速度不够快。我们提出了一种在CUDA上实现基于cpu的Serpent加密算法(C语言)的转换方法,以利用CUDA的并行处理能力。所提出的方法可用于快速移植基于cpu的算法,以快速获得性能。进一步的调整,如本文所述,通过使用分析器,将进一步提高性能增益。基于多个块加密并行集成的结果显示吞吐量性能高达100 MB/s或超过7倍的性能增益。
{"title":"Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)","authors":"Anas Mohd Nazlee, F. Hussin, N. Ali","doi":"10.1109/SCORED.2009.5443190","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443190","url":null,"abstract":"CUDA is a platform developed by Nvidia for general purpose computing on Graphic Processing Unit to utilize the parallelism capabilities. Serpent encryption is considered to have high security margin as its advantage; however it lacks in speed as its disadvantage. We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA's parallel processing capability. The proposed methodology could be used to quickly port a CPU-based algorithm for a quick gain in performance. Further tweaking, as described in this paper through the use of a profiler, would further increase the performance gain. Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100 MB/s or more than 7X performance gain.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
1.5V high performance OP AMP using self cascode structure 采用自级联码结构的1.5V高性能运放
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443054
Kshitij Bhardwaj, S. S. Rajput
An operational amplifier (Op Amp) based on self cascode structure is proposed that works with a supply voltage of ± .75 volt. It provides an open loop gain of 52dB with a unity gain frequency of about 17 MHz, with 145 microwatt of power consumption. Simulation results are based on p-spice simulation for 0.25μm CMOS technology.
提出了一种基于自级联码结构的运算放大器,工作电压为±0.75伏。它提供52dB的开环增益,单位增益频率约为17 MHz,功耗为145微瓦。仿真结果基于0.25μm CMOS工艺的p-spice仿真。
{"title":"1.5V high performance OP AMP using self cascode structure","authors":"Kshitij Bhardwaj, S. S. Rajput","doi":"10.1109/SCORED.2009.5443054","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443054","url":null,"abstract":"An operational amplifier (Op Amp) based on self cascode structure is proposed that works with a supply voltage of ± .75 volt. It provides an open loop gain of 52dB with a unity gain frequency of about 17 MHz, with 145 microwatt of power consumption. Simulation results are based on p-spice simulation for 0.25μm CMOS technology.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effectiveness of pre-employment screening methods 就业前筛选方法的有效性
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443256
Meshack Muderedzwa, Emanuel Nyakwende
This work looks at employment background screening methods. Effective pre-employment screening is a necessity not an option. The research assesses the effectiveness of employment background screening methods. Statistical analysis of quantitative information obtained from an email survey questionnaire, illustrates the effectiveness of background screening methods. It was discovered that background screening methods are the same. The study proposes two issues the development of an integrated online background screening approach and national online databases, in order to comprehensively screen data over the internet.
这项工作着眼于就业背景筛选方法。有效的就业前筛查是必要的,而不是一种选择。本研究评估了就业背景筛选方法的有效性。统计分析从电子邮件调查问卷中获得的定量信息,说明背景筛选方法的有效性。结果发现,背景筛选方法是相同的。该研究提出了两个问题:发展综合在线背景筛选方法和国家在线数据库,以便全面筛选互联网上的数据。
{"title":"Effectiveness of pre-employment screening methods","authors":"Meshack Muderedzwa, Emanuel Nyakwende","doi":"10.1109/SCORED.2009.5443256","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443256","url":null,"abstract":"This work looks at employment background screening methods. Effective pre-employment screening is a necessity not an option. The research assesses the effectiveness of employment background screening methods. Statistical analysis of quantitative information obtained from an email survey questionnaire, illustrates the effectiveness of background screening methods. It was discovered that background screening methods are the same. The study proposes two issues the development of an integrated online background screening approach and national online databases, in order to comprehensively screen data over the internet.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An energy-efficient and low latency (E2L2) MAC protocol for low traffic wireless sensor networks 针对低流量无线传感器网络的节能低延迟(E2L2) MAC协议
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443412
Sagar Kumar, Nishant Mittal, Shubham Gupta, N. Kalyanasundaram, R. Jain
Medium Access Control (MAC) protocols are application specific in nature. This paper proposes E2L2 MAC protocol for applications involving low network traffic but requiring prompt delivery of data. The wireless sensor networks' application area of medical monitoring and treatment is an example which encompasses such characteristics and requirements. Sensor nodes operate in half duplex mode and are defined to have two communication channels- data and control channel. While handshakes, to avoid collision between the contending sensor nodes, are done on the control channel using modified RTS and CTS packets, the data channel is utilized for data transmission. Low traffic on the network allows node reservation chain to be formed with the help of control channel handshakes, at the same time when data is flowing on the data channel. A packet reception algorithm is utilized to decide on the type of scheduling behavior to be used by the sensor nodes. Significant advantages in energy efficiency and latency are obtained as a direct impact of the protocol.
介质访问控制(MAC)协议本质上是特定于应用程序的。本文提出了E2L2 MAC协议,用于低网络流量但要求数据快速传递的应用。无线传感器网络在医疗监测和治疗领域的应用就是一个例子,它包含了这样的特点和要求。传感器节点以半双工模式工作,并定义为具有两个通信通道-数据通道和控制通道。为了避免竞争传感器节点之间的碰撞,在控制通道上使用修改后的RTS和CTS数据包进行握手,而数据通道则用于数据传输。网络上的低流量允许在数据通道上数据流动的同时,借助控制通道的握手形成节点保留链。利用数据包接收算法来决定传感器节点使用的调度行为类型。作为协议的直接影响,在能源效率和延迟方面获得了显著的优势。
{"title":"An energy-efficient and low latency (E2L2) MAC protocol for low traffic wireless sensor networks","authors":"Sagar Kumar, Nishant Mittal, Shubham Gupta, N. Kalyanasundaram, R. Jain","doi":"10.1109/SCORED.2009.5443412","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443412","url":null,"abstract":"Medium Access Control (MAC) protocols are application specific in nature. This paper proposes E2L2 MAC protocol for applications involving low network traffic but requiring prompt delivery of data. The wireless sensor networks' application area of medical monitoring and treatment is an example which encompasses such characteristics and requirements. Sensor nodes operate in half duplex mode and are defined to have two communication channels- data and control channel. While handshakes, to avoid collision between the contending sensor nodes, are done on the control channel using modified RTS and CTS packets, the data channel is utilized for data transmission. Low traffic on the network allows node reservation chain to be formed with the help of control channel handshakes, at the same time when data is flowing on the data channel. A packet reception algorithm is utilized to decide on the type of scheduling behavior to be used by the sensor nodes. Significant advantages in energy efficiency and latency are obtained as a direct impact of the protocol.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discrete-time queueing analysis of communication buffer with multiserver 多服务器通信缓冲区的离散时间排队分析
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443427
W. Shah, Syed Adeel Ali Shah, U. A. Rind, G. Das Menghwar
Discrete time queues are the significant tools which are used to analyze and model any kind of digital networks. Discrete time analysis of queues are the most important way to efficiently analyze the today's communication systems based on the digital technology. In this paper the buffer of communication network is analyzed through infinite capacity discrete time queue with multiserver. A model of network buffer is presented and performance measures of the network buffer are evaluated such as Mean number in the queue.
离散时间队列是分析和建模各种数字网络的重要工具。队列的离散时间分析是有效分析当今基于数字技术的通信系统的重要方法。本文通过多服务器的无限容量离散时间队列分析了通信网络的缓冲区问题。提出了网络缓冲区的模型,并对网络缓冲区的性能指标进行了评价,如队列中平均队列数等。
{"title":"Discrete-time queueing analysis of communication buffer with multiserver","authors":"W. Shah, Syed Adeel Ali Shah, U. A. Rind, G. Das Menghwar","doi":"10.1109/SCORED.2009.5443427","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443427","url":null,"abstract":"Discrete time queues are the significant tools which are used to analyze and model any kind of digital networks. Discrete time analysis of queues are the most important way to efficiently analyze the today's communication systems based on the digital technology. In this paper the buffer of communication network is analyzed through infinite capacity discrete time queue with multiserver. A model of network buffer is presented and performance measures of the network buffer are evaluated such as Mean number in the queue.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116498277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a mini solar power system 小型太阳能发电系统的设计
Pub Date : 2009-11-01 DOI: 10.1109/SCORED.2009.5443015
Tan Yu Hee, M. Isa
This paper presents the design of mini solar power system. The mini solar power system is designed based on photovoltaic cell generation and 12V direct current system. The main part of the solar power system is the charge controller that is analysed and presented in this paper. The overall system will be constructed for measurement and testing.
本文介绍了一种小型太阳能发电系统的设计。基于光伏电池发电和12V直流系统,设计了微型太阳能发电系统。本文对太阳能发电系统的主要部分——充电控制器进行了分析和介绍。将构建整个系统进行测量和测试。
{"title":"Design of a mini solar power system","authors":"Tan Yu Hee, M. Isa","doi":"10.1109/SCORED.2009.5443015","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443015","url":null,"abstract":"This paper presents the design of mini solar power system. The mini solar power system is designed based on photovoltaic cell generation and 12V direct current system. The main part of the solar power system is the charge controller that is analysed and presented in this paper. The overall system will be constructed for measurement and testing.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 IEEE Student Conference on Research and Development (SCOReD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1