Fall 2010 Seminars
|September 7, 2010||Bapeswara Rao|
Title: Determination of the Minimum Break Point Set of Directional Relay Networks based on k-trees of the Network Graphs
Abstract: We will present a new graph theory based algorithm for the determination of the minimum break point set of meshed systems. We show that if there is a k-tree in the graph G(V,E) associated with the system, then the minimum break point set has a cardinality of |E|-|V|+k. The proposed algorithm implements an iterative procedure to identify such a k-tree and having minimum k. It is found that the cardinality of the minimum break point set is 9 for the IEEE 14 bus system and 16 for the IEEE 30 bus system. These minimum values are smaller than the previously best reported results of 10 and 18 for the same systems.
|September 21, 2010||Subbaraya Yuvarajan and Xin Wang|
Title: Wind Generation Systems: Power Converters and Maximum Power Tracking
Abstract: In the first part of the seminar (Dr. Yuvarajan), an overview of wind energy systems will be given. Also a brief description of the research work being carried out in our department in the area of doubly fed induction generator (DFIG) based wind energy systems will be given. Choice of power converters for rotor injection will be the main focus. In the second part (Xin Wang), wind energy systems using permanent magnet synchronous generator (PMSG) will be described. The proposed closed loop system will use power feedback for maximum power tracking. The control of power converters and MATALB/SIMULINK simulation results will be presented.
|October 5, 2010||Aida Vosoughi, guest of Rajendra katti|
Title: Fast Message Authentication Code for Multiple Messages with Provable Security
Abstract: In this presentation, we will explain our proposed scheme for the computation of a single message authentication code (tag), for multiple messages that takes constant generation and verification time (time that is independent of the number of messages L) and has a tag length that is also independent of L. Current schemes result in tag computation and verification times proportional to L and are hence less efficient than the proposed scheme. The proposed scheme uses a modification of division by an irreducible polynomial over GF(2) in order to compress the messages first. The compressed result is then input to a pseudorandom function Fk(.) to obtain a secure tag. We prove the security of the proposed MAC scheme.
|October 19, 2010||Mark Schroeder|
Title: Entrepreneurship and Apps: Myriad Opportunities for You
Abstract: Innovation and entrepreneurship is important to industry and to our economy. However, very little is taught about these topics within engineering departments. Dr. Schroeder will be discussing the various entrepreneurship activities and opportunities that exist in the ECE department and at NDSU. He will also be discussing his own experiences on invention and forming a company this year. Finally, the world of apps, their development and their place in entrepreneurship will be discussed.
|November 2, 2010||Zhao Tan, guest of Chao You|
Title: An Asynchronous Reconfigurable Cellular Array in Conformal Computing
Abstract: Conformal Computing programs aims in building a large extensible array of cells to carry out computational purposes. Specifically, the cell structure is much simpler than conventional instruction-processing node. In this presentation, we will discuss the design of a asynchronously operated cell, which is able to perform general computation, and assembled into arrays communicating with neighbors. Design complications and general applications of cell array will also be presented.
|November 16, 2010||Dr. Thomas A Bon, guest of David Rogers|
Title: Fulbright Scholarship for University Teaching in Uzbekistan
Abstract: A traditional Fulbright Scholarship Grant provided the opportunity to teach courses at two universities in Tashkent, Uzbekistan during Spring Semester 2010. The courses taught involved applications of computer software, instrumentation, and fluid power principles. This seminar will deal with the timeline of the author in obtaining the Fulbright Scholarship and some of his experiences while teaching in Tashkent, Uzbekistan.
|November 30, 2010||Case New Holland, guest of Jacob Glower||Case New Holland - company presentation. Students will have the opportunity to find out about the company and current job openings starting December 1st.|