Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388348
M. A. Amiri, C. Balanis, C. Birtcher
A wideband semi-periodic circular high impedance surface for loop antenna applications is designed. The surface is illuminated with a plane wavw whose electric field is of phi component. A loop antenna is placed above the surface afterwards to find the operational bandwidth of the structure.
{"title":"Reflection phase characterization of wideband semi-periodic circular high impedance surface","authors":"M. A. Amiri, C. Balanis, C. Birtcher","doi":"10.1109/ATC.2015.7388348","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388348","url":null,"abstract":"A wideband semi-periodic circular high impedance surface for loop antenna applications is designed. The surface is illuminated with a plane wavw whose electric field is of phi component. A loop antenna is placed above the surface afterwards to find the operational bandwidth of the structure.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130962164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388374
Dang Vu Quoc, H. T. Van, Trang Hoang
In this work, a proposed high speed continuous speech recognition algorithm which was designed towards embedded devices and experimented on Vietnamese will be presented. To be more specific, this algorithm has used a transition network (TN) as search-space, which integrates many language model systems and condensed by the algorithm format to both reduce processing time and memory usage while matching. The final results which were evaluated on 100 speech samples have achieved the high accuracy of 92.24% on an embedded device named WandBoard Rev C1 kit.
{"title":"Vietnamese sentence recognition algorithm in embedded device based on specialized transition network","authors":"Dang Vu Quoc, H. T. Van, Trang Hoang","doi":"10.1109/ATC.2015.7388374","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388374","url":null,"abstract":"In this work, a proposed high speed continuous speech recognition algorithm which was designed towards embedded devices and experimented on Vietnamese will be presented. To be more specific, this algorithm has used a transition network (TN) as search-space, which integrates many language model systems and condensed by the algorithm format to both reduce processing time and memory usage while matching. The final results which were evaluated on 100 speech samples have achieved the high accuracy of 92.24% on an embedded device named WandBoard Rev C1 kit.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388381
C. Huynh, C. Nguyen
The design of a 0.18μm BiCMOS upconverter in Ka-band is presented. The upconverter consists of a single-ended-to-differential active balun, double-balanced Gilbert mixer cell, differential amplifier, and band pass filter. The input active balun is used to facilitate on-wafer characterization from a single-ended IF signal. With an LO power of 0.6 dBm, the upconverter exhibits a conversion gain of 22 dB, 1-dB input power of -23.8 dBm, 1-dB output power of -2.4 dBm, and maximum output power of 1 dBm at 35 GHz, while consuming a DC current of 40 mA from a supply voltage of 1.8V.
{"title":"Design of a Ka-band 0.18-μm BiCMOS upconverter","authors":"C. Huynh, C. Nguyen","doi":"10.1109/ATC.2015.7388381","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388381","url":null,"abstract":"The design of a 0.18μm BiCMOS upconverter in Ka-band is presented. The upconverter consists of a single-ended-to-differential active balun, double-balanced Gilbert mixer cell, differential amplifier, and band pass filter. The input active balun is used to facilitate on-wafer characterization from a single-ended IF signal. With an LO power of 0.6 dBm, the upconverter exhibits a conversion gain of 22 dB, 1-dB input power of -23.8 dBm, 1-dB output power of -2.4 dBm, and maximum output power of 1 dBm at 35 GHz, while consuming a DC current of 40 mA from a supply voltage of 1.8V.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388423
Yunsung Choi, Dongwoo Kim
In this paper, we present secure communication system with torch nodes. With a channel state information (CSI) between source and eavesdropper, a Alice null the received signal for eavesdropper with zero forcing beamforming (ZFB). But the CSI between source and eavesdropper is hard to achieve in secure communication. In this work, we propose the torch node in secure communication. The torch is assist node for secure communication that only report the CSI between source and the torch node. And we consider that the CSI of the torch node and some of eavesdroppers that close to torch node has a correlation. With this assumption, the Alice improve the secure outage with the CSI from the torch node. The study show that when transmit antennas of source is many then torch node bring the transmit power gain.
{"title":"Performance analysis with and without torch node in secure communications","authors":"Yunsung Choi, Dongwoo Kim","doi":"10.1109/ATC.2015.7388423","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388423","url":null,"abstract":"In this paper, we present secure communication system with torch nodes. With a channel state information (CSI) between source and eavesdropper, a Alice null the received signal for eavesdropper with zero forcing beamforming (ZFB). But the CSI between source and eavesdropper is hard to achieve in secure communication. In this work, we propose the torch node in secure communication. The torch is assist node for secure communication that only report the CSI between source and the torch node. And we consider that the CSI of the torch node and some of eavesdroppers that close to torch node has a correlation. With this assumption, the Alice improve the secure outage with the CSI from the torch node. The study show that when transmit antennas of source is many then torch node bring the transmit power gain.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388418
Dae-Kyo Jeong, Dongwoo Kim
In this paper, we present the exact outage analysis of the two-user downlink systems using the threshold-based opportunistic zero-forcing beamforming (TBO-ZFB) with a second mobile station's outage constraint. TBO-ZFB dynamically switches between a beamforming weight vector and a zero-forcing beamforming (ZFB) weight vector (using linear precoding for first mobile station (MS)) by comparing the values between a second MS's signal-to-noise ratio (SNR) and a predetermined threshold. We provide that the threshold is satisfied with the second MS's outage constraint. Numerical results show that the outage performance of first MS using TBO-ZFB is better than the ZFB and the threshold is satisfied with the second MS's outage constraints.
{"title":"Threshold-based opportunistic zero-forcing beamforming for two-user downlink systems with outage constraints","authors":"Dae-Kyo Jeong, Dongwoo Kim","doi":"10.1109/ATC.2015.7388418","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388418","url":null,"abstract":"In this paper, we present the exact outage analysis of the two-user downlink systems using the threshold-based opportunistic zero-forcing beamforming (TBO-ZFB) with a second mobile station's outage constraint. TBO-ZFB dynamically switches between a beamforming weight vector and a zero-forcing beamforming (ZFB) weight vector (using linear precoding for first mobile station (MS)) by comparing the values between a second MS's signal-to-noise ratio (SNR) and a predetermined threshold. We provide that the threshold is satisfied with the second MS's outage constraint. Numerical results show that the outage performance of first MS using TBO-ZFB is better than the ZFB and the threshold is satisfied with the second MS's outage constraints.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388421
Abheek Saha
MIMO broadcast networks are an emerging technique for maximizing resource sharing in dense cellular networks; by using techniques based on dirty-paper coding, it is possible for a single transmitter to simultaneously service multiple receivers, by pre-subtracting interference. A different but related problem is InterCell Interference Coordination, where two network nodes with overlapping coverage regions simultaneously transmit to UEs attached to them, but coordinate so as to not cause cross-cell interference. In this paper, we propose a novel method called `Active NullForming' which mitigates cross-cell interference using interference presubtraction. We show that we can achieve significant performance improvement over existing methods such as zero-forcing beamforming.
{"title":"A novel technique for cross-cell interference mitigation using joint encoding","authors":"Abheek Saha","doi":"10.1109/ATC.2015.7388421","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388421","url":null,"abstract":"MIMO broadcast networks are an emerging technique for maximizing resource sharing in dense cellular networks; by using techniques based on dirty-paper coding, it is possible for a single transmitter to simultaneously service multiple receivers, by pre-subtracting interference. A different but related problem is InterCell Interference Coordination, where two network nodes with overlapping coverage regions simultaneously transmit to UEs attached to them, but coordinate so as to not cause cross-cell interference. In this paper, we propose a novel method called `Active NullForming' which mitigates cross-cell interference using interference presubtraction. We show that we can achieve significant performance improvement over existing methods such as zero-forcing beamforming.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388332
Minh-Huan Vo, A. Dao
In this paper, we compared various power gating schemes in terms of energy loss, crossover time, and wake-up time using the 45-nm Predictive Technology Model. In this comparison, the Dual-Switch Power Gating (DSPG) shows smaller energy loss, shorter crossover time, faster wake-up time than the other power gating schemes such as the Single-Switch and Charge-Recycled Power Gating schemes. Based on these advantages, the DSPG is suggested in this paper as a viable candidate suitable to a fine-grain leakage control scheme, where logic blocks go in and out very frequently and shortly between the active and sleep modes.
{"title":"Dual-switch power gating technique with small energy loss, low area, short crossover time, and fast wake-up time for fine-grain leakage controlled VLSIs","authors":"Minh-Huan Vo, A. Dao","doi":"10.1109/ATC.2015.7388332","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388332","url":null,"abstract":"In this paper, we compared various power gating schemes in terms of energy loss, crossover time, and wake-up time using the 45-nm Predictive Technology Model. In this comparison, the Dual-Switch Power Gating (DSPG) shows smaller energy loss, shorter crossover time, faster wake-up time than the other power gating schemes such as the Single-Switch and Charge-Recycled Power Gating schemes. Based on these advantages, the DSPG is suggested in this paper as a viable candidate suitable to a fine-grain leakage control scheme, where logic blocks go in and out very frequently and shortly between the active and sleep modes.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388330
S. Nguyen, N. N. Le, Phat Tan Lam, E. Fribourg-Blanc, C. M. Dang, S. Tedjini
In this paper, we present a novel wireless sensor for the detection of food quality. The main idea is to integrate the sensing capability into UHF RFID tags thanks to the relation between physical read-range and permittivity of object in that we labeled RFID tags. From the knowledge in variation of food permittivity in function to time by experimental characterization, it is possible to detect the contamination time from which the food becomes improper for consumption based on the measurement of read-range with designed sensing tags. This low-cost UHF RFID passive sensor was designed and experimentally tested on beef with the same storage conditions in supermarket. The tendency agreement between experimental and simulation results show the potential of this technique for real-world applications in food traceability.
{"title":"A wireless sensor for food quality detection by UHF RFID passive tags","authors":"S. Nguyen, N. N. Le, Phat Tan Lam, E. Fribourg-Blanc, C. M. Dang, S. Tedjini","doi":"10.1109/ATC.2015.7388330","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388330","url":null,"abstract":"In this paper, we present a novel wireless sensor for the detection of food quality. The main idea is to integrate the sensing capability into UHF RFID tags thanks to the relation between physical read-range and permittivity of object in that we labeled RFID tags. From the knowledge in variation of food permittivity in function to time by experimental characterization, it is possible to detect the contamination time from which the food becomes improper for consumption based on the measurement of read-range with designed sensing tags. This low-cost UHF RFID passive sensor was designed and experimentally tested on beef with the same storage conditions in supermarket. The tendency agreement between experimental and simulation results show the potential of this technique for real-world applications in food traceability.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129903848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388399
N. Tai, L. T. Truyen, D. H. Chuong, N. T. Thanh
This paper proposes a two-DOF (degree-of-freedom) positioning stage. The stage provides nano scales planar motion along the X axis and rotational motion along the Z axis. The rotation can be controlled in both directions (clockwise and anticlockwise) and the rotation angle is not limited. The stage is based on a compliant mechanism with flexure hinges and the two piezoelectric elements which are used as motion excitation sources. The SIDM (Smooth Impact Driving Mechanism) is applied for rotation motion. To evaluate the designed stage, the finite element analysis was applied by means of commercial software ANSYS. A real prototype of the designed stage was manufactured. In order to evaluate the stage dynamic behavior, a series of experiments were carried out.
{"title":"Development of rotary actuator using piezolelectric element","authors":"N. Tai, L. T. Truyen, D. H. Chuong, N. T. Thanh","doi":"10.1109/ATC.2015.7388399","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388399","url":null,"abstract":"This paper proposes a two-DOF (degree-of-freedom) positioning stage. The stage provides nano scales planar motion along the X axis and rotational motion along the Z axis. The rotation can be controlled in both directions (clockwise and anticlockwise) and the rotation angle is not limited. The stage is based on a compliant mechanism with flexure hinges and the two piezoelectric elements which are used as motion excitation sources. The SIDM (Smooth Impact Driving Mechanism) is applied for rotation motion. To evaluate the designed stage, the finite element analysis was applied by means of commercial software ANSYS. A real prototype of the designed stage was manufactured. In order to evaluate the stage dynamic behavior, a series of experiments were carried out.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ATC.2015.7388367
T. Nguyen, Duan Dinh Nguyen
In this paper, we introduce and investigate a new robust blind video watermarking. Unlike some existing methods based on spatial domain watermarking techniques, the even-odd quantization algorithm is applied in our paper to embed all bit plane images decomposed from a single watermark image into only selected robust Discrete Cosine Transform (DCT) coefficients of 8×8 blocks from a host video. As a result, our method not only has high capacity of embedded information but also obtains high quality of watermarked video. Moreover, in order to obtain the security, a secret key is used to scramble embedded blocks and the watermark image is extracted without the host video. The experimental results demonstrate that our proposed method is robust against attacks of compression and addition of noise.
{"title":"A robust blind video watermarking in DCT domain using even-odd quantization technique","authors":"T. Nguyen, Duan Dinh Nguyen","doi":"10.1109/ATC.2015.7388367","DOIUrl":"https://doi.org/10.1109/ATC.2015.7388367","url":null,"abstract":"In this paper, we introduce and investigate a new robust blind video watermarking. Unlike some existing methods based on spatial domain watermarking techniques, the even-odd quantization algorithm is applied in our paper to embed all bit plane images decomposed from a single watermark image into only selected robust Discrete Cosine Transform (DCT) coefficients of 8×8 blocks from a host video. As a result, our method not only has high capacity of embedded information but also obtains high quality of watermarked video. Moreover, in order to obtain the security, a secret key is used to scramble embedded blocks and the watermark image is extracted without the host video. The experimental results demonstrate that our proposed method is robust against attacks of compression and addition of noise.","PeriodicalId":142783,"journal":{"name":"2015 International Conference on Advanced Technologies for Communications (ATC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}