首页 > 最新文献

2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)最新文献

英文 中文
Knowledge uncertainty supervision in automatic control and measurements 自动控制与测量中的知识不确定度监督
G. D'Antona
This paper presents three engineering applications concerning power system where knowledge uncertainty is managed properly in order to be able to control the process appropriately. The three examples reported are very different from each other especially for what concerns the complexity of the process involved, the time available for the decision process and for the cost of the uncertainty supervision system.
本文介绍了电力系统中知识不确定性的三种工程应用,通过对知识不确定性的合理管理,实现对过程的合理控制。所报告的三个例子彼此非常不同,特别是涉及所涉及的过程的复杂性,决策过程的可用时间和不确定性监督系统的成本。
{"title":"Knowledge uncertainty supervision in automatic control and measurements","authors":"G. D'Antona","doi":"10.1109/KBEI.2015.7436021","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436021","url":null,"abstract":"This paper presents three engineering applications concerning power system where knowledge uncertainty is managed properly in order to be able to control the process appropriately. The three examples reported are very different from each other especially for what concerns the complexity of the process involved, the time available for the decision process and for the cost of the uncertainty supervision system.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125323778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cuckoo search algorithm and its application for secondary protein structure prediction 杜鹃搜索算法及其在二级蛋白质结构预测中的应用
H. Rakhshani, A. Rahati, E. Dehghanian
Protein structure prediction (PSP) is one of the most challenging problems in the field of structural bioinformatics. Determining native conformation of a protein can affect its functions and plays an important role in drug design and disease prediction. Therefore, researchers are trying to come up with different techniques in order to find more precise structures. This study investigates application of cuckoo search (CS) algorithm on the protein folding problem based on AB off-lattice model. Experiments are conducted on a set of protein sequences that are suggested in the literature. For the purpose of evaluation, we used state-of-the-art and recently developed algorithms. Comparison of the statistical results demonstrates that CS outperforms other algorithms in a meaningful way.
蛋白质结构预测是结构生物信息学领域最具挑战性的问题之一。确定蛋白质的天然构象可以影响其功能,在药物设计和疾病预测中起着重要作用。因此,研究人员正试图想出不同的技术,以找到更精确的结构。研究了基于AB离格模型的布谷鸟搜索(CS)算法在蛋白质折叠问题中的应用。实验是根据文献中提出的一组蛋白质序列进行的。为了评估的目的,我们使用了最新开发的最先进的算法。统计结果的对比表明,CS算法的性能明显优于其他算法。
{"title":"Cuckoo search algorithm and its application for secondary protein structure prediction","authors":"H. Rakhshani, A. Rahati, E. Dehghanian","doi":"10.1109/KBEI.2015.7436080","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436080","url":null,"abstract":"Protein structure prediction (PSP) is one of the most challenging problems in the field of structural bioinformatics. Determining native conformation of a protein can affect its functions and plays an important role in drug design and disease prediction. Therefore, researchers are trying to come up with different techniques in order to find more precise structures. This study investigates application of cuckoo search (CS) algorithm on the protein folding problem based on AB off-lattice model. Experiments are conducted on a set of protein sequences that are suggested in the literature. For the purpose of evaluation, we used state-of-the-art and recently developed algorithms. Comparison of the statistical results demonstrates that CS outperforms other algorithms in a meaningful way.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Investigating NFC technology from the perspective of security, analysis of attacks and existing risk 从安全角度研究NFC技术,分析攻击和存在的风险
S. Shariati, A. Abouzarjomehri, M. Hossein Ahmadzadegan
Near Field Communication (NFC) is a short-range wireless communications technology that is usually less than 10 cm. This technology has many applications in commercial applications like electronic payments through smartphones, transfer images via mobile phones and tablets, direct print from mobile phones and tablets, etc. Today, with the development of mobile devices such as mobile phones, tablets and the increasing demand and popularity of these types of devices on the market, every day applications develop in this area to accelerate the current affairs of users as well as higher work efficiency. The transfer in technology is done by bringing two NFC-enabled devices to each other at a distance of 3 to 5 inches. In this paper, the NFC technology with approach of security, analysis of attacks and the risk is assessed.
近场通信(NFC)是一种通常小于10厘米的短距离无线通信技术。该技术在商业应用中有许多应用,如通过智能手机进行电子支付,通过手机和平板电脑传输图像,从手机和平板电脑直接打印等。如今,随着手机、平板电脑等移动设备的发展,以及这类设备在市场上的需求日益增加和普及,每天都在开发这方面的应用程序,以加快用户的时事处理,提高工作效率。技术的转移是通过将两个支持nfc的设备放在3到5英寸的距离上来完成的。本文对NFC技术进行了安全分析、攻击分析和风险评估。
{"title":"Investigating NFC technology from the perspective of security, analysis of attacks and existing risk","authors":"S. Shariati, A. Abouzarjomehri, M. Hossein Ahmadzadegan","doi":"10.1109/KBEI.2015.7436197","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436197","url":null,"abstract":"Near Field Communication (NFC) is a short-range wireless communications technology that is usually less than 10 cm. This technology has many applications in commercial applications like electronic payments through smartphones, transfer images via mobile phones and tablets, direct print from mobile phones and tablets, etc. Today, with the development of mobile devices such as mobile phones, tablets and the increasing demand and popularity of these types of devices on the market, every day applications develop in this area to accelerate the current affairs of users as well as higher work efficiency. The transfer in technology is done by bringing two NFC-enabled devices to each other at a distance of 3 to 5 inches. In this paper, the NFC technology with approach of security, analysis of attacks and the risk is assessed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A two-phase sampling algorithm for social networks 社交网络的两阶段抽样算法
Zeinab S. Jalali, Alireza Rezvanian, M. Meybodi
In recent years, the data used for analysis of social networks become very huge and restrictive so that it can be used an appropriate and small sampled network of original network for analysis goals. Sampling social network is referred to collect a small subgraph of original network with high property similarities between them. Due to important impact of sampling on the social network analyses, many algorithms have been proposed in the field of network sampling. In this paper, we propose a two-phase algorithm for sampling online social networks. At first phase, our algorithm iteratively constructs several set of minimum spanning trees (MST) of network. In the second phase, the proposed algorithm sorts vertices of MSTs and merge them to form a sampled network. Several simulation experiments are conducted to examine the performance of the proposed algorithm on different networks. The obtained results are compared with counterpart algorithms in terms of KS-test and ND-test. From the results, it can be observed that the proposed algorithm outperforms the existing algorithms.
近年来,用于分析社交网络的数据变得非常庞大和具有限制性,因此可以从原始网络中选取合适的小样本网络作为分析目标。抽样社会网络是指从原始网络中抽取一个性质相似度高的小子图。由于抽样对社会网络分析的重要影响,在网络抽样领域已经提出了许多算法。本文提出了一种在线社交网络采样的两阶段算法。首先,我们的算法迭代地构造了若干组网络的最小生成树(MST)。在第二阶段,提出的算法对mst的顶点进行排序并合并形成采样网络。通过仿真实验验证了该算法在不同网络上的性能。将所得结果与相应算法在KS-test和ND-test方面进行了比较。从结果可以看出,该算法优于现有算法。
{"title":"A two-phase sampling algorithm for social networks","authors":"Zeinab S. Jalali, Alireza Rezvanian, M. Meybodi","doi":"10.1109/KBEI.2015.7436212","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436212","url":null,"abstract":"In recent years, the data used for analysis of social networks become very huge and restrictive so that it can be used an appropriate and small sampled network of original network for analysis goals. Sampling social network is referred to collect a small subgraph of original network with high property similarities between them. Due to important impact of sampling on the social network analyses, many algorithms have been proposed in the field of network sampling. In this paper, we propose a two-phase algorithm for sampling online social networks. At first phase, our algorithm iteratively constructs several set of minimum spanning trees (MST) of network. In the second phase, the proposed algorithm sorts vertices of MSTs and merge them to form a sampled network. Several simulation experiments are conducted to examine the performance of the proposed algorithm on different networks. The obtained results are compared with counterpart algorithms in terms of KS-test and ND-test. From the results, it can be observed that the proposed algorithm outperforms the existing algorithms.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124083163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An efficient modeling algorithm for intrusion detection systems using C5.0 and Bayesian Network structures 基于C5.0和贝叶斯网络结构的入侵检测系统高效建模算法
Fariba Younes Nia, M. Khalili
Although different models have been offered for intrusion detection systems (IDSs) in computer networks, it is difficult to distinct unauthorized connections from authorized ones because intruders act similar to normal users. In this paper we propose an efficient modeling algorithm for applying in IDSs to improve the quality of detections. In the proposed algorithm, the integration of Tree Augmented Naive Bayes (TAN) in Bayesian Network (BN) and Boosting in C5.0 decision tree structures are used to take their advantages and avoid their weaknesses. These structures are adopted once individually. Then the agreements of their combination are considered. In addition, in implementation process, the KDDCUP'99 data set and the other widely-used measures in IDSs problem are used. The experimental results show that the proposed algorithm not only achieves satisfactory results in accuracy and false alarm rate, but also improves the existing works.
尽管针对计算机网络中的入侵检测系统(ids)提出了不同的模型,但由于入侵者的行为与正常用户相似,因此很难区分未经授权的连接和授权的连接。在本文中,我们提出了一种有效的建模算法用于ids,以提高检测质量。该算法将贝叶斯网络(BN)中的树增广朴素贝叶斯(TAN)与C5.0决策树结构中的Boosting相结合,取长补短。这些结构单独采用一次。然后考虑两者合并的一致性。此外,在实施过程中,还使用了KDDCUP'99数据集和其他在IDSs问题中广泛使用的测量方法。实验结果表明,该算法不仅在准确率和虚警率方面取得了令人满意的效果,而且对现有的工作进行了改进。
{"title":"An efficient modeling algorithm for intrusion detection systems using C5.0 and Bayesian Network structures","authors":"Fariba Younes Nia, M. Khalili","doi":"10.1109/KBEI.2015.7436203","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436203","url":null,"abstract":"Although different models have been offered for intrusion detection systems (IDSs) in computer networks, it is difficult to distinct unauthorized connections from authorized ones because intruders act similar to normal users. In this paper we propose an efficient modeling algorithm for applying in IDSs to improve the quality of detections. In the proposed algorithm, the integration of Tree Augmented Naive Bayes (TAN) in Bayesian Network (BN) and Boosting in C5.0 decision tree structures are used to take their advantages and avoid their weaknesses. These structures are adopted once individually. Then the agreements of their combination are considered. In addition, in implementation process, the KDDCUP'99 data set and the other widely-used measures in IDSs problem are used. The experimental results show that the proposed algorithm not only achieves satisfactory results in accuracy and false alarm rate, but also improves the existing works.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127852605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A low-phase-noise millimeter wave quadrature VCO in 180nm CMOS process 一种180nm CMOS制程的毫米波正交压控振荡器
Z. Kashani, A. Nabavi
This paper presents a new circuit topology for a 58-GHz low phase noise quadrature voltage control oscillator (QVCO) in a standard 180nm CMOS technology. Selecting a low phase noise Colpitts oscillator core with low power consumption and improved phase noise performance, and using self-injection coupling result in a phase noise of -106 dBc/Hz at 1MHz offset of a 58GHZ carrier. The power consumption for the entire circuit, including the buffers and main cores, is 10.6mA from a 1.8V supply. This design has the lowest phase noise and better figure-of-merits compared to previous works.
本文提出了一种适用于标准180nm CMOS技术的58 ghz低相位噪声正交压控振荡器(QVCO)的新电路拓扑结构。选择低功耗、提高相位噪声性能的低相位噪声Colpitts振荡器核心,并采用自注入耦合,在58GHZ载波1MHz偏移时相位噪声为-106 dBc/Hz。整个电路的功耗,包括缓冲器和主核心,在1.8V电源下为10.6mA。与以往的设计相比,该设计具有最低的相位噪声和更好的性能指标。
{"title":"A low-phase-noise millimeter wave quadrature VCO in 180nm CMOS process","authors":"Z. Kashani, A. Nabavi","doi":"10.1109/KBEI.2015.7436217","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436217","url":null,"abstract":"This paper presents a new circuit topology for a 58-GHz low phase noise quadrature voltage control oscillator (QVCO) in a standard 180nm CMOS technology. Selecting a low phase noise Colpitts oscillator core with low power consumption and improved phase noise performance, and using self-injection coupling result in a phase noise of -106 dBc/Hz at 1MHz offset of a 58GHZ carrier. The power consumption for the entire circuit, including the buffers and main cores, is 10.6mA from a 1.8V supply. This design has the lowest phase noise and better figure-of-merits compared to previous works.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images 提高了DCT方法在复杂光滑图像中检测复制-移动伪造的效率
Elham Mohebbian, M. Hariri
Digital images are easy to manipulate and edit due to advances in computers and image editing software. Copy-move forgery is one of the most popular tampering artifacts in digital images that used by image forgers. In this paper, a DCT-based method is developed to detect image forgery considering the complexity of input image. To detect duplicate region, images are divided into two categories: smooth and complex. To extract features discrete cosine transform (DCT) is applied to each block. Experimental results show that our proposed method is able to precisely detect duplicated regions even when the image was undergone several image manipulations like lossy JPEG compression, Gaussian blur filtering and Gaussian white noise contamination.
由于计算机和图像编辑软件的进步,数字图像易于操作和编辑。复制-移动伪造是图像伪造者在数字图像中最常用的篡改手法之一。考虑到输入图像的复杂性,提出了一种基于dct的图像伪造检测方法。为了检测重复区域,将图像分为平滑和复杂两类。为了提取特征,对每个块应用离散余弦变换(DCT)。实验结果表明,即使经过有损JPEG压缩、高斯模糊滤波和高斯白噪声污染等多种图像处理,该方法仍能准确检测出重复区域。
{"title":"Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images","authors":"Elham Mohebbian, M. Hariri","doi":"10.1109/KBEI.2015.7436084","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436084","url":null,"abstract":"Digital images are easy to manipulate and edit due to advances in computers and image editing software. Copy-move forgery is one of the most popular tampering artifacts in digital images that used by image forgers. In this paper, a DCT-based method is developed to detect image forgery considering the complexity of input image. To detect duplicate region, images are divided into two categories: smooth and complex. To extract features discrete cosine transform (DCT) is applied to each block. Experimental results show that our proposed method is able to precisely detect duplicated regions even when the image was undergone several image manipulations like lossy JPEG compression, Gaussian blur filtering and Gaussian white noise contamination.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"397 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133586865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Variable step size modified clipped LMS algorithm 可变步长修改的剪切LMS算法
Amin Aref, M. Lotfizad
In this paper we introduce an Modified Clipped LMS (MCLMS) algorithm with a variable step size. In the MCLMS algorithm two parameters, the step size and the threshold control the convergence rate of the adaptive filter coefficients and also determine the final mean-square error. The computational complexity decreased dramatically by a large threshold. However, this selection results in a low convergence rate. Since the convergence time is inversely proportional to the step size, a large step size is often selected for fast convergence. But a large step size results in an increased final mean square error. Therefore in this paper we choose a large threshold and propose a variable step size for the MCLMS algorithm. The advantages of this proposed variable step size and a large threshold selection are that the computation complexity is low, final mean square error is low and that the convergence is fast.
本文介绍了一种可变步长的改进剪切LMS (MCLMS)算法。在MCLMS算法中,步长和阈值两个参数控制了自适应滤波系数的收敛速度,也决定了最终的均方误差。计算复杂度显著降低了一个较大的阈值。然而,这种选择导致了较低的收敛速度。由于收敛时间与步长成反比,为了快速收敛,通常选择较大的步长。但较大的步长会导致最终均方误差增大。因此,本文选择一个较大的阈值,并提出一个可变步长的MCLMS算法。这种变步长和大阈值选择的优点是计算复杂度低,最终均方误差小,收敛速度快。
{"title":"Variable step size modified clipped LMS algorithm","authors":"Amin Aref, M. Lotfizad","doi":"10.1109/KBEI.2015.7436103","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436103","url":null,"abstract":"In this paper we introduce an Modified Clipped LMS (MCLMS) algorithm with a variable step size. In the MCLMS algorithm two parameters, the step size and the threshold control the convergence rate of the adaptive filter coefficients and also determine the final mean-square error. The computational complexity decreased dramatically by a large threshold. However, this selection results in a low convergence rate. Since the convergence time is inversely proportional to the step size, a large step size is often selected for fast convergence. But a large step size results in an increased final mean square error. Therefore in this paper we choose a large threshold and propose a variable step size for the MCLMS algorithm. The advantages of this proposed variable step size and a large threshold selection are that the computation complexity is low, final mean square error is low and that the convergence is fast.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A 2.8-10.6GHz Low-Power Low-Noise Amplifier for Ultra-Wideband Recivers 用于超宽带接收机的2.8-10.6GHz低功耗低噪声放大器
H. Karrari, E. N. Aghdam
In this paper, a 2.8-10.6GHz low-noise amplifier for ultra-wideband applications is presented. The proposed UWB-LNA uses inter-stage technique (current reuse topology with a peaking inductor) to achieve low power consumption. It is designed using TSMC 0.18 μm CMOS technology. Simulation results show the LNA achieves flat S21 of 12.32 ± 1.07 dB, S11 below -7.45 dB, S22 below -8.45 dB, S12 below -47 dB and flat NF of 3.2 ± 0.2 dB over the 2.8-10.6-GHz band of interest, with only power consumption of 5.74mW.
本文提出了一种用于超宽带应用的2.8-10.6GHz低噪声放大器。提出的UWB-LNA采用级间技术(带峰值电感的电流复用拓扑)来实现低功耗。采用台积电0.18 μm CMOS工艺设计。仿真结果表明,该LNA在2.8-10.6 ghz频段内实现了12.32±1.07 dB的平坦S21、-7.45 dB以下的S11、-8.45 dB以下的S22、-47 dB以下的S12和3.2±0.2 dB的平坦NF,功耗仅为5.74mW。
{"title":"A 2.8-10.6GHz Low-Power Low-Noise Amplifier for Ultra-Wideband Recivers","authors":"H. Karrari, E. N. Aghdam","doi":"10.1109/KBEI.2015.7436164","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436164","url":null,"abstract":"In this paper, a 2.8-10.6GHz low-noise amplifier for ultra-wideband applications is presented. The proposed UWB-LNA uses inter-stage technique (current reuse topology with a peaking inductor) to achieve low power consumption. It is designed using TSMC 0.18 μm CMOS technology. Simulation results show the LNA achieves flat S21 of 12.32 ± 1.07 dB, S11 below -7.45 dB, S22 below -8.45 dB, S12 below -47 dB and flat NF of 3.2 ± 0.2 dB over the 2.8-10.6-GHz band of interest, with only power consumption of 5.74mW.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132202833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-focus image fusion in DCT domain based on correlation coefficient 基于相关系数的DCT域多焦点图像融合
M. A. Naji, A. Aghagolzadeh
Multi-focus image fusion is used to collect useful and necessary information from input images with different focus depths in order to create an output image that ideally has all information from input images. In this article, an efficient, new and simple method is proposed for multi-focus image fusion which is based on correlation coefficient calculation in the discrete cosine transform (DCT) domain. Image fusion algorithms which are based on DCT are very appropriate, and they consume less time and energy, especially when JPEG images are used in visual sensor networks (VSN). The proposed method evaluates the amount of changes of the input multi-focus images when they pass through a low pass filter, and then selects the block which has been changed more. In order to assess the algorithm performance, a lot of pair multi-focused images which are coded as JPEG were used. The results show that the output image quality is better than that of the previous methods.
多焦点图像融合用于从不同聚焦深度的输入图像中收集有用和必要的信息,以创建理想的包含所有输入图像信息的输出图像。本文提出了一种基于离散余弦变换(DCT)域相关系数计算的高效、简便的多焦点图像融合方法。基于DCT的图像融合算法是一种非常合适的图像融合算法,特别是在视觉传感器网络(VSN)中使用JPEG图像时,它节省了大量的时间和精力。该方法对输入的多焦点图像经过低通滤波后的变化量进行评估,然后选择变化较大的块。为了评估算法的性能,使用了大量编码为JPEG的对多聚焦图像。结果表明,该方法的输出图像质量优于以往的方法。
{"title":"Multi-focus image fusion in DCT domain based on correlation coefficient","authors":"M. A. Naji, A. Aghagolzadeh","doi":"10.1109/KBEI.2015.7436118","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436118","url":null,"abstract":"Multi-focus image fusion is used to collect useful and necessary information from input images with different focus depths in order to create an output image that ideally has all information from input images. In this article, an efficient, new and simple method is proposed for multi-focus image fusion which is based on correlation coefficient calculation in the discrete cosine transform (DCT) domain. Image fusion algorithms which are based on DCT are very appropriate, and they consume less time and energy, especially when JPEG images are used in visual sensor networks (VSN). The proposed method evaluates the amount of changes of the input multi-focus images when they pass through a low pass filter, and then selects the block which has been changed more. In order to assess the algorithm performance, a lot of pair multi-focused images which are coded as JPEG were used. The results show that the output image quality is better than that of the previous methods.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"85 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1