Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348280
Yufeng Guo, Zhaoji Li, Bo Zhang
In this paper, a new breakdown model of SOI RESURF devices is proposed based on solving 2-D Poisson equation. The approach explores the physical insights of the lateral and vertical breakdowns for both of the completely and incompletely depleted drift regions. Analytical 2-D electrostatic potential and electric fields distributions are compared with the simulating results by MEDICI, The impacts of the geometry parameters on the breakdown voltage are also investigated by the analytical model and numerical simulation. A well agreement between the analytical and simulating results proofs the availability of the model. Finally, as a further experimental verification, LDMOS with a breakdown voltage of 220 V was fabricated on a bonding SOI wafer with a top silicon thickness of 3.0 mum and a buried oxide thickness of 1.5 mum.
{"title":"A new two dimensional analytical breakdown model of SOI RESURF devices","authors":"Yufeng Guo, Zhaoji Li, Bo Zhang","doi":"10.1109/ICCCAS.2007.4348280","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348280","url":null,"abstract":"In this paper, a new breakdown model of SOI RESURF devices is proposed based on solving 2-D Poisson equation. The approach explores the physical insights of the lateral and vertical breakdowns for both of the completely and incompletely depleted drift regions. Analytical 2-D electrostatic potential and electric fields distributions are compared with the simulating results by MEDICI, The impacts of the geometry parameters on the breakdown voltage are also investigated by the analytical model and numerical simulation. A well agreement between the analytical and simulating results proofs the availability of the model. Finally, as a further experimental verification, LDMOS with a breakdown voltage of 220 V was fabricated on a bonding SOI wafer with a top silicon thickness of 3.0 mum and a buried oxide thickness of 1.5 mum.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348209
B. Kruatrachue, N. Pantrakarn, K. Siriboon
One problem of generating a model to recognize any string is how to generate one that is generalized enough to accept strings with similar patterns and, at the same time, is specific enough to reject the non-target strings. This research focus on generating a model in the form of a state machine to recognize strings derived from the direction information of character's images. The state machine induction process has two steps. The first step is to generate the machine from the strings of each target character (positive training), and the second step is to adjust the machine to reject any other string (negative training). This state machine induction method that automatically learns from strings can be applied with other string patterns recognition apart from characters.
{"title":"State Machine Induction with Positive and Negative Training for Thai Character Recognition","authors":"B. Kruatrachue, N. Pantrakarn, K. Siriboon","doi":"10.1109/ICCCAS.2007.4348209","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348209","url":null,"abstract":"One problem of generating a model to recognize any string is how to generate one that is generalized enough to accept strings with similar patterns and, at the same time, is specific enough to reject the non-target strings. This research focus on generating a model in the form of a state machine to recognize strings derived from the direction information of character's images. The state machine induction process has two steps. The first step is to generate the machine from the strings of each target character (positive training), and the second step is to adjust the machine to reject any other string (negative training). This state machine induction method that automatically learns from strings can be applied with other string patterns recognition apart from characters.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348155
Yingxiang Li, Zhiheng Hu, Xianci Xiao
In this paper, we are interested in the problem of the estimation of polynomial phase signals affected by an additive Gaussian white noise. A method for 3-order polynomial phase signal parameter estimation is proposed. Firstly the segment correlation method is used to obtain linear frequency modulated (LFM) signal. Then some LFM detection and parameter estimation methods are adopted to solve this problem, such as Radon-ambiguity transform, time-domain dechirp, segment correlation dechirp methods. The merit of this new method is validated by illustrative examples in low signal-to-noise ratio (SNR) condition.
{"title":"Joint power distribution algorithm for multi-user downlink of JT MIMO system","authors":"Yingxiang Li, Zhiheng Hu, Xianci Xiao","doi":"10.1109/ICCCAS.2007.4348155","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348155","url":null,"abstract":"In this paper, we are interested in the problem of the estimation of polynomial phase signals affected by an additive Gaussian white noise. A method for 3-order polynomial phase signal parameter estimation is proposed. Firstly the segment correlation method is used to obtain linear frequency modulated (LFM) signal. Then some LFM detection and parameter estimation methods are adopted to solve this problem, such as Radon-ambiguity transform, time-domain dechirp, segment correlation dechirp methods. The merit of this new method is validated by illustrative examples in low signal-to-noise ratio (SNR) condition.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126598947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348123
Wei Huang, Yan-zhong Sun
A new image adaptive watermarking algorithm based on Bidimension Empirical Mode Decomposition (BEMD) is proposed. As a new two-dimensional signal processing tool, BEMD is first introduced into the image watermarking field in this paper. In the proposed algorithm, the cover image is decomposed into several intrinsic mode functions (IMFs) based on its local feature adaptively. Then the human visual system (HVS) model function based on IMFs and the logo image is generated, and inserted into the cover image. BEMD technique is used in the extracting processes as well and the recovered watermark image is obtained clearly. We have tested the robustness of the proposed scheme under cropping, JPEG compression, resizing, median filtering, and additive white Gaussian noise (AWGN) attacks. The experiments indicate that this technique can achieve high imperceptibility while showing good robustness. Furthermore, the proposed method is compared with the block DCT based method, and the experiment result confirms that the proposed method shows better performance.
{"title":"A New Image Watermarking Algorithm Using BEMD Method","authors":"Wei Huang, Yan-zhong Sun","doi":"10.1109/ICCCAS.2007.4348123","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348123","url":null,"abstract":"A new image adaptive watermarking algorithm based on Bidimension Empirical Mode Decomposition (BEMD) is proposed. As a new two-dimensional signal processing tool, BEMD is first introduced into the image watermarking field in this paper. In the proposed algorithm, the cover image is decomposed into several intrinsic mode functions (IMFs) based on its local feature adaptively. Then the human visual system (HVS) model function based on IMFs and the logo image is generated, and inserted into the cover image. BEMD technique is used in the extracting processes as well and the recovered watermark image is obtained clearly. We have tested the robustness of the proposed scheme under cropping, JPEG compression, resizing, median filtering, and additive white Gaussian noise (AWGN) attacks. The experiments indicate that this technique can achieve high imperceptibility while showing good robustness. Furthermore, the proposed method is compared with the block DCT based method, and the experiment result confirms that the proposed method shows better performance.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348269
Xingwen Liu
Studied in this paper is passivity and passification problems of a class of uncertain fuzzy large-scale systems, each of which consists of J interconnected Takagi-Sugeno (T-S) subsystems. Both passivity and passification criteria are established by applying Lyapunov function method and linear matrix inequality(LMI). A numerical example is given to illustrate the effectiveness of the theoretical results.
{"title":"Passivity and Passification of Uncertain Fuzzy Large-Scale Systems","authors":"Xingwen Liu","doi":"10.1109/ICCCAS.2007.4348269","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348269","url":null,"abstract":"Studied in this paper is passivity and passification problems of a class of uncertain fuzzy large-scale systems, each of which consists of J interconnected Takagi-Sugeno (T-S) subsystems. Both passivity and passification criteria are established by applying Lyapunov function method and linear matrix inequality(LMI). A numerical example is given to illustrate the effectiveness of the theoretical results.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.6251631
Cheng Chuanqing, Wang Li
Ethernet passive optic network(EPON) is a novel optical access network technology, deploying point to multi-points structure, passive transmission on fiber, supplying service on Ethernet.. It is a new technology is considered one of the best solution of access network. We have proposed a novel management method of EPON system based on SNMP .In this paper, we further deploy the detail of the novel method of TT-ERCR .The experiment results show that the method is effective to the EPON system.
{"title":"Research of a novel management method in Ethernet Passive Optical Network","authors":"Cheng Chuanqing, Wang Li","doi":"10.1109/ICCCAS.2007.6251631","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.6251631","url":null,"abstract":"Ethernet passive optic network(EPON) is a novel optical access network technology, deploying point to multi-points structure, passive transmission on fiber, supplying service on Ethernet.. It is a new technology is considered one of the best solution of access network. We have proposed a novel management method of EPON system based on SNMP .In this paper, we further deploy the detail of the novel method of TT-ERCR .The experiment results show that the method is effective to the EPON system.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127586439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348194
Lan Zhou, Sun Shi-xin
With the extensive studies of the task scheduling problem, many new methods, especial genetic algorithms, have been introduced into this field. In this paper, we develop a novel genetic algorithm, namely the knowledge-based genetic scheduling (KGS) algorithm with task duplication. KGS is different from the previously proposed genetic algorithms in a number of ways. Unlike the others genetic algorithms, KGS initializes population based on more knowledge to provide itself a better iterative basis. KGS also designs an effective decoding algorithm to get the best schedule scheme for a certain chromosome. In addition, KGS uses the relative precedence constraints other than absolute priorities to determine the schedule order of tasks. Simulation results show that KGS outperforms the previously proposed algorithms in terms of the solution quality and the execution time.
{"title":"A Genetic Scheduling Algorithm Based on Knowledge for Multiprocessor System","authors":"Lan Zhou, Sun Shi-xin","doi":"10.1109/ICCCAS.2007.4348194","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348194","url":null,"abstract":"With the extensive studies of the task scheduling problem, many new methods, especial genetic algorithms, have been introduced into this field. In this paper, we develop a novel genetic algorithm, namely the knowledge-based genetic scheduling (KGS) algorithm with task duplication. KGS is different from the previously proposed genetic algorithms in a number of ways. Unlike the others genetic algorithms, KGS initializes population based on more knowledge to provide itself a better iterative basis. KGS also designs an effective decoding algorithm to get the best schedule scheme for a certain chromosome. In addition, KGS uses the relative precedence constraints other than absolute priorities to determine the schedule order of tasks. Simulation results show that KGS outperforms the previously proposed algorithms in terms of the solution quality and the execution time.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129166400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.6250712
Li Zhao, Ruochun Li, Ping Zhang
Frequency offsets in regular OFDM communication systems distort the orthogonality between sub-carriers, which results in inter-carrier interference (ICI). In order to combat the impact of ICI on OFDM systems, an ICI mitigation technique by jointing symbol shift cancellation (SSC) and adjacent sub-channel filter (ASF) is proposed in this paper. At first, the symbol shift cancellation method is used to cancel the impact of ICI on the far sub-carriers, and then the adjacent sub-channel filter method is used to cancel the impact of ICI on the adjacent sub-carriers. By analyzing the distribution of the adjacent inter-carrier interference, a pilot-symbol scheme is proposed to improve the accuracy of channel estimation and simplify the adjacent interference filter method. The proposed algorithm can achieve trade-off between the bandwidth efficiency and the complexity of ICI cancellation method. Simulation results show that the technique proposed in this paper can effectively improve BER (Bit Error Rate) performance of the OFDM system.
{"title":"An intercarrier interference mitigation technique with SSC and ASF in OFDM systems","authors":"Li Zhao, Ruochun Li, Ping Zhang","doi":"10.1109/ICCCAS.2007.6250712","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.6250712","url":null,"abstract":"Frequency offsets in regular OFDM communication systems distort the orthogonality between sub-carriers, which results in inter-carrier interference (ICI). In order to combat the impact of ICI on OFDM systems, an ICI mitigation technique by jointing symbol shift cancellation (SSC) and adjacent sub-channel filter (ASF) is proposed in this paper. At first, the symbol shift cancellation method is used to cancel the impact of ICI on the far sub-carriers, and then the adjacent sub-channel filter method is used to cancel the impact of ICI on the adjacent sub-carriers. By analyzing the distribution of the adjacent inter-carrier interference, a pilot-symbol scheme is proposed to improve the accuracy of channel estimation and simplify the adjacent interference filter method. The proposed algorithm can achieve trade-off between the bandwidth efficiency and the complexity of ICI cancellation method. Simulation results show that the technique proposed in this paper can effectively improve BER (Bit Error Rate) performance of the OFDM system.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348125
Jing Liu, Hongyu Zhang
In this paper, it is proposed an invisible dual digital watermarking scheme based on DCT domain, which can be used in the product casing. By embedding fragile and robust watermark simultaneously, the scheme can both prevent the product from forgery and take the information of its serial number.
{"title":"Dual Digital Watermarking Used in Product Casing","authors":"Jing Liu, Hongyu Zhang","doi":"10.1109/ICCCAS.2007.4348125","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348125","url":null,"abstract":"In this paper, it is proposed an invisible dual digital watermarking scheme based on DCT domain, which can be used in the product casing. By embedding fragile and robust watermark simultaneously, the scheme can both prevent the product from forgery and take the information of its serial number.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-11DOI: 10.1109/ICCCAS.2007.4348286
Lin Quan, Zhang Yong-hong, Chen Qi-ke, Fan Yong, Yang Jian-yu, Li Liang-chao
The paper describes a W band radiometer for imaging. A superheterodyne receiver with Dicke switch is used in this radiometer, whose millimeter-wave components, which include a millimeter-wave fundamental wave mixer, a harmonic mixer and a VCO are mounted on the back-end of antenna for lower transmission loss. By this means, the radiometer with sensitivity 0.5 k is achieved. Through the experiment of imaging, the radiometer is shown to meet the requests of the image system.
{"title":"The W Band Radiometer for Imaging","authors":"Lin Quan, Zhang Yong-hong, Chen Qi-ke, Fan Yong, Yang Jian-yu, Li Liang-chao","doi":"10.1109/ICCCAS.2007.4348286","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348286","url":null,"abstract":"The paper describes a W band radiometer for imaging. A superheterodyne receiver with Dicke switch is used in this radiometer, whose millimeter-wave components, which include a millimeter-wave fundamental wave mixer, a harmonic mixer and a VCO are mounted on the back-end of antenna for lower transmission loss. By this means, the radiometer with sensitivity 0.5 k is achieved. Through the experiment of imaging, the radiometer is shown to meet the requests of the image system.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130332101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}