Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879754
S. Dong, J. Lees, P. Tasker
The intrinsic performance of the devices is of great meaning during power amplifiers design. A method to update de-embedding network at 5.8 GHz for packaged power devices is put forward based on physical modeling idea. The de-embedding network of a packaged GaN HEMT is presented and its errors are analyzed based on waveform engineering. The results may well lead to optimization of the de-embedding network.
{"title":"A de-embedding network at higher frequency and its error analysis","authors":"S. Dong, J. Lees, P. Tasker","doi":"10.1109/ICEICT.2016.7879754","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879754","url":null,"abstract":"The intrinsic performance of the devices is of great meaning during power amplifiers design. A method to update de-embedding network at 5.8 GHz for packaged power devices is put forward based on physical modeling idea. The de-embedding network of a packaged GaN HEMT is presented and its errors are analyzed based on waveform engineering. The results may well lead to optimization of the de-embedding network.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121769848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879696
S. Shang, Ming Li, Yingni Hou, Li Chen, Yuhao Yang, Jun Sun
Image pre-processing is the critical step in the ship target identification of ISAR images, which consists of speckle noise suppression and stripe noise suppression. In this paper, a pre-processing method of speckle noise and stripe noise suppression is proposed. For speckle noise estimation, an adaptive initial threshold is generated based on hypothesis of Rayleigh distribution, and the second segmentation threshold is calculated by the maximum gray value and gradient value in background region of ISAR image. For stripe noise estimation, a nonlinear compression method is used in the cross region of ship targets and stripe noise. In the experiments, the pre-processing results demonstrate the proposed method can not only suppress the speckle noise and stripe noise effectively, but also eliminate stronger noise points around the ship target.
{"title":"A novel method of ISAR image pre-processing for ship","authors":"S. Shang, Ming Li, Yingni Hou, Li Chen, Yuhao Yang, Jun Sun","doi":"10.1109/ICEICT.2016.7879696","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879696","url":null,"abstract":"Image pre-processing is the critical step in the ship target identification of ISAR images, which consists of speckle noise suppression and stripe noise suppression. In this paper, a pre-processing method of speckle noise and stripe noise suppression is proposed. For speckle noise estimation, an adaptive initial threshold is generated based on hypothesis of Rayleigh distribution, and the second segmentation threshold is calculated by the maximum gray value and gradient value in background region of ISAR image. For stripe noise estimation, a nonlinear compression method is used in the cross region of ship targets and stripe noise. In the experiments, the pre-processing results demonstrate the proposed method can not only suppress the speckle noise and stripe noise effectively, but also eliminate stronger noise points around the ship target.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123890731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879645
Teklu Merhawit Berhane, Wei-Xiao Meng, Yi Zhang, Lei Chen
Full-duplex (FD) mode systems are key technologies for 5G wireless communication systems due to their ability improving spectral efficiency. The major difficulties of these systems are in mitigating interferences such as multiuser interferences in both channels and self-interference from downlink to uplink. Therefore, it is required to rely on precoding schemes. We propose self-interference plus noise covariance matrix aware signal-to-leakage-and-noise ratio (SLNR) precoding and SLNR precoding for uplink and downlink channels, respectively, to improve spectral efficiency of FD in the Rician fading channel situations. Unlike zero-forcing (ZF) and block diagonalization (BD) precoding schemes, it has tradeoffs between interference and noise, as well simultaneously support multiple number of users and antennas. The problem is formulated as maximizing SLNR to obtain the precoder that optimized the total spectral efficiency of the system. Numerical results confirm that FD outperforms HD for small self-interference channel gain, for increasing number of antennas at the base station and for all Rician parameters.
{"title":"Spectral efficiency of single cell full-duplex MU-MIMO system based on SLNR precoding","authors":"Teklu Merhawit Berhane, Wei-Xiao Meng, Yi Zhang, Lei Chen","doi":"10.1109/ICEICT.2016.7879645","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879645","url":null,"abstract":"Full-duplex (FD) mode systems are key technologies for 5G wireless communication systems due to their ability improving spectral efficiency. The major difficulties of these systems are in mitigating interferences such as multiuser interferences in both channels and self-interference from downlink to uplink. Therefore, it is required to rely on precoding schemes. We propose self-interference plus noise covariance matrix aware signal-to-leakage-and-noise ratio (SLNR) precoding and SLNR precoding for uplink and downlink channels, respectively, to improve spectral efficiency of FD in the Rician fading channel situations. Unlike zero-forcing (ZF) and block diagonalization (BD) precoding schemes, it has tradeoffs between interference and noise, as well simultaneously support multiple number of users and antennas. The problem is formulated as maximizing SLNR to obtain the precoder that optimized the total spectral efficiency of the system. Numerical results confirm that FD outperforms HD for small self-interference channel gain, for increasing number of antennas at the base station and for all Rician parameters.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879729
Hui Lv, Da-Zheng Feng
This paper develops a new space-time adaptive processing (STAP) technique for multiple-input multiple-output (MIMO) radar, which is a reduced-dimension application of the well-known factored approach (FA) and extended factored approach (EFA). Simulation results are presented to demonstrate the effectiveness of this new method.
{"title":"MIMO radar space-time adaptive processing via iterative factored approach","authors":"Hui Lv, Da-Zheng Feng","doi":"10.1109/ICEICT.2016.7879729","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879729","url":null,"abstract":"This paper develops a new space-time adaptive processing (STAP) technique for multiple-input multiple-output (MIMO) radar, which is a reduced-dimension application of the well-known factored approach (FA) and extended factored approach (EFA). Simulation results are presented to demonstrate the effectiveness of this new method.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879705
Nam-jeong Kim, Mun-soo Gong, Gang-soo Lee
Many cyber attacks events have been occurring. Those are described so various points of views that redundancy of attack events information is increased. In this paper, to cope with the problems, we propose and develop attacker classification, attack-method classification, asset classification systems, as well as an ATM-schema that is an integrated schema of attacker's view, target(asset)'s view and attack-method's view. Additionally, we implement an ‘attack capability evaluation support system’ by using that schema. Those are useful for efficiently constructing an attack database of various cyber attack events and big data.
{"title":"An attack-target-method schema for cyber attack event database","authors":"Nam-jeong Kim, Mun-soo Gong, Gang-soo Lee","doi":"10.1109/ICEICT.2016.7879705","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879705","url":null,"abstract":"Many cyber attacks events have been occurring. Those are described so various points of views that redundancy of attack events information is increased. In this paper, to cope with the problems, we propose and develop attacker classification, attack-method classification, asset classification systems, as well as an ATM-schema that is an integrated schema of attacker's view, target(asset)'s view and attack-method's view. Additionally, we implement an ‘attack capability evaluation support system’ by using that schema. Those are useful for efficiently constructing an attack database of various cyber attack events and big data.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879762
Li Mo, Sun Peng, Zhang Jian, Li Jie, Qiao Chunhua, Li Linzhe, X. Li-yi
In this paper, a laser radiation model based on TCAD is built up. With this model, some simulations of laser irradiating semiconductor material are presented. And also simulations of gamma ray irradiating semiconductor material are given. By comparing the simulation results the relationship between laser intensity and gamma dose rate is obtained. The results demonstrate that the laser radiation model is practicable in TCAD for reliability analysis and the laser simulation technique is reliable to simulate dose rate effect.
{"title":"Research on laser radiation for simulating dose rate effects in semiconductor materials","authors":"Li Mo, Sun Peng, Zhang Jian, Li Jie, Qiao Chunhua, Li Linzhe, X. Li-yi","doi":"10.1109/ICEICT.2016.7879762","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879762","url":null,"abstract":"In this paper, a laser radiation model based on TCAD is built up. With this model, some simulations of laser irradiating semiconductor material are presented. And also simulations of gamma ray irradiating semiconductor material are given. By comparing the simulation results the relationship between laser intensity and gamma dose rate is obtained. The results demonstrate that the laser radiation model is practicable in TCAD for reliability analysis and the laser simulation technique is reliable to simulate dose rate effect.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879681
L. Tong, Zhao Qilu, Zhang Linbo
In the past decade, underwater acoustic networks have attracted more and more research interests and developed broadly for a large number of applications. Due to the characteristics of the underwater medium-low data rate, high bite error rate, unstable link and limited energy of node, the widely accepted routing protocols cannot adapt to the underwater transmission. In the paper, we have compared and analyzed the current routing protocols, and then put forward doubling flooding mechanism and reserving remaining routing mechanism to modify ad-hoc on-demand Distance Vector (AODV). By analyzing the simulation results in the OMNET++, we find modified AODV performs better than traditional AODV in the metrics like packet delivery ratio, route setup time and end-to-end delay.
{"title":"Modified AODV routing protocol in underwater acoustic networks","authors":"L. Tong, Zhao Qilu, Zhang Linbo","doi":"10.1109/ICEICT.2016.7879681","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879681","url":null,"abstract":"In the past decade, underwater acoustic networks have attracted more and more research interests and developed broadly for a large number of applications. Due to the characteristics of the underwater medium-low data rate, high bite error rate, unstable link and limited energy of node, the widely accepted routing protocols cannot adapt to the underwater transmission. In the paper, we have compared and analyzed the current routing protocols, and then put forward doubling flooding mechanism and reserving remaining routing mechanism to modify ad-hoc on-demand Distance Vector (AODV). By analyzing the simulation results in the OMNET++, we find modified AODV performs better than traditional AODV in the metrics like packet delivery ratio, route setup time and end-to-end delay.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879682
Xiaofeng Xu, Yongji Ren
Recent years have witnessed an impressive growth in the technology of wireless sensor networks (WSNs). Being an essential technology of WSNs, localization is very important to the location-based applications and network protocols. Therefore, several reported studies have focused more attention on the secure localization. A paradigm that the benign anchors are compromised in the hostile battlefield environments, and turn into malicious nodes to pretend to be true anchor nodes and send false information to interfere with the correct localization procedure of ordinary nodes, is designed. To solve this problem, some effective approaches should be explored to ensure the security of localization and eliminate the adverse influence due to the malicious anchors. Therefore, in this paper, we propose a novel information game based secure localization approach for wireless sensor networks. The secure localization problem in hostile scenario has been transformed into an information game problem. Simulation results show that the proposed method is effective to secure localization.
{"title":"Information game model for secure localization in wireless sensor networks","authors":"Xiaofeng Xu, Yongji Ren","doi":"10.1109/ICEICT.2016.7879682","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879682","url":null,"abstract":"Recent years have witnessed an impressive growth in the technology of wireless sensor networks (WSNs). Being an essential technology of WSNs, localization is very important to the location-based applications and network protocols. Therefore, several reported studies have focused more attention on the secure localization. A paradigm that the benign anchors are compromised in the hostile battlefield environments, and turn into malicious nodes to pretend to be true anchor nodes and send false information to interfere with the correct localization procedure of ordinary nodes, is designed. To solve this problem, some effective approaches should be explored to ensure the security of localization and eliminate the adverse influence due to the malicious anchors. Therefore, in this paper, we propose a novel information game based secure localization approach for wireless sensor networks. The secure localization problem in hostile scenario has been transformed into an information game problem. Simulation results show that the proposed method is effective to secure localization.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879687
Chaoqun Jing, Tian Liang, Qijun Lei
This paper presents the design of a new type of digital sun sensors which can be applied to micro spacecraft especially micro satellites. The optical system, which adopts the CMOS APS area array sensor while abandoning the traditional way of utilizing slot to achieve the introduction of sun light, is different from common systems. The uniqueness of the design lies in the perpendicular double-slit structure. By windowing image reading through software settings of the sensor, we can obtain the obliquity of light relative to two axes thus calculating the actual sun light angle. Since there is no need to read the image information of the entire area array, this design can significantly increase the data updating frequency with no loss of data accuracy.
{"title":"A new kind of miniature sun sensor design","authors":"Chaoqun Jing, Tian Liang, Qijun Lei","doi":"10.1109/ICEICT.2016.7879687","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879687","url":null,"abstract":"This paper presents the design of a new type of digital sun sensors which can be applied to micro spacecraft especially micro satellites. The optical system, which adopts the CMOS APS area array sensor while abandoning the traditional way of utilizing slot to achieve the introduction of sun light, is different from common systems. The uniqueness of the design lies in the perpendicular double-slit structure. By windowing image reading through software settings of the sensor, we can obtain the obliquity of light relative to two axes thus calculating the actual sun light angle. Since there is no need to read the image information of the entire area array, this design can significantly increase the data updating frequency with no loss of data accuracy.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123940322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICEICT.2016.7879753
Yazhou Dong, S. Dong, Xiaojun Li, L. Ran
Arbitrarily polarized microwave power transmission technologies including polarization auto-matching retrodirective transmitting method and arbitrarily polarized microwave rectenna are proposed in this paper. The polarization auto-matching retrodirective transmitting method using phase conjugating circuits and polarization rotators can receive any polarized pilot signal and generate predictable polarized beam aimed back to the rectenna. The arbitrarily polarized microwave rectenna introducing a directional coupler between dual-polarized antenna and rectifying circuits can receive any polarized microwave and equally distribute it to two rectifying circuits to maintain high rectifying efficiency.
{"title":"Arbitrarily polarized microwave power transmission technologies","authors":"Yazhou Dong, S. Dong, Xiaojun Li, L. Ran","doi":"10.1109/ICEICT.2016.7879753","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879753","url":null,"abstract":"Arbitrarily polarized microwave power transmission technologies including polarization auto-matching retrodirective transmitting method and arbitrarily polarized microwave rectenna are proposed in this paper. The polarization auto-matching retrodirective transmitting method using phase conjugating circuits and polarization rotators can receive any polarized pilot signal and generate predictable polarized beam aimed back to the rectenna. The arbitrarily polarized microwave rectenna introducing a directional coupler between dual-polarized antenna and rectifying circuits can receive any polarized microwave and equally distribute it to two rectifying circuits to maintain high rectifying efficiency.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116631364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}