首页 > 最新文献

2006 IEEE Region 5 Conference最新文献

英文 中文
IEEE 1451 with IEEE 1275: Synergy for sensing and control IEEE 1451与IEEE 1275:传感和控制的协同
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507409
P. Frenger
IEEE 1451 is a family of related low-level standards covering the use of networked sensors and actuators. These techniques improve interoperability by enabling simple transducers to be upgraded to intelligent status. IEEE 1451 utilizes interface protocols from hardwired and wireless communication practices. IEEE 1275 describes a computer network initialization and testing process. This standard employs a byte-coded virtual machine to operate independent of CPU, software, or network configuration. It contains its own embedded programming language. The author describes how these complimentary standards may be utilized to create novel plug-and-play, hot-swap, self-configuring, pre-calibrated, multi-drop networks, for closed-loop, intrinsically-safe medical, scientific and robotic applications.
IEEE 1451是一系列相关的低级标准,涵盖了网络传感器和执行器的使用。这些技术通过使简单的传感器升级到智能状态来提高互操作性。IEEE 1451利用来自硬连线和无线通信实践的接口协议。IEEE 1275描述了计算机网络初始化和测试过程。该标准采用字节编码的虚拟机来独立于CPU、软件或网络配置进行操作。它包含自己的嵌入式编程语言。作者描述了如何利用这些附加标准来创建新颖的即插即用、热插拔、自配置、预校准、多滴网络,用于闭环、本质安全的医疗、科学和机器人应用。
{"title":"IEEE 1451 with IEEE 1275: Synergy for sensing and control","authors":"P. Frenger","doi":"10.1109/TPSD.2006.5507409","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507409","url":null,"abstract":"IEEE 1451 is a family of related low-level standards covering the use of networked sensors and actuators. These techniques improve interoperability by enabling simple transducers to be upgraded to intelligent status. IEEE 1451 utilizes interface protocols from hardwired and wireless communication practices. IEEE 1275 describes a computer network initialization and testing process. This standard employs a byte-coded virtual machine to operate independent of CPU, software, or network configuration. It contains its own embedded programming language. The author describes how these complimentary standards may be utilized to create novel plug-and-play, hot-swap, self-configuring, pre-calibrated, multi-drop networks, for closed-loop, intrinsically-safe medical, scientific and robotic applications.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From cancer gene expression data to simple vital rules 从癌症基因表达数据到简单的生命规则
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507407
R. Hewett, Ali Goksu, Soma Datta
Microarray gene expression profiling technology generates huge high-dimensional data. Finding analysis techniques that can cope with such data characteristics is crucial in Bioinformatics. This paper proposes a variation of an ensemble learning approach combined with a clustering technique to extract “simple” and yet “vital” rules from genomic data. The paper describes the approach and evaluates it on cancer gene expression data sets. We report experimental results including comparisons with other results obtained from a similar ensemble learning approach as well as some sophisticated techniques such as support vector machines.
微阵列基因表达谱技术产生巨大的高维数据。寻找能够处理这些数据特征的分析技术在生物信息学中是至关重要的。本文提出了一种结合聚类技术的集成学习方法的变体,以从基因组数据中提取“简单”但“重要”的规则。本文描述了这种方法,并在癌症基因表达数据集上对其进行了评价。我们报告了实验结果,包括与类似的集成学习方法以及一些复杂技术(如支持向量机)获得的其他结果的比较。
{"title":"From cancer gene expression data to simple vital rules","authors":"R. Hewett, Ali Goksu, Soma Datta","doi":"10.1109/TPSD.2006.5507407","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507407","url":null,"abstract":"Microarray gene expression profiling technology generates huge high-dimensional data. Finding analysis techniques that can cope with such data characteristics is crucial in Bioinformatics. This paper proposes a variation of an ensemble learning approach combined with a clustering technique to extract “simple” and yet “vital” rules from genomic data. The paper describes the approach and evaluates it on cancer gene expression data sets. We report experimental results including comparisons with other results obtained from a similar ensemble learning approach as well as some sophisticated techniques such as support vector machines.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New steganalysis technique for the digital media forensics examiner 数字媒体取证审查员的新隐写分析技术
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507436
S. Agaian, B. M. Rodriguez, Gilbert L. Peterson
Steganographic fingerprints are convened with the individuality of the steganographic methods. The basic goals of this article are: 1. To evaluate sequential and randomly embedded steganographic evidence within digital images. 2. To identify the “steganographic fingerprint” of spatial domain based steganographic methods. Steganographic fingerprinting is the next step towards forensic analysis, reachable only if one may localize steganographic content within an image. The presented detection method works equally well for sequential and random embedding. We will show that the new method may improve the message length estimation, detection accuracy and give an indication of the embedding method. In addition we will show the false alarm rate of 0.9 for the proposed method, while the false alarm rate for the commonly used technique RS Steganalysis is 2.4.
隐写指纹具有隐写方法的独特性。本文的基本目标是:1。评估数字图像中顺序和随机嵌入的隐写证据。2. 基于空间域的隐写方法识别“隐写指纹”。隐写指纹识别是法医分析的下一步,只有当人们可以在图像中定位隐写内容时才能实现。所提出的检测方法对顺序嵌入和随机嵌入都有很好的效果。我们将证明新方法可以提高消息长度估计和检测精度,并给出嵌入方法的指示。此外,我们将展示该方法的虚警率为0.9,而常用的RS隐写分析技术的虚警率为2.4。
{"title":"New steganalysis technique for the digital media forensics examiner","authors":"S. Agaian, B. M. Rodriguez, Gilbert L. Peterson","doi":"10.1109/TPSD.2006.5507436","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507436","url":null,"abstract":"Steganographic fingerprints are convened with the individuality of the steganographic methods. The basic goals of this article are: 1. To evaluate sequential and randomly embedded steganographic evidence within digital images. 2. To identify the “steganographic fingerprint” of spatial domain based steganographic methods. Steganographic fingerprinting is the next step towards forensic analysis, reachable only if one may localize steganographic content within an image. The presented detection method works equally well for sequential and random embedding. We will show that the new method may improve the message length estimation, detection accuracy and give an indication of the embedding method. In addition we will show the false alarm rate of 0.9 for the proposed method, while the false alarm rate for the commonly used technique RS Steganalysis is 2.4.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The novel Arc low-pass filter 新颖的弧形低通滤波器
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507414
Ranjith Raghunath, Joann M. Moreno, A. Grigoryan
In this paper, we propose a new form of the amplitude response for designing low-pass filters, that is defined by a modified arctangent function in the frequency domain. This is a parameterized and very smooth function which can be used for any tolerance scheme with given specifications. The filter depends on two parameters that allow us to straighten the magnitude response from the passband to stopband without increasing the computational complexity of the filter. The main properties of the low-pass filter with the proposed magnitude response, which we call the Arc low-pass filter, are considered and compared with the well known Chebyshev and Butterworth filters.
在本文中,我们提出了一种新的用于设计低通滤波器的幅度响应形式,它是在频域上用一个修正的反正切函数来定义的。这是一个参数化的非常平滑的函数,可用于给定规格的任何公差方案。该滤波器依赖于两个参数,这两个参数使我们能够在不增加滤波器计算复杂度的情况下将幅度响应从通带拉直到阻带。考虑了具有所提出幅度响应的低通滤波器的主要特性,我们称之为Arc低通滤波器,并将其与著名的切比雪夫滤波器和巴特沃斯滤波器进行了比较。
{"title":"The novel Arc low-pass filter","authors":"Ranjith Raghunath, Joann M. Moreno, A. Grigoryan","doi":"10.1109/TPSD.2006.5507414","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507414","url":null,"abstract":"In this paper, we propose a new form of the amplitude response for designing low-pass filters, that is defined by a modified arctangent function in the frequency domain. This is a parameterized and very smooth function which can be used for any tolerance scheme with given specifications. The filter depends on two parameters that allow us to straighten the magnitude response from the passband to stopband without increasing the computational complexity of the filter. The main properties of the low-pass filter with the proposed magnitude response, which we call the Arc low-pass filter, are considered and compared with the well known Chebyshev and Butterworth filters.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Open Source solutions for secure government systems 为安全的政府系统利用开源解决方案
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507466
Michael Worden
Recent updates to federal government and Department of Defense (DoD) security policies have opened the door to the official use of Open Source Software (OSS) as a solution set for the development of secure enterprise systems. New policies published by the National Institute of Standards and Technology (NIST) and the DoD have significantly changed the guidelines associated with deployment of industry-standard OSS security solutions, including: ● Linux - including the NSA sponsored “Security Enhanced Linux” product ● OpenSSL - a full-strength general-purpose cryptography ● Tripwire and Open Source Tripwire® - A change Monitoring and Analysis and auditing product
最近对联邦政府和国防部(DoD)安全政策的更新为正式使用开源软件(OSS)作为开发安全企业系统的解决方案集打开了大门。美国国家标准与技术研究院(NIST)和国防部发布的新政策显著改变了与部署行业标准OSS安全解决方案相关的指导方针,包括:●Linux—包括NSA赞助的“安全增强Linux”产品●OpenSSL—一种全强度通用加密技术●Tripwire和开源Tripwire®—一种变化监测、分析和审计产品
{"title":"Leveraging Open Source solutions for secure government systems","authors":"Michael Worden","doi":"10.1109/TPSD.2006.5507466","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507466","url":null,"abstract":"Recent updates to federal government and Department of Defense (DoD) security policies have opened the door to the official use of Open Source Software (OSS) as a solution set for the development of secure enterprise systems. New policies published by the National Institute of Standards and Technology (NIST) and the DoD have significantly changed the guidelines associated with deployment of industry-standard OSS security solutions, including: ● Linux - including the NSA sponsored “Security Enhanced Linux” product ● OpenSSL - a full-strength general-purpose cryptography ● Tripwire and Open Source Tripwire® - A change Monitoring and Analysis and auditing product","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fractal steganography using artificially generated images 分形隐写术使用人工生成的图像
Pub Date : 2006-04-07 DOI: 10.1117/12.777663
S. Agaian, Johanna M. Susmilch
There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.
在图像中存在多种基于分形的数据隐藏方法。先前工作的主要贡献是通过修改原始的、预先存在的图像或在图像中嵌入加密的数据流来嵌入数据。在本文中,我们提出了一种基于分形的方法来隐藏封面图像(包括人工生成的分形图像)中的敏感信息。在图像生成过程中,隐写数据会改变图像的分形参数。这导致生成的图像中已经隐藏了数据,而不是在事后添加数据。我们证明了算法的输入参数,如分形类型和迭代次数,将作为隐藏信息的简单加密密钥。我们还解释了图像的容量如何受到参数变化的影响。最后,我们证明了所提出的算法不受常用的隐写检测算法的影响。
{"title":"Fractal steganography using artificially generated images","authors":"S. Agaian, Johanna M. Susmilch","doi":"10.1117/12.777663","DOIUrl":"https://doi.org/10.1117/12.777663","url":null,"abstract":"There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
THD-optimal staircase modulation of single-phase multilevel inverters 单相多电平逆变器的thd优化阶梯调制
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507417
Bill Diong
This paper considers the problem of achieving the minimum THD of the staircase-modulated output voltage of single-phase multilevel inverters, with or without elimination of the lowest harmonics. The minimal THD values together with the corresponding necessary step angles (and also dc source ratios when the source values are not constrained to be equal) have been obtained for various waveform cases. The results show that requiring harmonic elimination yields slightly to somewhat worse distortion, and that using unequal dc source voltages is better than using equal ones, as expected.
本文研究了在消除或不消除最低次谐波的情况下,实现单相多电平逆变器阶梯调制输出电压的最小THD问题。得到了各种波形情况下的最小THD值以及相应的必要阶跃角(以及源值不受约束相等时的直流源比)。结果表明,要求消除谐波会产生稍微更严重的失真,并且使用不等直流电源电压比使用等直流电源电压更好,正如预期的那样。
{"title":"THD-optimal staircase modulation of single-phase multilevel inverters","authors":"Bill Diong","doi":"10.1109/TPSD.2006.5507417","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507417","url":null,"abstract":"This paper considers the problem of achieving the minimum THD of the staircase-modulated output voltage of single-phase multilevel inverters, with or without elimination of the lowest harmonics. The minimal THD values together with the corresponding necessary step angles (and also dc source ratios when the source values are not constrained to be equal) have been obtained for various waveform cases. The results show that requiring harmonic elimination yields slightly to somewhat worse distortion, and that using unequal dc source voltages is better than using equal ones, as expected.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Power quality issue with variable speed drive a case study for oil exploration operation in Russia 变速驱动的电能质量问题——以俄罗斯石油勘探作业为例
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507418
Bijoy Chat
The use of variable speed drive (VSD) has been increased significantly to improve the energy efficiency and conservation. It is estimated that pumping system accounts for nearly 20% of the world's energy used by electric motors and 25% to 50% of the total electrical energy usage in certain industrial facilities [1]. As such, there is a significant incentive to improve the efficiency and performance of pumps.
变速驱动(VSD)的使用已显著增加,以提高能源效率和节约。据估计,泵送系统占世界电机能耗的近20%,在某些工业设施中占总电能使用量的25%至50%[1]。因此,提高泵的效率和性能具有重要的激励作用。
{"title":"Power quality issue with variable speed drive a case study for oil exploration operation in Russia","authors":"Bijoy Chat","doi":"10.1109/TPSD.2006.5507418","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507418","url":null,"abstract":"The use of variable speed drive (VSD) has been increased significantly to improve the energy efficiency and conservation. It is estimated that pumping system accounts for nearly 20% of the world's energy used by electric motors and 25% to 50% of the total electrical energy usage in certain industrial facilities [1]. As such, there is a significant incentive to improve the efficiency and performance of pumps.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A pseudo random I/O scrambling and transformation approach in prevention of software piracy 一种防止软件盗版的伪随机I/O置乱与转换方法
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507459
B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra
This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.
本文讨论了一种通过数学处理对输入输出(I/O)进行置乱的技术。就应用软件的实际目的而言,该过程在转移对手的注意力方面是有效的。当软件应用程序执行一定数量的数学方程并产生数值结果时,该技术特别有用。本文还演示了该方法如何有效地防止应用程序的逆向工程。本文以一个软件应用程序为例说明了该方案的实现,并描述了各种软件问题和实现的实用性。
{"title":"A pseudo random I/O scrambling and transformation approach in prevention of software piracy","authors":"B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra","doi":"10.1109/TPSD.2006.5507459","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507459","url":null,"abstract":"This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Position dependent photocurrent intensity of MSM photodetectors MSM光电探测器的位置依赖光电流强度
Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507430
S. Yuan, Jianning Wang, Yumin Zhang, J. Krasinski
It was found experimentally that the photocurrent intensity in a Metal-Semiconductor-Metal (MSM) structure has a strong dependence on the position of the incident laser beam; however, there is no satisfactory explanation of this phenomenon. We simulated this process with device simulator ATLAS, and the result agrees with experiment pretty well. We also investigated various factors such as material property and external bias voltage that affect the current density, and found that the photocurrent changed significantly with these parameters.
实验发现,金属-半导体-金属(MSM)结构中的光电流强度与入射激光束的位置有很强的依赖性;然而,对于这一现象并没有令人满意的解释。利用设备模拟器ATLAS对这一过程进行了仿真,结果与实验结果吻合较好。我们还研究了材料性能和外部偏置电压等各种因素对电流密度的影响,发现光电流随这些参数的变化显著。
{"title":"Position dependent photocurrent intensity of MSM photodetectors","authors":"S. Yuan, Jianning Wang, Yumin Zhang, J. Krasinski","doi":"10.1109/TPSD.2006.5507430","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507430","url":null,"abstract":"It was found experimentally that the photocurrent intensity in a Metal-Semiconductor-Metal (MSM) structure has a strong dependence on the position of the incident laser beam; however, there is no satisfactory explanation of this phenomenon. We simulated this process with device simulator ATLAS, and the result agrees with experiment pretty well. We also investigated various factors such as material property and external bias voltage that affect the current density, and found that the photocurrent changed significantly with these parameters.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2006 IEEE Region 5 Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1