{"title":"A new 4D four-wing hyperchaotic attractor and its circuit implementation","authors":"Yuxia Li, Yongchao Cao, Xia Huang, Ming Gao","doi":"10.1109/ICCCAS.2010.5581871","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581871","url":null,"abstract":"In this paper, a new simple four-dimensional continuous-time autonomous hyperchaotic system is introduced, which displays a complicated four-wing attractor. The existence of the hyperchaos is verified by bifurcation analysis, and in the meantime bifurcation routes from period to quasi-period, then to chaos and finally to hyperchaos is determined. Different configurations of the hyperchaotic attractor are illustrated not only by computer simulation but also by electronic circuit realization.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tingting Shi, Sijian Hou, Ping Luo, Ruhui Yang, Jun Chen, Shaowei Zhen, Bo Zhang
{"title":"A low power and high precision DAC in 0.13µm CMOS for DVS system","authors":"Tingting Shi, Sijian Hou, Ping Luo, Ruhui Yang, Jun Chen, Shaowei Zhen, Bo Zhang","doi":"10.1109/ICCCAS.2010.5581929","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581929","url":null,"abstract":"A low power and high precision digital to analog converter (DAC) for Dynamic Voltage Scaling (DVS) system is presented and demonstrated in this paper. Based on conventional resistor string architecture, the DAC is compensated by digitally controlled on-resistance network to improve output precision. The proposed 5-bit DAC can produce 0.7V∼1.475V, 25mV per step voltage as programmable reference in DVS system. The DAC is implemented by 0.13µm CMOS technology. The static power dissipation is 26.4µW when the power supply voltage is 3.3V and the reference voltage is 0.61V. The simulation results show that the output error is decreased from 5.64mV to 0.43mV after digital calibration. The conversion speed is less than 2.5µs; the digital input code transition frequency of the proposed DAC can reach 400K Hz. The performance satisfies the requirement of DVS system.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120893323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Wang, Kerui Huang, Bin Wang, Zhiguang Qin, Ge Huang
{"title":"Privacy prevention based on trust model for P2P streaming systems","authors":"Yong Wang, Kerui Huang, Bin Wang, Zhiguang Qin, Ge Huang","doi":"10.1109/ICCCAS.2010.5582008","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5582008","url":null,"abstract":"In P2P streaming networks, the main sources of illegal media contents sharing are streaming clients who ignore copyright laws and provide contents deliver services. To stop illegally media contents sharing activities with the boundary of a P2P streaming network, we propose a time-space dynamic trust model for legalizing peers' content delivery services. We incorporate time dimension using time-frame, which captures experience and recommendation's time-sensitivity. At the same time, we introduce space dimension using IP addresses, which reflects the peers' physical locations and relations. Together, these two dimensions are adjusted using positive feedback control mechanism, thus, trust valuation can reflect the dynamics of the trust environment. Theoretical analysis and simulation results show that, out proposed trust model has advantages in modeling time-space dynamic trust relationship. It is capable to detect and penalize the illegally media contents sharing peers, as well as those that exhibit malicious behavior. Moreover, the trust model can filter out dishonest peers effectively.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128294104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prune the set of SV to improve the generalization performance of SVM","authors":"Ziqiang Li, Mingtian Zhou, Haibo Pu","doi":"10.1109/ICCCAS.2010.5581950","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581950","url":null,"abstract":"Initiated by that the quality of training data may affect the model selection, this paper presents a method to improve the prediction performance of SVM through pruning the set of SV. That is, using a global comparable noise measure based on neighbor distribution information to identify noisy SVs, and weaken their role in training. The difference of this method from traditional one is that it need not to process noise for every instance in training set, and but only for those in SVs. The experiment result shows that when top noisy SVs are weakened the prediction performance of SVM is better for most categories.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algorithm of resolving the range ambiguity using a single PRF","authors":"Wei Zhang, L. Kong, Xiaobo Yang, Xiaojing Wang","doi":"10.1109/ICCCAS.2010.5581957","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581957","url":null,"abstract":"A new algorithm of range ambiguity resolution is presented which is substantially different from previously proposed algorithms. The algorithm utilizes a constant pulse repetition frequency (PRF). Firstly, a merit function is designed according to the moving characteristics of the targets. Secondly, range ambiguity resolution is achieved by minimizing the merit function. Numerical simulation results indicate that the proposed algorithm can resolve the range ambiguity efficiently using a single constant PRF.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple and versatile design method of resonator-coupled wireless power transfer system","authors":"I. Awai, T. Komori","doi":"10.1109/ICCCAS.2010.5581895","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581895","url":null,"abstract":"A simple design method for the resonator-coupled wireless power transfer system is proposed on the basis of the BPF theory. Three parameters of the constituting resonators are obtained in advance to design a BPF, which include the resonant frequency, coupling coefficient between adjacent resonators, and the external Q of the outermost resonators. The design is carried out adjusting those parameters to cope with a 2-stage BPF made of two direct coupled resonators. Since the present design theory can be applied for any resonators as long as their resonant frequency is chosen the same, it has a wide range of practical application. The adopted design example is a magnetically coupled 2-stage resonator system proposed by MIT group, since it is most popular, but any usable design theory has not been presented so far.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework on software fault localization: Variable Stress Reaction","authors":"Pengpeng Nie, Ji Geng, Zhiguang Qin","doi":"10.1109/ICCCAS.2010.5582003","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5582003","url":null,"abstract":"Since automated fault localization can improve the efficiency of both the testing and debugging process, it comes to an indispensable part of high security and reliable software development for the computer networks. A novel software fault localization framework: Variable Stress Reaction (VSR) is proposed in this paper, which works well for data type overflow detection. The experimental results show that our approach has the potential to be effective in localizing the faults for software.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of complementary sequence sets based on orthogonal matrixes","authors":"Zhenyu Zhang, F. Zeng, Guixin Xuan","doi":"10.1109/ICCCAS.2010.5581974","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581974","url":null,"abstract":"Based on any two orthogonal matrixes with the number of rows of one matrix equal to the number of columns of another matrix, a novel set of complementary sequences is proposed. The constructed complementary sequences with each sequence including a flock of element sequences have ideal auto-correlation and cross-correlation properties, where the correlation function of a complementary sequence is equal to the sum of correlation functions of its element sequences. Different from previous construction methods on the basis of orthogonal matrixes which limit the element sequence length and flock size, the presented method in this paper can obtain the element sequence length and flock size of any integer, which ensures a more flexible choice of sequence parameters for the systems employing complementary sequence sets.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"546 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison between CI/OFDM and OFDM systems","authors":"Pei Gao, Jun Wang, Shaoqian Li, Hui Hao","doi":"10.1109/ICCCAS.2010.5582051","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5582051","url":null,"abstract":"Carrier Interferometry Orthogonal frequency division multiplexing (CI/OFDM) has gained a great deal of attention recently because of its good bit error rate (BER) and low peak-to-average power ratio (PAPR) performance. In this paper, we investigate the performance of CI/OFDM based on a new implementation model for both zero forcing (ZF) and minimum mean square error (MMSE) equalization. We further provide an analytical comparison between CI/OFDM and traditional OFDM. According to our analysis, the BER and PAPR advantage of CI/OFDM over the traditional OFDM are at the cost of low capacity. Moreover, we argue that the more frequently the channel deep fades occur, the more significant the advantage of CI/OFDM over OFDM is. The simulation results validate the theoretical analysis.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face location with LBP scale transform","authors":"Yunlong Wei, M. Xie, R. Sun, Tao Li","doi":"10.1109/ICCCAS.2010.5581980","DOIUrl":"https://doi.org/10.1109/ICCCAS.2010.5581980","url":null,"abstract":"Local Binary Patterns (LBP) is an effective texture description operator and the histogram that it generates has been proved to be a very useful texture feature to adapt to rotation and illumination. Using the LBP features as feature vectors in adaBoost classifier for target identification has become a trend. But LBP is bound by the scale transformation, so it is not widely used in adaBoost face detector. This paper proposes a scale transform formula for Local Binary Patterns. Based on this formula, LBP features extracted from single fixed size templates can be trained to identify any size of faces. This paper also proposes a method to obtain particular detecting sub-areas called binary ring-shaped sub-windows, which can keep the LBP features rotation invariant. Experimental results show that the method we proposed here is feasible in face detecting.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114635442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}