Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)最新文献

筛选
英文 中文
Characteristics of shielded microstrip with finite conductivity and finite strip thickness 有限电导率和有限带材厚度的屏蔽微带特性
A. El-Hennawy, N. M. El-Minyawi, T. A. Al-Saeed
{"title":"Characteristics of shielded microstrip with finite conductivity and finite strip thickness","authors":"A. El-Hennawy, N. M. El-Minyawi, T. A. Al-Saeed","doi":"10.1109/NRSC.2000.838839","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838839","url":null,"abstract":"An accurate full-wave mode matching approach is used to analyze the dispersion characteristics of shielded microstrip. In contrast to the usual perturbation method it includes metallic loss by a self-consistent description without skin effect approximation. The analysis holds for arbitrary high losses and also for metallization dimensions smaller than the skin depth. The metallic strip is considered to be of finite conductivity with finite metallization thickness. The substrate used is GaAs.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
State machine transition to avoid the race conditions in asynchronous sequential logic circuits 异步顺序逻辑电路中避免竞争条件的状态机转换
M. Elbably
{"title":"State machine transition to avoid the race conditions in asynchronous sequential logic circuits","authors":"M. Elbably","doi":"10.1109/NRSC.2000.838943","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838943","url":null,"abstract":"A new approach, represented by an algorithm is introduced for asynchronous sequential logic circuits. It provides an efficient procedure to avoiding the race conditions. The algorithm procedures have been developed to identify the race conditions and to prevent the system from malfunctioning. Moreover, it provides convenient and efficient procedures without any complexity in hardware or reduction in the system's speed.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the packet reservation multiple access protocol for supporting multimedia services over wireless networks 支持无线网络多媒体业务的分组保留多址协议的评价
N. El-Fishawy
{"title":"Evaluation of the packet reservation multiple access protocol for supporting multimedia services over wireless networks","authors":"N. El-Fishawy","doi":"10.1109/NRSC.2000.838931","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838931","url":null,"abstract":"The future broadband wireless networks require an efficient access protocol to fulfill varying quality of service (QoS) requirements for multimedia applications. In this paper, the packet reservation multiple access (PRMA) protocol is adopted for the transmission of voice and data over the wireless channel, then the protocol is modified in order to support video traffic. The proposed protocol aims at satisfying the stringent requirements of video traffic as well as achieving better channel utilization. Two models of different traffic weights are considered to evaluate the performance of the proposed protocol. Simulation results show that, the protocol achieves high efficiency and guaranteed QoS.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Neural network face recognition using statistical feature extraction 基于统计特征提取的神经网络人脸识别
S. El-Khamy, O. Abdel-Alim, M. Saii
{"title":"Neural network face recognition using statistical feature extraction","authors":"S. El-Khamy, O. Abdel-Alim, M. Saii","doi":"10.1109/NRSC.2000.838960","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838960","url":null,"abstract":"Recognition method of human face using statistical analysis feature extraction and a neural network algorithm is proposed. In the preprocessing step we detect the edges of the face image by using the Sobel algorithm. Then we propose a new method to transform the two-dimension black and white image to a one-dimension vector. Finally, based on the statistical analysis, we extract seven features. In the recognition step we use the fast backpropagation (FBP) algorithm. Computer simulation results with 100 test images of 10 persons (the images of each person in a various pauses, facial expression, and facial details) show that the proposed method yields a high recognition rate.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Transmission and reflection of TE electromagnetic X-wave normally incident on a lossy dispersive half-space TE电磁x波在有耗色散半空间上的透射与反射
A. M. Atiya, E. El-Diwany, A.M. Shaarwai
{"title":"Transmission and reflection of TE electromagnetic X-wave normally incident on a lossy dispersive half-space","authors":"A. M. Atiya, E. El-Diwany, A.M. Shaarwai","doi":"10.1109/NRSC.2000.838848","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838848","url":null,"abstract":"The problem of transmission and reflection of TE electromagnetic X-waves normally incident on a lossy dispersive half-space is investigated. Such X-waves are represented as a superposition of pulsed plane waves in all azimuth directions and tilted by a constant angle with respect to the X-wave propagation direction. The problem of transmission and reflection of pulsed TE electromagnetic plane waves in the presence of a lossy dispersive half-space is formulated in the frequency domain and is converted to the time domain via Fourier transformation. The transmission coefficient, the reflection coefficient, and the longitudinal propagation function inside the lossy dispersive medium are frequency dependent. A new efficient and accurate method is used to evaluate the inverse Fourier transform where the asymptotic forms of the frequency dependent parameters are obtained, and the corresponding fields are evaluated analytically. The remaining part of the integrand is a fast decaying function of frequency that can be approximated by a series of exponential functions via Prony's method. The Fourier transform of such exponential terms is evaluated analytically in closed form.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124097159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient algorithm to design convolved LFSR/SR 一种设计卷积LFSR/SR的有效算法
M. El-Mahlawy, W. Waller
{"title":"An efficient algorithm to design convolved LFSR/SR","authors":"M. El-Mahlawy, W. Waller","doi":"10.1109/NRSC.2000.838952","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838952","url":null,"abstract":"We present an efficient algorithm to design convolved LFSR/SRs (linear feedback shift register/shift registers). Convolved LFSR/SR is considered to be the most efficient pseudoexhaustive test pattern generator as far as the lengths of test set and hardware overhead are concerned. We present an efficient search algorithm to assign the residues to the inputs of the circuit under test (CUT) so as to increase the number of potential solutions and thus reduce the hardware overhead. The experimental results indicate the efficiency of the approach.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116882410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A blind signature scheme based on ElGamal signature 一种基于ElGamal签名的盲签名方案
E. Mohammed, E. Emarah, K. El-Shennawy
{"title":"A blind signature scheme based on ElGamal signature","authors":"E. Mohammed, E. Emarah, K. El-Shennawy","doi":"10.1109/NRSC.2000.838954","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838954","url":null,"abstract":"The use of public key cryptosystems has received considerable attention. They are beneficial in encryption as well as signing which plays an essential role in electronic banking and financial transactions. This paper presents a new generalized blind signature scheme based on ElGamal (1985) signatures. This new scheme has a valuable property that assures that if a message is signed multiple times, the corresponding signatures will be different. This adds to the anonymity of the blind signatures. The new scheme uses number theory operations and modular arithmetic techniques to achieve the desired goal. The current research introduces a generalized signature scheme that could be used to generate blind signatures as well as ordinary ElGamal signatures. The new scheme is found to be comparable to the RSA blinding. Moreover, the new scheme has the advantage of having less computational complexity and is faster than RSA in the blinding procedure.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Effect of turbulence on underwater targets recognition 湍流对水下目标识别的影响
O. Alim, H. Khater
{"title":"Effect of turbulence on underwater targets recognition","authors":"O. Alim, H. Khater","doi":"10.1109/NRSC.2000.838972","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838972","url":null,"abstract":"This paper provides an analysis of the echo structures returning from underwater targets, then it describes the effect of turbulence on underwater target recognition. The sonar signal recognition system deals with the echoes received from complex geometrical shapes of underwater targets. Practical measurements were carried out in the Naval Research Center (NRC) in Alexandria that is supported by a standard water tank. When the vibration system in the water tank started, the effect of turbulence on the received echoes that returned from the targets was included.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132310459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural network based spread spectrum PN code acquisition system 基于神经网络的扩频PN码采集系统
S. El-Khamy, E. Gelenbe, H. Abdelbaki
{"title":"Neural network based spread spectrum PN code acquisition system","authors":"S. El-Khamy, E. Gelenbe, H. Abdelbaki","doi":"10.1109/NRSC.2000.838959","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838959","url":null,"abstract":"A neural network based direct sequence spread spectrum code synchronization system is proposed. The's system is based on training a recurrent random neural network (RNN) model on all the possible phases of the used spreading code. The trained network can then be used at the receiver for the initial coarse alignment of the local code phase and the received code. One advantage of this technique over the conventional synchronization techniques is that the phase of the received PN code can be decided without searching the potential code phases. Also the RNN, after being trained, can have a simple hardware realization that makes it candidate for implementation as a dedicated chip. This makes the neural network based technique faster and more robust than the conventional techniques. Computer simulations, carried out on maximal length sequences of length N=7 and N=15, show that the proposed system cast effectively indicate the phase of the received code even with very low signal to noise ratios.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pitch detection algorithm using a wavelet correlation model 使用小波相关模型的基音检测算法
N. A. Kader
{"title":"Pitch detection algorithm using a wavelet correlation model","authors":"N. A. Kader","doi":"10.1109/NRSC.2000.838962","DOIUrl":"https://doi.org/10.1109/NRSC.2000.838962","url":null,"abstract":"A new algorithm for pitch detection of the speech signal is introduced. The technique is based on the discrete wavelet transform to classify the speech signal into voiced and unvoiced segments. The wavelet parameters of the voiced segments in two frequency bands are extracted and crosscorrelation is performed to generate a correlation function. Then, a peak detection is applied to extract the pitch period. The algorithm is highly immunized to noise. A comparison between the ordinary methods and this new one is presented. The pitch contour is varying through the utterance period rather of being consider as constant through the analysis periods as in ordinary methods. The results are accurate for speech of signal to noise ratio equals to 2 dB.","PeriodicalId":211510,"journal":{"name":"Proceedings of the Seventeenth National Radio Science Conference. 17th NRSC'2000 (IEEE Cat. No.00EX396)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126230224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信