2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)最新文献

筛选
英文 中文
A de-embedding network at higher frequency and its error analysis 高频去嵌入网络及其误差分析
S. Dong, J. Lees, P. Tasker
{"title":"A de-embedding network at higher frequency and its error analysis","authors":"S. Dong, J. Lees, P. Tasker","doi":"10.1109/ICEICT.2016.7879754","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879754","url":null,"abstract":"The intrinsic performance of the devices is of great meaning during power amplifiers design. A method to update de-embedding network at 5.8 GHz for packaged power devices is put forward based on physical modeling idea. The de-embedding network of a packaged GaN HEMT is presented and its errors are analyzed based on waveform engineering. The results may well lead to optimization of the de-embedding network.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121769848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel method of ISAR image pre-processing for ship 一种新的舰船ISAR图像预处理方法
S. Shang, Ming Li, Yingni Hou, Li Chen, Yuhao Yang, Jun Sun
{"title":"A novel method of ISAR image pre-processing for ship","authors":"S. Shang, Ming Li, Yingni Hou, Li Chen, Yuhao Yang, Jun Sun","doi":"10.1109/ICEICT.2016.7879696","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879696","url":null,"abstract":"Image pre-processing is the critical step in the ship target identification of ISAR images, which consists of speckle noise suppression and stripe noise suppression. In this paper, a pre-processing method of speckle noise and stripe noise suppression is proposed. For speckle noise estimation, an adaptive initial threshold is generated based on hypothesis of Rayleigh distribution, and the second segmentation threshold is calculated by the maximum gray value and gradient value in background region of ISAR image. For stripe noise estimation, a nonlinear compression method is used in the cross region of ship targets and stripe noise. In the experiments, the pre-processing results demonstrate the proposed method can not only suppress the speckle noise and stripe noise effectively, but also eliminate stronger noise points around the ship target.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123890731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectral efficiency of single cell full-duplex MU-MIMO system based on SLNR precoding 基于SLNR预编码的单小区全双工MU-MIMO系统的频谱效率
Teklu Merhawit Berhane, Wei-Xiao Meng, Yi Zhang, Lei Chen
{"title":"Spectral efficiency of single cell full-duplex MU-MIMO system based on SLNR precoding","authors":"Teklu Merhawit Berhane, Wei-Xiao Meng, Yi Zhang, Lei Chen","doi":"10.1109/ICEICT.2016.7879645","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879645","url":null,"abstract":"Full-duplex (FD) mode systems are key technologies for 5G wireless communication systems due to their ability improving spectral efficiency. The major difficulties of these systems are in mitigating interferences such as multiuser interferences in both channels and self-interference from downlink to uplink. Therefore, it is required to rely on precoding schemes. We propose self-interference plus noise covariance matrix aware signal-to-leakage-and-noise ratio (SLNR) precoding and SLNR precoding for uplink and downlink channels, respectively, to improve spectral efficiency of FD in the Rician fading channel situations. Unlike zero-forcing (ZF) and block diagonalization (BD) precoding schemes, it has tradeoffs between interference and noise, as well simultaneously support multiple number of users and antennas. The problem is formulated as maximizing SLNR to obtain the precoder that optimized the total spectral efficiency of the system. Numerical results confirm that FD outperforms HD for small self-interference channel gain, for increasing number of antennas at the base station and for all Rician parameters.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MIMO radar space-time adaptive processing via iterative factored approach 基于迭代因子法的MIMO雷达时空自适应处理
Hui Lv, Da-Zheng Feng
{"title":"MIMO radar space-time adaptive processing via iterative factored approach","authors":"Hui Lv, Da-Zheng Feng","doi":"10.1109/ICEICT.2016.7879729","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879729","url":null,"abstract":"This paper develops a new space-time adaptive processing (STAP) technique for multiple-input multiple-output (MIMO) radar, which is a reduced-dimension application of the well-known factored approach (FA) and extended factored approach (EFA). Simulation results are presented to demonstrate the effectiveness of this new method.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An attack-target-method schema for cyber attack event database 一种针对网络攻击事件数据库的攻击目标方法模式
Nam-jeong Kim, Mun-soo Gong, Gang-soo Lee
{"title":"An attack-target-method schema for cyber attack event database","authors":"Nam-jeong Kim, Mun-soo Gong, Gang-soo Lee","doi":"10.1109/ICEICT.2016.7879705","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879705","url":null,"abstract":"Many cyber attacks events have been occurring. Those are described so various points of views that redundancy of attack events information is increased. In this paper, to cope with the problems, we propose and develop attacker classification, attack-method classification, asset classification systems, as well as an ATM-schema that is an integrated schema of attacker's view, target(asset)'s view and attack-method's view. Additionally, we implement an ‘attack capability evaluation support system’ by using that schema. Those are useful for efficiently constructing an attack database of various cyber attack events and big data.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on laser radiation for simulating dose rate effects in semiconductor materials 模拟半导体材料中剂量率效应的激光辐射研究
Li Mo, Sun Peng, Zhang Jian, Li Jie, Qiao Chunhua, Li Linzhe, X. Li-yi
{"title":"Research on laser radiation for simulating dose rate effects in semiconductor materials","authors":"Li Mo, Sun Peng, Zhang Jian, Li Jie, Qiao Chunhua, Li Linzhe, X. Li-yi","doi":"10.1109/ICEICT.2016.7879762","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879762","url":null,"abstract":"In this paper, a laser radiation model based on TCAD is built up. With this model, some simulations of laser irradiating semiconductor material are presented. And also simulations of gamma ray irradiating semiconductor material are given. By comparing the simulation results the relationship between laser intensity and gamma dose rate is obtained. The results demonstrate that the laser radiation model is practicable in TCAD for reliability analysis and the laser simulation technique is reliable to simulate dose rate effect.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified AODV routing protocol in underwater acoustic networks 水声网络中改进的AODV路由协议
L. Tong, Zhao Qilu, Zhang Linbo
{"title":"Modified AODV routing protocol in underwater acoustic networks","authors":"L. Tong, Zhao Qilu, Zhang Linbo","doi":"10.1109/ICEICT.2016.7879681","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879681","url":null,"abstract":"In the past decade, underwater acoustic networks have attracted more and more research interests and developed broadly for a large number of applications. Due to the characteristics of the underwater medium-low data rate, high bite error rate, unstable link and limited energy of node, the widely accepted routing protocols cannot adapt to the underwater transmission. In the paper, we have compared and analyzed the current routing protocols, and then put forward doubling flooding mechanism and reserving remaining routing mechanism to modify ad-hoc on-demand Distance Vector (AODV). By analyzing the simulation results in the OMNET++, we find modified AODV performs better than traditional AODV in the metrics like packet delivery ratio, route setup time and end-to-end delay.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Information game model for secure localization in wireless sensor networks 无线传感器网络安全定位的信息博弈模型
Xiaofeng Xu, Yongji Ren
{"title":"Information game model for secure localization in wireless sensor networks","authors":"Xiaofeng Xu, Yongji Ren","doi":"10.1109/ICEICT.2016.7879682","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879682","url":null,"abstract":"Recent years have witnessed an impressive growth in the technology of wireless sensor networks (WSNs). Being an essential technology of WSNs, localization is very important to the location-based applications and network protocols. Therefore, several reported studies have focused more attention on the secure localization. A paradigm that the benign anchors are compromised in the hostile battlefield environments, and turn into malicious nodes to pretend to be true anchor nodes and send false information to interfere with the correct localization procedure of ordinary nodes, is designed. To solve this problem, some effective approaches should be explored to ensure the security of localization and eliminate the adverse influence due to the malicious anchors. Therefore, in this paper, we propose a novel information game based secure localization approach for wireless sensor networks. The secure localization problem in hostile scenario has been transformed into an information game problem. Simulation results show that the proposed method is effective to secure localization.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new kind of miniature sun sensor design 一种新型微型太阳敏感器的设计
Chaoqun Jing, Tian Liang, Qijun Lei
{"title":"A new kind of miniature sun sensor design","authors":"Chaoqun Jing, Tian Liang, Qijun Lei","doi":"10.1109/ICEICT.2016.7879687","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879687","url":null,"abstract":"This paper presents the design of a new type of digital sun sensors which can be applied to micro spacecraft especially micro satellites. The optical system, which adopts the CMOS APS area array sensor while abandoning the traditional way of utilizing slot to achieve the introduction of sun light, is different from common systems. The uniqueness of the design lies in the perpendicular double-slit structure. By windowing image reading through software settings of the sensor, we can obtain the obliquity of light relative to two axes thus calculating the actual sun light angle. Since there is no need to read the image information of the entire area array, this design can significantly increase the data updating frequency with no loss of data accuracy.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123940322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Arbitrarily polarized microwave power transmission technologies 任意极化微波功率传输技术
Yazhou Dong, S. Dong, Xiaojun Li, L. Ran
{"title":"Arbitrarily polarized microwave power transmission technologies","authors":"Yazhou Dong, S. Dong, Xiaojun Li, L. Ran","doi":"10.1109/ICEICT.2016.7879753","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879753","url":null,"abstract":"Arbitrarily polarized microwave power transmission technologies including polarization auto-matching retrodirective transmitting method and arbitrarily polarized microwave rectenna are proposed in this paper. The polarization auto-matching retrodirective transmitting method using phase conjugating circuits and polarization rotators can receive any polarized pilot signal and generate predictable polarized beam aimed back to the rectenna. The arbitrarily polarized microwave rectenna introducing a directional coupler between dual-polarized antenna and rectifying circuits can receive any polarized microwave and equally distribute it to two rectifying circuits to maintain high rectifying efficiency.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116631364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信