Hongyun Xie, Jia-hui Wu, Dan Sun, Shuo Liu, Rui Liu, Wanrong Zhang, X. Yi
{"title":"Modeling and analysis of an uni-traveling carrier hertero-jucntion phototransistor","authors":"Hongyun Xie, Jia-hui Wu, Dan Sun, Shuo Liu, Rui Liu, Wanrong Zhang, X. Yi","doi":"10.1109/CIRSYSSIM.2017.8023175","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023175","url":null,"abstract":"In this paper, the equivalent circuit model of UTC-HPT is established to simplify the microwave optical amplifier and mixer design. Based on the equivalent circuit model of HBTs, the photo-generated current in UTC-HPT is introduced reasonably as part of base current. The influence of photogenerated carriers on several equivalent circuit components such as trans-conductance, barrier capacitor, diffusion capacitor and junction resistor are considered carefully in the model. Finally, the collector output current is checked to verify the model validity and the photo-current gain and the photo-characteristic frequency are analyzed with the established model.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved design of electromagnetic compatibility for automatic transmission control module","authors":"Mingrong Liao, D. Cong, Yong Zhao","doi":"10.1109/CIRSYSSIM.2017.8023189","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023189","url":null,"abstract":"This paper introduces the improved measures of Electromagnetic Compatibility (EMC) for Automatic Transmission Control Module (TCM) circuit design. The improved electromagnetic designs for TCM circuit can be divided into two aspects, which are Electromagnetic Interference (EMI) and Electromagnetic Susceptibility (EMS). The EMI characteristics are obtained by measuring the TCM. Through analyzing the source and principles of electromagnetic noise, the improved circuits are designed to depress the EMI emissions depending on the characteristics of EMI noise and EMC standards. For EMS, the protection measures are used to protect the TCM basing on the parameters and effects of EMS test. And research method integrated computer simulation and experiment has been used in this paper. The PSPICE circuit simulation software provides guide for improving the design of TCM circuits. After debugging the actual improved circuits and adjusting the circuits' parameters, then the improved circuits are really used in the TCM. And the improved TCM can satisfy the EMC standards.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125132107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust detection algorithm for image Copy-Move forgery in smooth regions","authors":"Q. Han, Qiong Li, Hongli Zhang, M. Emam","doi":"10.1109/CIRSYSSIM.2017.8023194","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023194","url":null,"abstract":"Region duplication or simply Copy-Move forgery is one of the most common forgery types in digital images where a region of the image is copied and then pasted into another location in the same image. Many forgery detection algorithms have been proposed to detect such type of forgery. However, most of the existing algorithms fail when the smooth regions are used to cover up the forgery. In this paper, we propose a robust region duplication forgery detection method based on extracting local extrema points from Difference of Gaussians (DoG) operator. DoG is used because it is a good approximation for the Laplacian of Gaussian (LoG) and much faster to calculate. To extract the descriptive features and hence improve the matching performance, Multi-support Region Order-based Gradient Histogram (MROGH) descriptor is adopted. Experimental results show the robustness of the proposed method compared with the state-of-the-art methods.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123385625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outage analysis of two-tier heterogeneous cellular network with sleep strategies","authors":"A. Shabbir, H. Khan, Syed Abbas Ali","doi":"10.1109/CIRSYSSIM.2017.8023198","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023198","url":null,"abstract":"This research paper has analyzed two tier heterogeneous cellular network based infrastructure, when femto cells are introduced in traditional homogeneous network for meeting explosive data rate requirements raised by high speed smart applications driven by smart phones, tablets and PCs. The evolution of small cell opens the possibility to cater with one of the biggest issue in cellular world: Energy Efficiency (EE) of base stations. One way to optimized EE is to introduce sleep mode strategies for small cells. This research work aims to investigate outage probability and active probability of multi-tier heterogeneous network, when sleeping mode strategies are applied for reduction in energy consumption.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice trigger system using fuzzy logic","authors":"E. Manor, S. Greenberg","doi":"10.1109/CIRSYSSIM.2017.8023193","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023193","url":null,"abstract":"In this paper, we propose a voice trigger system using a keyword-dependent speaker recognition technique. The voice trigger system must be able to perform keyword recognition, as well as speaker recognition, without using computationally demanding speech recognizer, to properly trigger a mobile device with low computational power consumption. This paper presents a fuzzy logic system to classify the speaker voice features. Experiments using a Hebrew word bank show that the fuzzy based method performs with low recognition error while highly minimizing the power and area footprint comparing to conventional methods.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130744487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A whole-process WiFi security perception software system","authors":"Heqing Huang, Yanjun Hu, Yan Ja, Shiliang Ao","doi":"10.1109/CIRSYSSIM.2017.8023201","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023201","url":null,"abstract":"A whole-process WiFi security perception software system is designed in this paper based on the analysis of client's wireless access process, it consists of three modules to protect user from security threats during the pre-connection, connection and after-connection. The system could detects WiFi environment and shows with 3D effect, marking the Rogue AP, which is found out by multi-factors analysis techniques. During the connection, it inspired by the idea of Fog Computing, sending fake traffic to protect PSK from sniffing. After connection, the system detects Deauth attack in time, and traces the attacker. Finally, The software functionalities is realized, all the suspicious points are displayed on the User Interface (UI). The corresponding experimental testing shows that it could protect the surf in the WiFi environment effectively.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130082328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical estimation of logical masking capability of majority/minority gates used in nanoelectronic circuits","authors":"Padmanabhan Balasubramanian, R. T. Naayagi","doi":"10.1109/CIRSYSSIM.2017.8023173","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023173","url":null,"abstract":"In nanoelectronic circuit synthesis, the majority gate and the inverter form the basic combinational logic primitives. This paper deduces the mathematical formulae to estimate the logical masking capability of majority gates, which are used extensively in nanoelectronic digital circuit synthesis. The mathematical formulae derived to evaluate the logical masking capability of majority gates holds well for minority gates, and a comparison with the logical masking capability of conventional gates such as NOT, AND/NAND, OR/NOR, and XOR/XNOR is provided. It is inferred from this research work that the logical masking capability of majority/minority gates is similar to that of XOR/XNOR gates, and with an increase of fan-in the logical masking capability of majority/minority gates also increases.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time benchmark set synthesis based on pWCET estimation and bounded hyper-periods","authors":"Ashraf Suyyagh, Z. Zilic","doi":"10.1109/CIRSYSSIM.2017.8023196","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023196","url":null,"abstract":"In evaluating performance, schedulability, and energy efficiency metrics for real-time systems, numerous algorithms have been proposed to construct synthetic tasksets for simulation. The resulting taskset characteristics should ideally reflect real workloads while the algorithms generating these tasksets should be efficient. Any experimentation using these tasksets will highly depend on their properties. Current approaches construct the sets by choosing taskset periods and utilisation from statistical distributions and compute the task worst case execution times accordingly. Tasks are generated through timed loops or matrix operations up to the specified task WCET. At times, the taskset hyper-period is bounded to minimise simulation interval through selected assignment of task periods. However, tasks which burn processor cycles through loops and matrix operations do not always reflect realistic task loads. In this paper, we propose a methodology for generating realistic tasksets based on available embedded benchmarks. We extend on previous work and propose new algorithms: CPA-AU/DU (Compute-Propagate-Adjust Ascending/Descending Utilisation) which efficiently pair taskset WCETs with selected discrete periods. Our tasksets have bounded and feasible simulation interval and meet desired total utilisation with minimum digression errors. We also show that our algorithms run in polynomial time.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Early stopping criterion for LDPC","authors":"J. Sodha","doi":"10.1109/CIRSYSSIM.2017.8023197","DOIUrl":"https://doi.org/10.1109/CIRSYSSIM.2017.8023197","url":null,"abstract":"A log-likelihood ratio (LLR) test on the single Mth check node of an LDPC decoder is utilised to develop an improved low complexity stopping criterion. The average number of iterations required at low SNRs is significantly reduced without sacrificing the BER performance. At high SNRs, unlike typical stopping criteria which suffer a penalty in the BER performance because the decoder inadvertently stops the decoder too early, the proposed algorithm adaptively switches off at high SNRs. Simulation results are presented for the rate 1 (288, 576) WiMAX 802.16e LDPC code digits using binary phase shift keying (BPSK) over an AWGN channel.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}