Jing Chen, Hongqi Fan, Huaitie Xiao, Zhi-yong Song
{"title":"A novel ISAR imaging method for multiple targets moving in formation","authors":"Jing Chen, Hongqi Fan, Huaitie Xiao, Zhi-yong Song","doi":"10.1109/CECNET.2013.6703264","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703264","url":null,"abstract":"When multiple targets, such as aircrafts in a formation, fly closely in the same radar beam, the returned signals from these targets are overlapped in time. Therefore, by applying conventional motion compensation algorithms that work well for single target, the multiple targets cannot be resolved and each individual target cannot be clearly image. This paper proposes a novel inverse aperture radar (ISAR) imaging method for multiple targets moving in a formation with uniformly accelerative rectilinear motion. This method is composed of three steps. In the first step, range curvature and range walk are corrected by the acceleration compensation and Keystone transform (KT) respectively. Then, phase adjustment is used to obtain a bulk ISAR image of multiple targets. The second step is the image segmentation that partitions the region of each target by the normalized cuts. Finally, refined compensation using conventional motion compensation algorithm is carried out to obtain a well-focused ISAR image of each individual target. Simulation results prove the effectiveness of the proposed method.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hui Zhang, Chunzh Liu, Tao Wang, Hua Zhang, Chen Zeng
{"title":"Analysis of hot carrier and NBTI induced device degradation on CMOS ring oscillator","authors":"Hui Zhang, Chunzh Liu, Tao Wang, Hua Zhang, Chen Zeng","doi":"10.1109/CECNET.2013.6703292","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703292","url":null,"abstract":"The degradation of CMOS ring oscillator caused by hot carrier and negative bias temperature instability (NBTI) is presented in this paper. These two degradation mechanisms deteriorate the oscillator's start-up reliability and the oscillation frequency by threshold voltage (Vth) degradation. According to impact analysis, an improved ring oscillator is proposed which is insensitive to degradation. The SPICE simulation shows that the oscillator has better start-up reliability and frequency stability.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on analyzing sentiment of texts based on semantic comprehension","authors":"Bin Wen, Ping Fan, WenHua Dai, Ling Ding","doi":"10.1109/CECNET.2013.6703386","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703386","url":null,"abstract":"Text sentimental mining is aim to obtain the orientation information of text, and studying users' opinion is relevant because through it concerned departments could make correct responses. In this paper, we introduce methods to discriminatively learn semantic comprehension for use as features in text classification. Based on the existed HowNet Knowledge, we consider improving algorithm for calculating Chinese term semantic value. Then, conditions of adverbs, conjunctions and text-structure are added step by step. And the experimental results show that the proposed approach is suitable for judging texts' sentimental orientation.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"17 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Zhang, Lu Wang, Gang Cheng, Ting Li, Huajing Li
{"title":"The application of 3S in investigation and design of electric power transmission line","authors":"N. Zhang, Lu Wang, Gang Cheng, Ting Li, Huajing Li","doi":"10.1109/CECNet.2013.6703417","DOIUrl":"https://doi.org/10.1109/CECNet.2013.6703417","url":null,"abstract":"The paper gives a brief discussion of how to collect terrain data from papery topographic maps to generate DTM, and introduces the method of making orthoimages with radiometric correction and geometry rectification. DTM data and orthoimages are used as the basis for designing transmitting lines and generating section maps. 3D data and GPS are utilized for field survey. Finally GPS field survey data are added into images to modify and settle position of telegraph poles.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingying Han, Xirong Que, Wendong Wang, Kai Shuang, Ming Huang
{"title":"Study on wireless resource consumption of mobile applications in GPRS","authors":"Yingying Han, Xirong Que, Wendong Wang, Kai Shuang, Ming Huang","doi":"10.1109/CECNET.2013.6703411","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703411","url":null,"abstract":"The success of mobile Internet brings about data tsunami and huge impact on the Internet, especially 2G network. Application behaviors such as the heartbeat, frequent connection and short package lead to the abuse of wireless network resources in GPRS. In this paper, we study CCCH channel resource consumption of mobile applications with 2G data service. The core concept is to analyze CCCH resource consumption result from the heartbeat behavior of always online applications such as QQ, Fetion and Sina Weibo on intelligent terminal of Android platform. Firstly, we use a network packet analyzer to capture data packets of applications in different scenarios. Then we take full advantage of apps' heartbeat behavior characteristics and knowledge of resource consumption on wireless signaling channel, coming up with a simplified algorithm to realize CCCH resources consumption statistics. Finally, we make some conclusion through data statistics and contrast analysis. Further experimental analysis shows that different kinds and versions of applications, system mechanism of intelligent terminals and network conditions are the three main factors which affect resource consumption.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved FCM algorithm based on the initial clustering center selection","authors":"Qi Wen, Lili Yu, Yingjie Wang, Weifeng Wang","doi":"10.1109/CECNET.2013.6703344","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703344","url":null,"abstract":"Fuzzy C-average algorithm (also known as the FCM algorithm) is a clustering algorithm based on partition. The idea of the algorithm is making is divided into clusters with the similarity between objects as large as possible, and the similarity between objects of different clusters as small as possible. As the algorithm is simple, easy to implement and computer clustering effect, etc., makes this algorithm in many fields has been widely applied. This paper focuses principles of FCM algorithm, the algorithm steps and its problems were described in detail and propose an improved algorithm.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of cognitive radio spectrum access with heterogeneous traffic under buffer constraints","authors":"Zhu-Juan Wang, Yi Zhang","doi":"10.1109/CECNET.2013.6703291","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703291","url":null,"abstract":"In this paper, a novel spectrum sharing scheme is proposed to improve the achievable traffic load in the cognitive radio networks (CRN) with considering heterogeneous traffic and limited system resource (i.e., the buffer capability in a secondary base station), simultaneously. Specifically, we consider a CRN where unlicensed networks employ network coding for data storage control in a secondary base station. We put up three different data-change scenarios and five kinds of comparison mechanisms in every scenario based on heterogeneous traffic. For performance measures, we derive the blocking probability, the probability of forced termination, throughput and spectrum utilization. Numerical results show that compared to the existing approaches, the proposed scheme can carry out higher stable traffic load and spectrum utilization of unlicensed users.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of wireless injection attacks based on TinyOS","authors":"Xiaoliang Zhu, Yunfang Chen","doi":"10.1109/CECNET.2013.6703385","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703385","url":null,"abstract":"Wireless sensor networks face information disclosure, information tampering, replay attacks and other threats. For wireless sensor networks in the objective conditions, this paper proposes a wireless injection attack based on the TinyOS operating system comparable to Man-in-the-middle attack, and designs a set of schemes on injection attack by hardware node platform and TinyOS platform. The results show that it successfully injects false data into the normal wireless communications in wireless sensor networks, resulting in terminal receives fake data.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated failure model for analog circuit simulation based on Saber platform","authors":"Tao Wang, Hui Zhang, Hua Zhang","doi":"10.1109/CECNET.2013.6703348","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703348","url":null,"abstract":"A new failure model based on Saber platform is proposed to simulate familiar failure mode of analog circuit, such as open-circuit and short-circuit mode. With this new model, it becomes much easier and more convenient to carry out fault injection and failure simulation in analog circuit simulation. By using a representative case, it is validated that the integrated fault model is correct and the injection of this fault model is feasible.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The algorithm of information system anomaly detection","authors":"M. Gu","doi":"10.1109/CECNET.2013.6703415","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703415","url":null,"abstract":"Principle of anomaly detection technique based on a chi-square statistic was described. Algorithm of Chi-square statistical technique was designed. In order to verify the effect of principle and algorithm, testing data of sample of UNIX and Windows XP system was presented and compared. The results of this study show that chi-square technology achieves the 0% false alarm rate and the 100% detection rate for abnormal intrusion scenarios. All intrusion scenarios are detected at the first or second audit event.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}