2013 3rd International Conference on Consumer Electronics, Communications and Networks最新文献

筛选
英文 中文
A novel ISAR imaging method for multiple targets moving in formation 一种多目标编队运动的ISAR成像新方法
Jing Chen, Hongqi Fan, Huaitie Xiao, Zhi-yong Song
{"title":"A novel ISAR imaging method for multiple targets moving in formation","authors":"Jing Chen, Hongqi Fan, Huaitie Xiao, Zhi-yong Song","doi":"10.1109/CECNET.2013.6703264","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703264","url":null,"abstract":"When multiple targets, such as aircrafts in a formation, fly closely in the same radar beam, the returned signals from these targets are overlapped in time. Therefore, by applying conventional motion compensation algorithms that work well for single target, the multiple targets cannot be resolved and each individual target cannot be clearly image. This paper proposes a novel inverse aperture radar (ISAR) imaging method for multiple targets moving in a formation with uniformly accelerative rectilinear motion. This method is composed of three steps. In the first step, range curvature and range walk are corrected by the acceleration compensation and Keystone transform (KT) respectively. Then, phase adjustment is used to obtain a bulk ISAR image of multiple targets. The second step is the image segmentation that partitions the region of each target by the normalized cuts. Finally, refined compensation using conventional motion compensation algorithm is carried out to obtain a well-focused ISAR image of each individual target. Simulation results prove the effectiveness of the proposed method.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of hot carrier and NBTI induced device degradation on CMOS ring oscillator CMOS环形振荡器热载流子及NBTI致器件退化分析
Hui Zhang, Chunzh Liu, Tao Wang, Hua Zhang, Chen Zeng
{"title":"Analysis of hot carrier and NBTI induced device degradation on CMOS ring oscillator","authors":"Hui Zhang, Chunzh Liu, Tao Wang, Hua Zhang, Chen Zeng","doi":"10.1109/CECNET.2013.6703292","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703292","url":null,"abstract":"The degradation of CMOS ring oscillator caused by hot carrier and negative bias temperature instability (NBTI) is presented in this paper. These two degradation mechanisms deteriorate the oscillator's start-up reliability and the oscillation frequency by threshold voltage (Vth) degradation. According to impact analysis, an improved ring oscillator is proposed which is insensitive to degradation. The SPICE simulation shows that the oscillator has better start-up reliability and frequency stability.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on analyzing sentiment of texts based on semantic comprehension 基于语义理解的文本情感分析研究
Bin Wen, Ping Fan, WenHua Dai, Ling Ding
{"title":"Research on analyzing sentiment of texts based on semantic comprehension","authors":"Bin Wen, Ping Fan, WenHua Dai, Ling Ding","doi":"10.1109/CECNET.2013.6703386","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703386","url":null,"abstract":"Text sentimental mining is aim to obtain the orientation information of text, and studying users' opinion is relevant because through it concerned departments could make correct responses. In this paper, we introduce methods to discriminatively learn semantic comprehension for use as features in text classification. Based on the existed HowNet Knowledge, we consider improving algorithm for calculating Chinese term semantic value. Then, conditions of adverbs, conjunctions and text-structure are added step by step. And the experimental results show that the proposed approach is suitable for judging texts' sentimental orientation.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"17 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The application of 3S in investigation and design of electric power transmission line 3S在输电线路勘察设计中的应用
N. Zhang, Lu Wang, Gang Cheng, Ting Li, Huajing Li
{"title":"The application of 3S in investigation and design of electric power transmission line","authors":"N. Zhang, Lu Wang, Gang Cheng, Ting Li, Huajing Li","doi":"10.1109/CECNet.2013.6703417","DOIUrl":"https://doi.org/10.1109/CECNet.2013.6703417","url":null,"abstract":"The paper gives a brief discussion of how to collect terrain data from papery topographic maps to generate DTM, and introduces the method of making orthoimages with radiometric correction and geometry rectification. DTM data and orthoimages are used as the basis for designing transmitting lines and generating section maps. 3D data and GPS are utilized for field survey. Finally GPS field survey data are added into images to modify and settle position of telegraph poles.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on wireless resource consumption of mobile applications in GPRS GPRS中移动应用的无线资源消耗研究
Yingying Han, Xirong Que, Wendong Wang, Kai Shuang, Ming Huang
{"title":"Study on wireless resource consumption of mobile applications in GPRS","authors":"Yingying Han, Xirong Que, Wendong Wang, Kai Shuang, Ming Huang","doi":"10.1109/CECNET.2013.6703411","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703411","url":null,"abstract":"The success of mobile Internet brings about data tsunami and huge impact on the Internet, especially 2G network. Application behaviors such as the heartbeat, frequent connection and short package lead to the abuse of wireless network resources in GPRS. In this paper, we study CCCH channel resource consumption of mobile applications with 2G data service. The core concept is to analyze CCCH resource consumption result from the heartbeat behavior of always online applications such as QQ, Fetion and Sina Weibo on intelligent terminal of Android platform. Firstly, we use a network packet analyzer to capture data packets of applications in different scenarios. Then we take full advantage of apps' heartbeat behavior characteristics and knowledge of resource consumption on wireless signaling channel, coming up with a simplified algorithm to realize CCCH resources consumption statistics. Finally, we make some conclusion through data statistics and contrast analysis. Further experimental analysis shows that different kinds and versions of applications, system mechanism of intelligent terminals and network conditions are the three main factors which affect resource consumption.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved FCM algorithm based on the initial clustering center selection 基于初始聚类中心选择的改进FCM算法
Qi Wen, Lili Yu, Yingjie Wang, Weifeng Wang
{"title":"Improved FCM algorithm based on the initial clustering center selection","authors":"Qi Wen, Lili Yu, Yingjie Wang, Weifeng Wang","doi":"10.1109/CECNET.2013.6703344","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703344","url":null,"abstract":"Fuzzy C-average algorithm (also known as the FCM algorithm) is a clustering algorithm based on partition. The idea of the algorithm is making is divided into clusters with the similarity between objects as large as possible, and the similarity between objects of different clusters as small as possible. As the algorithm is simple, easy to implement and computer clustering effect, etc., makes this algorithm in many fields has been widely applied. This paper focuses principles of FCM algorithm, the algorithm steps and its problems were described in detail and propose an improved algorithm.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of cognitive radio spectrum access with heterogeneous traffic under buffer constraints 缓冲约束下异构业务的认知无线电频谱接入分析
Zhu-Juan Wang, Yi Zhang
{"title":"Analysis of cognitive radio spectrum access with heterogeneous traffic under buffer constraints","authors":"Zhu-Juan Wang, Yi Zhang","doi":"10.1109/CECNET.2013.6703291","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703291","url":null,"abstract":"In this paper, a novel spectrum sharing scheme is proposed to improve the achievable traffic load in the cognitive radio networks (CRN) with considering heterogeneous traffic and limited system resource (i.e., the buffer capability in a secondary base station), simultaneously. Specifically, we consider a CRN where unlicensed networks employ network coding for data storage control in a secondary base station. We put up three different data-change scenarios and five kinds of comparison mechanisms in every scenario based on heterogeneous traffic. For performance measures, we derive the blocking probability, the probability of forced termination, throughput and spectrum utilization. Numerical results show that compared to the existing approaches, the proposed scheme can carry out higher stable traffic load and spectrum utilization of unlicensed users.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of wireless injection attacks based on TinyOS 基于TinyOS的无线注入攻击研究
Xiaoliang Zhu, Yunfang Chen
{"title":"Research of wireless injection attacks based on TinyOS","authors":"Xiaoliang Zhu, Yunfang Chen","doi":"10.1109/CECNET.2013.6703385","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703385","url":null,"abstract":"Wireless sensor networks face information disclosure, information tampering, replay attacks and other threats. For wireless sensor networks in the objective conditions, this paper proposes a wireless injection attack based on the TinyOS operating system comparable to Man-in-the-middle attack, and designs a set of schemes on injection attack by hardware node platform and TinyOS platform. The results show that it successfully injects false data into the normal wireless communications in wireless sensor networks, resulting in terminal receives fake data.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated failure model for analog circuit simulation based on Saber platform 基于Saber平台的模拟电路仿真集成故障模型
Tao Wang, Hui Zhang, Hua Zhang
{"title":"Integrated failure model for analog circuit simulation based on Saber platform","authors":"Tao Wang, Hui Zhang, Hua Zhang","doi":"10.1109/CECNET.2013.6703348","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703348","url":null,"abstract":"A new failure model based on Saber platform is proposed to simulate familiar failure mode of analog circuit, such as open-circuit and short-circuit mode. With this new model, it becomes much easier and more convenient to carry out fault injection and failure simulation in analog circuit simulation. By using a representative case, it is validated that the integrated fault model is correct and the injection of this fault model is feasible.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The algorithm of information system anomaly detection 信息系统异常检测算法
M. Gu
{"title":"The algorithm of information system anomaly detection","authors":"M. Gu","doi":"10.1109/CECNET.2013.6703415","DOIUrl":"https://doi.org/10.1109/CECNET.2013.6703415","url":null,"abstract":"Principle of anomaly detection technique based on a chi-square statistic was described. Algorithm of Chi-square statistical technique was designed. In order to verify the effect of principle and algorithm, testing data of sample of UNIX and Windows XP system was presented and compared. The results of this study show that chi-square technology achieves the 0% false alarm rate and the 100% detection rate for abnormal intrusion scenarios. All intrusion scenarios are detected at the first or second audit event.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信