Hae-Chang JEONG Kyung-Whan YEOM
In this paper, the design and fabrication of a miniaturized class-F 2.5 GHz 8 W power amplifier using a commercially available GaN HEMT bare chip from TriQuint and a Selectively Anodized Aluminum Oxide (SAAO) substrate are presented. The SAAO process was recently proposed and patented by Wavenics Inc., Daejeon, Korea, which provides the fabrication of small size circuit comparable to conventional MMIC and at drastically low cost due to the use of aluminum as a wafer. The advantage of low cost is especially promising for RF components fabrication in commercial applications like mobile communications. The fabricated power amplifier has a compact size of 4.4 4.4 mm2 and shows power added efficiency (PAE) of about 35% and harmonic suppression of above 30 dBc for second and third harmonics at an output power of 39 dBm.
Hyengcheul CHOI Kyung-Young JUNG Hyeongdong KIM
Ground antennas are suitable for use in mobile electronic devices due to their compactness. These ground antennas incorporate two capacitors for controlling the resonance frequency and a shorting loop for impedance matching. In this work, we compare the performance of a ground antenna with that of a meandered inverted-F antenna (IFA). It is numerically and experimentally shown that a ground antenna can yield simultaneous improvements in both the antenna size and radiation efficiency when compared to the meandered IFA. The bandwidth of the ground antenna for a voltage standing wave ratio (VSWR) of 3:1 is 240 MHz from 2350 MHz to 2590 MHz, while the minimum total antenna efficiency is 62% within the 2.4 GHz ISM band.
ChengDong WU Long CHENG YunZhou ZHANG
In this paper, two efficient redeployment strategies which are designed to balance the detection coverage rate and maintenance period are proposed. To develop these strategies, we first analyze the sensor detection coverage and energy consumption model. We then propose a network maintenance indicator that considers the coverage rate and residual energy in each node. We adopt the network maintenance indicator as the cost function. That is, the network maintenance is formulated as a cost optimization problem. Finally we propose COST_MAX_MIN and COST_MAX_AVG strategies to select the redeployed location of candidate nodes. Simulation results show that the COST_MAX_AVG prolong the repair period in comparison with the COST_MAX_MIN strategy.
Jaemin JEUNG Seungmyeong JEONG JaeSung LIM
We propose a deception mechanism to combat a compromised station in IEEE 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.
Hiroshi KUBO Takenori YOSHIDA Atsushi SANADA Tsunayuki YAMAMOTO
A left-handed material with simple structure is proposed. The material is composed of periodic metal strips exhibiting both electric property and magnetic property. The dispersion relations and the transmission characteristics are confirmed experimentally. The main field pattern of guided mode in the material is similar to that of the plane wave, and a transmission characteristic with low reflection is obtained for an impedance matching region.
Junxiang WANG Jiangqun NI Dong ZHANG Hao LUO
In the letter, we propose an improved histogram shifting (HS) based reversible data hiding scheme for small payload embedding. Conventional HS based schemes are not suitable for low capacity embedding with relatively large distortion due to the inflexible side information selection. From an analysis of the whole HS process, we develop a rate-distortion model and provide an optimal adaptive searching approach for side information selection according to the given payload. Experiments demonstrate the superior performance of the proposed scheme in terms of performance curve for low payload embedding.
Chengqian XU Yubo LI Kai LIU Xiaoyu CHEN
In this paper, we constructed a class of low correlation zone sequence sets derived from the interleaved technique and DFT matrices. When p is a prime such that p > 3, p-ary LCZ sequence sets with parameters LCZ(pn-1,pm-1,(pn-1)/(pm-1),1) are constructed based on a DFT matrix with order pp, which is optimal with respect to the Tang-Fan-Matsufuji bound. When p is a prime such that p ≥ 2, pk-ary LCZ sequence sets with parameters LCZ(pn-1,pk-1,(pn-1)/(pk-1),1) are constructed based on a DFT matrix with order pkpk, which is also optimal. These sequence sets are useful in certain quasi-synchronous code-division mutiple access (QS-CDMA) communication systems.
We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote user authentication scheme using smart cards. We formally prove the security of our proposed scheme using the BAN logic.
Chen CHEN Qingqi PEI Xiaoji LI Rong SUN
In this letter, a Simple but Effective Congestion Control scheme (SECC) in VANET has been proposed to guarantee the successful transmissions for safety-related nodes. The strategy derive a Maximum Beacon Load Activity Indicator (MBLAI) to restrain the neighboring general periodical beacon load for the investigated safety-related “observation nodes”, i.e., the nodes associated with some emergent events. This mechanism actually reserves some bandwidth for the safety-related nodes to make them have higher priorities than periodical beacons to access channel. Different from the static congestion control scheme in IEEE802.11p, this strategy could provide dynamic control strength for congestion according to tolerant packets drop ratio for different applications.
Raouf SENHADJI-NAVARRO Ignacio GARCIA-VARGAS
This letter proposes a new model of state machine called Finite Virtual State Machine (FVSM). A memory-based architecture and a procedure for generating FVSM implementations from Finite State Machines (FSMs) are presented. FVSM implementations provide advantages in speed over conventional RAM-based FSM implementations. The results of experiments prove the feasibility of this approach.
Jaeho JEONG Gia Khanh TRAN Kiyomichi ARAKI
Single front-end architecture with parasitic antenna element (PAE) in compact array system has been proposed for enhancing spectral efficiency and miniaturizing the receiver. Although most of studies paid attention to design optimal receiver with antenna mutual coupling on fading correlation, relatively little attention has been paid to noise. In this paper, we propose a low noise model for single front-end MIMO receiver system with PAE which includes arbitrary signal and noise coupling. The proposed model articulates physical noise sources and relates their spatial correlation with array receive antennas, parasitic element, front-end and matching circuit. A matching circuit is designed to achieve minimum noise figure. After that, the optimal PAE value is derived to maximize channel capacity. We present numerical analysis to verify the proposed system on certain conditions.
Guoliang LU Mineichi KUDO Jun TOYAMA
Vision based human action recognition has been an active research field in recent years. Exemplar matching is an important and popular methodology in this field, however, most previous works perform exemplar matching on the whole input video clip for recognition. Such a strategy is computationally expensive and limits its practical usage. In this paper, we present a martingale framework for selection of characteristic frames from an input video clip without requiring any prior knowledge. Action recognition is operated on these selected characteristic frames. Experiments on 10 studied actions from WEIZMANN dataset demonstrate a significant improvement in computational efficiency (54% reduction) while achieving the same recognition precision.
Recently a simple algorithm was presented by the first author which enables one to successively compute the transformation matrix of various order for the general 1-D to 1-D polynomial transformation. This letter extends the result to the general 1-D to 2-D polynomial transformation. It is also shown that the matrix obtained can be used for the 2-D to 2-D polynomial transformation as well.
Masayoshi AIKAWA Eisuke NISHIYAMA
This paper describes very compact MIC magic-Ts and their integration with planar array antennas to realize the advanced antenna modules. The orthogonal transmission modes are effectively used to arrange the preferable port layout of magic-Ts. This flexible port layout of magic-Ts is a practical feature for integration with planar array antennas. The integration of magic-Ts and planar array antennas can easily create advanced functions. A couple of array antennas based on the integration advantages are introduced to materialize this technical concept. This integration approach is of big worth to originate various kinds of advanced antennas and the wireless modules in the ubiquitous society.
In this paper, we propose a novel voice activity detection (VAD) algorithm using global speech absence probability (GSAP) based on Teager energy (TE) for speech enhancement. The proposed method provides a better representation of GSAP, resulting in improved decision performance for speech and noise segments by the use of a TE operator which is employed to suppress the influence of noise signals. The performance of our approach is evaluated by objective tests under various environments, and it is found that the suggested method yields better results than conventional schemes.
Fanxin ZENG Xiaoping ZENG Zhenyu ZHANG Guixin XUAN
This paper investigates construction methods of perfect 16-QAM sequences and arrays, since such sequences and arrays play quite an important role in synchronization of communication systems making use of 16-QAM signals. The method used for obtaining the results is to establish a relationship between the known perfect quaternary sequences/arrays and the required ones so that the former is transformed into the latter. Consequently, the sufficient conditions for implementing the required transformations are derived, and several examples are given. Our methods can provide perfect 16-QAM sequences with lengths 2, 4, 8, and 16, which are given in Table A·1 and infinite families of perfect 16-QAM arrays, whose existing sizes up to dimension 5 and volume 2304 are listed in Tables A·2 and A·3.
Sunyoung LEE Kae Won CHOI Seong-Lyun KIM
In this letter, we focus on detecting a random primary user (PU) network for cognitive radio systems in a cooperative manner by using maximum likelihood (ML) detection. Different from traditional PU network models, the random PU network model in this letter considers the randomness in the PU network topology, and so is better suited for describing the infrastructure-less PU network such as an ad hoc network. Since the joint pdf required for the ML detection is hard to obtain in a closed form, we derive approximate ones from the Gaussian approximation. The performance of the proposed algorithm is comparable to the optimal one.
Xue GAO Jinzhi GUO Lianwen JIN
Linear Discriminant Analysis (LDA) is one of the most popular dimensionality reduction techniques in existing handwritten Chinese character (HCC) recognition systems. However, when used for unconstrained handwritten Chinese character recognition, the traditional LDA algorithm is prone to two problems, namely, the class separation problem and multimodal sample distributions. To deal with these problems,we propose a new locally linear discriminant analysis (LLDA) method for handwritten Chinese character recognition.Our algorithm operates as follows. (1) Using the clustering algorithm, find clusters for the samples of each class. (2) Find the nearest neighboring clusters from the remaining classes for each cluster of one class. Then, use the corresponding cluster means to compute the between-class scatter matrix in LDA while keeping the within-class scatter matrix unchanged. (3) Finally, apply feature vector normalization to further improve the class separation problem. A series of experiments on both the HCL2000 and CASIA Chinese character handwriting databases show that our method can effectively improve recognition performance, with a reduction in error rate of 28.7% (HCL2000) and 16.7% (CASIA) compared with the traditional LDA method.Our algorithm also outperforms DLA (Discriminative Locality Alignment,one of the representative manifold learning-based dimensionality reduction algorithms proposed recently). Large-set handwritten Chinese character recognition experiments also verified the effectiveness of our proposed approach.
Dongpei LIU Hengzhu LIU Botao ZHANG Jianfeng ZHANG Shixian WANG Zhengfa LIANG
High-performance FFT processor is indispensable for real-time OFDM communication systems. This paper presents a CORDIC based design of variable-length FFT processor which can perform various FFT lengths of 64/128/256/512/1024/2048/4096/8192-point. The proposed FFT processor employs memory based architecture in which mixed radix 4/2 algorithm, pipelined CORDIC, and conflict-free parallel memory access scheme are exploited. Besides, the CORDIC rotation angles are generated internally based on the transform of butterfly counter, which eliminates the need of ROM making it memory-efficient. The proposed architecture has a lower hardware complexity because it is ROM-free and with no dedicated complex multiplier. We implemented the proposed FFT processor and verified it on FPGA development platform. Additionally, the processor is also synthesized in 0.18 µm technology, the core area of the processor is 3.47 mm2 and the maximum operating frequency can be up to 500 MHz. The proposed FFT processor is better trade off performance and hardware overhead, and it can meet the speed requirement of most modern OFDM system, such as IEEE 802.11n, WiMax, 3GPP-LTE and DVB-T/H.
Seok-Ho YOON Ji-Su KIM Sang-Wook KIM Choonhwa LEE
This paper presents a novel similarity measure that computes similarity scores among scientific research papers. The text of a given paper in online scientific literature is often found to be incomplete in terms of its potential to be compared with others, which likely leads to inaccurate results. Our solution to this problem makes use of both text and link information of a paper in question for similarity scores in that the comparison text of the paper is strengthened by adding that of papers related to it. More accurate similarity scores can be computed by reinforcing the input with the citations of the paper as well as the citations included within the paper. The efficacy of the proposed measure is validated through our extensive performance evaluation study which demonstrates a substantial gain.