The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, it introduces some new developments of several new LTCC microwave stereo integrated circuits, including: X-band ultra wideband balun, ultra wideband 3dB orthogonal directional couple, a new bandpass filter with highly steep band, ultra-wideband and palanar magtic T, bandpass filter with double transmission zeros, quintuple-mode dual-band filter, ultra broadband vivaldi antenna with...
In this paper studies an X-band ultra-wideband micro-balun based on LTCC, the working frequency of 7–13GHz, belonging to the X-band, the relative bandwidth is 60%. In this paper, from the design and manufacture of the product, combined with the theoretical basis, through the HFSS simulation software to complete the design, finally, it decided to use three coupling lines to improved Marchand Balun...
In this paper, an ultra-wideband stripline 3dB orthogonal directional coupler based on LTCC is studied. The operating frequency is 0.5–3.5GHz and the relative bandwidth is 150%. The difficulty lies in the requirements of ultra-wideband, high performance and miniaturization. In this paper, we started from the design and manufacture of the product, combined with the theoretical basis, through the HFSS...
In this paper, the throughput maximization problem is investigated for a block fading buffer-aided relay channel. The decode-and-forward (DF) relaying scheme is adopted, and the buffers at the relay can temporarily store the data received from the source. Considering the non-ideal circuit power, one of three transmission modes (source transmission, relay transmission, and keeping silence) is selected...
Although numerous loop optimization techniques have been designed and deployed in commercial compilers in the past, virtually no common experimental infrastructure nor repository exists to help the compiler community evaluate the effectiveness of these techniques. This paper describes a repository, LORE, that maintains a large number of C language for loop nests extracted from popular benchmarks,...
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and elegant compilation approach to mitigate the impact of faults to cryptographic implementations, which we present in this work. We propose a compilation flow, CAMFAS, to automatically and selectively introduce vectorization in a cryptographic library - to translate a vanilla...
Video-on-demand (VoD) streaming based on Peer-to-Peer (P2P) overlay has become one of the most popular applications over the Internet. However, the bottlenecks in the available upload bandwidth, both at the media source and inside the overlay, is still a challenging problem, which may limit the satisfaction of users in watching video. A potential solution for this problem is assisting the P2P streaming...
A novel microwave-induced thermoacoustic imaging framework based on compressed sensing (CS) is proposed in this work. In contrast to conventional thermoacoustic imaging setup, it can greatly reduce the number of ultrasound transducers or the spatial density of measurement. It is even possible to reconstruct thermoacoustic images using only one transducer at a fixed location. This feature is enabled...
This paper considers an energy-efficient transmit design in a multiple-input single-output (MISO) wiretap channel. In particular, a transmitter sends one confidential message to a legitimate receiver, which must be kept perfectly secure from multiple external eavesdroppers. Assuming partial eavesdroppers' channel state information (ECSI) at the transmitter, we aim to design the transmit beamformer...
In this paper, we consider wireless caching in device-to-device (D2D) cooperative networks and propose a new definition,energy-consumption-ratio (ECR), to measure the energy efficiency that caching schemes can achieve. Based on this definition,we formulate an optimal energy-efficient caching problem and develop a caching scheme, named SBRC-2S. Simulation results show that the proposed scheme outperforms...
This paper considers an energy-efficient transmit design in a multiple-input single-output (MISO) wiretap channel. In particular, a transmitter sends one confidential message to a legitimate receiver, which must be kept perfectly secure from multiple external single-antenna eavesdroppers. Assuming statistical eavesdroppers' channel state information (ECSI) at the transmitter, we aim to design the...
This paper considers a cellular multiple-input single- output (MISO) system overheard by multiple eavesdroppers, in the presence of one pair of device- to-device (D2D) nodes working as an underlay to the cellular network. A novel eavesdropping scenario is studied in this paper, where the eavesdroppers intend to simultaneously overhear the cellular communication as well as the D2D communication. Assuming...
In this paper, Haar-like patterns and a classification machine were employed for fingerprint feature extraction. Although the Gabor filter has high accuracy for feature extraction under a wide angle representation range, the full range of the filter is not required. Moreover, fingerprints have clear direction field representation. Due to these two key factors, this paper uses modified Haar-like patterns...
Consider a cellular multiple-input single-output (MISO) channel, in the presence of multiple eavesdroppers (Eves) and one pair of single-antenna device-to-device (D2D) nodes working as an underlay. A novel eavesdropping scenario, termed as selective eavesdropping, is studied in this paper, where Eves arbitrarily select one target from the cellular receiver and the D2D receiver to overhear, but their...
This paper considers the channel estimation (CE) and multi-user detection (MUD) problems in cloud radio access network (C-RAN). Assuming that active users are sparse in the network, we solve CE and MUD problems with compressed sensing (CS) technology to greatly reduce the long identification pilot overhead. A mixed ℓ2.1-regularization functional for extended sparse group-sparsity recovery is proposed...
Linear ultrasonic motor, which usually operates at ultrasonic wave, has the merits of smaller dimension, silence, high thrust at low speed, and no electromagnetic interference (EMI) problems such that it has been widely used in industrial applications, especially in high-precision motion control. In this study, one provides the output specifications to be AC frequency of 39.6k Hz controllable sine...
This paper considers a cellular multiple-input multiple-output multiple-eavesdropper (MIMOME) channel, with a pair of single-antenna device-to-device (D2D) nodes working as an underlay. A novel eavesdropping scenario is studied in this paper, where the eavesdroppers intend to simultaneously overhear the cellular communication and the D2D communication. Our goal is to jointly optimize the covariance...
Vibration rejection using feedforward control architecture is presented in this paper showing that both input and output vibration rejection can be utilized as one problem. Wiener solution to this problem is derived by using numerical data. Two fast convergence feedforward control algorithms are developed and analyzed to solve the slow convergence rate of Fx-LMS algorithm when underlying inputs are...
This paper considers a two-receiver multiple-input multiple-output (MIMO) Gaussian broadcast channel model with integrated services. Specifically, two sorts of service messages are combined and served simultaneously: one multicast message intended for both receivers and one confidential message intended for only one receiver and kept perfectly secure from the other receiver. Our goal is to jointly...
This paper studies the throughput maximization problem for a three-node relay channel with direct link and non-ideal circuit power. The relay operates in a half- duplex manner, and the decode-and-forward (DF) relaying is adopted. Considering the extra power consumption by the circuits, the optimal power allocations over infinite time horizon are investigated. First, two special scenarios, i.e., the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.