Visible to the public Biblio

Filters: Keyword is Band-pass filters  [Clear All Filters]
2022-08-26
Hao, Yihang.  2021.  Frequency Reconfigurable Microstrip Bandpass Filter Based on VO2. 2021 IEEE International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI). :827–831.
Reconfigurability is very popular in advanced highly integrated wireless communication circuits and systems, which is valuable for mitigating spectrum congestion and reducing signal interference. To reduce interference and meet the different wireless standards in different countries, frequency reconfigurable filters are promising. Concurrently, due to the conductor and semiconductor properties of VO2 at different temperatures or pressures, the phase transition characteristics of new material VO2 are applied to reconfigurable filters. This paper mainly discusses the application of phase transition characteristics of VO2 materials in filter design and proposes a frequency reconfigurable microstrip bandpass filter based on VO2 materials, in which the microstrip filter adopts the design form of end coupling. Through theoretical calculation, data analysis, and the establishment of the equivalent model of VO2 phase transition, a related design is proposed. An end-coupled microband bandpass filter centered at a reconfigurable frequency (6 GHz to 6.5 GHz) with fractional bandwidth of 2.8% has been designed, which shows consistent match with the expected ones and verify the validity of the proposed method.
2022-07-29
Mishchenko, Mikhail A., Bolshakov, Denis I., Matrosov, Valery V., Sysoev, Ilya V..  2021.  Electronic neuron-like generator with excitable and self-oscillating behavior. 2021 5th Scientific School Dynamics of Complex Networks and their Applications (DCNA). :1–2.
Experimental implementation of phase-locked loop (PLL) with bandpass filter is proposed. Such PLL is noteworthy for neuron-like dynamics. It generates both regular and chaotic spikes and bursts. Previously proposed hardware implementation of this system has significant disadvantage – absence of excitable (non-oscillating) mode that is vital for brain neurons. The proposed electronic neuron-like generator is modified and could be used for hardware implementation of spiking neural networks.
2021-11-29
Perea-Robles, Rafael, Mateu, Jordi, Collado, Carlos, Aigner, Robert.  2021.  Wideband Transversal Acoustic Wave Filters. Application to Connected Cars. 2020 50th European Microwave Conference (EuMC). :104–107.
This paper presents the synthesis and circuit transformations of acoustic wave filters based on a transversal arrangement of the individual resonators. This configuration allows for the synthesis of any filter response without detrimental of the limited value of the electro-acoustic coupling coefficient. The synthesis can be performed in the low-pass domain to be latter transformed into the band-pass domain. This latter step results in significant differences between the low-pass and the band-pass responses in wideband stringent filters. This work, after an initial synthesis in the low-pass domain, directly applies the pass-band circuit transformation achieving a more accurate synthesized network even for wideband filters.
2021-08-17
Byrnes, Jeffrey, Hoang, Thomas, Mehta, Nihal Nitin, Cheng, Yuan.  2020.  A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems. 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). :218—225.
Much research is concentrated on improving models for host-based intrusion detection systems (HIDS). Typically, such research aims at improving a model's results (e.g., reducing the false positive rate) in the familiar static training/testing environment using the standard data sources. Matching advancements in the machine learning community, researchers in the syscall HIDS domain have developed many complex and powerful syscall-based models to serve as anomaly detectors. These models typically show an impressive level of accuracy while emphasizing on minimizing the false positive rate. However, with each proposed model iteration, we get further from the setting in which these models are intended to operate. As kernels become more ornate and hardened, the implementation space for anomaly detection models is narrowing. Furthermore, the rapid advancement of operating systems and the underlying complexity introduced dictate that the sometimes decades-old datasets have long been obsolete. In this paper, we attempt to bridge the gap between theoretical models and their intended application environments by examining the recent Linux kernel 5.7.0-rc1. In this setting, we examine the feasibility of syscall-based HIDS in modern operating systems and the constraints imposed on the HIDS developer. We discuss how recent advancements to the kernel have eliminated the previous syscall trace collect method of writing syscall table wrappers, and propose a new approach to generate data and place our detection model. Furthermore, we present the specific execution time and memory constraints that models must meet in order to be operable within their intended settings. Finally, we conclude with preliminary results from our model, which primarily show that in-kernel machine learning models are feasible, depending on their complexity.
2020-12-21
Tseng, S.-Y., Hsiao, C.-C., Wu, R.-B..  2020.  Synthesis and Realization of Chebyshev Filters Based on Constant Electromechanical Coupling Coefficient Acoustic Wave Resonators. 2020 IEEE/MTT-S International Microwave Symposium (IMS). :257–260.
This paper proposes a method to synthesis acoustic wave (AW) filters with Chebyshev response automatically. Meanwhile, each AW resonator used to design the filter can be easily fabricated on the same piezoelectric substrate. The method is based on an optimization algorithm with constraints for constant electromechanical coupling coefficient ( kt2) to minimize the defined cost function. Finally, the experimental result for a surface acoustic wave (SAW) filter of global positioning system (GPS) frequency band based on the 42° lithium tantalate (LiTaO3) substrate validates the simulation results. The designed filter shows insertion loss (IL) and return loss (RL) better than 2.5dB and 18dB respectively in the pass-band, and out-band reflection larger than 30dB.
2020-02-26
Qiu, Tongsheng, Wang, Xianyi, Tian, Yusen, Du, Qifei, Sun, Yueqiang.  2019.  A System Design of Real-Time Narrowband Rfi Detection And Mitigation for Gnss-R Receiver. IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium. :5167–5170.

With the rapid development of radio detection and wireless communication, narrowband radio-frequency interference (NB-RFI) is a serious threat for GNSS-R (global navigation satellite systems - reflectometry) receivers. However, interferometric GNSS-R (iGNSS-R) is more prone to the NB-RFIs than conventional GNSS-R (cGNSS-R), due to wider bandwidth and unclean replica. Therefore, there is strong demand of detecting and mitigating NB-RFIs for GNSS-R receivers, especially iGNSS-R receivers. Hence, focusing on working with high sampling rate and simplifying the fixed-point implementation on FPGA, this paper proposes a system design exploiting cascading IIR band-stop filters (BSFs) to suppress NB-RFIs. Furthermore, IIR BSF compared with IIR notch filter (NF) and IIR band-pass filter (BPF) is the merely choice that is able to mitigate both white narrowband interference (WNBI) and continuous wave interference (CWI) well. Finally, validation and evaluation are conducted, and then it is indicated that the system design can detect NB-RFIs and suppress WNBI and CWI effectively, which improves the signal-to-noise ratio (SNR) of the Delay-Doppler map (DDM).

2020-01-20
Chawla, Nikhil, Singh, Arvind, Rahman, Nael Mizanur, Kar, Monodeep, Mukhopadhyay, Saibal.  2019.  Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers. 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). :31–40.

Energy efficiency and security is a critical requirement for computing at edge nodes. Unrolled architectures for lightweight cryptographic algorithms have been shown to be energy-efficient, providing higher performance while meeting resource constraints. Hardware implementations of unrolled datapaths have also been shown to be resistant to side channel analysis (SCA) attacks due to a reduction in signal-to-noise ratio (SNR) and an increased complexity in the leakage model. This paper demonstrates optimal leakage models and an improved CFA attack which makes it feasible to extract first-order side-channel leakages from combinational logic in the initial rounds of unrolled datapaths. Several leakage models, targeting initial rounds, are explored and 1-bit hamming weight (HW) based leakage model is shown to be an optimal choice. Additionally, multi-band narrow bandpass filtering techniques in conjunction with correlation frequency analysis (CFA) is demonstrated to improve SNR by up to 4×, attributed to the removal of the misalignment effect in combinational logics and signal isolation. The improved CFA attack is performed on side channel signatures acquired for 7-round unrolled SIMON datapaths, implemented on Sakura-G (XILINX spartan 6, 45nm) based FPGA platform and a 24× reduction in minimum-traces-to-disclose (MTD) for revealing 80% of the key bits is demonstrated with respect to conventional time domain correlation power analysis (CPA). Finally, the proposed method is successfully applied to a fully-unrolled datapath for PRINCE and a parallel round-based datapath for Advanced Encryption Standard (AES) algorithm to demonstrate its general applicability.

2019-11-26
Shukla, Anjali, Rakshit, Arnab, Konar, Amit, Ghosh, Lidia, Nagar, Atulya K..  2018.  Decoding of Mind-Generated Pattern Locks for Security Checking Using Type-2 Fuzzy Classifier. 2018 IEEE Symposium Series on Computational Intelligence (SSCI). :1976-1981.

Brain Computer Interface (BCI) aims at providing a better quality of life to people suffering from neuromuscular disability. This paper establishes a BCI paradigm to provide a biometric security option, used for locking and unlocking personal computers or mobile phones. Although it is primarily meant for the people with neurological disorder, its application can safely be extended for the use of normal people. The proposed scheme decodes the electroencephalogram signals liberated by the brain of the subjects, when they are engaged in selecting a sequence of dots in(6×6)2-dimensional array, representing a pattern lock. The subject, while selecting the right dot in a row, would yield a P300 signal, which is decoded later by the brain-computer interface system to understand the subject's intention. In case the right dots in all the 6 rows are correctly selected, the subject would yield P300 signals six times, which on being decoded by a BCI system would allow the subject to access the system. Because of intra-subjective variation in the amplitude and wave-shape of the P300 signal, a type 2 fuzzy classifier has been employed to classify the presence/absence of the P300 signal in the desired window. A comparison of performances of the proposed classifier with others is also included. The functionality of the proposed system has been validated using the training instances generated for 30 subjects. Experimental results confirm that the classification accuracy for the present scheme is above 90% irrespective of subjects.

2019-01-31
Bak, D., Mazurek, P..  2018.  Air-Gap Data Transmission Using Screen Brightness Modulation. 2018 International Interdisciplinary PhD Workshop (IIPhDW). :147–150.

Air-gap data is important for the security of computer systems. The injection of the computer virus is limited but possible, however data communication channel is necessary for the transmission of stolen data. This paper considers BFSK digital modulation applied to brightness changes of screen for unidirectional transmission of valuable data. Experimental validation and limitations of the proposed technique are provided.

2019-01-16
Psychogiou, D., Simpson, D. J..  2018.  Multi-Band Acoustic-Wave-Lumped-Element Resonator-Based Bandstop Filters with Continuously Tunable Stopband Bandwidths. 2018 IEEE/MTT-S International Microwave Symposium - IMS. :860–863.
A new class of multi-band acoustic-wave-Iumped-ele-ment-resonator (AWLR)-based bandstop filters (BSFs) is reported. It is based on\$N\$multi-resonant A WLRs-shaped by\$K\$AWLRs and 2K inverters-that are connected to an all-pass network and result in\$\textbackslashtextbackslashpmbK\textbackslashtextbackslash Nˆth\$order rejection bands. The proposed concept allows the realization of multiple rejection bands with the following characteristics: i) fractional bandwidths (FBWs) larger than the electromechanical coupling coefficient\$\textbackslashtextbackslashpmbk\_tˆ\textbackslashtextbackslash 2\$of its constituent acoustic-wave resonators, ii) continuously variable and inde-pendently-controlled FBWs, iii) intrinsically-switched stopbands, and iv) an all pass state. For proof-of-concept validation purposes a dual-band prototype was designed, built, and tested. It exhibits two stopbands centered at 418 and 433 MHz that can be continu-ously-tuned in FBW (up to 7.7:1 tuning range) and in number.
2017-12-20
Yin, S., Bae, C., Kim, S. J., Seo, J. s.  2017.  Designing ECG-based physical unclonable function for security of wearable devices. 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). :3509–3512.

As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.

2017-03-08
Sandic-Stankovic, D., Kukolj, D., Callet, P. Le.  2015.  DIBR synthesized image quality assessment based on morphological pyramids. 2015 3DTV-Conference: The True Vision - Capture, Transmission and Display of 3D Video (3DTV-CON). :1–4.

Most Depth Image Based Rendering (DIBR) techniques produce synthesized images which contain non-uniform geometric distortions affecting edges coherency. This type of distortions are challenging for common image quality metrics. Morphological filters maintain important geometric information such as edges across different resolution levels. There is inherent congruence between the morphological pyramid decomposition scheme and human visual perception. In this paper, multi-scale measure, morphological pyramid peak signal-to-noise ratio MP-PSNR, based on morphological pyramid decomposition is proposed for the evaluation of DIBR synthesized images. It is shown that MPPSNR achieves much higher correlation with human judgment compared to the state-of-the-art image quality measures in this context.

2017-02-21
Z. Zhu, M. B. Wakin.  2015.  "Wall clutter mitigation and target detection using Discrete Prolate Spheroidal Sequences". 2015 3rd International Workshop on Compressed Sensing Theory and its Applications to Radar, Sonar and Remote Sensing (CoSeRa). :41-45.

We present a new method for mitigating wall return and a new greedy algorithm for detecting stationary targets after wall clutter has been cancelled. Given limited measurements of a stepped-frequency radar signal consisting of both wall and target return, our objective is to detect and localize the potential targets. Modulated Discrete Prolate Spheroidal Sequences (DPSS's) form an efficient basis for sampled bandpass signals. We mitigate the wall clutter efficiently within the compressive measurements through the use of a bandpass modulated DPSS basis. Then, in each step of an iterative algorithm for detecting the target positions, we use a modulated DPSS basis to cancel nearly all of the target return corresponding to previously selected targets. With this basis, we improve upon the target detection sensitivity of a Fourier-based technique.

S. Chen, F. Xi, Z. Liu, B. Bao.  2015.  "Quadrature compressive sampling of multiband radar signals at sub-Landau rate". 2015 IEEE International Conference on Digital Signal Processing (DSP). :234-238.

Sampling multiband radar signals is an essential issue of multiband/multifunction radar. This paper proposes a multiband quadrature compressive sampling (MQCS) system to perform the sampling at sub-Landau rate. The MQCS system randomly projects the multiband signal into a compressive multiband one by modulating each subband signal with a low-pass signal and then samples the compressive multiband signal at Landau-rate with output of compressive measurements. The compressive inphase and quadrature (I/Q) components of each subband are extracted from the compressive measurements respectively and are exploited to recover the baseband I/Q components. As effective bandwidth of the compressive multiband signal is much less than that of the received multiband one, the sampling rate is much less than Landau rate of the received signal. Simulation results validate that the proposed MQCS system can effectively acquire and reconstruct the baseband I/Q components of the multiband signals.

2015-05-01
Poberezhskiy, Y.S., Poberezhskiy, G.Y..  2014.  Impact of the sampling theorem interpretations on digitization and reconstruction in SDRs and CRs. Aerospace Conference, 2014 IEEE. :1-20.

Sampling and reconstruction (S&R) are used in virtually all areas of science and technology. The classical sampling theorem is a theoretical foundation of S&R. However, for a long time, only sampling rates and ways of the sampled signals representation were derived from it. The fact that the design of S&R circuits (SCs and RCs) is based on a certain interpretation of the sampling theorem was mostly forgotten. The traditional interpretation of this theorem was selected at the time of the theorem introduction because it offered the only feasible way of S&R realization then. At that time, its drawbacks did not manifest themselves. By now, this interpretation has largely exhausted its potential and inhibits future progress in the field. This tutorial expands the theoretical foundation of S&R. It shows that the traditional interpretation, which is indirect, can be replaced by the direct one or by various combinations of the direct and indirect interpretations that enable development of novel SCs and RCs (NSCs and NRCs) with advanced properties. The tutorial explains the basic principles of the NSCs and NRCs design, their advantages, as well as theoretical problems and practical challenges of their realization. The influence of the NSCs and NRCs on the architectures of SDRs and CRs is also discussed.