Shunli Yao, F. Ruan, Xiaojin You, Ming Su, Xiaohong Yang, Jun Huang, Junhua Zhang
{"title":"Analysis of multiple factors and electrode velocity effect on ESD in micro-air gap","authors":"Shunli Yao, F. Ruan, Xiaojin You, Ming Su, Xiaohong Yang, Jun Huang, Junhua Zhang","doi":"10.1109/ICASID.2016.7873921","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873921","url":null,"abstract":"The critical characteristics of variation parameter in electrostatic discharge(ESD) were mainly affected by gas ionization condition, discharge gap length, electrode and discharge voltage. Humidity, pressure, temperature in atmosphere factors and electrode velocity have great impact on ESD process, which may lead to much distink low repeatability of results in parameter test process. We proposed a field source model to analyze the motion of electrons in an E-field, and discussed the influence on various parameters in discharge current. Using the newly invented ESD measurement system, we measured discharge current waveform under different conditions, with surface process and electron avalanche process in short-gap ESD model, we described appearance of discharge current transferring at 800v, and explained the reason of variation critical effect of electrode velocity on discharge parameters.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-security colour shift keying modulation scheme with chaos-based constellation rotation for VLC system","authors":"Huaiyin Lu, Lin Zhang, Xingcheng Liu","doi":"10.1109/ICASID.2016.7873889","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873889","url":null,"abstract":"With the aid of broad-band visible light and colour shift keying(CSK), visible light communication (VLC) can construct high speed broadcast network in public scenarios. However, due to the broadcast property of light beam, the malicious eavesdroppers located in the same light beam as the legitimate receivers may capture the information. In order to improve the security of VLC systems, in this paper, we propose to apply a chaos-based constellation rotation (CCR) method to CSK modulation scheme. Specifically, the information is modulated at a rotated constellation, while the rotation rule of constellation is determined by the non-repeating chaotic sequences. Since chaotic sequences are non periodic and sensitive to the initial value, the rotation pattern changes dynamically and the eavesdroppers can not retrieve the information in real time in high speed VLC systems. Moreover, the theoretical information leakage analysis is performed for the CCR based CSK (CCR-CSK) modulation scheme. Simulations are performed and the results demonstrate that CCR-CSK scheme achieves the same bit error rate (BER) as original CSK scheme does, while providing much lower information leakage and higher security information transmission for the users.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guoli Ji, Yang Lin, Qianmin Lin, Guangzao Huang, Wenbing Zhu, Wenjie You
{"title":"Predicting DNA-binding proteins using feature fusion and MSVM-RFE","authors":"Guoli Ji, Yang Lin, Qianmin Lin, Guangzao Huang, Wenbing Zhu, Wenjie You","doi":"10.1109/ICASID.2016.7873928","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873928","url":null,"abstract":"DNA-binding proteins play a vital important role in cell activities. Prediction of DNA-binding proteins is an important but not fairly solved problem. Currently prediction of DNA-binding proteins via calculation method is a research hotspot. In this paper, we adopt MSVM-RFE for feature selection to those high-dimensional features generated in multiclass feature fusion process and obtain a representative feature subset. The feature subset is evaluated by thirty times 10-fold cross-validation test. At last, we verified the effectiveness of this method compared with method DNA-Prot and other method through three typical datasets. The results demonstrate that this method of predicting DNA-binding proteins has better effect.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"2676 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new variable step-Size LMS algorithm based on piecewise function","authors":"Yufei Han, Mingjiang Wang, Xiangbin Duan, Qiquan Zhang","doi":"10.1109/ICASID.2016.7873929","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873929","url":null,"abstract":"In this paper, a new improved variable step size adaptive algorithm is proposed. The step size is devised to piecewise functions for increasing the performance of the algorithm. By using the characteristics of the each stage, the proposed algorithm can improve the convergence speed and decreases the steady state error. The proposed algorithm has simple formulation and easily setting parameters. The effect of different parameters in piecewise functions are discussed. The simulation results exhibit the proposed algorithm has good tracking ability, convergence rate and small steady state error.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic security enhancement of crypto ICs against fault injection attacks","authors":"C. Shao, Huiyun Li","doi":"10.1109/ICASID.2016.7873887","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873887","url":null,"abstract":"Fault injection attacks have become a serious threat against cryptographic ICs. The existing countermeasures rely on error detection and correction, which brings a large area and power overhead. This paper proposes a security enhancement design method against fault injection attacks, which selectively protects or detects only the vulnerable logic cells in a cryptographic circuit. These vulnerable cells of the cryptographic ICs can be accurately identified on the system level and the security enhancement will be conducted only on these cells on the circuit level. This security enhancement design method has the advantages of smaller area and power overheads, transparency to the IC designers and compatibility to the common electronic design automation (EDA) tools.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal link control of WSN considering the network activity interference with stochastic geometry theory","authors":"Jie Chen, B. Kan","doi":"10.1109/ICASID.2016.7873930","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873930","url":null,"abstract":"Wireless Sensor Network(WSN) has become a hot topic in recent years. However, WSN's application areas still been limited beacase of the constrained energy. Traditionally, using the minimal transmitting power of sensor node by k-hop interference model is a popular way. However, network activity was not considered. In this paper, we derived a normal transmitted power level using network activity aware interference with stochastic geometry theory. For network performance improvement, active nodes with the enhanced transmitted power dynamically select suitable values of data-rate relying on channel state information (CSI). Experiments results show that our proposed strategy can improve the energy efficiency of WSNs.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128895823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive noise cancellation and classification of lung sounds under practical environment","authors":"Lin Li, Wenhao Xu, Q. Hong, F. Tong, Jinzhun Wu","doi":"10.1109/ICASID.2016.7873913","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873913","url":null,"abstract":"Lung sound (LS) offers an effective way to detect and discriminate the respiratory disease. However, in practical environments an LS record is subject to serious noise contamination which may be addressed by adaptive noise cancellation (ANC). A least mean square (LMS) algorithm based ANC method is presented by this paper for signal enhancement of LS under practical noisy environment. Based on the hidden Markov model (HMM), minimum classification error (MCE) is adopted to further improve the discriminative performance of LS. Experimental results confirm the effectiveness of the ANC, and the HMM-MCE based lung sounds recognition approach outperforms the traditional HMM-ML(maximum likelihood) method.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128645850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Humming note segmentation method in Query-by-Humming","authors":"Shaojing Zhou, Zhijun Zhao, Ping Shi","doi":"10.1109/ICASID.2016.7873890","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873890","url":null,"abstract":"Humming note segmentation is an important step in Query-by-Humming (QBH) and the accuracy of note segmentation plays an important role in improving the accuracy of the melody matching in music retrieval system. According to the properties that the voice was not stable, a note segmentation method based on dynamic threshold was put forward in this paper to improve the accuracy of the humming note segmentation. The experiment results showed that the dynamic threshold method can effectively improve the accuracy of retrieval, and it provides an idea to improve the effect of QBH.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel mapping implementation of AES for Coarse-Grained Reconfigurable Block Encryption Array","authors":"Yuhang Yang, Wei Li, Jinfu Xu, H. Ni","doi":"10.1109/ICASID.2016.7873919","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873919","url":null,"abstract":"In this paper, we explore different parallel mapping implementations of Advanced Encryption Standard (AES) on the Coarse-Grained Reconfigurable Block Encryption Array(RBEA). To improve performance and resource efficiency of the direct mapping implementation, we propose 8 modified implementations based on merger, task duplication and loop unrolling methods. Experimental results show that the improved implementations increase the throughput from 1023.99 Mbps to 13643.96 Mbps and the performance-area ratio from 63.99 Mbps/FB to 309.62 Mbps/FB, developing the superiority of array's computing resources. Compared with other platforms, our work has 1.16–13.34 times higher throughput and 3.55–11.73 times higher throughput per unit of array area.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126899591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved MLS policy model","authors":"Hangtian Liu, Z. Dai, Junwei Li, Yi Zhou","doi":"10.1109/ICASID.2016.7873915","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873915","url":null,"abstract":"Bell-LaPadula model is able to provide excellent protection for confidentiality, but is short of integrity policy. Moreover, its trusted subjects are endowed too much privilege to be conformed with the principle of least privilege. In order to resolve these problems, a new hybrid model called CIUSM is proposed, which takes Bell-LaPadula as the initial model. CIUSM organically absorbs ideas of well-formed transaction in Clark-Wilson model and domain separation in DTE model, which effectively remedy the loss of integrity policy and limit the accessible range of trusted subjects. Finally, safety of CIUSM and Bell-LaPadula are quantitatively estimated and compared based on security entropy theory. Research shows that CIUSM has higher security strength than BLP, being able to meet security requirements for both confidentiality and integrity.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}