2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification最新文献

筛选
英文 中文
An individual oriented service support model for Campus Cloud 面向个人的校园云服务支持模型
Conghuan Ye, Xiaowen Chen
{"title":"An individual oriented service support model for Campus Cloud","authors":"Conghuan Ye, Xiaowen Chen","doi":"10.1109/ASID.2011.5967404","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967404","url":null,"abstract":"The number of resources in universities has been growing explosively during the past few years. However, the rate of utilization for these resources is very low. In this case, resource sharing in service computing system is invaluable for users, however, the current service computing system couldn't provide personalized service for users. In this paper, we propose an individual oriented service support model for Campus Cloud, the novel approach ensures that the quality of service is maintained, and the model plays an important role in the development of individual oriented Cloud service delivery practices with a growth in the utilization rate of resources in university. It is, in particular, important for users to get special service support from Campus Cloud.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-occurrence matrix features for fingerprint verification 指纹验证的共现矩阵特征
M. Khalil, M. Khan, M. I. Razzak
{"title":"Co-occurrence matrix features for fingerprint verification","authors":"M. Khalil, M. Khan, M. I. Razzak","doi":"10.1109/ASID.2011.5967412","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967412","url":null,"abstract":"In this paper, an enhanced image-based fingerprint verification algorithm is presented that improves matching accuracy by overcoming the shortcomings of previous methods due to poor image quality. It reduces multi-spectral noise by enhancing a fingerprint image to accurately and reliably determine a reference point and then extracts a 129 X 129 block, making the reference point its center. From the 12 co-occurrence matrices, four statistical descriptors are computed. Experimental results show that the proposed method has more accurate and performance than other methods the average false acceptance rate (FAR) is 0.48% and the average false rejection rate (FRR) is 0.18%.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A 2GSPS 8-bit ADC with digital foreground calibration technology 采用数字前景校准技术的2GSPS 8位ADC
Z. Zhang, Yong-lu Wang, Xinlei Huang
{"title":"A 2GSPS 8-bit ADC with digital foreground calibration technology","authors":"Z. Zhang, Yong-lu Wang, Xinlei Huang","doi":"10.1109/ASID.2011.5967436","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967436","url":null,"abstract":"A high-speed 8-bit analog-to-digital converter in 0.35µm BiCMOS process technology is presented. The ADC uses the unique folding and interpolating architecture and the dual-channel timing interleave multiplexing technology to achieve a sampling rate of 2GSPS. In case of digital calibration, as a result of testing, the ADC achieves 7.32ENOB at analog input of 484MHz, and 7.1ENOB at Nyquist input after the chip is self-corrected.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125293601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSO-based fuzzy image mobile robot systems design 基于pso的模糊图像移动机器人系统设计
Hsuan-Ming Feng, Hua-Ching Chen, Donghui Guo
{"title":"PSO-based fuzzy image mobile robot systems design","authors":"Hsuan-Ming Feng, Hua-Ching Chen, Donghui Guo","doi":"10.1109/ASID.2011.5967426","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967426","url":null,"abstract":"The novel particle swarm optimization (PSO) learning algorithm is applied to automatically generate the fuzzy systems with the image processing technology in achieving the adaptability of the embedded mobile robot. The omni-directional image mathematical model for the mobile robot system is established to represent the indoor environment. The embedded fuzzy control rules are automatically extracted by the direct of the flexible fitness function for multiple objectives of avoiding obstacles, selecting suitable fuzzy rules and approaching the desired targets at the same time. The illustrated examples with various initial positions for the discussed environment map containing the defined block is applied to demonstrate that the proposed mobile robot with the selected fuzzy rules can overcome the obstacles and achieve the targets as soon as possible.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114417327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An identity-based group-oriented threshold encryption scheme 一种基于身份的面向组的阈值加密方案
Jinghao Xing, Qiuliang Xu
{"title":"An identity-based group-oriented threshold encryption scheme","authors":"Jinghao Xing, Qiuliang Xu","doi":"10.1109/ASID.2011.5967409","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967409","url":null,"abstract":"In many broadcast systems, it is useful to send messages to some (not all) members of the whole group. And the ciphertext can only be decrypted with the participation of a certain number of receivers. In this paper, we construct an efficient identity-based group-oriented threshold encryption scheme. The sender can encrypt a single message for a dynamic k-member group which can be a subset of the n-member group. And at least t receivers are needed to decrypt the ciphertext, where 1≼t≼k≼n. Meanwhile, we provide the formal security proofs of this scheme in random oracle model.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127641113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A feedback based charge pump 基于反馈的电荷泵
Ting Li, Yuxin Wang, Ruzhang Li
{"title":"A feedback based charge pump","authors":"Ting Li, Yuxin Wang, Ruzhang Li","doi":"10.1109/ASID.2011.5967448","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967448","url":null,"abstract":"A new feedback based charge pump circuit with the controllable output voltage is proposed. By using the feedback loop and two charging channels, the output voltage can be set accurately and continuously while the input voltage is being adjusted. This technique overcomes the drawback of the traditional charge pumps which can only provide voltage that is discrete and dependent on VDD, and also alleviates the Vthn induced pumping gain loss and single charge channel induced low charging rate. A charge pump using the new circuit technique is designed and integrated into a high-speed and high-resolution A/D converter to drive a buffer. The output voltage of the charge pump ranges from 3.9V to 6.1V while the input voltage is adjusted from 0.8V to 3V. The A/D converter is fabricated in a standard 0.35-µm CMOS process technology, achieves 95.33-dBc spurious free dynamic range and 75.75-dBc signal-to-noise ratio for a 10.1-MHz input at −0.9dBFS at 100MSPS sampling rate.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133234263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AES finalists implementation for GPU and multi-core CPU based on OpenCL 基于OpenCL的GPU和多核CPU的AES最终实现
Xingliang Wang, Xiaochao Li, Mei Zou, Jun Zhou
{"title":"AES finalists implementation for GPU and multi-core CPU based on OpenCL","authors":"Xingliang Wang, Xiaochao Li, Mei Zou, Jun Zhou","doi":"10.1109/ASID.2011.5967411","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967411","url":null,"abstract":"Benefit from the OpenCL (Open Computing Language), applications can be easily transplanted among different GPUs, multi-core CPUs, and other processors. In this paper, we present implementation of AES finalists (Rijndael, Serpent, Twofish) in XTS mode, based on OpenCL. Benchmark testing is performed on 4 mainstream GPUs and multi-core CPUs. The results are also compared with implementations based on traditional serial programming model and CUDA. The resulting data shows that throughputs based on OpenCL are higher than serial programming model, while a little lower than CUDA. Which demonstrates that OpenCL promises a portable language for GPU programming, while entail a performance penalty.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A high side current sensing circuit with high PSRR based on BCD process 一种基于BCD工艺的高PSRR高侧电流传感电路
Jianbin Lin, Huihui Cheng, J. Xing
{"title":"A high side current sensing circuit with high PSRR based on BCD process","authors":"Jianbin Lin, Huihui Cheng, J. Xing","doi":"10.1109/ASID.2011.5967445","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967445","url":null,"abstract":"This paper describes an instrumentation amplifier for bidirectional high-side current sensing applications. It uses an advanced high-voltage process to design. To achieve high power supply voltage, the circuit adds a current source under the amplifier. So the circuit has a wide power supply voltage range from 4V–40V, and the input common-mode voltage of the amplifier also can go beyond its supply rail. The bipolar transistors as the input stages devices reduce the offset voltage. The amplifier uses the folded-casecode structure to increase the slew rate. Finally, the design has passed by the high-voltage BCD simulation library.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128597290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A SHA-less 12-bit 200-MS/s pipeline ADC 无sha的12位200毫秒/秒流水线ADC
Zhao Xiaoxiao, Fule Li, Bin Wu
{"title":"A SHA-less 12-bit 200-MS/s pipeline ADC","authors":"Zhao Xiaoxiao, Fule Li, Bin Wu","doi":"10.1109/ASID.2011.5967441","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967441","url":null,"abstract":"This paper describes a 12-bit, 200MS/s IF sampling pipeline A/D converter (ADC) that is implemented in SMIC 0.13 um CMOS process. The ADC has a sample-and-hold circuit that is integrated in the first pipeline stage, which removes the need for a dedicated sample-and-hold amplifier. In order to decrease the clock jitter effectively, a delay locked loop (DLL) circuit with duty cycle stabilization function is designed. A gain boosting miller compensation two stages OTA is used to achieve the sufficient gain; The use of the redundancy coding technique ease the requirement of the comparator's offset voltage; On chip reference buffer and High speed LVDS interface are also designed in this ADC. The circuit occupies a chip area of 2mm × 2mm. Simulation result showed that the circuit achieves a SNDR of 73.2 dB and a SFDR of 92 dB at a 1.2V 70MHz sine wave input.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The dynamic relocation cache and its energy consumption model for low power processor 低功耗处理器动态重定位缓存及其能耗模型
Hongyin Luo, Shaojun Wei, Donghui Guo
{"title":"The dynamic relocation cache and its energy consumption model for low power processor","authors":"Hongyin Luo, Shaojun Wei, Donghui Guo","doi":"10.1109/ASID.2011.5967431","DOIUrl":"https://doi.org/10.1109/ASID.2011.5967431","url":null,"abstract":"In this paper, a dynamic relocation cache scheme is proposed for low power processor. Based on an energy consumption function of cache system, which mapping the cache energy consumption problem to a binary ILP (Integer Linear Programming) problem, this dynamic relocation cache scheme map the static code to a dynamic location through an address mapping strategy which can relocate the compiler generated code to a single memory with execution sequence, thus provide high performance with small memory capacity. Finally, the full RTL model based on LEON2 processor is implemented and simulated, and the experiment results show that the energy consumption of this cache scheme have approximate 25% improvement comparing to traditional direct cache scheme for achieving the same IPC (Instructions Per Clock).","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115177642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信