2010 International Conference on Anti-Counterfeiting, Security and Identification最新文献

筛选
英文 中文
Comparison of fast modular multiplication architectures in FPGA FPGA中快速模块化倍增结构的比较
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551841
Mostafizur Rahman
{"title":"Comparison of fast modular multiplication architectures in FPGA","authors":"Mostafizur Rahman","doi":"10.1109/ICASID.2010.5551841","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551841","url":null,"abstract":"Modular multiplication is the fundamental operation in most public-key cryptosystem. Therefore, the efficiency of modular multiplication directly affects the efficiency of whole crypto-system. This paper presents implementation and comparison of several recently proposed, highly efficient architectures for modular multiplication on FPGAs: interleaved multiplication, two variants of Montgomery multiplication, Jeong-Burleson multiplication, multiplication based on key size partitioning and complement. Finally, new hardware architecture for time optimal modular multiplication is proposed based on Hamming weight and position of one's in multiplicand.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134496590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 16-bits constant-current LED driver 16位恒流LED驱动器的设计
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551839
Yi Wang, Mingkun Gao, Donghui Guo
{"title":"Design of 16-bits constant-current LED driver","authors":"Yi Wang, Mingkun Gao, Donghui Guo","doi":"10.1109/ICASID.2010.5551839","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551839","url":null,"abstract":"A 16-bits Constant-Current LED Driver Integrated Circuit (abbreviated as “Driver”) is presented in this paper. It is fabricated with 0.6-µm 2P3M CMOS process in an active area of 0.9mm × 0.9mm. The driver provides 16 open-drain, constant current sinking LED driver outputs. All the constant-current outputs are programmed together by a signal external resistor. Post simulation result shows that each output channel provides constant current up to 70mA within possible temperature range of −40°C to 125°C and power supply range of 3V to 5.5V. The current match between each bit is 3% and between each technical corner is less than 6% typically. More importantly, it includes the power-on reset and over-heating protection circuits, which help protect the IC against logic error and burnt up.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124543173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Measuring permittivity of the dielectric sheet by two kinds of microwave cavities 用两种微波腔测量介质片的介电常数
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551830
L. Yao, Zurong Ni, Tongzan Liu], Fen Xiao
{"title":"Measuring permittivity of the dielectric sheet by two kinds of microwave cavities","authors":"L. Yao, Zurong Ni, Tongzan Liu], Fen Xiao","doi":"10.1109/ICASID.2010.5551830","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551830","url":null,"abstract":"The formulas were derived for the calculation of the permittivity of dielectric measured in TE109 mode rectangular cavity and TE011 mode cylindrical cavity. A testing system based on scalar network analyzer was adopted to measure the same sheet dielectric by the two cavities above respectively. The testing software based on LABVIEW was developed. The results showed that the measuring error was less than 3.8% and repeatability error was than 1.1% by perturbation method in rectangular cavity, while those are 0.4% and 0.3%, by using cylindrical cavity. The automatic measurement of permittivity of dielectric sheet can be achieved by perturbation method in cylindrical cavity.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a novel nonlinear slope compensation circuit for peak current-mode boost DC-DC converter 一种新型峰值电流型升压DC-DC变换器非线性斜率补偿电路的设计
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551838
Chao-dong Ling, Changqing Wen, Wei-wei Huang, Xiao Yang
{"title":"Design of a novel nonlinear slope compensation circuit for peak current-mode boost DC-DC converter","authors":"Chao-dong Ling, Changqing Wen, Wei-wei Huang, Xiao Yang","doi":"10.1109/ICASID.2010.5551838","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551838","url":null,"abstract":"This paper introduces a design of slope compensation circuit for peak-current-mode boost DC-DC converter. The circuit is simple, and eliminates instability problem of the peak-current-mode system generated by double-loop control. And it avoided detrimental effects on account of improper compensation, such as slow transient response, low carrying capacity. It improves the stability of the switching power supply. The design is implemented base on the TSMC's 0.35 μm CMOS process. The spectre simulation results show that, when the inductive current occurs disturbance, the system do not occur prolonged oscillation, can supply stable output voltage.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Marginal maximum likelihood estimation of single parameter logistic based on EM algorithm 基于EM算法的单参数逻辑的边际极大似然估计
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551506
Xueyan Sun, Fengxuan Jing, Xiaoyao Xie, Anyu Zhang
{"title":"Marginal maximum likelihood estimation of single parameter logistic based on EM algorithm","authors":"Xueyan Sun, Fengxuan Jing, Xiaoyao Xie, Anyu Zhang","doi":"10.1109/ICASID.2010.5551506","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551506","url":null,"abstract":"Cluster analysis is one of the most important functions of data mining. Expectation Maximization (EM) method is an important technology based on model clustering method. The expectation maximization algorithm is analyzed in this research and applied to Adaptive Testing System, in which logistic function in item response theory serves as a model, and the combination of methods of marginal maximum likelihood estimation (MMLE) and the EM algorithm are used to estimate the difficulty parameter estimation of single-parameter logistic function. This effort achieves good results.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaotic control of real estate price game using computational verb rules 基于计算动词规则的房地产价格博弈混沌控制
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551501
Xi-Chang Zhou, Tao Yang
{"title":"Chaotic control of real estate price game using computational verb rules","authors":"Xi-Chang Zhou, Tao Yang","doi":"10.1109/ICASID.2010.5551501","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551501","url":null,"abstract":"In this paper, the game between government and real estate developers is modeled based on nonlinear dynamical equations. In the model, chaotic behavior is observed, and the time-delayed feedback control (DFC) method is introduced to control chaos to converge to the equilibrium point within minimum number of iterations. Furthermore, a method of optimizing the regulating parameters is presented. In this method, computational verb rules (CVR) are used to approximate the optimal control parameters. The simulation results show that by using CV rules, the convergent time is reduces dramatically comparing with the conventional price perturbation control method.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The evolution of biometrics 生物识别技术的发展
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551405
Panpan Li, Renjin Zhang
{"title":"The evolution of biometrics","authors":"Panpan Li, Renjin Zhang","doi":"10.1109/ICASID.2010.5551405","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551405","url":null,"abstract":"Biometrics is a Technology that can carry out the identification and authentication according to the physiological or behavioral characteristics. The technology has the reliability, security, convenience and safety and so on. With the rapid development of computer technology and the needs of ever-increasing information security, biometrics is more and more important. Firstly, the paper makes a brief overview presentation on various types of biometric identification technology, Secondly, biometric technology in information security in the application and development prospects are also analyzed and prospected.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129676030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A new secure SIM-card based RFID reader 一种基于sim卡的RFID读写器
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551845
Yiqun Xu, Zijun Guo, Jianhua Deng
{"title":"A new secure SIM-card based RFID reader","authors":"Yiqun Xu, Zijun Guo, Jianhua Deng","doi":"10.1109/ICASID.2010.5551845","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551845","url":null,"abstract":"Nowadays, Radio Frequency Identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency, and the RFID technology has become mature and its manufacturing cost is reduced constantly, this technology has already widely used in a lot of field such as supply chain management, entrance guard system, intelligent home appliances, electronic payment, production automation, etc. But it also threatens security and privacy of individuals and organizations. So to effectively answering the challenges of security and privacy, in this work, we introduce a new way to authentication and encryption that use Sim card.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130571153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A bandgap reference circuit with temperature compensation 带温度补偿的带隙参考电路
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551833
Shuai Wang, J. Xing
{"title":"A bandgap reference circuit with temperature compensation","authors":"Shuai Wang, J. Xing","doi":"10.1109/ICASID.2010.5551833","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551833","url":null,"abstract":"A second-order compensated bandgap reference (BGR) using current proportional to absolute temperature (PTAT) is proposed in this paper. This proposed BGR utilize a PTAT current to improve the temperature coefficient (TC) of base-emitter voltage VBE, and make temperature characteristic of the BGR optimized. The simulation based on nee 2um BiCMOS process library shows a lower TC (only 9.07 ppm/°C) and a variation in the output voltage of the BGR less than 3.7mV with a power supply range from 3V to 10V.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A model of computational verb finite-state machines 计算动词有限状态机模型
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551492
Muchenxuan Tong, Tao Yang
{"title":"A model of computational verb finite-state machines","authors":"Muchenxuan Tong, Tao Yang","doi":"10.1109/ICASID.2010.5551492","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551492","url":null,"abstract":"In this paper, a model of computational verb finite-state machines is introduced. This model extends fuzzy state machines with computational verb logic and is able to make transition bases on the dynamics of inputs and internal states. The model is very general and will provide a new perspective for solving problems in many fields.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信