{"title":"A new algorithm of dynamic display for the large LED screen of multi-scanning-beam","authors":"Kezhi Lin, Tao Yang, Lin Li, Donghui Guo","doi":"10.1109/ICASID.2010.5551514","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551514","url":null,"abstract":"In this paper, a new algorithm of dynamic display is introduced for design of the large LED screen, it employs the image masking technology for multi-scanning-beam displaying dynamically. In order to verify the effectiveness of our new algorithm, a LED display system is designed and implemented with the microcontroller of STC12C5A60S2. The result shows that this algorithm improves the performance of dynamic display without any screen flickers, it doesn't require a large of external RAM or FLASH memory and will reduce the hardware cost of LED display system.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption algorithms using chaos and CAT methodology","authors":"Weihua Zhu, Ying Shen","doi":"10.1109/ICASID.2010.5551484","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551484","url":null,"abstract":"As the reason of image encryption algorithm of high iteration and low-key encryption-dimensional discrete chaotic space, this paper proposed a CAT methodology combining Chaos to discrete images. The using of map cyclical changes in the image is encrypted by different-sized images of different encryption cycle. After experiments the results show that this encryption algorithm using Chaos and CAT can effectively encrypt images. This algorithm can also obtain the best parameters to achieve the best image encryption effect.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linearity improvement base on digital foreground calibration algorithm for a ultra high-speed analog-to-digital converter","authors":"RuiTao Zhang, Jinshan Yu, Z. Zhang, Yong-lu Wang, Zhu Can, Yu Zhou","doi":"10.1109/ICASID.2010.5551519","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551519","url":null,"abstract":"In this paper, a digital calibration algorithm for an ultra high-speed folding and interpolating analog-to-digital converter in 0.18-fin CMOS technology is presented. The spice simulation result shows the digital foreground calibration algorithm can efficiently improve the linearity of the ADC.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparator with flexible programming of the hysteresis","authors":"Jian Tao, Yajun Wang, J. Xing","doi":"10.1109/ICASID.2010.5551525","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551525","url":null,"abstract":"Different from the conventional hysteretic comparators, a simple circuit is introduced to provide flexibility to program the hysteretic threshold in this paper. The hysteresis can be controlled accurately at a large range and equals to the difference of extra controlled voltage to make the hysteresis be controlled expediently. Besides, this structure is not only for low power dissipation comparators but also for high speed comparators.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114620915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on correction method of traffic simulation model based on linear regression","authors":"Liguang Wang, Zhijie Liu","doi":"10.1109/ICASID.2010.5551503","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551503","url":null,"abstract":"The research on parameter calibration of traffic simulation model plays an important role in whether a model can well reflect the real traffic situation of the road. Thus it can provide evidence indirectly to traffic management and control. In this paper, the data verified in the traffic simulation software VISSIM is compared with the measured data, then we know that the model parameters after correction can better reflect the actual situation of the road. The method can also be extended to other roads and intersections in the parameters correction of simulation model.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The bit allocation and RDO mode based rate control algorithm","authors":"Qiwei Lin, Gui Feng","doi":"10.1109/ICASID.2010.5551513","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551513","url":null,"abstract":"H.264/AVC video encoding standard is a successful video compression standard after the MPEG-2/H.262. It's received much attention from academic and industrial fields. In this paper, rate control algorithm is discussed. By noticing that the H.264/AVC rate control algorithm has some disadvantages, two frame layer rate control improvement strategies are proposed in this paper, which are based on the bit allocation and the RDO(Rate Distortion Optimization) mode respectively. The proposed rate control algorithm includes GOP layer rate control, frame-layer rate control and basic unit layer rate control. The improvement algorithm has two steps: The first step is the mode selection parameter and the quantification parameter separating; the second step is to adjust λMODE, according actual encoding bit rate. The algorithm is performed on the JM86 platform which implants the frame skip scheme. The simulation results show that the improved algorithm do have some advantages over the JM86 rate control algorithm, in the aspects on the buffer controlling, the accuracy of output rate, avoiding frame skip and the smoothness of the decoded sequence.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129965957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new type of adaptive-network-based computational verb inference system","authors":"Lisha Guo, Yi Guo, Tao Yang","doi":"10.1109/ICASID.2010.5551488","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551488","url":null,"abstract":"The adaptive-network-based computational verb inference system (ANCVIS) is a kind of computational verb inference system implemented in adaptive networks. In this paper, a new type of ANCVIS, which uses trend-based computational verb similarities, is presented, and its learning algorithm is derived. Simulations show that the proposed model can tune system parameters well and yield reasonable results based on computational verb rules and input-output data pairs.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design and realization of open-source search engine based on Nutch","authors":"Guojun Yu, Xiaoyao Xie, Zhijie Liu","doi":"10.1109/ICASID.2010.5551507","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551507","url":null,"abstract":"Search engines nowadays are becoming more and more necessary and popular in surfing the Internet. However, how these search engines like Google or Baidu works is unknown to many people. This paper, through a research into Open-source search engine Nutch, introduces how a common search engine works. By using Nutch, a search engine which belongs to Guizhou Normal University's website is designed and at last, through the improvement of Nutch's sorting algorithm and experiment, it can be found that Nutch is very suitable for working in home-search.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A synchronous Jacobi iteration parallel algorithm for solving liner system based on SCILAB","authors":"Shanping You, Xiaoyao Xie","doi":"10.1109/ICASID.2010.5551510","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551510","url":null,"abstract":"Considering the Pc cluster system has strong computational ability and the slow communication between processors in network parallel environments, we research a synchronous Jacobi iterative algorithm for solving linear system on scientific computing free software SCILAB. By the numerical experiment we find that the algorithm is very easy to realize, and has relatively high parallel efficiency and high speedup.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"23 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120985546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variable step-size LMS adaptive algorithm based on computational verb rules","authors":"F. Zheng, Lianfeng Huang, Zhiyuan Shi, Tao Yang","doi":"10.1109/ICASID.2010.5551355","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551355","url":null,"abstract":"In this paper, a new variable step-size LMS algorithm based on computational verb rules is presented. This method allows the algorithm to converge faster and to produce smaller steady-state errors compared to other variable step-size LMS algorithms, even when the system is subjected to sudden changes. Furthermore, it provides a brand new framework that allows the designers to design adaptive algorithms in a simpler and more effective way by using computational verb rules to encode the designers' knowledge of dynamical processes. Simulation results are provided to show the usefulness of the proposed algorithm by comparing with other variable step-size LMS algorithms.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}