2010 International Conference on Anti-Counterfeiting, Security and Identification最新文献

筛选
英文 中文
New patterns in two-dimensional computational verb cellular networks 二维计算动词细胞网络的新模式
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551494
Kun Wen, Tao Yang
{"title":"New patterns in two-dimensional computational verb cellular networks","authors":"Kun Wen, Tao Yang","doi":"10.1109/ICASID.2010.5551494","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551494","url":null,"abstract":"Computational verb cellular networks (CVCNs) are new kinds of cellular computational platforms where cellular rules are computational verb rules. In the previous works, the categorizations of patterns formed in two-dimensional computational verb networks (2D CVCNs) were done. The existing results imply that 2D CVCNs are universal in pattern formations in the sense that all patterns that reported in other color cellular networks including color cellular automata (CA) and cellular neural networks (CNN) can be observed in 2D CVCNs. In this paper some new kinds of patterns like Turing patterns and other dynamical pattern are presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130431524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implement of file sharing system with identity certification based on CL-PKC in P2P networks P2P网络中基于CL-PKC的身份认证文件共享系统的设计与实现
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551487
Zhongwen Li, Zhibin Xu, Xinquan Feng
{"title":"Design and implement of file sharing system with identity certification based on CL-PKC in P2P networks","authors":"Zhongwen Li, Zhibin Xu, Xinquan Feng","doi":"10.1109/ICASID.2010.5551487","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551487","url":null,"abstract":"File sharing is one of the most typical applications in P2P networks. Due to the problems of certificate management and key escrow, the traditional public key cryptosystems including PKI and ID-PKC are very difficult to be applied in the P2P networks. Identity authentication is always hard to be brought into effect, which brings some trust problems, such as free riding. The trust problems widely exist in such file sharing systems. In this paper, we research the applications with identity certification based on certificateless public key cryptography (CL-PKC), and build a file sharing system based on the JXTA platform in the P2P networks. The system implements key generation, identity authentication and file content authentication, verifies its feasibility and validity, and proves that it is so secure.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on ring-based routing for wireless mesh network 无线网状网络中基于环的路由研究
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551352
Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu
{"title":"Research on ring-based routing for wireless mesh network","authors":"Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu","doi":"10.1109/ICASID.2010.5551352","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551352","url":null,"abstract":"The author puts forward a ring-based routing approach, which reduces the load of the mechanism of the central node in a wireless mesh network. This routing mechanism can evenly allocate the load from the area close to the center of the network to the network perimeter area. This paper analyzes the ring-based routing method from the outlined principles, method descriptions and emulation of the method. Adopting of this time scheduling approach is mainly to save energy, so the network can significantly decrease average power consumption, but the average power consumption reduction is based on the cost of network latency, because the dormant node cannot forward the packet. It cannot continue working until the corresponding super-frame period arrives.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The experimental blind timing acquisition scheme for FM-DCSK communication system FM-DCSK通信系统的实验盲定时采集方案
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551521
Xiaochao Li, Xiaofan Lin, Donghui Guo
{"title":"The experimental blind timing acquisition scheme for FM-DCSK communication system","authors":"Xiaochao Li, Xiaofan Lin, Donghui Guo","doi":"10.1109/ICASID.2010.5551521","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551521","url":null,"abstract":"System design and performance are presented for an experimental FM-DCSK radio system with a blind timing acquisition scheme. The transmitter and receiver architecture is proposed, and a novel two-stage blind bit synchronization algorithm for a fast and efficient timing acquisition process is introduced. This synchronization scheme exploits the waveform repetition pattern which naturally present in the DCSK transmitted reference signal structure. The BER performance of such systems is evaluated under AWGN and multi-path channel, the value is fairly close to that of perfect synchronization, which is 0.2dB difference at SNR 10–15dB. Key building blocks of circuit implementation are also presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of 3D scan conversion algorithm based on Handel-C 基于Handel-C的三维扫描转换算法的设计与实现
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551515
Yongfu Yan, Jianyang Zhou, Chunfang Zheng
{"title":"Design and implementation of 3D scan conversion algorithm based on Handel-C","authors":"Yongfu Yan, Jianyang Zhou, Chunfang Zheng","doi":"10.1109/ICASID.2010.5551515","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551515","url":null,"abstract":"In this paper, we design and implement 3D scan conversion algorithm using Handel-C language. Primarily we introduce the 3D graphics rendering process and analyze the principle of improved scan conversion algorithm. Then we design and implement the improved scan conversion algorithm. Finally we translate the Handel-C code into Verilog-HDL code and verify the design in ModelSim. Parallel optimization schemes are introduced in Handel-C porting. The performance increases more than 12 times after optimization. The design experience shows that the hardware implementation of complex algorithm based on Handel-C is feasible and efficient.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The implementation of communication between the upper computer and lower PLC of rescue robot 实现了救援机器人上位机与下位PLC之间的通信
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551344
Hongli Tang, Xiaoyao Xie, Xiangdong Yang, Chen Yang, J. Xiao
{"title":"The implementation of communication between the upper computer and lower PLC of rescue robot","authors":"Hongli Tang, Xiaoyao Xie, Xiangdong Yang, Chen Yang, J. Xiao","doi":"10.1109/ICASID.2010.5551344","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551344","url":null,"abstract":"The realization of communication between PC and PLC is the basic constituent part in rescue robot control system. It has direct impact to the function of entire system. This paper introduces a method in detail which can make the communication between the rescue robot upper computer and lower PLC come true. It also analyses how to implement communication between S7-200 programmable logic controller and personal computer in the mode of free port, and given the programming instance. Practice indicates the idea of the scheme is succinct and also very effective.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image interpolation algorithm based on computational verb theory 基于计算动词理论的图像插值算法
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551337
Huiqing Liu, Yinghao Liao, Tao Yang, Cheng Chen
{"title":"Image interpolation algorithm based on computational verb theory","authors":"Huiqing Liu, Yinghao Liao, Tao Yang, Cheng Chen","doi":"10.1109/ICASID.2010.5551337","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551337","url":null,"abstract":"In this paper, a new image interpolation algorithm is proposed due to the inspiration of knowledge-based learning and dynamical control strategy which are based on computational verb theory. This algorithm takes gray level profiles and contour shapes as two processing factors. Experiments show that, with respect to the performance near edges of digital images, our algorithm is better than nearest neighbor interpolation algorithm; with respect to the performance in regions of images, our method is better than bilinear interpolation and bicubic interpolation.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Architecture of Web-EDA system based on Cloud computing and application for project management of IC design 基于云计算的Web-EDA系统体系结构及其在集成电路设计项目管理中的应用
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551512
Xiaopeng Lin, Yiyang Li, H. Dai, Donghui Guo
{"title":"Architecture of Web-EDA system based on Cloud computing and application for project management of IC design","authors":"Xiaopeng Lin, Yiyang Li, H. Dai, Donghui Guo","doi":"10.1109/ICASID.2010.5551512","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551512","url":null,"abstract":"Cloud computing is usually defined to deliver infrastructure, platform and software as services, which is available as a pay-as-you-go model for users. A paradigm of Cloud computing for EDA service is presented in this paper, and a hierarchical architecture of Web-EDA system implemented with Cloud computing is described in detail. Based on this proposed system structure, we developed a prototype of the Web-EDA system for sharing EDA Tools and project management of IC design. It shows that Cloud computing for EDA service is possible to be implemented distributedly and brings maximum benefit to both users and vendors.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on the implementation of trusted platform module based on reconfigurable computing 基于可重构计算的可信平台模块实现研究
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551832
Zhichao Liu, Yunfeng Wang, Tianxiang Liu
{"title":"Research on the implementation of trusted platform module based on reconfigurable computing","authors":"Zhichao Liu, Yunfeng Wang, Tianxiang Liu","doi":"10.1109/ICASID.2010.5551832","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551832","url":null,"abstract":"In this paper, the implementation and reconfigurable feature of RSA and AES cryptographic algorithm are analyzed. On the basis of the Reconfigurable design of this two algorithms, Reconfigurable RSA and AES hardware architecture is designed to fit four different key length of 256bit, 512bit, 1024bit, 2048bit for RSA, and three different key length of 128bit, 192bit, and 256bit for AES. The reconfigurable design and testing are carried out on FPGA, the results showed that it is able to meet the high-performance information security systems encryption algorithm on the speed requirement.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of an outer-chip controllable and inner-chip adjustable voltage reference 芯片外可控和芯片内可调电压基准的设计
2010 International Conference on Anti-Counterfeiting, Security and Identification Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551516
Shuming Yang, Yongsheng Yin, Honghui Deng
{"title":"Design of an outer-chip controllable and inner-chip adjustable voltage reference","authors":"Shuming Yang, Yongsheng Yin, Honghui Deng","doi":"10.1109/ICASID.2010.5551516","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551516","url":null,"abstract":"A new type of voltage reference which can be controlled in the outer-chip by the external pins and can generate an arbitrary reference voltage was introduced in this paper. There is a resistor serial in the reference voltage circuit that can generate 4 different reference voltages by the internal control logic circuit to adapt to fit different situations demand. The core circuit employs the improved Brokaw architecture. The entire circuit is in 0.18um CMOS process and the power supply voltage is 1.8V. Simulation results using Hspice tools show that different reference voltages can be achieved by corresponding configurations of external pins; or can output 4 fixed reference voltages controlled by the internal logic signals. When the temperature ranges from −40 to 120°C, the reference voltage circuit can reach to a low temperature coefficient (8.5ppm/°C) and a high power supply rejection ratio that is −110.2dB.1","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信