{"title":"New patterns in two-dimensional computational verb cellular networks","authors":"Kun Wen, Tao Yang","doi":"10.1109/ICASID.2010.5551494","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551494","url":null,"abstract":"Computational verb cellular networks (CVCNs) are new kinds of cellular computational platforms where cellular rules are computational verb rules. In the previous works, the categorizations of patterns formed in two-dimensional computational verb networks (2D CVCNs) were done. The existing results imply that 2D CVCNs are universal in pattern formations in the sense that all patterns that reported in other color cellular networks including color cellular automata (CA) and cellular neural networks (CNN) can be observed in 2D CVCNs. In this paper some new kinds of patterns like Turing patterns and other dynamical pattern are presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130431524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implement of file sharing system with identity certification based on CL-PKC in P2P networks","authors":"Zhongwen Li, Zhibin Xu, Xinquan Feng","doi":"10.1109/ICASID.2010.5551487","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551487","url":null,"abstract":"File sharing is one of the most typical applications in P2P networks. Due to the problems of certificate management and key escrow, the traditional public key cryptosystems including PKI and ID-PKC are very difficult to be applied in the P2P networks. Identity authentication is always hard to be brought into effect, which brings some trust problems, such as free riding. The trust problems widely exist in such file sharing systems. In this paper, we research the applications with identity certification based on certificateless public key cryptography (CL-PKC), and build a file sharing system based on the JXTA platform in the P2P networks. The system implements key generation, identity authentication and file content authentication, verifies its feasibility and validity, and proves that it is so secure.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu
{"title":"Research on ring-based routing for wireless mesh network","authors":"Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu","doi":"10.1109/ICASID.2010.5551352","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551352","url":null,"abstract":"The author puts forward a ring-based routing approach, which reduces the load of the mechanism of the central node in a wireless mesh network. This routing mechanism can evenly allocate the load from the area close to the center of the network to the network perimeter area. This paper analyzes the ring-based routing method from the outlined principles, method descriptions and emulation of the method. Adopting of this time scheduling approach is mainly to save energy, so the network can significantly decrease average power consumption, but the average power consumption reduction is based on the cost of network latency, because the dormant node cannot forward the packet. It cannot continue working until the corresponding super-frame period arrives.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The experimental blind timing acquisition scheme for FM-DCSK communication system","authors":"Xiaochao Li, Xiaofan Lin, Donghui Guo","doi":"10.1109/ICASID.2010.5551521","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551521","url":null,"abstract":"System design and performance are presented for an experimental FM-DCSK radio system with a blind timing acquisition scheme. The transmitter and receiver architecture is proposed, and a novel two-stage blind bit synchronization algorithm for a fast and efficient timing acquisition process is introduced. This synchronization scheme exploits the waveform repetition pattern which naturally present in the DCSK transmitted reference signal structure. The BER performance of such systems is evaluated under AWGN and multi-path channel, the value is fairly close to that of perfect synchronization, which is 0.2dB difference at SNR 10–15dB. Key building blocks of circuit implementation are also presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of 3D scan conversion algorithm based on Handel-C","authors":"Yongfu Yan, Jianyang Zhou, Chunfang Zheng","doi":"10.1109/ICASID.2010.5551515","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551515","url":null,"abstract":"In this paper, we design and implement 3D scan conversion algorithm using Handel-C language. Primarily we introduce the 3D graphics rendering process and analyze the principle of improved scan conversion algorithm. Then we design and implement the improved scan conversion algorithm. Finally we translate the Handel-C code into Verilog-HDL code and verify the design in ModelSim. Parallel optimization schemes are introduced in Handel-C porting. The performance increases more than 12 times after optimization. The design experience shows that the hardware implementation of complex algorithm based on Handel-C is feasible and efficient.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongli Tang, Xiaoyao Xie, Xiangdong Yang, Chen Yang, J. Xiao
{"title":"The implementation of communication between the upper computer and lower PLC of rescue robot","authors":"Hongli Tang, Xiaoyao Xie, Xiangdong Yang, Chen Yang, J. Xiao","doi":"10.1109/ICASID.2010.5551344","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551344","url":null,"abstract":"The realization of communication between PC and PLC is the basic constituent part in rescue robot control system. It has direct impact to the function of entire system. This paper introduces a method in detail which can make the communication between the rescue robot upper computer and lower PLC come true. It also analyses how to implement communication between S7-200 programmable logic controller and personal computer in the mode of free port, and given the programming instance. Practice indicates the idea of the scheme is succinct and also very effective.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image interpolation algorithm based on computational verb theory","authors":"Huiqing Liu, Yinghao Liao, Tao Yang, Cheng Chen","doi":"10.1109/ICASID.2010.5551337","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551337","url":null,"abstract":"In this paper, a new image interpolation algorithm is proposed due to the inspiration of knowledge-based learning and dynamical control strategy which are based on computational verb theory. This algorithm takes gray level profiles and contour shapes as two processing factors. Experiments show that, with respect to the performance near edges of digital images, our algorithm is better than nearest neighbor interpolation algorithm; with respect to the performance in regions of images, our method is better than bilinear interpolation and bicubic interpolation.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture of Web-EDA system based on Cloud computing and application for project management of IC design","authors":"Xiaopeng Lin, Yiyang Li, H. Dai, Donghui Guo","doi":"10.1109/ICASID.2010.5551512","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551512","url":null,"abstract":"Cloud computing is usually defined to deliver infrastructure, platform and software as services, which is available as a pay-as-you-go model for users. A paradigm of Cloud computing for EDA service is presented in this paper, and a hierarchical architecture of Web-EDA system implemented with Cloud computing is described in detail. Based on this proposed system structure, we developed a prototype of the Web-EDA system for sharing EDA Tools and project management of IC design. It shows that Cloud computing for EDA service is possible to be implemented distributedly and brings maximum benefit to both users and vendors.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the implementation of trusted platform module based on reconfigurable computing","authors":"Zhichao Liu, Yunfeng Wang, Tianxiang Liu","doi":"10.1109/ICASID.2010.5551832","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551832","url":null,"abstract":"In this paper, the implementation and reconfigurable feature of RSA and AES cryptographic algorithm are analyzed. On the basis of the Reconfigurable design of this two algorithms, Reconfigurable RSA and AES hardware architecture is designed to fit four different key length of 256bit, 512bit, 1024bit, 2048bit for RSA, and three different key length of 128bit, 192bit, and 256bit for AES. The reconfigurable design and testing are carried out on FPGA, the results showed that it is able to meet the high-performance information security systems encryption algorithm on the speed requirement.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an outer-chip controllable and inner-chip adjustable voltage reference","authors":"Shuming Yang, Yongsheng Yin, Honghui Deng","doi":"10.1109/ICASID.2010.5551516","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551516","url":null,"abstract":"A new type of voltage reference which can be controlled in the outer-chip by the external pins and can generate an arbitrary reference voltage was introduced in this paper. There is a resistor serial in the reference voltage circuit that can generate 4 different reference voltages by the internal control logic circuit to adapt to fit different situations demand. The core circuit employs the improved Brokaw architecture. The entire circuit is in 0.18um CMOS process and the power supply voltage is 1.8V. Simulation results using Hspice tools show that different reference voltages can be achieved by corresponding configurations of external pins; or can output 4 fixed reference voltages controlled by the internal logic signals. When the temperature ranges from −40 to 120°C, the reference voltage circuit can reach to a low temperature coefficient (8.5ppm/°C) and a high power supply rejection ratio that is −110.2dB.1","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}