{"title":"Auto-adaptive edge detection of tank level IR imaging using double-threshold canny operator","authors":"Xi Li, Lianshan Lin, Xianhe Shao","doi":"10.1109/ICASID.2010.5551489","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551489","url":null,"abstract":"This paper proposes a new way to detect tank level based on the auto-adaptive double-threshold Canny operator, considering IR imaging of tank level and aiming at the problem of the detection of tank level. The adaptive double-threshold edge detection operator based on Canny criteria can set the threshold level according to different image histogram feature automatically, to avoid the artificial choice threshold inappropriate the edge information loss, in particular, the information of tank level loss. In the process of extract tank level IR imaging information, the number of horizontal stripes automatically is analysed, based on the number of landscape orientation stripes, getting the specific location of each horizontal stripes. The simulation results indicate that edge detection of tank level based on the auto-adaptive double-threshold canny operator apply in detection of tank Level very well.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"16 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123212707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The evolution of computational verbs in Chinese","authors":"Xi-Chang Zhou, Tao Yang","doi":"10.1109/ICASID.2010.5551332","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551332","url":null,"abstract":"The development and evolution of vocabulary is a very complex and dynamic process. The development of Chinese vocabulary is mainly that the monosyllabic words in ancient Chinese gradually evolved into disyllabic and polysyllabic words in modern Chinese. This paper attempts to analyze the evolving mechanism of computational verbs in Chinese, including merge of verbs, split of verbs. Furthermore, computational verb theory was used to build the mathematic models of new Chinese verbs. The experiments were constructed to help analyze the changes in semantic meaning when Chinese verbs merge or split. Based on these experiments, the interactions among Chinese verbs and their consequences were studied mathematically.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131880132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic vehicle identification (AVI) system based on RFID","authors":"Chonghua Li","doi":"10.1109/ICASID.2010.5551336","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551336","url":null,"abstract":"RFID is a Radio Frequency Identification technology, which has a unique advantage in data collection and data transmission. Based on the expatiate of the identification principle, the system structure, and the characteristics of the RFID, this paper introduces the structure, technical target and application of the AVI system Based on the RFID.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formation of circumgyration patterns in two-dimentional computational verb cellular networks","authors":"Xiaoli Lin, Tao Yang","doi":"10.1109/ICASID.2010.5551496","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551496","url":null,"abstract":"Computational verb cellular network(CVCN) is a new kind of cellular computational platform where the cellular rules are computational verb rule. CVCNs are good models for modeling human social interactions with high-level modeling of human rational and irrational behaviors. Since the richness of patterns formed in 2D CVCNs, the mechanism of forming patterns is difficult to study mathematically. In this paper, the circumgyration patterns formed in 2D CVCN are studied. Based on computational verb local rules, mathematical equations are constructed to define the circumgyration solutions of 2D CVCN. The solution is calculated numerically using Matlab to verify the usefulness of the theoretical predictions.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"119 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a high-performance brokaw band-gap reference","authors":"Jun Hu, Yongsheng Yin, Honghui Deng","doi":"10.1109/ICASID.2010.5551518","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551518","url":null,"abstract":"A high-performance CMOS band-gap reference (BGR) is designed in this paper. The proposed circuit employs the current-mode architecture optimized for low supply voltage applications. The key portion of the circuit employs the Brokaw BGR architecture, in which a three-stage operational amplifier is adopted to get high PSRR and only first-order temperature compensation technology is employed to get a low temperature coefficient. The circuit is on the Chartered 0.18 μ m CMOS process under the operating voltage of 1.8V and its simulation results are presented. The simulation results show that the temperature coefficient is 9 ppm/°K over the −40°C to 125°C temperature range and the fluctuation of reference voltage is within 0.067m V when the power voltage changes from 1.44V to 2.16V. In addition, the PSRR is 108.5dB at 10 kHz, and the power consumption is only 0.355mW1","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133519397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information management of operation history for the fuel elements in SPRR-300","authors":"Wei Chen, Song Zhang, Rui Yang","doi":"10.1109/ICASID.2010.5551502","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551502","url":null,"abstract":"It is decided that only singular table is used to record the power history of the reactor, and one table is used to record the ratio of the relative neutron flux of every load for one element. Three kinds of tables in the database are linked by the field of Load ID. The element operation data of the inquiry can be derived to a pure text file which may easily be treated further. Because of the simplification of the structure of the operation history database for fuel elements, both a lot of unnecessary repetitive work in analysis and input and arduous manual calculation are avoided. So the data treatment for source term calculation of any element can be done in a relatively short time.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A compact output stage for low-power low-distortion amplifier with diode negative feedback","authors":"Xiaoliang Chen, J. Xing","doi":"10.1109/ICASID.2010.5551828","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551828","url":null,"abstract":"This paper describes a compact output stage for low-power rail to rail operational amplifier. A negative feedback diode could be used to decrease even harmonic distortion and simplify frequencies compensation. The amplifier is designed to be loaded 20pF capacitive load, and the unity-gain bandwidth is 200 KHz at 65° phase margin. The quiescent current is limit to 45uA when voltage supply is 5V. The THD down to −95dB when signal frequency at 1 KHz. Finally, this circuit has been thoroughly simulated in a standard 0.8um bipolar process.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114539898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of IOT in building energy consumption supervision","authors":"L. Wan, Dawei Sun, Jianhua Deng","doi":"10.1109/ICASID.2010.5551509","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551509","url":null,"abstract":"This paper demonstrates developing a Building Energy Consumption Supervision system with IOT technology. In this system, building energy consumption data is collected by intelligent meters with RS485 port, and then the data is transported to energy supervision servicer by TCP/IP protocol to be processed and analyzed. With the help of MapXtreme plug-in, the servicer embed energy data to building map, which would be published to internet in the form of web page and visited by user's browser.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"388 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography","authors":"M. Eldefrawy, M. Khan, K. Alghathbar","doi":"10.1109/ICASID.2010.5551480","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551480","url":null,"abstract":"Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many key agreement schemes come with a shortage of considering sensor addition, revocation, and also rekeying. This paper proposes a key distribution protocol based on the public key cryptography, RSA, and DHECC. The proposed protocol does not trust individual sensors, and partially trust the Gateway. Our protocol establishes pair-wise keys between nodes according to a specific routing algorithm after deployment, instead of loading full pair-wise keys into each node. So each node doesn't have to share a key with all neighbors except those involved in the routing path with it, which is the key role of increasing the resiliency, against node capturing, and also the storage efficiency. The proposed scheme comes to circumvent the shortage of providing the rekeying property of nodes and also nodes addition and revocation, comes with previous algorithms. We evaluate our algorithm from the WSN security view point.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless transmission of RS232 interface signal based on ZigBee","authors":"Guoxin Luo","doi":"10.1109/ICASID.2010.5551491","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551491","url":null,"abstract":"RS232 interfaces are widely used in data transmission, such as wireless meter reading, digital image transmission, industrial data collection, cell paging, fire-proof system, radio frequency identification card, local alarm system, and so on. Since the longest distance of cable transmission is only 15 meters, so it is important to develop a kind of RS232 interface used for wireless transmission. ZigBee is a new and popular protocol for wireless communication because of its low power assumption, large network capacity and the ability to organize a network automatically. The scheme of converting RS232 signal into wireless signal is introduced. MAX232 is used to connect RS232 interface with ZigBee module, and CC2430 with internal C51 is used to be programmed for wireless communication.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}