Chujun Lin, Hongying Chen, Weidong Xu, Fang Gao, Xin'an Wang
{"title":"A novel high-precision bandgap reference with differential common-gate structure","authors":"Chujun Lin, Hongying Chen, Weidong Xu, Fang Gao, Xin'an Wang","doi":"10.1109/ICASID.2015.7405659","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405659","url":null,"abstract":"This paper proposes a novel kind of bandgap reference (BGR) with high precision and high power supply rejection ratio (PSRR) by using optimized differential common-gate structure and a cascode amplifier. The circuit uses the standard 0.18 μm CMOS process. The simulation results indicate that the temperature range is -20°C to 80°C and the temperature coefficient (TC) less than 27 ppm/°C is achieved at all process corners. Line regulation is better than 0.045%/V and the power supply rejection ratio in low frequency is close to 56dB. The supply voltage of the proposed bandgap reference ranges from 1.8V to 3.5V while the maximum supply current is 36μA at room temperature.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication interface of intelligent subdivision controller of stepper motor","authors":"Xueqin Zheng, Qiangyuan Gao","doi":"10.1109/ICASID.2015.7405689","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405689","url":null,"abstract":"The communication interface of sine constant current of high subdivision drive controller of stepper motor is proposed based on the technology of microprocessor and communication. The microprocessor and computer can communicate with each other, which can realize the real-time monitoring of running conditions of stepper motor. The running information includes the operational status, real-time waveform of phase current of motor, and so on. All these information of the stepping motor can be uploaded to the upper PC. The subdivision controller of stepper motor has the function of communication. The low-pass filter of hardware and anti-interference filter of software are designed. The sampling information is processed. The accuracy of sampling information is enhanced.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(7, 4)-Hamming generalized LDPC code for Rayleigh fading channel","authors":"Yangwen Yu, Yanan Han, Lijun Zhang, L. Cheng","doi":"10.1109/ICASID.2015.7405686","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405686","url":null,"abstract":"To get a generalized version of LDPC code, we construct (7, 4)-Hamming GLDPC code with (7, 4) Hamming component code in this paper, and give the number of short cycles of this GLDPC code as well as the code weight distribution. Via MLD, the negative effects of short cycles limited in the Hamming block can be eliminated. Simulation results show that, up to 2 dB coding gain can be obtained for GLDPC code, with faster convergence rate, in comparison with the counterpart standard code, at BER of 10-7 in Rayleigh fading channel. Even compared with the standard LDPC code which has no 4-cycles, the better behaviors for GLDPC code, with still faster convergence rate, are achieved in several limits. These results may enhance the implementation of this GLDPC code in real world.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of equalization architecture for the high-speed serial communication","authors":"Mingke Zhang, Qingsheng Hu","doi":"10.1109/ICASID.2015.7405650","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405650","url":null,"abstract":"This paper investigates the optimization of equalization architecture for the high-speed serial communication, especially for 25Gbps or above backplane communication. By using the ADS Channel Simulator and taking advantage of the frequency and impulse responses, the high speed backplane channel is analyzed at first. Then various equalization architectures including the high frequency boost values of linear equalizer (LE) and tap coefficients of decision feedback equalizer (DFE) are analyzed in detail. It is shown that much better performance can be obtained by using some combined LE/DFE compared to using LE or DFE separately, and the cost is only a little increase in complexity.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133026743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective tracking system based on Wi-Fi trajectory matching","authors":"N. Li, Yuchun Guo, Yishuai Chen","doi":"10.1109/ICASID.2015.7405684","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405684","url":null,"abstract":"This paper presents a tracking system based on trajectory matching in WiFi network. When a user equipment appears in the monitored area, the system continuously intercepts WiFi beacon messages which are periodically issued by the user's equipments for finding accessable WiFi access point (AP). The system then infers the user's trajectory based on the MAC address and received signal strength indication (RSSI) indicated in the beacon message. We propose an estimation method to match the received electronic signal series along a user's trajectory to the most possible one of the predefined paths. The method mainly uses the variance of RSSI to determine the user pedistrian path. We develop a system prototype and conduct extensive experiments in real experimental environment. The experimental results show that the success rate is up to 68%, which proves that the method is applicable. Our tracking system can be widely applied in miscellaneous public spaces for a variety of applications, e.g., public park navigation.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124552086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of simplified matching algorithms for RF fingerprinting in LTE network","authors":"Yanan Han, Huan Ma, Lijun Zhang, L. Chen","doi":"10.1109/ICASID.2015.7405654","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405654","url":null,"abstract":"Performance evaluation of fingerprinting using simplified statistical matching algorithm with two similarity metrics is presented. The collection of RF information can be automatically accomplished with the minimization of drive testing (MDT) in long term evolution (LTE) networks. In the case of non-ideal cell detection, the proposed algorithm greatly decreases the calculation of RF information and the time of position estimation. We employed the proposed algorithm in LTE cellular networks including rural, urban and Hetnet cases. The results show that the proposed algorithm reduce by 76%, 34% and 70% in computation time in rural, urban and Hetnet case respectively, while the positioning errors (PEs) have been improved in comparison with the classic KNN algorithm.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123308371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient continuous-time linear equalizer for short-haul optical communications","authors":"Fengdeng Li, Qingsheng Hu","doi":"10.1109/ICASID.2015.7405665","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405665","url":null,"abstract":"This paper presents a power estimate method to predict the energy efficiencies of continuous-time linear equalizers for short-haul optical communications. In order to forecast the energy efficiency over data rates, which is defined as power dissipation divided by the corresponding data rate, a reference circuit meeting some major features is established, whose energy efficiency functions as the start point of the scaling process. By exploring the relationship between the scaled circuits working at different data rates and the reference circuit, the energy efficiency model is obtained. With this equation-based model, the energy efficiencies of the scaled CTLEs with different boost values are estimated in both CMOS 180-nm process and 90-nm process. Simulation results are given and analyses show that the model is accurate, model results are very close to SPICE simulation results.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized adaptive algorithm of digital self-interference cancellation based on improved variable step","authors":"Lingyun Sun, Yujie Li, Yifeng Zhao, Lianfeng Huang, Zhibin Gao","doi":"10.1109/ICASID.2015.7405687","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405687","url":null,"abstract":"Full-duplex wireless communication system transmits and receives signals in a same frequency band and at a same time, which solves the problem of the low using efficiency of limited radio spectrum resource, and doubles the channel capacity. However, it also brings a new problem that the full-duplex node will generate a strong self-interference signal. And to deal with the self-interference signal, using existing negative self-interference cancellation and analog self-interference cancellation technology are not enough, effective digital self-interference cancellation is needed for further cancellation. This paper proposes an optimized adaptive algorithm of digital self-interference cancellation based on improved variable step. By using a iteration threshold, we establish a new nonlinear relationship between the step factor and the error signal, which overcomes the slow change problem when the error signal is getting closed to zero, and accelerates the convergence rate.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of encryption mechanism in Office 2013","authors":"Jingxin Hong, Zefeng Chen, Jun Hu","doi":"10.1109/ICASID.2015.7405655","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405655","url":null,"abstract":"Microsoft Office is the most popular office software. Office document security is mainly carried out through encryption by the software encryption function. But as the new decoding method is put forward and the computer speed is accelerated rapidly, the document security has been questioned. This paper analyzed the whole process of Office 2013 file encryption/decryption, designed a contrast experiment with the former version of Office 2010, then cracked respectively the password on CPU computing computer and GPU computing platform by password brute-force method, and experimental data were obtained with time as the indicator. It was discussed whether Office 2013 encrypted files were safe.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116192010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peizhi Yang, Jianxin Wang, Yangxian Zhang, Zinan Tang, Shengxi Song
{"title":"Clustering algorithm in VANETs: A survey","authors":"Peizhi Yang, Jianxin Wang, Yangxian Zhang, Zinan Tang, Shengxi Song","doi":"10.1109/ICASID.2015.7405685","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405685","url":null,"abstract":"Vehicular ad hoc networks (VANETs), as a special kind of mobile ad-hoc network, have been found a promising prospect in the future intelligent transportation system (ITS). However, the high nodes mobility, frequently changed network topology and unstable communication link in VANETs motivates the design of stable clustering algorithms. Much has been done on this topic and many methods have been explored. This paper presents a survey of the clustering techniques researched in recent years, including the description of the algorithms, the application of clustering algorithms and their performance. Through the survey, readers can have a better understanding of the clustering algorithms in VANETs.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}