2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)最新文献

筛选
英文 中文
A novel high-precision bandgap reference with differential common-gate structure 一种新型高精度带隙差分共栅极参考元件
Chujun Lin, Hongying Chen, Weidong Xu, Fang Gao, Xin'an Wang
{"title":"A novel high-precision bandgap reference with differential common-gate structure","authors":"Chujun Lin, Hongying Chen, Weidong Xu, Fang Gao, Xin'an Wang","doi":"10.1109/ICASID.2015.7405659","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405659","url":null,"abstract":"This paper proposes a novel kind of bandgap reference (BGR) with high precision and high power supply rejection ratio (PSRR) by using optimized differential common-gate structure and a cascode amplifier. The circuit uses the standard 0.18 μm CMOS process. The simulation results indicate that the temperature range is -20°C to 80°C and the temperature coefficient (TC) less than 27 ppm/°C is achieved at all process corners. Line regulation is better than 0.045%/V and the power supply rejection ratio in low frequency is close to 56dB. The supply voltage of the proposed bandgap reference ranges from 1.8V to 3.5V while the maximum supply current is 36μA at room temperature.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication interface of intelligent subdivision controller of stepper motor 步进电机智能细分控制器通信接口
Xueqin Zheng, Qiangyuan Gao
{"title":"Communication interface of intelligent subdivision controller of stepper motor","authors":"Xueqin Zheng, Qiangyuan Gao","doi":"10.1109/ICASID.2015.7405689","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405689","url":null,"abstract":"The communication interface of sine constant current of high subdivision drive controller of stepper motor is proposed based on the technology of microprocessor and communication. The microprocessor and computer can communicate with each other, which can realize the real-time monitoring of running conditions of stepper motor. The running information includes the operational status, real-time waveform of phase current of motor, and so on. All these information of the stepping motor can be uploaded to the upper PC. The subdivision controller of stepper motor has the function of communication. The low-pass filter of hardware and anti-interference filter of software are designed. The sampling information is processed. The accuracy of sampling information is enhanced.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
(7, 4)-Hamming generalized LDPC code for Rayleigh fading channel [7,4]瑞利衰落信道的-Hamming广义LDPC码
Yangwen Yu, Yanan Han, Lijun Zhang, L. Cheng
{"title":"(7, 4)-Hamming generalized LDPC code for Rayleigh fading channel","authors":"Yangwen Yu, Yanan Han, Lijun Zhang, L. Cheng","doi":"10.1109/ICASID.2015.7405686","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405686","url":null,"abstract":"To get a generalized version of LDPC code, we construct (7, 4)-Hamming GLDPC code with (7, 4) Hamming component code in this paper, and give the number of short cycles of this GLDPC code as well as the code weight distribution. Via MLD, the negative effects of short cycles limited in the Hamming block can be eliminated. Simulation results show that, up to 2 dB coding gain can be obtained for GLDPC code, with faster convergence rate, in comparison with the counterpart standard code, at BER of 10-7 in Rayleigh fading channel. Even compared with the standard LDPC code which has no 4-cycles, the better behaviors for GLDPC code, with still faster convergence rate, are achieved in several limits. These results may enhance the implementation of this GLDPC code in real world.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of equalization architecture for the high-speed serial communication 高速串行通信均衡体系的优化
Mingke Zhang, Qingsheng Hu
{"title":"Optimization of equalization architecture for the high-speed serial communication","authors":"Mingke Zhang, Qingsheng Hu","doi":"10.1109/ICASID.2015.7405650","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405650","url":null,"abstract":"This paper investigates the optimization of equalization architecture for the high-speed serial communication, especially for 25Gbps or above backplane communication. By using the ADS Channel Simulator and taking advantage of the frequency and impulse responses, the high speed backplane channel is analyzed at first. Then various equalization architectures including the high frequency boost values of linear equalizer (LE) and tap coefficients of decision feedback equalizer (DFE) are analyzed in detail. It is shown that much better performance can be obtained by using some combined LE/DFE compared to using LE or DFE separately, and the cost is only a little increase in complexity.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133026743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An effective tracking system based on Wi-Fi trajectory matching 基于Wi-Fi轨迹匹配的有效跟踪系统
N. Li, Yuchun Guo, Yishuai Chen
{"title":"An effective tracking system based on Wi-Fi trajectory matching","authors":"N. Li, Yuchun Guo, Yishuai Chen","doi":"10.1109/ICASID.2015.7405684","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405684","url":null,"abstract":"This paper presents a tracking system based on trajectory matching in WiFi network. When a user equipment appears in the monitored area, the system continuously intercepts WiFi beacon messages which are periodically issued by the user's equipments for finding accessable WiFi access point (AP). The system then infers the user's trajectory based on the MAC address and received signal strength indication (RSSI) indicated in the beacon message. We propose an estimation method to match the received electronic signal series along a user's trajectory to the most possible one of the predefined paths. The method mainly uses the variance of RSSI to determine the user pedistrian path. We develop a system prototype and conduct extensive experiments in real experimental environment. The experimental results show that the success rate is up to 68%, which proves that the method is applicable. Our tracking system can be widely applied in miscellaneous public spaces for a variety of applications, e.g., public park navigation.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124552086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of simplified matching algorithms for RF fingerprinting in LTE network LTE网络中射频指纹识别简化匹配算法的性能评价
Yanan Han, Huan Ma, Lijun Zhang, L. Chen
{"title":"Performance evaluation of simplified matching algorithms for RF fingerprinting in LTE network","authors":"Yanan Han, Huan Ma, Lijun Zhang, L. Chen","doi":"10.1109/ICASID.2015.7405654","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405654","url":null,"abstract":"Performance evaluation of fingerprinting using simplified statistical matching algorithm with two similarity metrics is presented. The collection of RF information can be automatically accomplished with the minimization of drive testing (MDT) in long term evolution (LTE) networks. In the case of non-ideal cell detection, the proposed algorithm greatly decreases the calculation of RF information and the time of position estimation. We employed the proposed algorithm in LTE cellular networks including rural, urban and Hetnet cases. The results show that the proposed algorithm reduce by 76%, 34% and 70% in computation time in rural, urban and Hetnet case respectively, while the positioning errors (PEs) have been improved in comparison with the classic KNN algorithm.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123308371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient continuous-time linear equalizer for short-haul optical communications 用于短距离光通信的节能连续时间线性均衡器
Fengdeng Li, Qingsheng Hu
{"title":"Energy-efficient continuous-time linear equalizer for short-haul optical communications","authors":"Fengdeng Li, Qingsheng Hu","doi":"10.1109/ICASID.2015.7405665","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405665","url":null,"abstract":"This paper presents a power estimate method to predict the energy efficiencies of continuous-time linear equalizers for short-haul optical communications. In order to forecast the energy efficiency over data rates, which is defined as power dissipation divided by the corresponding data rate, a reference circuit meeting some major features is established, whose energy efficiency functions as the start point of the scaling process. By exploring the relationship between the scaled circuits working at different data rates and the reference circuit, the energy efficiency model is obtained. With this equation-based model, the energy efficiencies of the scaled CTLEs with different boost values are estimated in both CMOS 180-nm process and 90-nm process. Simulation results are given and analyses show that the model is accurate, model results are very close to SPICE simulation results.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized adaptive algorithm of digital self-interference cancellation based on improved variable step 基于改进变步长的数字自干扰消除优化自适应算法
Lingyun Sun, Yujie Li, Yifeng Zhao, Lianfeng Huang, Zhibin Gao
{"title":"Optimized adaptive algorithm of digital self-interference cancellation based on improved variable step","authors":"Lingyun Sun, Yujie Li, Yifeng Zhao, Lianfeng Huang, Zhibin Gao","doi":"10.1109/ICASID.2015.7405687","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405687","url":null,"abstract":"Full-duplex wireless communication system transmits and receives signals in a same frequency band and at a same time, which solves the problem of the low using efficiency of limited radio spectrum resource, and doubles the channel capacity. However, it also brings a new problem that the full-duplex node will generate a strong self-interference signal. And to deal with the self-interference signal, using existing negative self-interference cancellation and analog self-interference cancellation technology are not enough, effective digital self-interference cancellation is needed for further cancellation. This paper proposes an optimized adaptive algorithm of digital self-interference cancellation based on improved variable step. By using a iteration threshold, we establish a new nonlinear relationship between the step factor and the error signal, which overcomes the slow change problem when the error signal is getting closed to zero, and accelerates the convergence rate.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of encryption mechanism in Office 2013 Office 2013加密机制分析
Jingxin Hong, Zefeng Chen, Jun Hu
{"title":"Analysis of encryption mechanism in Office 2013","authors":"Jingxin Hong, Zefeng Chen, Jun Hu","doi":"10.1109/ICASID.2015.7405655","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405655","url":null,"abstract":"Microsoft Office is the most popular office software. Office document security is mainly carried out through encryption by the software encryption function. But as the new decoding method is put forward and the computer speed is accelerated rapidly, the document security has been questioned. This paper analyzed the whole process of Office 2013 file encryption/decryption, designed a contrast experiment with the former version of Office 2010, then cracked respectively the password on CPU computing computer and GPU computing platform by password brute-force method, and experimental data were obtained with time as the indicator. It was discussed whether Office 2013 encrypted files were safe.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116192010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering algorithm in VANETs: A survey VANETs中的聚类算法综述
Peizhi Yang, Jianxin Wang, Yangxian Zhang, Zinan Tang, Shengxi Song
{"title":"Clustering algorithm in VANETs: A survey","authors":"Peizhi Yang, Jianxin Wang, Yangxian Zhang, Zinan Tang, Shengxi Song","doi":"10.1109/ICASID.2015.7405685","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405685","url":null,"abstract":"Vehicular ad hoc networks (VANETs), as a special kind of mobile ad-hoc network, have been found a promising prospect in the future intelligent transportation system (ITS). However, the high nodes mobility, frequently changed network topology and unstable communication link in VANETs motivates the design of stable clustering algorithms. Much has been done on this topic and many methods have been explored. This paper presents a survey of the clustering techniques researched in recent years, including the description of the algorithms, the application of clustering algorithms and their performance. Through the survey, readers can have a better understanding of the clustering algorithms in VANETs.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信