{"title":"The design rail-to-rail operational amplifier used in PGA","authors":"Xiaofang Zha, Yongsheng Yin","doi":"10.1109/ICASID.2015.7405662","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405662","url":null,"abstract":"This paper presents a low-power rail-to-rail amplifier with a paralleled folded-cascold structure input stage and a feedforward class AB output stage. the switch in the bias circuit is switching off to boost the driving capability when the input single is low, or else, the amplifier works on the switching on state to save power. simulations using SMIC 0.35um process moled and cadence specre at 3.3V supply voltage, the amplifier performs almost 70dB dc gain, the CMRR reaches 140dB and the lowest static power consumption is just 0.6mW.this amplifier is used in the PGA of hige precision sigma-delta ADC as a buffer to meet the input sigle range of 2.5 V when the gain of the PGA is 1 or 2.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115628645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special shaped softgel inspection system based on machine vision","authors":"Shu-man Zheng, Wei Zhang, Lei Wang, Shan He","doi":"10.1109/ICASID.2015.7405675","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405675","url":null,"abstract":"A machine vision system for special shaped softgel inspection is proposed in this paper, which is composed of a pair of CMOS cameras and a diffuse blue illuminator. Because the flaws appear in softgel shells edge is difficult to detect, these two cameras are arranged symmetrically upon softgels with a certain angle to avoid blind area. An image segment method combined automatic threshold and edge detection is proposed to extract the outer contour of softgels. The internal flaws can be detected by dynamic threshold and morphological feature analysis. The experiments shows that the flaws in fish oil softgels such as missing pill, excess pill, abnormal pill, bubbles, black spots and rubber defects can be detected successfully, and the encapsulating line is distinguished from those defects. The resolution of detection is smaller than 0.1mm and the detection accuracy is about 99.9%.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and optimization of combined equalizer for high speed serial link","authors":"Xiaoli Wang, Qingsheng Hu","doi":"10.1109/ICASID.2015.7405658","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405658","url":null,"abstract":"Many factors influence the choice of equalization for high speed serial link. This paper presents the analysis and optimization of combined equalizer for high speed serial link based on the ADS simulation. By modeling the high speed serial link, which mainly includes the equalization for the loss of channel, the performance of various equalizers including pre-emphasis in transmitter, CTLE/DFE in receiver and some combined equalizers are analyzed for different channels. The results show that much better performance can be obtained by using some combined equalization architectures compared to using CTLE or DFE separately, and the cost is only a little increase in complexity.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of embedded system in Supervisory Control and Data Acquisition System (SCADA) over wireless sensor and GPRS networks","authors":"Chen Fu, Zurong Ni","doi":"10.1109/ICASID.2015.7405666","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405666","url":null,"abstract":"The paper presents a Supervisory Control and Data Acquisition System (SCADA) based on wireless communication mechanism combined with General Packet Radio System (GPRS) platform and wireless sensor networks (WSN). In order to access the services rendered by the WSNs and to extend its communication capabilities, a WSN controller was implemented with Xilinx spartan-3E, XC3S250E-4FT256C for the demand of relaying various types of monitoring and control data over a large-scale communication. In the WSN monitoring system network, a protocol stack dispatcher, known as Operating System Abstraction Layer (OSAL) over TI's ZStack protocol stack, was chosen to fulfill the strict requirement for the performance of real-time data acquisition and control, as well as the stability of operation system. Some key strategies of the supervisory of task polling were employed to make the management of the WSN controller more robust and flexible. The developed system can be efficiently used for on-site supervision and control of remote equipments in harsh environment.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126493031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peng Zhang, Ye Li, Qiuyun Hao, Jingsai Jiang, Xiaoxia Chen
{"title":"High-payload spread spectrum watermarking based on informed code phase shift keying","authors":"Peng Zhang, Ye Li, Qiuyun Hao, Jingsai Jiang, Xiaoxia Chen","doi":"10.1109/ICASID.2015.7405652","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405652","url":null,"abstract":"Code phase shift keying (CPSK) is an efficient M-ary modulation that can be applied to spread spectrum (SS) based watermarking to improve the watermark payload. However, the host media acts as interference that degrades the watermark robustness, especially in high-payload applications. In this paper, an informed embedding method for CPSK-based watermarking is proposed. The host is utilized at the embedder to improve the decoding performance at the extractor. Theoretically, compared with the non-informed methods such as traditional CPSK and code division multiple access (CDMA), the proposed method can reduce the decoding error rate by several orders of magnitude under the same watermark strength and payload. Moreover, experiments are conducted in audio watermarking, and the informed CPSK method exhibits better robustness against signal processing and attacks.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cluster-based multichannel MAC protocol for throughput sensitive applications in VANETs","authors":"Zinan Tang, Jianxin Wang, Shengxi Song, Peizhi Yang, Yangxian Zhang","doi":"10.1109/ICASID.2015.7405653","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405653","url":null,"abstract":"The IEEE 1609.4 protocol adopts the alternating channel access mechanism, in which the synchronization interval is separated into control channel interval and service channel interval. The vehicles can only exchange the control information in control channel interval and the service information in service channel interval separately, but the wireless resource could not be used efficiently. In this paper, we introduce the concept of cluster and propose a new mechanism based on TDMA. In our scheme, vehicles are grouped into clusters and each cluster elects a cluster head as the dedicated central controller of the cluster. The cluster head is responsible to consolidate, forward the message sent by the cluster members and schedule transmission slots for them, thus the cluster members can use the control channel interval for service traffic and efficiently improve the throughput of non-safety message. The simulation results show that the proposed MAC protocol achieves higher packet deliver ratio and throughput for the service data.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122804706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-functional floating point multiplier","authors":"De Liu, Mingjiang Wang, Yiwen Wang, Hang Su","doi":"10.1109/ICASID.2015.7405661","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405661","url":null,"abstract":"This paper presents a multi-functional double precision floating-point multiplier design. The proposed design can perform one double precision multiplication or one vector multiplication of two 2D vectors which is consist of single precision floating-point numbers. The proposed design is modeled in Verilog-HDL and verified through extensive functional simulation. The presented multi-functional double-precision multiplier is compared with conventional single and double precision multipliers by ASIC synthesis. The functionality of supporting single precision multiplication is at the cost of 8% more area and 9% more delay, compared to a conventional double precision multiplier. Compared to the combination of one double and four single precision multipliers, the proposed design saves 47% area.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125718873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seal registration and identification based on SIFT","authors":"Bo Jin, Haiying Wang","doi":"10.1109/ICASID.2015.7405669","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405669","url":null,"abstract":"At present, most of the existing seal image registration methods are based on shape, and most of the methods can't tolerate the image scale change. To overcome these problems, a general seal registration and identification approach is proposed in this paper. This method uses the classic scale invariant feature transform (SIFT) algorithm to extract the key points. To register the seal accurately, the Random Sample Consensus (RANSAC) algorithm and the Least Squares Method (LSM) are used to obtain the transformational matrix. Then the invariant features are extracted based on residual image. At last, the Normal Bayesian classifier (NBC), K-Nearest Neighbor classifier (K-NN) and the Support Vector Machine (SVM) are combined to classify the feature vector. The experiments demonstrate the identification ability of the proposed approach.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 6-bit 320-MS/s 2-bit/cycle SAR ADC with tri-level charge redistribution","authors":"Wenyan Xu, Qi Wei, Li Luo, Huazhong Yang","doi":"10.1109/ICASID.2015.7405664","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405664","url":null,"abstract":"In this paper, a 6-bit 320-MS/s successive approximation register analog-to-digital converter (SAR ADC) is presented. The 2-bit/cycle technique and tri-level based charge redistribution technique are utilized to achieve high conversion rate and reduce the hardware cost. The proposed ADC is designed and implemented in a 65-nm CMOS process. Simulation results show that it accomplishes 48.52-dB SFDR, 37.30-dB SNDR and 5.90 ENOB for a 9.06-MHz 0.6-Vpp sinusoidal input signal at 320-MS/s sampling rate. With a 151.20MHz input frequency, the SFDR and SNDR maintains above 48dB and 34dB respectively. The ADC has a total power consumption of 9.81mW at 320MS/s, corresponding to a figure of merit (FOM) of 479fJ/step.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy clustering of incomplete data based on missing attribute interval size","authors":"Li Zhang, Baoxing Li, Liyong Zhang, Dawei Li","doi":"10.1109/ICASID.2015.7405670","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405670","url":null,"abstract":"Fuzzy c-means algorithm is used to identity clusters of similar objects within a data set, while it is not directly applied to incomplete data. In this paper, we proposed a novel fuzzy c-means algorithm based on missing attribute interval size for the clustering of incomplete data. In the new algorithm, incomplete data set was transformed to interval data set according to the nearest neighbor rule. The missing attribute value was replaced by the corresponding interval median and the interval size was set as the additional property for the incomplete data to control the effect of interval size in clustering. Experiments on standard UCI data set show that our approach outperforms other clustering methods for incomplete data.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}