Anti-counterfeiting, Security, and Identification最新文献

筛选
英文 中文
On-line real-time task management for three-dimensional network on chips 芯片上三维网络的在线实时任务管理
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325315
Cyun-Yi Jheng, Ya-Shu Chen
{"title":"On-line real-time task management for three-dimensional network on chips","authors":"Cyun-Yi Jheng, Ya-Shu Chen","doi":"10.1109/ICASID.2012.6325315","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325315","url":null,"abstract":"Three-dimensional network on chips (3D NoCs) have been developed to achieve high computation and communication throughput for the growing demands of applications. But with increased applications and cores, real-time task management for 3D NoCs becomes a major challenge. The difficulty of this process is due to the precedence constraint between applications and the communication overhead between cores. In this paper, we propose an on-line real-time task management framework for 3D NoCs to minimize the makespan of each application and minimize the communication overhead of systems, in order to meet the quality of service requirements and maximize system performance. Schedulability and scalability of the proposed methodology is evaluated by a series of experiments, with encouraging results.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120968478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power management system based on ZigBee 基于ZigBee的电源管理系统
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325332
Chiung-Hsing Chen, Hung-Wei Lin, Yen-Sou Huang, Jwu-Jenq Chen
{"title":"Power management system based on ZigBee","authors":"Chiung-Hsing Chen, Hung-Wei Lin, Yen-Sou Huang, Jwu-Jenq Chen","doi":"10.1109/ICASID.2012.6325332","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325332","url":null,"abstract":"Human life has changed since energy scarcity and climate change. We consider that building of high energy consumption. In this study, we propose a method to solve this problem by ZigBee Wireless Sensor Network (WSN). We use ZigBee WSN and Hall current transducer to monitor power consumption of load for each sensor node. If the power consumption of load is higher than maximal power, the ZigBee WSN will cut off the load to avoid disaster. We consider that ZigBee module must be small, so we develop own ZigBee Module that call “ZBee”. In this study, we develop the friendly user interface (UI) by National Instruments (NI) LabVIEW. The host join to ZigBee WSN, tablet, computer and smart phone by way of Internet. The manager can achieve energy saving effect by the system. The complete design has been installed in our laboratory. The main purpose is convenience to prevent extra power waste.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure anonymous authentication protocol with unlinkability for mobile wireless environment 移动无线环境下具有不可链接性的安全匿名认证协议
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325334
Jia-Lun Tsai, N. Lo, Tzong-Chen Wu
{"title":"Secure anonymous authentication protocol with unlinkability for mobile wireless environment","authors":"Jia-Lun Tsai, N. Lo, Tzong-Chen Wu","doi":"10.1109/ICASID.2012.6325334","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325334","url":null,"abstract":"In the past couple of years, user privacy has become one of the major information security concerns for mobile device users when Internet access is available through mobile wireless environment. Several anonymous authentication protocols for mobile wireless environment have been proposed to meet mobile user requirements on security and privacy. In 2011, Li et al. showed that the authentication scheme proposed by Xu and Feng did not provide user unlinkability and has time synchronization problem. They also proposed an enhanced authentication protocol. This study reveals that the scheme of Li et al. is vulnerable to de-synchronization attack and time synchronization problem. A new anonymous authentication protocol for mobile wireless environment is introduced to immunize de-synchronization attack and avoid time synchronization issue. In addition, user privacy is achieved by supporting user unlinkability in the proposed protocol. Security analyses show that the proposed protocol is able to defend against major attacks on user authentication.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tourists effective management and reminder system based on RFID 基于RFID的游客有效管理和提醒系统
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325287
Chiung-Hsing Chen, Hung-Wei Lin, Guan-Yu Chen, Jwu-Jenq Chen
{"title":"Tourists effective management and reminder system based on RFID","authors":"Chiung-Hsing Chen, Hung-Wei Lin, Guan-Yu Chen, Jwu-Jenq Chen","doi":"10.1109/ICASID.2012.6325287","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325287","url":null,"abstract":"Tourists traveling abroad, always forget the assembling time or the events of on the wrong tour bus, resulting in delay follow-up trip. Therefore, in order to solve the above problem, this paper uses RFID, infrared sensors, LabVIEW and RF radio frequency technology to develop a tour management system. This system can replace the guides automatically roll call and can display the number of tourists get on and off. The guide can also be set destination of residence time via RF technology, so that tourists be able to remember the assembling time and timely reminders, will not delay to follow-up trip. This system allows the tour guide will be more efficient to master time for management and follow-up trip.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114012075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 0.18 Um CMOS reconfigurable digital baseband transceiver with 2FSK for RFID 一个0.18 Um CMOS可重构数字基带收发器与2FSK RFID
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325289
Caifeng Wei, Chun Zhang, Pan Wu, Hanjun Jiang, Zhihua Wang
{"title":"A 0.18 Um CMOS reconfigurable digital baseband transceiver with 2FSK for RFID","authors":"Caifeng Wei, Chun Zhang, Pan Wu, Hanjun Jiang, Zhihua Wang","doi":"10.1109/ICASID.2012.6325289","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325289","url":null,"abstract":"This paper presents a digital baseband transceiver in 0.18 um CMOS technology. The PHY layer of the baseband supports multi-rate 2FSK modulation and demodulation with fully digital way. The proposed demodulator reaches 10-4 BER for 14dB SNR and 100Kbps. The 2FSK receiver sensitivity reaches -94dbm when PER is 10-2. Using 0.18 um CMOS process, the demodulator occupies an active area of 0.19mm2. The MAC layer is compatible with IEEE 802.15.4 protocol. The Protocol layer is processed by the MCU. The digital baseband is a part of SOC, which is multi-channel and multi-mode. And it works at 400 MHz or 2.4 GHz. This chip is mainly applied to short-range wireless communication system such as RFID or WBAN.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two sufficient conditions of the r-SPR property r-SPR性质的两个充分条件
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325283
Lingyun Li, Junqing Li, Hui-Shan Yu, Shengxian Xie
{"title":"Two sufficient conditions of the r-SPR property","authors":"Lingyun Li, Junqing Li, Hui-Shan Yu, Shengxian Xie","doi":"10.1109/ICASID.2012.6325283","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325283","url":null,"abstract":"Some variants of second-preimage resistance(SPR) [1] assumptions of the keyless compression function, called c-SPR, r-SPR and e-SPR, have been put forth by Halevi and Krawczyk [2], in order to obtain more secure properties for the dedicated-key hash function. In this paper, we provide a full picture of the relation between r-SPR and other two security properties, Universal e-SPR and CR0 (n + b, n), and obtain two sufficient conditions of r-SPR, our contributions are twofold. Firstly, we extend the definition of the e-SPR property into the more general situation, called Universal e-SPR, we point out that for the keyless compression function, the Universal e-SPR property implies r-SPR. In the second part of this paper, we extend the analysis into the dedicated-key compression function, we point CRn (n + b, n) and CR0 (n + b, n) are c-SPR and r-SPR as for the keyless compression and hash functions. We continue analyze the dedicated-key compression family hk (c, m) = h(c, m ⊕ k) used by Bellare and Rogaway to construct TCR hash function via iterations on the SPR-like assumption [2], and get the conclusion that CR0 (n + b, n) in the case of hk (c, m) implies r-SPR of keyless compression function, that is, CR0 (n + b, n) is more secure than the r-SPR property for this specific scheme.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic slot-based task scheduling based on node workload in a MapReduce computation model MapReduce计算模型中基于节点工作负载的动态插槽任务调度
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325318
Hsin-Yu Shih, Jhih-Jia Huang, Jenq-Shiou Leu
{"title":"Dynamic slot-based task scheduling based on node workload in a MapReduce computation model","authors":"Hsin-Yu Shih, Jhih-Jia Huang, Jenq-Shiou Leu","doi":"10.1109/ICASID.2012.6325318","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325318","url":null,"abstract":"MapReduce is becoming a leading large-scale data processing model providing a logical framework for cloud computing. Hadoop, an open-source implementation of MapReduce framework, is widely used for realize such kind of parallel computing model. Nodes in the current Hadoop environment are normally homogeneous. Efficient resource management in clouds is crucial for improving the performance of MapReduce applications and the utilization of resources. However, the original scheduling scheme in Hadoop assign tasks to each node based on the fixed and static number of slots, without considering the physical workload on each node, such as the CPU utilization. This paper aims at proposing a dynamic slot-based task scheduling scheme by considering the physical workload on each node so as to prevent resource underutilization. The evaluation results show the proposed scheme can raise the overall computation efficiency among the heterogeneous nodes in cloud.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131362149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Online propagation model correction based on PSO algorithmin LTE SON system 基于PSO算法的LTE - SON系统在线传播模型校正
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325345
Lianfeng Huang, Xiaoxin Chen, Zhibin Gao, H. Cai
{"title":"Online propagation model correction based on PSO algorithmin LTE SON system","authors":"Lianfeng Huang, Xiaoxin Chen, Zhibin Gao, H. Cai","doi":"10.1109/ICASID.2012.6325345","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325345","url":null,"abstract":"Reliable simulation of radio environment and coverage prediction for wireless network planning could be obtained if precise propagation model is adopted. As propagation model is not generally applicable to the specific environment and the efficiency and accuracy of propagation model correction using continuous wave test is too low, an online propagation model correction method based on terminal (UE) measurement information is put forward in this paper, to apply the correction results for network planning and optimization. This method is based on SPM model and particle swarm optimization (PSO) algorithm. The deviation between UE test data and correction results is calculated, and the online correction efficiency is analyzed to show the performance of the proposed method.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A BP-based path selection model for dynamic transportation network 基于bp的动态交通网络路径选择模型
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325349
Jianhong Li
{"title":"A BP-based path selection model for dynamic transportation network","authors":"Jianhong Li","doi":"10.1109/ICASID.2012.6325349","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325349","url":null,"abstract":"This paper concentrates on the issues commonly existed in the dynamic transportation network, for instance, there are large number of stochastic situation, time-oriented cases and it is difficult to work out the optimal path. In order to deal with these issues, a BP (Back Propagation)-based path selection model is introduced for the dynamic transportation network. The model utilizes neuron model together with two training and learning methodologies like LSA and EBP to improve the velocity of convergence and reduce the running time. Experiments are carried out to compare the traditional algorithm with this model proposed in this paper. The simulation results imply that the proposed model is better than the traditional algorithm in terms of training performance.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131743405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Bayesian sparse representation based on beta-Bernoulli process prior 基于β -伯努利过程先验的鲁棒贝叶斯稀疏表示
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325328
Zengyuan Mi, Qin Lin, Yue Huang, Xinghao Ding
{"title":"Robust Bayesian sparse representation based on beta-Bernoulli process prior","authors":"Zengyuan Mi, Qin Lin, Yue Huang, Xinghao Ding","doi":"10.1109/ICASID.2012.6325328","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325328","url":null,"abstract":"There has been a significant growing interest in the study of sparse representation recent years. Although many algorithms have been developed, outliers in the training data make the estimation unreliable. In the paper, we present a model under non-parametric Bayesian framework to solve the problem. The noise term in the sparse representation is decomposed into a Gaussian noise term and an outlier noise term, which we assume to be sparse. The beta-Bernoulli process is employed as a prior for finding sparse solutions.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134340535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信