{"title":"Balance analysis of self-powered sensor and application in building automation","authors":"F. Ruan, E. You, Ruishan Zhou, Sheng Li","doi":"10.1109/ICASID.2012.6325295","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325295","url":null,"abstract":"Sensor Network is the basis of Internet of Things. Self-powered wireless sensor network has distinct advantages used in building automation. Energy balance and power balance are considered in battery-free sensor module. Analysis is given on various application places of self-powered sensor. A simple formula was given to evaluate average current in self-powered sensor module. Energy balance of weekend was discussed for lighting system in office building based on energy store super-capacitor. Function of battery free wireless sensor module was described based on ambient energy harvesting principles. The new battery-free wireless sensor module was applied in lighting system of modern building automation for energy saving. The topology applying battery-free sensor module was given and briefly analyzed.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116305393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new CV image interpolation algorithm based on adptive pattern","authors":"Yinghao Liao, Xin Wang","doi":"10.1109/ICASID.2012.6325321","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325321","url":null,"abstract":"In this paper, an adaptive image interpolation algorithm based on computational verb is proposed. This algorithm improves the previous work on computational verb image interpolation by exploiting the adaptive pattern to preserve the edge in interpolated images. As tested in a number of experiments, the proposed algorithm produces at least equal, often significantly better results than our previously published work.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122104789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to improve differential signal integrity","authors":"Mon-Chau Shie, Shin Dian Dian","doi":"10.1109/ICASID.2012.6325296","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325296","url":null,"abstract":"The integrity analysis of the PCB signal has already become important due to the use of high-speed clock, high-speed signal transmitter, high definition and high-speed spare part. In the high speed board/package design, designers are trying to improve or minimize all the impedance mismatches along the high speed signal path. Impedance discontinuities on PCB board will cause signal reflections, degrade the high-speed signal slew rate and eye height. In this paper, signal integrity of differential signal improvement analysis method is proposed. We analyze the correlation of channel width, spacing, and impedance. Then we observe that can increase the odd mode effect by decreasing the spacing. By the way, we not only can enhance the slew rate performance, but can also save more area of routing.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A two-stage cascode class F CMOS power amplifier for Bluetooth","authors":"Guo-Ming Sung, Xiang-jun Zhang, T. Hsiao","doi":"10.1109/ICASID.2012.6325305","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325305","url":null,"abstract":"In this paper, a two-stage cascode class F power amplifier (PA) intended for class 1 Bluetooth application is presented using standard 0.18-μm CMOS technology. In the proposed PA, a cascode schematic is used not only to avoid from overflow current but also to have a good isolation. Furthermore, the class F power amplifier is designed to improve the power efficiency using the operating mode in either triode or cut-off region. The simulation results present that the output power is larger than 20 dBm and the power added efficiency (PAE) is roughly 49%. Moreover, the multiple bonding wires are added to eliminate the parasitic capacitance of input stage (first) and to save the power dissipation.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security query protocol of ONS in EPC system","authors":"Zhongwen Li, Yi Xie, Cheng-Bin Wu, Binbin Ding","doi":"10.1109/ICASID.2012.6325293","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325293","url":null,"abstract":"Object Naming Service (ONS) provides a connection between the middleware of Electronic Product Code (EPC) and EPC Information Services (EPCIS). The communication security of EPC network mainly depends on the queries of ONS. In the process of an ONS query, the local server sends DNS query messages in plaintext, which may result in the leakage of EPC information. In this paper, we propose a security query protocol for ONS which includes an extension protocol of DNS and a second generation onion routing protocol based on the certificateless public key cryptography (CL-PKC). In this protocol, multi-KGC center generates the part of private key for each user, users control the lengths of anonymous routing paths, and cross-domain users negotiate session keys. These features can not only meet the security needs of the ONS query process, but also improves system fault tolerance ability and anonymity. Moreover, the application of CL-PKC avoids the traditional complicated management of certificates, and then improves the efficiency of system.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless networks designs through advanced regulation machine","authors":"Hua-Ching Chen, Donghui Guo, Hsuan-Ming Feng, Ji-Hwei Horng","doi":"10.1109/ICASID.2012.6325336","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325336","url":null,"abstract":"Advanced regulation machine (ARM) is determined to make the perfect parameters (AIFS, CWmin and CWmax) selections in the wireless networks platform. The simple but effective adjustment strategies of three parameters combinations are proposed with the priority theory to obtain the acquired high quality of service (QoS). The internal competitions models of various traffic analysis machines are delivered to detect and reduce the busy probability in the discussed channel. The ARM reduces the conflict probability by the regulations of AIFS, CWmin and CWmax to evaluate the performance analysis of network business. Three simulations in the four businesses of wireless networks applications are applied to perform the adapt parameters regulation results.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of mass data mining based on cloud-computing","authors":"Ting-Ting Hu, Hai-shan Chen, Lu Huang, X. Zhu","doi":"10.1109/ICASID.2012.6325353","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325353","url":null,"abstract":"Since 2007, the business calculation model-cloud computing was proposed. Promoted greatly by great companies, cloud computing is developing at a very rapid pace. With the features of mass data storage and distribution calculation of cloud computing, it provides a new method for data mining, effectively solving the problems of distribution of mass data mining and efficient storage computing. The cloud computing model brings many benefits and convenience. This paper introduces the cloud computing and data mining and then simply introduce some existing parallel data mining algorithms based on cloud computing and data mining service platforms. Finally it gives a simple description of the problems and prospects of data mining based on cloud computing.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126989373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective approach for hardware design of intra prediction in H.264/AVC","authors":"Jianwei Zheng, Chunhang Xu, Jiefeng Guo","doi":"10.1109/ICASID.2012.6325313","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325313","url":null,"abstract":"In H.264/AVC standard, intra prediction is a key technology. In this paper, a novel finite-state machine for system control and a parallel architecture with four pixels parallelism for accelerating the predicted pixel calculation are proposed. Based on the location of sub-blocks, A few candidate modes are chosen for predicted pixel calculation, which adopts a configurable circuit for reduce the complexity of algorithm implement. With the analysis of the timing schedule in a macro block, a three-stage MB-pipelining architecture is applied to reduce the latency for intra prediction, which is the bottleneck of intra prediction. The proposed architecture is implemented in VHDL, and the VHDL code is verified to work at 100 MHz in a Xilinx Virtex-II Pro FPGA. The synthesis results show that the proposed architecture can completely satisfy the requirement of video encoding in the H.264 baseline profile standard.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOS translinear principle based analog four-quadrant multiplier","authors":"Ruiqi Wu, J. Xing","doi":"10.1109/ICASID.2012.6325304","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325304","url":null,"abstract":"This paper presents a MOS translinear principle based current mode CMOS four-quadrant multiplier. The multiplication is implemented by two MOS translinear loops working in the subthreshold region. The remainder of the differential output currents is the multiplication of the signals carried by the differential input currents. The multiplier characterized with a high bandwidth and low power consumption. The simulation results show a THD lower than 3.0% in 1MHz, a -3dB bandwidth of more than 58MHz and the maximum power consumption is 60μW. However, the body effect of NMOS transistors in CMOS process will introduce great nonlinearity error. Fortunately, the body effect can be eliminated by modifying the multiplier topology with PMOS transistors for applications using standard CMOS process. Simulation results using a 0.5μm BCD process are presented and discussed.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid-density based feature classification for speaker recognition","authors":"Lin Li, Wei Wang, Shan He","doi":"10.1109/ICASID.2012.6325282","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325282","url":null,"abstract":"A new strategy of feature classification method for speaker recognition based on the grid-density clustering is presented. According to the concept of density-based and grid-distance-based distribution in the Mel-frequency cepstrum domain, the feature vectors of each speaker were self-adaptively classified into L clusters with less overlapped. With these convex and non-interwoven clusters, the Gaussian Mixture Model could statistically analyze and estimate the distinct feature classification for each speaker. Moreover, a new speaker recognition system was established by using GMM-UBM model. The experimental results showed that the clustering effect of the proposed method was superior to the K-means plus EM clustering method, and the proposed speaker recognition system achieves better classification performance in terms of verification accuracy and computational complexity.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127608077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}