Anti-counterfeiting, Security, and Identification最新文献

筛选
英文 中文
Oblique projection based receiver with interference cancellation in OFDMA uplink 基于斜投影的OFDMA上行干扰消除接收机
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325344
Jie Huang, Wen-Hsien Fang, Po-Wen Cheng
{"title":"Oblique projection based receiver with interference cancellation in OFDMA uplink","authors":"Jie Huang, Wen-Hsien Fang, Po-Wen Cheng","doi":"10.1109/ICASID.2012.6325344","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325344","url":null,"abstract":"This paper presents an oblique projection-based detection scheme with the assistance of parallel/successive interference cancellation (PIC/SIC) in the uplink of interleaved orthogonal frequency division multiple access (OFDMA) systems. For every transmitted symbol, PIC is first invoked to remove the multiple user interference (MUI). Thereafter, SIC is employed to successively alleviate the soft-decision outputs of inter-carrier interference (ICI). To fully mitigate the decision residues as well as the interference caused by the undetected symbols, an oblique projection based detector is devised. Furthermore, for practical implementations, a low-complexity version, which only copes with the principal components of ICI, is also addressed. Simulation results show that the performance of the proposed scheme outperforms the existing detection algorithms. Especially, the low-complexity implementation requires dramatically lower computational overhead with only slight performance loss.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126369483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modified LT coding with systematic connections 改进了具有系统连接的LT编码
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325333
Van Hoan Tran, K. Lay, Lun-Chung Peng
{"title":"Modified LT coding with systematic connections","authors":"Van Hoan Tran, K. Lay, Lun-Chung Peng","doi":"10.1109/ICASID.2012.6325333","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325333","url":null,"abstract":"Although belief propagation (BP) algorithm can be used to solve the problem of LT decoding on noisy channels, the system performance turns out to be not very good. In this paper, we introduce one method to improve the system performance of LT soft decoding. The method is using different percent of systematic connections of encoded packets. Simulation results reveal the advantage of the proposed modified LT code over the conventional LT code scheme.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Thermal-aware service rate adjustment for cyber-physical systems 网络物理系统的热感知服务速率调整
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325352
Hsin-Hao Chu, Ting-Hao Tsai, Ya-Shu Chen
{"title":"Thermal-aware service rate adjustment for cyber-physical systems","authors":"Hsin-Hao Chu, Ting-Hao Tsai, Ya-Shu Chen","doi":"10.1109/ICASID.2012.6325352","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325352","url":null,"abstract":"The thermal-aware service rate assignment problem is a major challenge in cyber-physical systems. This problem is complex because of the severe temperature changes in uncertain physical environments and variable power consumption for each application, and these two effects might cause the system to overheat. This study proposes a dynamic-programming based service rate assignment with a feedback control framework. With configurable computational overhead, the proposed algorithm prevents the system from overheating and maximizes the system benefit under the given service level. This study also evaluates the capability of the proposed methodology using a series of experiments and presenting encouraging results.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient resource allocation scheme for cross-cloud federation 一种高效的跨云联合资源分配方案
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325350
N. Lo, Kuo-Hui Yeh, Pei-Yun Liu
{"title":"An efficient resource allocation scheme for cross-cloud federation","authors":"N. Lo, Kuo-Hui Yeh, Pei-Yun Liu","doi":"10.1109/ICASID.2012.6325350","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325350","url":null,"abstract":"In order to provide uninterrupted services to the cloud clients from cloud vendors with finite resources, it is important to get as more computing and storage resources as possible and at the same time achieve network or computing load balance. In this study, we focus on the computing resource allocation involving with the management of processing power, network transmission and storage resource. A manager frame is defined for cloud and identity provider, and a cross-IDP and cross-cloud federation architecture based on inter-trust context is also presented. In this method, we elaborate a procedure of borrowing available virtualized resources from external clouds via a constructed federated cloud.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A study of communication performance in the infrastructure of cluster-based MPSoC 基于集群的MPSoC基础架构通信性能研究
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325316
Duoli Zhang, Yun Xia, Gaoming Du, Ning Hou
{"title":"A study of communication performance in the infrastructure of cluster-based MPSoC","authors":"Duoli Zhang, Yun Xia, Gaoming Du, Ning Hou","doi":"10.1109/ICASID.2012.6325316","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325316","url":null,"abstract":"In an era of multi-core and even many-core processors, with the increase of the number of cores integrated on a single-chip, how to organize these cores efficiently is becoming the key issue to make multi-processor systems optimal. The infrastructure of cluster-based multi-processor system-on-chip (MPSoC) is promising, and welcomed because of its hierarchy and scalability. However, how to configure the number of processing cores in each cluster has so far proved inconclusive. This paper shows the relationship between different processing core number configuration in each cluster and multi-processor system communication performance, and a C++-based cycle-accurate simulation model has established. The simulation model can be configured, and has fast simulation. When the total number of processing cores is fixed, changed the configuration of processing core numbers in each cluster, could get different system communication performance. Comparison of communication performance under different configurations to obtain the best, it may provide guidance to configure core numbers in the infrastructure of cluster-based MPSoC to gain a high communication performance.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122408442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 2.4GHz low power low phase noise ring VCO 一种2.4GHz低功耗低相位噪声环压控振荡器
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325309
Chenggang Zhang, Jianyang Zhou
{"title":"A 2.4GHz low power low phase noise ring VCO","authors":"Chenggang Zhang, Jianyang Zhou","doi":"10.1109/ICASID.2012.6325309","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325309","url":null,"abstract":"This paper presents a low power low phase noise ring voltage controlled oscillator(VCO). The VCO consists of two stage differential delay cells which use transmission gates control delay. By using cross-coupled PMOS pair and compensation resistors in each delay cell, performance of the VCO is further improved. This VCO has been designed using 90nm CMOS technology with 1.2V power supply. Simulation results show that the VCO can operate from 1.1GHz to 3.2GHz, by varying the control voltage from 0.5v to 1.2v, the phase noise at 1 MHz offset from 2.4 GHz is -94 dBc/Hz. Its power consumption at 2.4GHz is 0.9mW, area of VCO is 12μm by 13μm.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Opamp-sharing MDAC design for pipelined successive-stage of a 1.8V 80MS/s 14-bit pipelined ADC 用于1.8V 80MS/s 14位流水线ADC的流水线连续级的opamp共享MDAC设计
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325308
Xian-zhong Guan, Honghui Deng, Liang Chang
{"title":"Opamp-sharing MDAC design for pipelined successive-stage of a 1.8V 80MS/s 14-bit pipelined ADC","authors":"Xian-zhong Guan, Honghui Deng, Liang Chang","doi":"10.1109/ICASID.2012.6325308","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325308","url":null,"abstract":"A design of opamp-sharing multiplying digital-to-analog converter (MDAC) used in the successive stages of an 80MS/s 14-bit pipelined analog-to-digital converter (ADC) with 1.8V supply voltage is presented in this paper. Opamp-sharing structure of the paper is proposed to achieve low-power operation, and SC-CMFB (switch capacitor-common mode feedback) circuit further reduces power consumption. The gain-boost structure of the amplifier is used to meet the precision requirement of the MDAC. The memory effect is completely eliminated with clock-resetting phase. The circuit design is implemented in the Chartered 0.18um CMOS process and the simulation results show that the designed MDAC could meet performance requirements of the pipelined ADC, consuming 10.5mW power.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Can defects classification based on improved SOFM neural network 基于改进SOFM神经网络的缺陷分类能否实现
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325327
Lusheng Xie, Chaojun Zhu, Pengfei Ding, Bin Feng, Tianlin Hu
{"title":"Can defects classification based on improved SOFM neural network","authors":"Lusheng Xie, Chaojun Zhu, Pengfei Ding, Bin Feng, Tianlin Hu","doi":"10.1109/ICASID.2012.6325327","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325327","url":null,"abstract":"In order to realize automatically classifying can defects and improve the convergence speed and the classification accuracy of Self-Organizing Feature Map (SOFM) neural network, 5 improved measures are presented in this paper. They include using typical sample vector, introducing frequency sensitive factor, learning rate adaptive adjustment, selecting convergence criterion and searching winning neuron. Based on the convergence function of SOFM, 6 features of can defects are selected as classification indexes, including the area, anisotropic, roundness, compactness, aspect ratio and the average gray value. The sample data of can defects is classified into 3 categories, which are large edge collapse, pit and dot. The experimental result shows that, compared with classic SOFM method, the classification accuracy of the improved SOFM method is 96%, which is 12% higher than classic SOFM method, and the convergence speed is about 3 times as much as the speed of classic SOFM method. The method presented in this paper has been applied in the actual industrial production.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid circuit-switched NOC for low cost on-chip communication 用于低成本片上通信的混合电路开关NOC
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325317
Hongyin Luo, Shaojun Wei, Demin Chen, Donghui Guo
{"title":"Hybrid circuit-switched NOC for low cost on-chip communication","authors":"Hongyin Luo, Shaojun Wei, Demin Chen, Donghui Guo","doi":"10.1109/ICASID.2012.6325317","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325317","url":null,"abstract":"Chip-multiprocessors need low cost and high performance communication structure. Network-on-Chip (NOC) is a promising candidate because of its high scalability. In this paper, a hybrid circuit-switched (HCS) NOC is proposed. The HCS NOC uses bufferless switch and pipeline channel to construct the on-chip network. A network interface is also designed to make the HCS NOC AMBA-compatible. Packet setup channel and preserves this channel in one clock. Hence, the network transfer message with a hybrid scheme. It works as packet routing if the message has one packet or circuit switching if the message has multiple packets. Since the coherence protocol has not been ready yet, we evaluate the HCS network by random traffic pattern without processors. Our results show that the HCS network with 2-entry channel has low cost and good performance. It has 8 percent smaller cycle time, 27 percent smaller power consumption, 29 percent smaller area and 12 percent smaller maximum throughput compared to the HCS network with 4-entry channel.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Binary-channel can covers defects detection system based on machine vision 二值通道可以覆盖基于机器视觉的缺陷检测系统
Anti-counterfeiting, Security, and Identification Pub Date : 2012-10-11 DOI: 10.1109/ICASID.2012.6325323
Bin Feng, S. Guo, Feng-ling Zhang, Chaojun Zhu, Lei Wang
{"title":"Binary-channel can covers defects detection system based on machine vision","authors":"Bin Feng, S. Guo, Feng-ling Zhang, Chaojun Zhu, Lei Wang","doi":"10.1109/ICASID.2012.6325323","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325323","url":null,"abstract":"In order to realize the on-line detection and elimination of unqualified can covers, a binary-channel inspection system based on machine vision is proposed in this article. The system mainly consists of two illumination sources, two cameras, two sensors, an IPC, an interface circuit, two eliminating devices, a set of algorithms for image processing and a software for the control of independent binary-channel. In working status, each channel of the system is placed directly above a conveyor, which transports can covers to the detection position so that the camera is triggered, and then an image is captured with a flash. The cover images are transferred to the IPC and then processed by the algorithm that based on template matching and variation model. Depending on the processing results unqualified covers are eliminated. The system is proved to be non-pollution, low-cost, and defects such as double covers, no glue, shoulder scratch, distortion can be detected with a 98.7% accuracy and a speed of 1200 covers per minute.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信