{"title":"Oblique projection based receiver with interference cancellation in OFDMA uplink","authors":"Jie Huang, Wen-Hsien Fang, Po-Wen Cheng","doi":"10.1109/ICASID.2012.6325344","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325344","url":null,"abstract":"This paper presents an oblique projection-based detection scheme with the assistance of parallel/successive interference cancellation (PIC/SIC) in the uplink of interleaved orthogonal frequency division multiple access (OFDMA) systems. For every transmitted symbol, PIC is first invoked to remove the multiple user interference (MUI). Thereafter, SIC is employed to successively alleviate the soft-decision outputs of inter-carrier interference (ICI). To fully mitigate the decision residues as well as the interference caused by the undetected symbols, an oblique projection based detector is devised. Furthermore, for practical implementations, a low-complexity version, which only copes with the principal components of ICI, is also addressed. Simulation results show that the performance of the proposed scheme outperforms the existing detection algorithms. Especially, the low-complexity implementation requires dramatically lower computational overhead with only slight performance loss.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126369483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified LT coding with systematic connections","authors":"Van Hoan Tran, K. Lay, Lun-Chung Peng","doi":"10.1109/ICASID.2012.6325333","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325333","url":null,"abstract":"Although belief propagation (BP) algorithm can be used to solve the problem of LT decoding on noisy channels, the system performance turns out to be not very good. In this paper, we introduce one method to improve the system performance of LT soft decoding. The method is using different percent of systematic connections of encoded packets. Simulation results reveal the advantage of the proposed modified LT code over the conventional LT code scheme.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thermal-aware service rate adjustment for cyber-physical systems","authors":"Hsin-Hao Chu, Ting-Hao Tsai, Ya-Shu Chen","doi":"10.1109/ICASID.2012.6325352","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325352","url":null,"abstract":"The thermal-aware service rate assignment problem is a major challenge in cyber-physical systems. This problem is complex because of the severe temperature changes in uncertain physical environments and variable power consumption for each application, and these two effects might cause the system to overheat. This study proposes a dynamic-programming based service rate assignment with a feedback control framework. With configurable computational overhead, the proposed algorithm prevents the system from overheating and maximizes the system benefit under the given service level. This study also evaluates the capability of the proposed methodology using a series of experiments and presenting encouraging results.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient resource allocation scheme for cross-cloud federation","authors":"N. Lo, Kuo-Hui Yeh, Pei-Yun Liu","doi":"10.1109/ICASID.2012.6325350","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325350","url":null,"abstract":"In order to provide uninterrupted services to the cloud clients from cloud vendors with finite resources, it is important to get as more computing and storage resources as possible and at the same time achieve network or computing load balance. In this study, we focus on the computing resource allocation involving with the management of processing power, network transmission and storage resource. A manager frame is defined for cloud and identity provider, and a cross-IDP and cross-cloud federation architecture based on inter-trust context is also presented. In this method, we elaborate a procedure of borrowing available virtualized resources from external clouds via a constructed federated cloud.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of communication performance in the infrastructure of cluster-based MPSoC","authors":"Duoli Zhang, Yun Xia, Gaoming Du, Ning Hou","doi":"10.1109/ICASID.2012.6325316","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325316","url":null,"abstract":"In an era of multi-core and even many-core processors, with the increase of the number of cores integrated on a single-chip, how to organize these cores efficiently is becoming the key issue to make multi-processor systems optimal. The infrastructure of cluster-based multi-processor system-on-chip (MPSoC) is promising, and welcomed because of its hierarchy and scalability. However, how to configure the number of processing cores in each cluster has so far proved inconclusive. This paper shows the relationship between different processing core number configuration in each cluster and multi-processor system communication performance, and a C++-based cycle-accurate simulation model has established. The simulation model can be configured, and has fast simulation. When the total number of processing cores is fixed, changed the configuration of processing core numbers in each cluster, could get different system communication performance. Comparison of communication performance under different configurations to obtain the best, it may provide guidance to configure core numbers in the infrastructure of cluster-based MPSoC to gain a high communication performance.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122408442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 2.4GHz low power low phase noise ring VCO","authors":"Chenggang Zhang, Jianyang Zhou","doi":"10.1109/ICASID.2012.6325309","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325309","url":null,"abstract":"This paper presents a low power low phase noise ring voltage controlled oscillator(VCO). The VCO consists of two stage differential delay cells which use transmission gates control delay. By using cross-coupled PMOS pair and compensation resistors in each delay cell, performance of the VCO is further improved. This VCO has been designed using 90nm CMOS technology with 1.2V power supply. Simulation results show that the VCO can operate from 1.1GHz to 3.2GHz, by varying the control voltage from 0.5v to 1.2v, the phase noise at 1 MHz offset from 2.4 GHz is -94 dBc/Hz. Its power consumption at 2.4GHz is 0.9mW, area of VCO is 12μm by 13μm.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opamp-sharing MDAC design for pipelined successive-stage of a 1.8V 80MS/s 14-bit pipelined ADC","authors":"Xian-zhong Guan, Honghui Deng, Liang Chang","doi":"10.1109/ICASID.2012.6325308","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325308","url":null,"abstract":"A design of opamp-sharing multiplying digital-to-analog converter (MDAC) used in the successive stages of an 80MS/s 14-bit pipelined analog-to-digital converter (ADC) with 1.8V supply voltage is presented in this paper. Opamp-sharing structure of the paper is proposed to achieve low-power operation, and SC-CMFB (switch capacitor-common mode feedback) circuit further reduces power consumption. The gain-boost structure of the amplifier is used to meet the precision requirement of the MDAC. The memory effect is completely eliminated with clock-resetting phase. The circuit design is implemented in the Chartered 0.18um CMOS process and the simulation results show that the designed MDAC could meet performance requirements of the pipelined ADC, consuming 10.5mW power.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lusheng Xie, Chaojun Zhu, Pengfei Ding, Bin Feng, Tianlin Hu
{"title":"Can defects classification based on improved SOFM neural network","authors":"Lusheng Xie, Chaojun Zhu, Pengfei Ding, Bin Feng, Tianlin Hu","doi":"10.1109/ICASID.2012.6325327","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325327","url":null,"abstract":"In order to realize automatically classifying can defects and improve the convergence speed and the classification accuracy of Self-Organizing Feature Map (SOFM) neural network, 5 improved measures are presented in this paper. They include using typical sample vector, introducing frequency sensitive factor, learning rate adaptive adjustment, selecting convergence criterion and searching winning neuron. Based on the convergence function of SOFM, 6 features of can defects are selected as classification indexes, including the area, anisotropic, roundness, compactness, aspect ratio and the average gray value. The sample data of can defects is classified into 3 categories, which are large edge collapse, pit and dot. The experimental result shows that, compared with classic SOFM method, the classification accuracy of the improved SOFM method is 96%, which is 12% higher than classic SOFM method, and the convergence speed is about 3 times as much as the speed of classic SOFM method. The method presented in this paper has been applied in the actual industrial production.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid circuit-switched NOC for low cost on-chip communication","authors":"Hongyin Luo, Shaojun Wei, Demin Chen, Donghui Guo","doi":"10.1109/ICASID.2012.6325317","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325317","url":null,"abstract":"Chip-multiprocessors need low cost and high performance communication structure. Network-on-Chip (NOC) is a promising candidate because of its high scalability. In this paper, a hybrid circuit-switched (HCS) NOC is proposed. The HCS NOC uses bufferless switch and pipeline channel to construct the on-chip network. A network interface is also designed to make the HCS NOC AMBA-compatible. Packet setup channel and preserves this channel in one clock. Hence, the network transfer message with a hybrid scheme. It works as packet routing if the message has one packet or circuit switching if the message has multiple packets. Since the coherence protocol has not been ready yet, we evaluate the HCS network by random traffic pattern without processors. Our results show that the HCS network with 2-entry channel has low cost and good performance. It has 8 percent smaller cycle time, 27 percent smaller power consumption, 29 percent smaller area and 12 percent smaller maximum throughput compared to the HCS network with 4-entry channel.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bin Feng, S. Guo, Feng-ling Zhang, Chaojun Zhu, Lei Wang
{"title":"Binary-channel can covers defects detection system based on machine vision","authors":"Bin Feng, S. Guo, Feng-ling Zhang, Chaojun Zhu, Lei Wang","doi":"10.1109/ICASID.2012.6325323","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325323","url":null,"abstract":"In order to realize the on-line detection and elimination of unqualified can covers, a binary-channel inspection system based on machine vision is proposed in this article. The system mainly consists of two illumination sources, two cameras, two sensors, an IPC, an interface circuit, two eliminating devices, a set of algorithms for image processing and a software for the control of independent binary-channel. In working status, each channel of the system is placed directly above a conveyor, which transports can covers to the detection position so that the camera is triggered, and then an image is captured with a flash. The cover images are transferred to the IPC and then processed by the algorithm that based on template matching and variation model. Depending on the processing results unqualified covers are eliminated. The system is proved to be non-pollution, low-cost, and defects such as double covers, no glue, shoulder scratch, distortion can be detected with a 98.7% accuracy and a speed of 1200 covers per minute.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}