{"title":"A method to eliminate BGP divergence based on AS relationships","authors":"Hongjun Wang, Wanping Hao, Xin Zhao","doi":"10.1109/PACCS.2010.5627907","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627907","url":null,"abstract":"The Border Gateway Protocol, BGP, is currently the de-facto inter-domain routing protocol employed on the Internet. It is responsible for exchanging routing information between autonomous systems(ASes) and selecting routes to destination networks. Each AS defines and applies local policies to select routes and propagate routes to neighboring ASes. However, studies show that conflicting local policies among a collection of ASes can lead to BGP divergence. This paper presents an online method to eliminate BGP divergence. The proposed method uses the AS path history, which is composed of the AS path contained in the best route, to discover routes divergence. When there is a cycle of AS path in the history, the potential BGP divergence occurs. In order to eliminate the BGP divergence, the proposed method adjusts the routes preference of involving based on AS relationships and advertise best routes according to relationship between announcer AS and receiver AS.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130267692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A kind of controlling and management method for embedded system software and its hardware testing software","authors":"Li Lei, Hao Wu","doi":"10.1109/PACCS.2010.5627003","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627003","url":null,"abstract":"The development features of embedded systems software and hardware testing software was discussed. A software development flow for embedded systems software and hardware testing software was proposed. According to the flow, the organization and management at different stages of software development was discussed, and some of the key factors and every aspect of the development process was discussed in detail.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"4651 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132459438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinate transformation based Super-Exponential Iterative blind equalization algorithm","authors":"Ye-cai Guo, Zhao Xue-qing","doi":"10.1109/PACCS.2010.5627050","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627050","url":null,"abstract":"Constant Modulus Algorithm (CMA) with simple structure and robustness is not suitable for equalizing nonconstant modulus higher order QAM signals, it is necessary to turn nonconstant modulus higher order QAM signals into constant modulus fourth-order QAM in order to make CMA be used to equalize higher order QAM signals. Based on analyzing the coordinate transformation prinicple and Super-Exponential Iterative(SEI) property, a Super-Exponential Iterative blind equalization algorithm based on Coordinate Transformation (CT-SEI) is proposed. The proposed CT-SEI algorithm can obtain high convergence rate via using SEI algorithm and small steady-state error via turning nonconstant modulus higher order QAM signals into constant modulus fourth-order QAM. The performance of the proposed algorithm can be proofed by underwater acoustic channel simulation.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhi-ying Han, Ning Chang, Xiao-Ming Chen, Xiao-long Cha
{"title":"Discussing about the application of data mining technology in anti-illegal immigrant intelligence","authors":"Zhi-ying Han, Ning Chang, Xiao-Ming Chen, Xiao-long Cha","doi":"10.1109/PACCS.2010.5626730","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626730","url":null,"abstract":"However with China entering into the WTO, the big clearance in national seaport will soon realize, immigration traveler's number will be fast increasing, at the same time, anti-illegal immigrant conflict would also be more intense and complicated. Under such condition the analysis of anti-illegal immigrant intelligence has many difficulties. So data mining technology will be introduced in anti-illegal immigrant intelligence to detect new illegal immigrant trends. This article states the process of data mining in anti-illegal immigrant consulting relevancy data mining algorithm, including data processing in advance, association rule digging out, and so forth. Mining on time sequence rule will be the important way in data mining. Through this way, the objective law of anti-illegal immigrant intelligence will be found to support decision-making.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum efficiency point tracking algorithm for photovoltaic power generating system","authors":"Cheol-soon Kwon, Won-kyun Choi, F. Kang","doi":"10.1109/PACCS.2010.5627020","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627020","url":null,"abstract":"It proposes a new control algorithm to increase efficiency of a grid-connected photovoltaic power generating system. It finds a maximum efficiency point by considering the quantity of power generated from PV arrays, the number of inverters, and an efficiency of the inverter. And then it assigns the optimized power, which is in a high efficiency condition, on the PV inverter. Operational principle of the proposed maximum efficiency point tracking algorithm is given in detail. To verify the validity of the proposed method, computer-aided simulation is carried out.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133215323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near-threshold full adders for ultra low-power applications","authors":"Jianping Hu, Xiaoying Yu","doi":"10.1109/PACCS.2010.5626910","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626910","url":null,"abstract":"Scaling supply voltage is an efficient technique to achieve low energy delay product (EDP). This paper investigates static CMOS, DCVSL, CPL and TG logic full adders in sub-threshold and super-threshold region in terms of low EDP. All circuits are simulated with HSPICE at a PTM 65nm CMOS technology by varying supply voltages from O.2V to 1.1 V with O.1V steps. The simulation results demonstrate that lowering supply voltage is advantageous, especially in medium-voltage region (700mv–800mv) which yields the best EDP. In addition, it is shown that the optimum supply voltage of the full adders varies slightly with logic style.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130750960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for test data volume reduction with multiple scan chains","authors":"Jie Liu, Maoxiang Yi, F. Zhao","doi":"10.1109/PACCS.2010.5626879","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626879","url":null,"abstract":"Test technique with multiple scan chains can fully reduce test time, but more data input channels, higher hardware overhead, lower test data compression ratio and lower fault coverage along with it are all paid more extensive attention to in the current test field. A cyclic shift compression technique is proposed and applied to multiple scan chain testing. Unlike general shift, cyclic shift technique can not only retain the don't bits in original test vectors, but also increase the correlation between vectors. T he experiment results and analysis demonstrate that the proposed approach can maintain the advantages of multiple scan chain testing and transmit data using single channel, further improve test compression ratios and meet the needs of full fault test and hybrid built-in self test with lower hardware cost.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and simulation of logic circuits using CNFETs and interconnects","authors":"E. Abiri, M. Salehi, Zahra Mehrjoo","doi":"10.1109/PACCS.2010.5627019","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627019","url":null,"abstract":"In this paper a new RLC model of a CNFET is presented. The S parameter formulation and analysis is utilized to investigate this two port model for drain to source signal transmission. The characteristic of the new topology is that using CNT interconnects instead of metallic ones, makes the model comfortable to be used in structures with more than one transistor connected to each other like VLSI circuits. Some logic circuits are simulated due to this approach in the end. All simulations are done in software “ADS 2008”.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133563456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and realization of real-time data management system in customs surveillance zone","authors":"Xuehua Song, Wenyun Wu, Xiang Bao, Min Lu","doi":"10.1109/PACCS.2010.5627059","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627059","url":null,"abstract":"It is necessary to realize real-time data management system in customs surveillance zone (RDMCS) for the customs' modernization. According to the feature of the enterprise data in Zhenjiang customs surveillance zone, the paper analyzes the current regulatory model, the kind of the enterprise real-time data and the platform for interaction with the current systems, designs the real-time data management system in customs surveillance zone based on the .NET technology, solves the malpractice of traditional regulatory approach effectively, and achieves the real-time regulation of enterprise data. In the respect of the security technology, this system utilizes the technology of stratified design, database, framework architecture and so on, effectively solves the problems of safety, efficiency and real-time in data transmission. This system has been operated in sixteen enterprises and obtains the good effects, which indicates that the system not only improves the efficiency of customs surveillance, but also achieves the real-time automation of data management, so it is very suitable for the application of data management in customs surveillance.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong-min Yu, Wei-bo Li, Xiao-kang Zhang, Feng-bin Yan
{"title":"Study on multi-Agent model of weapon equipment systems","authors":"Hong-min Yu, Wei-bo Li, Xiao-kang Zhang, Feng-bin Yan","doi":"10.1109/PACCS.2010.5626984","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626984","url":null,"abstract":"This paper expatiate Swarm which can solve the problem of complex adaptive systems, Weapon equipment systems can be disposed by CAS theory, Because it can use this method to deal with the problem. After that, it designs a multi-Agent/CA model frame of weapon equipment systems, then discuss the critical technology of the model, At last it illuminates the next step of the emulation.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}