Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551514
Kezhi Lin, Tao Yang, Lin Li, Donghui Guo
In this paper, a new algorithm of dynamic display is introduced for design of the large LED screen, it employs the image masking technology for multi-scanning-beam displaying dynamically. In order to verify the effectiveness of our new algorithm, a LED display system is designed and implemented with the microcontroller of STC12C5A60S2. The result shows that this algorithm improves the performance of dynamic display without any screen flickers, it doesn't require a large of external RAM or FLASH memory and will reduce the hardware cost of LED display system.
{"title":"A new algorithm of dynamic display for the large LED screen of multi-scanning-beam","authors":"Kezhi Lin, Tao Yang, Lin Li, Donghui Guo","doi":"10.1109/ICASID.2010.5551514","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551514","url":null,"abstract":"In this paper, a new algorithm of dynamic display is introduced for design of the large LED screen, it employs the image masking technology for multi-scanning-beam displaying dynamically. In order to verify the effectiveness of our new algorithm, a LED display system is designed and implemented with the microcontroller of STC12C5A60S2. The result shows that this algorithm improves the performance of dynamic display without any screen flickers, it doesn't require a large of external RAM or FLASH memory and will reduce the hardware cost of LED display system.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551484
Weihua Zhu, Ying Shen
As the reason of image encryption algorithm of high iteration and low-key encryption-dimensional discrete chaotic space, this paper proposed a CAT methodology combining Chaos to discrete images. The using of map cyclical changes in the image is encrypted by different-sized images of different encryption cycle. After experiments the results show that this encryption algorithm using Chaos and CAT can effectively encrypt images. This algorithm can also obtain the best parameters to achieve the best image encryption effect.
{"title":"Encryption algorithms using chaos and CAT methodology","authors":"Weihua Zhu, Ying Shen","doi":"10.1109/ICASID.2010.5551484","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551484","url":null,"abstract":"As the reason of image encryption algorithm of high iteration and low-key encryption-dimensional discrete chaotic space, this paper proposed a CAT methodology combining Chaos to discrete images. The using of map cyclical changes in the image is encrypted by different-sized images of different encryption cycle. After experiments the results show that this encryption algorithm using Chaos and CAT can effectively encrypt images. This algorithm can also obtain the best parameters to achieve the best image encryption effect.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a digital calibration algorithm for an ultra high-speed folding and interpolating analog-to-digital converter in 0.18-fin CMOS technology is presented. The spice simulation result shows the digital foreground calibration algorithm can efficiently improve the linearity of the ADC.
{"title":"Linearity improvement base on digital foreground calibration algorithm for a ultra high-speed analog-to-digital converter","authors":"RuiTao Zhang, Jinshan Yu, Z. Zhang, Yong-lu Wang, Zhu Can, Yu Zhou","doi":"10.1109/ICASID.2010.5551519","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551519","url":null,"abstract":"In this paper, a digital calibration algorithm for an ultra high-speed folding and interpolating analog-to-digital converter in 0.18-fin CMOS technology is presented. The spice simulation result shows the digital foreground calibration algorithm can efficiently improve the linearity of the ADC.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551507
Guojun Yu, Xiaoyao Xie, Zhijie Liu
Search engines nowadays are becoming more and more necessary and popular in surfing the Internet. However, how these search engines like Google or Baidu works is unknown to many people. This paper, through a research into Open-source search engine Nutch, introduces how a common search engine works. By using Nutch, a search engine which belongs to Guizhou Normal University's website is designed and at last, through the improvement of Nutch's sorting algorithm and experiment, it can be found that Nutch is very suitable for working in home-search.
{"title":"The design and realization of open-source search engine based on Nutch","authors":"Guojun Yu, Xiaoyao Xie, Zhijie Liu","doi":"10.1109/ICASID.2010.5551507","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551507","url":null,"abstract":"Search engines nowadays are becoming more and more necessary and popular in surfing the Internet. However, how these search engines like Google or Baidu works is unknown to many people. This paper, through a research into Open-source search engine Nutch, introduces how a common search engine works. By using Nutch, a search engine which belongs to Guizhou Normal University's website is designed and at last, through the improvement of Nutch's sorting algorithm and experiment, it can be found that Nutch is very suitable for working in home-search.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551352
Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu
The author puts forward a ring-based routing approach, which reduces the load of the mechanism of the central node in a wireless mesh network. This routing mechanism can evenly allocate the load from the area close to the center of the network to the network perimeter area. This paper analyzes the ring-based routing method from the outlined principles, method descriptions and emulation of the method. Adopting of this time scheduling approach is mainly to save energy, so the network can significantly decrease average power consumption, but the average power consumption reduction is based on the cost of network latency, because the dormant node cannot forward the packet. It cannot continue working until the corresponding super-frame period arrives.
{"title":"Research on ring-based routing for wireless mesh network","authors":"Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu","doi":"10.1109/ICASID.2010.5551352","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551352","url":null,"abstract":"The author puts forward a ring-based routing approach, which reduces the load of the mechanism of the central node in a wireless mesh network. This routing mechanism can evenly allocate the load from the area close to the center of the network to the network perimeter area. This paper analyzes the ring-based routing method from the outlined principles, method descriptions and emulation of the method. Adopting of this time scheduling approach is mainly to save energy, so the network can significantly decrease average power consumption, but the average power consumption reduction is based on the cost of network latency, because the dormant node cannot forward the packet. It cannot continue working until the corresponding super-frame period arrives.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551488
Lisha Guo, Yi Guo, Tao Yang
The adaptive-network-based computational verb inference system (ANCVIS) is a kind of computational verb inference system implemented in adaptive networks. In this paper, a new type of ANCVIS, which uses trend-based computational verb similarities, is presented, and its learning algorithm is derived. Simulations show that the proposed model can tune system parameters well and yield reasonable results based on computational verb rules and input-output data pairs.
{"title":"A new type of adaptive-network-based computational verb inference system","authors":"Lisha Guo, Yi Guo, Tao Yang","doi":"10.1109/ICASID.2010.5551488","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551488","url":null,"abstract":"The adaptive-network-based computational verb inference system (ANCVIS) is a kind of computational verb inference system implemented in adaptive networks. In this paper, a new type of ANCVIS, which uses trend-based computational verb similarities, is presented, and its learning algorithm is derived. Simulations show that the proposed model can tune system parameters well and yield reasonable results based on computational verb rules and input-output data pairs.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551510
Shanping You, Xiaoyao Xie
Considering the Pc cluster system has strong computational ability and the slow communication between processors in network parallel environments, we research a synchronous Jacobi iterative algorithm for solving linear system on scientific computing free software SCILAB. By the numerical experiment we find that the algorithm is very easy to realize, and has relatively high parallel efficiency and high speedup.
{"title":"A synchronous Jacobi iteration parallel algorithm for solving liner system based on SCILAB","authors":"Shanping You, Xiaoyao Xie","doi":"10.1109/ICASID.2010.5551510","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551510","url":null,"abstract":"Considering the Pc cluster system has strong computational ability and the slow communication between processors in network parallel environments, we research a synchronous Jacobi iterative algorithm for solving linear system on scientific computing free software SCILAB. By the numerical experiment we find that the algorithm is very easy to realize, and has relatively high parallel efficiency and high speedup.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"23 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120985546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551525
Jian Tao, Yajun Wang, J. Xing
Different from the conventional hysteretic comparators, a simple circuit is introduced to provide flexibility to program the hysteretic threshold in this paper. The hysteresis can be controlled accurately at a large range and equals to the difference of extra controlled voltage to make the hysteresis be controlled expediently. Besides, this structure is not only for low power dissipation comparators but also for high speed comparators.
{"title":"A comparator with flexible programming of the hysteresis","authors":"Jian Tao, Yajun Wang, J. Xing","doi":"10.1109/ICASID.2010.5551525","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551525","url":null,"abstract":"Different from the conventional hysteretic comparators, a simple circuit is introduced to provide flexibility to program the hysteretic threshold in this paper. The hysteresis can be controlled accurately at a large range and equals to the difference of extra controlled voltage to make the hysteresis be controlled expediently. Besides, this structure is not only for low power dissipation comparators but also for high speed comparators.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114620915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551487
Zhongwen Li, Zhibin Xu, Xinquan Feng
File sharing is one of the most typical applications in P2P networks. Due to the problems of certificate management and key escrow, the traditional public key cryptosystems including PKI and ID-PKC are very difficult to be applied in the P2P networks. Identity authentication is always hard to be brought into effect, which brings some trust problems, such as free riding. The trust problems widely exist in such file sharing systems. In this paper, we research the applications with identity certification based on certificateless public key cryptography (CL-PKC), and build a file sharing system based on the JXTA platform in the P2P networks. The system implements key generation, identity authentication and file content authentication, verifies its feasibility and validity, and proves that it is so secure.
{"title":"Design and implement of file sharing system with identity certification based on CL-PKC in P2P networks","authors":"Zhongwen Li, Zhibin Xu, Xinquan Feng","doi":"10.1109/ICASID.2010.5551487","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551487","url":null,"abstract":"File sharing is one of the most typical applications in P2P networks. Due to the problems of certificate management and key escrow, the traditional public key cryptosystems including PKI and ID-PKC are very difficult to be applied in the P2P networks. Identity authentication is always hard to be brought into effect, which brings some trust problems, such as free riding. The trust problems widely exist in such file sharing systems. In this paper, we research the applications with identity certification based on certificateless public key cryptography (CL-PKC), and build a file sharing system based on the JXTA platform in the P2P networks. The system implements key generation, identity authentication and file content authentication, verifies its feasibility and validity, and proves that it is so secure.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551494
Kun Wen, Tao Yang
Computational verb cellular networks (CVCNs) are new kinds of cellular computational platforms where cellular rules are computational verb rules. In the previous works, the categorizations of patterns formed in two-dimensional computational verb networks (2D CVCNs) were done. The existing results imply that 2D CVCNs are universal in pattern formations in the sense that all patterns that reported in other color cellular networks including color cellular automata (CA) and cellular neural networks (CNN) can be observed in 2D CVCNs. In this paper some new kinds of patterns like Turing patterns and other dynamical pattern are presented.
{"title":"New patterns in two-dimensional computational verb cellular networks","authors":"Kun Wen, Tao Yang","doi":"10.1109/ICASID.2010.5551494","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551494","url":null,"abstract":"Computational verb cellular networks (CVCNs) are new kinds of cellular computational platforms where cellular rules are computational verb rules. In the previous works, the categorizations of patterns formed in two-dimensional computational verb networks (2D CVCNs) were done. The existing results imply that 2D CVCNs are universal in pattern formations in the sense that all patterns that reported in other color cellular networks including color cellular automata (CA) and cellular neural networks (CNN) can be observed in 2D CVCNs. In this paper some new kinds of patterns like Turing patterns and other dynamical pattern are presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130431524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}