首页 > 最新文献

2010 International Conference on Anti-Counterfeiting, Security and Identification最新文献

英文 中文
New patterns in two-dimensional computational verb cellular networks 二维计算动词细胞网络的新模式
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551494
Kun Wen, Tao Yang
Computational verb cellular networks (CVCNs) are new kinds of cellular computational platforms where cellular rules are computational verb rules. In the previous works, the categorizations of patterns formed in two-dimensional computational verb networks (2D CVCNs) were done. The existing results imply that 2D CVCNs are universal in pattern formations in the sense that all patterns that reported in other color cellular networks including color cellular automata (CA) and cellular neural networks (CNN) can be observed in 2D CVCNs. In this paper some new kinds of patterns like Turing patterns and other dynamical pattern are presented.
计算动词细胞网络(CVCNs)是一种新型的细胞计算平台,其中细胞规则是计算动词规则。在之前的工作中,我们对二维计算动词网络(2D CVCNs)中形成的模式进行了分类。现有的结果表明,2D CVCNs在模式形成上是通用的,这意味着在其他颜色细胞网络(包括颜色细胞自动机(CA)和细胞神经网络(CNN))中报道的所有模式都可以在2D CVCNs中观察到。本文介绍了图灵模式和其他动态模式等几种新的模式。
{"title":"New patterns in two-dimensional computational verb cellular networks","authors":"Kun Wen, Tao Yang","doi":"10.1109/ICASID.2010.5551494","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551494","url":null,"abstract":"Computational verb cellular networks (CVCNs) are new kinds of cellular computational platforms where cellular rules are computational verb rules. In the previous works, the categorizations of patterns formed in two-dimensional computational verb networks (2D CVCNs) were done. The existing results imply that 2D CVCNs are universal in pattern formations in the sense that all patterns that reported in other color cellular networks including color cellular automata (CA) and cellular neural networks (CNN) can be observed in 2D CVCNs. In this paper some new kinds of patterns like Turing patterns and other dynamical pattern are presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130431524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implement of file sharing system with identity certification based on CL-PKC in P2P networks P2P网络中基于CL-PKC的身份认证文件共享系统的设计与实现
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551487
Zhongwen Li, Zhibin Xu, Xinquan Feng
File sharing is one of the most typical applications in P2P networks. Due to the problems of certificate management and key escrow, the traditional public key cryptosystems including PKI and ID-PKC are very difficult to be applied in the P2P networks. Identity authentication is always hard to be brought into effect, which brings some trust problems, such as free riding. The trust problems widely exist in such file sharing systems. In this paper, we research the applications with identity certification based on certificateless public key cryptography (CL-PKC), and build a file sharing system based on the JXTA platform in the P2P networks. The system implements key generation, identity authentication and file content authentication, verifies its feasibility and validity, and proves that it is so secure.
文件共享是P2P网络中最典型的应用之一。由于证书管理和密钥托管的问题,传统的公钥密码体系PKI和ID-PKC很难在P2P网络中应用。身份认证往往难以实施,这就带来了搭便车等信任问题。信任问题在此类文件共享系统中普遍存在。本文研究了基于无证书公钥加密(CL-PKC)的身份认证应用,并在P2P网络中构建了一个基于JXTA平台的文件共享系统。系统实现了密钥生成、身份认证和文件内容认证,验证了系统的可行性和有效性,证明了系统的安全性。
{"title":"Design and implement of file sharing system with identity certification based on CL-PKC in P2P networks","authors":"Zhongwen Li, Zhibin Xu, Xinquan Feng","doi":"10.1109/ICASID.2010.5551487","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551487","url":null,"abstract":"File sharing is one of the most typical applications in P2P networks. Due to the problems of certificate management and key escrow, the traditional public key cryptosystems including PKI and ID-PKC are very difficult to be applied in the P2P networks. Identity authentication is always hard to be brought into effect, which brings some trust problems, such as free riding. The trust problems widely exist in such file sharing systems. In this paper, we research the applications with identity certification based on certificateless public key cryptography (CL-PKC), and build a file sharing system based on the JXTA platform in the P2P networks. The system implements key generation, identity authentication and file content authentication, verifies its feasibility and validity, and proves that it is so secure.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on ring-based routing for wireless mesh network 无线网状网络中基于环的路由研究
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551352
Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu
The author puts forward a ring-based routing approach, which reduces the load of the mechanism of the central node in a wireless mesh network. This routing mechanism can evenly allocate the load from the area close to the center of the network to the network perimeter area. This paper analyzes the ring-based routing method from the outlined principles, method descriptions and emulation of the method. Adopting of this time scheduling approach is mainly to save energy, so the network can significantly decrease average power consumption, but the average power consumption reduction is based on the cost of network latency, because the dormant node cannot forward the packet. It cannot continue working until the corresponding super-frame period arrives.
作者提出了一种基于环的路由方法,减少了无线网状网络中中心节点机制的负载。这种路由机制可以将负载从靠近网络中心的区域均匀地分配到网络外围区域。本文从原理概述、方法描述和仿真三个方面对基于环的路由方法进行了分析。采用这种时间调度方法主要是为了节省能源,因此网络可以显著降低平均功耗,但是平均功耗的降低是以网络延迟的代价为基础的,因为休眠节点无法转发数据包。在相应的超帧周期到达之前,它不能继续工作。
{"title":"Research on ring-based routing for wireless mesh network","authors":"Weihong Zheng, Xiaoyao Xie, Ziyi You, Yan Chen, Xuhong Yu","doi":"10.1109/ICASID.2010.5551352","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551352","url":null,"abstract":"The author puts forward a ring-based routing approach, which reduces the load of the mechanism of the central node in a wireless mesh network. This routing mechanism can evenly allocate the load from the area close to the center of the network to the network perimeter area. This paper analyzes the ring-based routing method from the outlined principles, method descriptions and emulation of the method. Adopting of this time scheduling approach is mainly to save energy, so the network can significantly decrease average power consumption, but the average power consumption reduction is based on the cost of network latency, because the dormant node cannot forward the packet. It cannot continue working until the corresponding super-frame period arrives.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The experimental blind timing acquisition scheme for FM-DCSK communication system FM-DCSK通信系统的实验盲定时采集方案
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551521
Xiaochao Li, Xiaofan Lin, Donghui Guo
System design and performance are presented for an experimental FM-DCSK radio system with a blind timing acquisition scheme. The transmitter and receiver architecture is proposed, and a novel two-stage blind bit synchronization algorithm for a fast and efficient timing acquisition process is introduced. This synchronization scheme exploits the waveform repetition pattern which naturally present in the DCSK transmitted reference signal structure. The BER performance of such systems is evaluated under AWGN and multi-path channel, the value is fairly close to that of perfect synchronization, which is 0.2dB difference at SNR 10–15dB. Key building blocks of circuit implementation are also presented.
介绍了一种实验用FM-DCSK盲定时采集系统的系统设计和性能。提出了一种新型的两级盲位同步算法,实现了快速高效的定时采集。该同步方案利用了DCSK传输参考信号结构中自然存在的波形重复模式。在AWGN和多径信道条件下对系统的误码率性能进行了评价,其值与完全同步时的误码率相当接近,在信噪比为10-15dB时的误码率差为0.2dB。给出了电路实现的关键模块。
{"title":"The experimental blind timing acquisition scheme for FM-DCSK communication system","authors":"Xiaochao Li, Xiaofan Lin, Donghui Guo","doi":"10.1109/ICASID.2010.5551521","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551521","url":null,"abstract":"System design and performance are presented for an experimental FM-DCSK radio system with a blind timing acquisition scheme. The transmitter and receiver architecture is proposed, and a novel two-stage blind bit synchronization algorithm for a fast and efficient timing acquisition process is introduced. This synchronization scheme exploits the waveform repetition pattern which naturally present in the DCSK transmitted reference signal structure. The BER performance of such systems is evaluated under AWGN and multi-path channel, the value is fairly close to that of perfect synchronization, which is 0.2dB difference at SNR 10–15dB. Key building blocks of circuit implementation are also presented.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of 3D scan conversion algorithm based on Handel-C 基于Handel-C的三维扫描转换算法的设计与实现
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551515
Yongfu Yan, Jianyang Zhou, Chunfang Zheng
In this paper, we design and implement 3D scan conversion algorithm using Handel-C language. Primarily we introduce the 3D graphics rendering process and analyze the principle of improved scan conversion algorithm. Then we design and implement the improved scan conversion algorithm. Finally we translate the Handel-C code into Verilog-HDL code and verify the design in ModelSim. Parallel optimization schemes are introduced in Handel-C porting. The performance increases more than 12 times after optimization. The design experience shows that the hardware implementation of complex algorithm based on Handel-C is feasible and efficient.
本文采用Handel-C语言设计并实现了三维扫描转换算法。首先介绍了三维图形的绘制过程,分析了改进的扫描转换算法的原理。然后设计并实现了改进的扫描转换算法。最后,我们将Handel-C代码翻译成Verilog-HDL代码,并在ModelSim中验证设计。在handl - c移植中引入了并行优化方案。优化后性能提高12倍以上。设计经验表明,基于Handel-C的复杂算法的硬件实现是可行和高效的。
{"title":"Design and implementation of 3D scan conversion algorithm based on Handel-C","authors":"Yongfu Yan, Jianyang Zhou, Chunfang Zheng","doi":"10.1109/ICASID.2010.5551515","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551515","url":null,"abstract":"In this paper, we design and implement 3D scan conversion algorithm using Handel-C language. Primarily we introduce the 3D graphics rendering process and analyze the principle of improved scan conversion algorithm. Then we design and implement the improved scan conversion algorithm. Finally we translate the Handel-C code into Verilog-HDL code and verify the design in ModelSim. Parallel optimization schemes are introduced in Handel-C porting. The performance increases more than 12 times after optimization. The design experience shows that the hardware implementation of complex algorithm based on Handel-C is feasible and efficient.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The implementation of communication between the upper computer and lower PLC of rescue robot 实现了救援机器人上位机与下位PLC之间的通信
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551344
Hongli Tang, Xiaoyao Xie, Xiangdong Yang, Chen Yang, J. Xiao
The realization of communication between PC and PLC is the basic constituent part in rescue robot control system. It has direct impact to the function of entire system. This paper introduces a method in detail which can make the communication between the rescue robot upper computer and lower PLC come true. It also analyses how to implement communication between S7-200 programmable logic controller and personal computer in the mode of free port, and given the programming instance. Practice indicates the idea of the scheme is succinct and also very effective.
PC与PLC通信的实现是救援机器人控制系统的基本组成部分。它直接影响到整个系统的功能。本文详细介绍了一种实现救援机器人上位机与下位PLC通信的方法。分析了S7-200可编程控制器与个人计算机以自由口方式通信的实现方法,并给出了编程实例。实践表明,该方案思想简洁,效果显著。
{"title":"The implementation of communication between the upper computer and lower PLC of rescue robot","authors":"Hongli Tang, Xiaoyao Xie, Xiangdong Yang, Chen Yang, J. Xiao","doi":"10.1109/ICASID.2010.5551344","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551344","url":null,"abstract":"The realization of communication between PC and PLC is the basic constituent part in rescue robot control system. It has direct impact to the function of entire system. This paper introduces a method in detail which can make the communication between the rescue robot upper computer and lower PLC come true. It also analyses how to implement communication between S7-200 programmable logic controller and personal computer in the mode of free port, and given the programming instance. Practice indicates the idea of the scheme is succinct and also very effective.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image interpolation algorithm based on computational verb theory 基于计算动词理论的图像插值算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551337
Huiqing Liu, Yinghao Liao, Tao Yang, Cheng Chen
In this paper, a new image interpolation algorithm is proposed due to the inspiration of knowledge-based learning and dynamical control strategy which are based on computational verb theory. This algorithm takes gray level profiles and contour shapes as two processing factors. Experiments show that, with respect to the performance near edges of digital images, our algorithm is better than nearest neighbor interpolation algorithm; with respect to the performance in regions of images, our method is better than bilinear interpolation and bicubic interpolation.
本文受基于计算动词理论的知识学习和动态控制策略的启发,提出了一种新的图像插值算法。该算法以灰度轮廓和轮廓形状为两个处理因素。实验表明,在数字图像的近边缘处,我们的算法优于最近邻插值算法;就图像区域的性能而言,我们的方法优于双线性插值和双三次插值。
{"title":"Image interpolation algorithm based on computational verb theory","authors":"Huiqing Liu, Yinghao Liao, Tao Yang, Cheng Chen","doi":"10.1109/ICASID.2010.5551337","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551337","url":null,"abstract":"In this paper, a new image interpolation algorithm is proposed due to the inspiration of knowledge-based learning and dynamical control strategy which are based on computational verb theory. This algorithm takes gray level profiles and contour shapes as two processing factors. Experiments show that, with respect to the performance near edges of digital images, our algorithm is better than nearest neighbor interpolation algorithm; with respect to the performance in regions of images, our method is better than bilinear interpolation and bicubic interpolation.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Architecture of Web-EDA system based on Cloud computing and application for project management of IC design 基于云计算的Web-EDA系统体系结构及其在集成电路设计项目管理中的应用
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551512
Xiaopeng Lin, Yiyang Li, H. Dai, Donghui Guo
Cloud computing is usually defined to deliver infrastructure, platform and software as services, which is available as a pay-as-you-go model for users. A paradigm of Cloud computing for EDA service is presented in this paper, and a hierarchical architecture of Web-EDA system implemented with Cloud computing is described in detail. Based on this proposed system structure, we developed a prototype of the Web-EDA system for sharing EDA Tools and project management of IC design. It shows that Cloud computing for EDA service is possible to be implemented distributedly and brings maximum benefit to both users and vendors.
云计算通常被定义为将基础设施、平台和软件作为服务交付,这是用户可以使用的即付即用模式。提出了一种面向EDA服务的云计算范式,并详细描述了基于云计算实现的Web-EDA系统的分层体系结构。在此基础上,我们开发了一个用于集成电路设计的EDA工具共享和项目管理的Web-EDA系统原型。说明EDA服务的云计算是可以分布式实现的,可以为用户和厂商带来最大的利益。
{"title":"Architecture of Web-EDA system based on Cloud computing and application for project management of IC design","authors":"Xiaopeng Lin, Yiyang Li, H. Dai, Donghui Guo","doi":"10.1109/ICASID.2010.5551512","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551512","url":null,"abstract":"Cloud computing is usually defined to deliver infrastructure, platform and software as services, which is available as a pay-as-you-go model for users. A paradigm of Cloud computing for EDA service is presented in this paper, and a hierarchical architecture of Web-EDA system implemented with Cloud computing is described in detail. Based on this proposed system structure, we developed a prototype of the Web-EDA system for sharing EDA Tools and project management of IC design. It shows that Cloud computing for EDA service is possible to be implemented distributedly and brings maximum benefit to both users and vendors.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on the implementation of trusted platform module based on reconfigurable computing 基于可重构计算的可信平台模块实现研究
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551832
Zhichao Liu, Yunfeng Wang, Tianxiang Liu
In this paper, the implementation and reconfigurable feature of RSA and AES cryptographic algorithm are analyzed. On the basis of the Reconfigurable design of this two algorithms, Reconfigurable RSA and AES hardware architecture is designed to fit four different key length of 256bit, 512bit, 1024bit, 2048bit for RSA, and three different key length of 128bit, 192bit, and 256bit for AES. The reconfigurable design and testing are carried out on FPGA, the results showed that it is able to meet the high-performance information security systems encryption algorithm on the speed requirement.
本文分析了RSA和AES加密算法的实现及其可重构特性。在对这两种算法进行可重构设计的基础上,设计了可重构RSA和AES的硬件架构,以适应RSA 256bit、512bit、1024bit、2048bit四种不同的密钥长度,以及AES 128bit、192bit、256bit三种不同的密钥长度。在FPGA上进行了可重构设计和测试,结果表明该算法能够满足高性能信息安全系统对加密算法的速度要求。
{"title":"Research on the implementation of trusted platform module based on reconfigurable computing","authors":"Zhichao Liu, Yunfeng Wang, Tianxiang Liu","doi":"10.1109/ICASID.2010.5551832","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551832","url":null,"abstract":"In this paper, the implementation and reconfigurable feature of RSA and AES cryptographic algorithm are analyzed. On the basis of the Reconfigurable design of this two algorithms, Reconfigurable RSA and AES hardware architecture is designed to fit four different key length of 256bit, 512bit, 1024bit, 2048bit for RSA, and three different key length of 128bit, 192bit, and 256bit for AES. The reconfigurable design and testing are carried out on FPGA, the results showed that it is able to meet the high-performance information security systems encryption algorithm on the speed requirement.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of an outer-chip controllable and inner-chip adjustable voltage reference 芯片外可控和芯片内可调电压基准的设计
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551516
Shuming Yang, Yongsheng Yin, Honghui Deng
A new type of voltage reference which can be controlled in the outer-chip by the external pins and can generate an arbitrary reference voltage was introduced in this paper. There is a resistor serial in the reference voltage circuit that can generate 4 different reference voltages by the internal control logic circuit to adapt to fit different situations demand. The core circuit employs the improved Brokaw architecture. The entire circuit is in 0.18um CMOS process and the power supply voltage is 1.8V. Simulation results using Hspice tools show that different reference voltages can be achieved by corresponding configurations of external pins; or can output 4 fixed reference voltages controlled by the internal logic signals. When the temperature ranges from −40 to 120°C, the reference voltage circuit can reach to a low temperature coefficient (8.5ppm/°C) and a high power supply rejection ratio that is −110.2dB.1
本文介绍了一种新型的参考电压源,它可以通过外部引脚在芯片外部控制,产生任意的参考电压。参考电压电路中有一个电阻串行,通过内部控制逻辑电路可以产生4个不同的参考电压,以适应不同情况的需求。核心电路采用改进的布罗考结构。整个电路采用0.18um CMOS工艺,电源电压为1.8V。利用Hspice工具进行的仿真结果表明,通过相应的外部引脚配置可以获得不同的参考电压;或可输出4个由内部逻辑信号控制的固定参考电压。在−40 ~ 120℃的温度范围内,基准电压电路具有较低的温度系数(8.5ppm/℃)和较高的电源抑制比(−110.2dB.1)
{"title":"Design of an outer-chip controllable and inner-chip adjustable voltage reference","authors":"Shuming Yang, Yongsheng Yin, Honghui Deng","doi":"10.1109/ICASID.2010.5551516","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551516","url":null,"abstract":"A new type of voltage reference which can be controlled in the outer-chip by the external pins and can generate an arbitrary reference voltage was introduced in this paper. There is a resistor serial in the reference voltage circuit that can generate 4 different reference voltages by the internal control logic circuit to adapt to fit different situations demand. The core circuit employs the improved Brokaw architecture. The entire circuit is in 0.18um CMOS process and the power supply voltage is 1.8V. Simulation results using Hspice tools show that different reference voltages can be achieved by corresponding configurations of external pins; or can output 4 fixed reference voltages controlled by the internal logic signals. When the temperature ranges from −40 to 120°C, the reference voltage circuit can reach to a low temperature coefficient (8.5ppm/°C) and a high power supply rejection ratio that is −110.2dB.1","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 International Conference on Anti-Counterfeiting, Security and Identification
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1