首页 > 最新文献

2010 International Conference on Anti-Counterfeiting, Security and Identification最新文献

英文 中文
Parameters estimation for multidimensional item response theory: An effective method of determining dimensions and bayesian method parameters estimation 多维项目反应理论的参数估计:一种确定维度的有效方法和贝叶斯方法参数估计
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551497
Anyu Zhang, Xiaoyao Xie, Fang Li
Broadly speaking, IRT models can be divided into two families: unidimensional and multidimensional. Unidimensional models require a single trait (ability) dimension θ. Multidimensional IRT models model response data hypothesized to arise from multiple traits. However, because of the greatly increased complexity, the majority of IRT research and applications utilize a unidimensional model. With the developmental, the MIRT is negative to be researcher. In this paper, we proposed the estimation method of determining the number of dimensions for multidimensional item response theory based on combination with Principal Component Analysis and χ2 test. A Joint marginal likelihood estimation method based on Bayesian method is provided in paper. Finally, a suggestion about the issue of numerical calculation of multiple integrals is given.
广义地说,IRT模型可以分为两大类:一维模型和多维模型。单维模型需要单个特征(能力)维度θ。多维IRT模型对反应数据进行建模,假设反应数据来自多个特征。然而,由于IRT的复杂性大大增加,大多数IRT研究和应用都使用一维模型。随着技术的发展,MIRT对研究人员来说是消极的。本文结合主成分分析和χ2检验,提出了多维项目反应理论中确定维度数的估计方法。提出了一种基于贝叶斯方法的联合边际似然估计方法。最后,对多重积分的数值计算问题提出了建议。
{"title":"Parameters estimation for multidimensional item response theory: An effective method of determining dimensions and bayesian method parameters estimation","authors":"Anyu Zhang, Xiaoyao Xie, Fang Li","doi":"10.1109/ICASID.2010.5551497","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551497","url":null,"abstract":"Broadly speaking, IRT models can be divided into two families: unidimensional and multidimensional. Unidimensional models require a single trait (ability) dimension θ. Multidimensional IRT models model response data hypothesized to arise from multiple traits. However, because of the greatly increased complexity, the majority of IRT research and applications utilize a unidimensional model. With the developmental, the MIRT is negative to be researcher. In this paper, we proposed the estimation method of determining the number of dimensions for multidimensional item response theory based on combination with Principal Component Analysis and χ2 test. A Joint marginal likelihood estimation method based on Bayesian method is provided in paper. Finally, a suggestion about the issue of numerical calculation of multiple integrals is given.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Innovative application of SIP protocol for communication platform SIP协议在通信平台上的创新应用
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551346
Benbin Chen, Wenchao Zhou, Yiyang Li, Donghui Guo
An innovative application for communication platform based on SIP protocol is presented in this paper. In this application, a group management model is proposed for SIP with grouping functions. A new encryption mechanism that combines AES and RSA algorithm is included in this model to ensure the security of SIP messages. Different from the traditional application based on SIP, the architecture of this new platform requires a data service node to store the configuration list of the group management and the public key of RSA. Additionally, a methodology for NAT/FW traversal by using ICE and HTTP tunnel is applied to enhance the adaptability of the platform in different application environment. Finally, this communication platform is implemented with a user agent (UA), a SIP server (option), and a data service node. And the experience with the platform shows that, it could be widely utilized in enterprises, groups and organizations with low-cost because of those improvements.
本文提出了一种基于SIP协议的通信平台创新应用。在此应用中,提出了一种具有分组功能的SIP组管理模型。该模型采用AES和RSA算法相结合的加密机制来保证SIP消息的安全性。与传统的基于SIP的应用程序不同,该平台的体系结构需要一个数据服务节点来存储组管理的配置列表和RSA公钥。此外,为了提高平台在不同应用环境下的适应性,还提出了一种利用ICE和HTTP隧道进行NAT/FW穿越的方法。最后,该通信平台由用户代理(UA)、SIP服务器(选项)和数据服务节点实现。实践表明,通过这些改进,该平台可以在企业、团体和组织中以低成本得到广泛应用。
{"title":"Innovative application of SIP protocol for communication platform","authors":"Benbin Chen, Wenchao Zhou, Yiyang Li, Donghui Guo","doi":"10.1109/ICASID.2010.5551346","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551346","url":null,"abstract":"An innovative application for communication platform based on SIP protocol is presented in this paper. In this application, a group management model is proposed for SIP with grouping functions. A new encryption mechanism that combines AES and RSA algorithm is included in this model to ensure the security of SIP messages. Different from the traditional application based on SIP, the architecture of this new platform requires a data service node to store the configuration list of the group management and the public key of RSA. Additionally, a methodology for NAT/FW traversal by using ICE and HTTP tunnel is applied to enhance the adaptability of the platform in different application environment. Finally, this communication platform is implemented with a user agent (UA), a SIP server (option), and a data service node. And the experience with the platform shows that, it could be widely utilized in enterprises, groups and organizations with low-cost because of those improvements.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A research on Denial of Service attack in passive RFID system 无源RFID系统中的拒绝服务攻击研究
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551848
Yongqing Fu, Chun Zhang, Jingchao Wang
As RFID technology being applied more and more widely, its security and privacy problems are increasingly called into question. Means of RFID attack emerge in endlessly and RFID security becomes a relatively new research area. This paper makes research on one of the attack methods — Denial of Service (DoS). We thoroughly expound and analyze the active jamming to the RFID system which, mentioned as Active Jamming Attack later, is a form of DoS. Through theoretical derivation and simulation, the most effective active jamming approach is summarized, which is also demonstrated by presenting experimental results. This work may provide a reference for RFID designers to prevent or weaken this type of DoS attacks to the greatest extent.
随着RFID技术的应用越来越广泛,其安全性和隐私性问题也日益受到质疑。RFID攻击手段层出不穷,RFID安全成为一个比较新的研究领域。本文对其中一种攻击方法——拒绝服务(DoS)进行了研究。本文对RFID系统的有源干扰进行了深入的阐述和分析,后文中称之为有源干扰攻击,是DoS攻击的一种形式。通过理论推导和仿真,总结了最有效的有源干扰方法,并给出了实验结果。这项工作可以为RFID设计人员提供参考,最大程度地防止或削弱这种类型的DoS攻击。
{"title":"A research on Denial of Service attack in passive RFID system","authors":"Yongqing Fu, Chun Zhang, Jingchao Wang","doi":"10.1109/ICASID.2010.5551848","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551848","url":null,"abstract":"As RFID technology being applied more and more widely, its security and privacy problems are increasingly called into question. Means of RFID attack emerge in endlessly and RFID security becomes a relatively new research area. This paper makes research on one of the attack methods — Denial of Service (DoS). We thoroughly expound and analyze the active jamming to the RFID system which, mentioned as Active Jamming Attack later, is a form of DoS. Through theoretical derivation and simulation, the most effective active jamming approach is summarized, which is also demonstrated by presenting experimental results. This work may provide a reference for RFID designers to prevent or weaken this type of DoS attacks to the greatest extent.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124626252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A controllable proxy signature scheme with revocation list 具有撤销列表的可控代理签名方案
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551485
Jianhong Zhang, Wei Wang, Xue Liu
Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.
授权是现代办公制度的重要手段。在某些情况下,我们需要控制代理签名的验证,因为任何人都没有必要相信签名者的不光彩消息(如账单)的理由。为了实现验证的控制和代理签名的撤销,本文将代理签名、指定验证者签名和撤销列表相结合,提出了一种新的原语:具有撤销列表的可控代理签名方案。并在随机oracle模型下验证了该方法的正确性和安全性。
{"title":"A controllable proxy signature scheme with revocation list","authors":"Jianhong Zhang, Wei Wang, Xue Liu","doi":"10.1109/ICASID.2010.5551485","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551485","url":null,"abstract":"Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of video decoding MPSoC for wireless video intercom 无线视频对讲视频解码MPSoC的设计
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551827
Jing Zhang, Duoli Zhang, Gaoming Du
Wireless video interphone cannot only provide portability, but also connect people through video communication, so it gains more and more interest in consumer electronics. To design such systems, it needs high performance video processing engine. In this paper, a Multi-processor system on a chip (MPSoC) is designed, in which there are one 32-bit RISC CPU and a low power, high performance H.264 codec. The RISC CPU controls the system operation, and the H.264 codec is responsible for video decoding. Due to the large number of data to be processed, an off-chip DDRII SDRAM is used to store source stream and intermediate data. Additionally, the MPSoC can receive real-time wireless video and convert the decoded data into RGB data format that can be displayed on LCD. The MPSoC is implemented on EP3C120F780C8N FPGA, and takes up 71% resource of the total device resource. Experiment results show that it runs 32MHz, and can perform real-time video decoding, with the frame rate up to 30fps.
无线可视对讲机不仅提供了便携性,而且通过视频通信将人们联系在一起,因此在消费电子产品中越来越受到关注。为了设计这样的系统,需要高性能的视频处理引擎。本文设计了一种多处理器单片系统(MPSoC),其中包含一个32位RISC CPU和一个低功耗、高性能的H.264编解码器。RISC CPU控制系统运行,H.264编解码器负责视频解码。由于需要处理的数据量很大,因此采用片外DDRII SDRAM来存储源流和中间数据。此外,MPSoC可以接收实时无线视频,并将解码后的数据转换为可以在LCD上显示的RGB数据格式。MPSoC在EP3C120F780C8N FPGA上实现,占用总设备资源的71%。实验结果表明,该系统运行频率为32MHz,可以进行实时视频解码,帧率可达30fps。
{"title":"Design of video decoding MPSoC for wireless video intercom","authors":"Jing Zhang, Duoli Zhang, Gaoming Du","doi":"10.1109/ICASID.2010.5551827","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551827","url":null,"abstract":"Wireless video interphone cannot only provide portability, but also connect people through video communication, so it gains more and more interest in consumer electronics. To design such systems, it needs high performance video processing engine. In this paper, a Multi-processor system on a chip (MPSoC) is designed, in which there are one 32-bit RISC CPU and a low power, high performance H.264 codec. The RISC CPU controls the system operation, and the H.264 codec is responsible for video decoding. Due to the large number of data to be processed, an off-chip DDRII SDRAM is used to store source stream and intermediate data. Additionally, the MPSoC can receive real-time wireless video and convert the decoded data into RGB data format that can be displayed on LCD. The MPSoC is implemented on EP3C120F780C8N FPGA, and takes up 71% resource of the total device resource. Experiment results show that it runs 32MHz, and can perform real-time video decoding, with the frame rate up to 30fps.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A training algorithm of computational verb decision trees 计算动词决策树的训练算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551334
Juanjuan Sun, Tao Yang
In this paper, an algorithm of learning computational verb decision trees (verb trees, for short) from training examples base on impact factors, which are calculated by using computational verb similarities, is presented. Some examples are used to show the creation of verb decision tree and the usefulness of verb decision trees. Examples are used to show that verb decision trees are powerful tools to generalize and extract knowledge from both historical records and Boolean logical records
本文提出了一种基于影响因子的训练样例学习计算动词决策树(以下简称动词树)的算法,影响因子是通过计算动词相似度来计算的。通过一些例子说明了动词决策树的创建和动词决策树的实用性。实例表明,动词决策树是从历史记录和布尔逻辑记录中概括和提取知识的强大工具
{"title":"A training algorithm of computational verb decision trees","authors":"Juanjuan Sun, Tao Yang","doi":"10.1109/ICASID.2010.5551334","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551334","url":null,"abstract":"In this paper, an algorithm of learning computational verb decision trees (verb trees, for short) from training examples base on impact factors, which are calculated by using computational verb similarities, is presented. Some examples are used to show the creation of verb decision tree and the usefulness of verb decision trees. Examples are used to show that verb decision trees are powerful tools to generalize and extract knowledge from both historical records and Boolean logical records","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123115893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-conflict RR scheduling algorithm and its hardware implementation for crossbar switch 交叉开关无冲突RR调度算法及其硬件实现
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551342
Hongyin Luo, Lin Li, Donghui Guo
In this paper, two different architectures of the iSLIP scheduling algorithm are implemented by hardware, and the delay limitation of this algorithm is indicated by comparing their performances. Then a matrix model is proposed for analyzing the reason of delay limitation, and the conclusion is that the pointer conflict causes the large area and delay in essence. Finally, the non-conflict RR scheduling algorithm is proposed for resolving this pointer conflict problem. The hardware implementation result shows that the performance of this algorithm is much better than iSLIP algorithm.
本文通过硬件实现了两种不同架构的iSLIP调度算法,并通过对其性能的比较,指出了该算法的延迟限制。在此基础上,提出了一个矩阵模型来分析延迟限制的原因,得出了指针冲突在本质上造成了大面积延迟的结论。最后,针对指针冲突问题,提出了无冲突RR调度算法。硬件实现结果表明,该算法的性能明显优于iSLIP算法。
{"title":"Non-conflict RR scheduling algorithm and its hardware implementation for crossbar switch","authors":"Hongyin Luo, Lin Li, Donghui Guo","doi":"10.1109/ICASID.2010.5551342","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551342","url":null,"abstract":"In this paper, two different architectures of the iSLIP scheduling algorithm are implemented by hardware, and the delay limitation of this algorithm is indicated by comparing their performances. Then a matrix model is proposed for analyzing the reason of delay limitation, and the conclusion is that the pointer conflict causes the large area and delay in essence. Finally, the non-conflict RR scheduling algorithm is proposed for resolving this pointer conflict problem. The hardware implementation result shows that the performance of this algorithm is much better than iSLIP algorithm.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A software-based frequency domain parallel acquisition algorithm for GPS signal 一种基于软件的GPS信号频域并行采集算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551340
Yuying Zheng
Signal search and acquisition is an important part of GPS software receiver and makes an influence on the working performance of it. This paper discusses a frequency domain parallel acquisition algorithm. Its theoretic model is first analyzed and then implemented in Matlab, in which the carrier frequencies and code phases in GPS signal can be successfully calculated. Comparison between the conventional time domain serial search and proposed frequency domain parallel acquisition method is discussed. It is verified that the proposed method has better performance both in computation and accuracy.
信号搜索与采集是GPS软件接收机的重要组成部分,直接影响到GPS软件接收机的工作性能。本文讨论了一种频域并行采集算法。首先对其理论模型进行了分析,然后在Matlab中进行了实现,成功地计算出了GPS信号中的载波频率和码相。讨论了传统的时域串行搜索与频域并行获取方法的比较。实验结果表明,该方法在计算量和精度上都有较好的性能。
{"title":"A software-based frequency domain parallel acquisition algorithm for GPS signal","authors":"Yuying Zheng","doi":"10.1109/ICASID.2010.5551340","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551340","url":null,"abstract":"Signal search and acquisition is an important part of GPS software receiver and makes an influence on the working performance of it. This paper discusses a frequency domain parallel acquisition algorithm. Its theoretic model is first analyzed and then implemented in Matlab, in which the carrier frequencies and code phases in GPS signal can be successfully calculated. Comparison between the conventional time domain serial search and proposed frequency domain parallel acquisition method is discussed. It is verified that the proposed method has better performance both in computation and accuracy.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Algorithm for bit-parallelism automaton based RFID event filtering 基于位并行自动机的RFID事件滤波算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551338
Fagui Liu, Yong-Xiong Ruan, Yuzhu Jie, Yue-Dong Lin, Yang Zhang
With the rapid development of RFID (Radio Frequency Identification) technology, RFID middleware has increasingly become the focus. How to process massive RFID data with high-performance is a key issue. This paper analyzes the characteristics of the RFID event filtering in RFID middleware, proposes a RFID EPC Sub-Pattern Match Model using Automata Theory and presents a high-performance matching algorithm for RFID event filtering with bit-parallelism, which has been implemented in our RFID middleware system. Performance evaluation results have indicated that this algorithm is more efficient than the regular expression matching algorithm used before.
随着RFID(无线射频识别)技术的迅速发展,RFID中间件日益成为人们关注的焦点。如何高效地处理海量RFID数据是一个关键问题。分析了RFID中间件中RFID事件过滤的特点,利用自动机理论提出了RFID EPC子模式匹配模型,提出了一种具有位并行性的RFID事件过滤的高性能匹配算法,并在我们的RFID中间件系统中实现。性能评估结果表明,该算法比以前使用的正则表达式匹配算法效率更高。
{"title":"Algorithm for bit-parallelism automaton based RFID event filtering","authors":"Fagui Liu, Yong-Xiong Ruan, Yuzhu Jie, Yue-Dong Lin, Yang Zhang","doi":"10.1109/ICASID.2010.5551338","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551338","url":null,"abstract":"With the rapid development of RFID (Radio Frequency Identification) technology, RFID middleware has increasingly become the focus. How to process massive RFID data with high-performance is a key issue. This paper analyzes the characteristics of the RFID event filtering in RFID middleware, proposes a RFID EPC Sub-Pattern Match Model using Automata Theory and presents a high-performance matching algorithm for RFID event filtering with bit-parallelism, which has been implemented in our RFID middleware system. Performance evaluation results have indicated that this algorithm is more efficient than the regular expression matching algorithm used before.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of power scaleable MD AC in high performance pipelined ADC 高性能流水线ADC中功率可缩放的MD AC设计
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551522
Fei Pei, Honghui Deng, Yongsheng Yin
A 9-bit, 125MSPS, power scaleable MDAC applied in high performance pipelined ADC in 1.8V supply voltage, 0.18um CMOS process is presented in this paper. The related circuits: a high gain, high unit gain bandwidth operational amplifier with gain boosting, common-mode feedback and bootstrap are proposed. Additionally, when the sampling rate is changed, the power of the whole MDAC can be significantly modulated by setting modulations of bias in op amp with different combinations of current sources. Simulation results in a 0.18um CMOS process indicated that when programmed at 125MSPS, the signal can correctly set up in 2.1ns; MDAC exhibits a spurious free dynamic range (SFDR)of 73.1 dB and a signal-to-noise and distortion ratio(SNDR)of 60.23dB. It consumes 6.8mw when a 62MHz sine signal is fed in.1
介绍了一种用于1.8V供电电压、0.18um CMOS工艺下的高性能流水线ADC的9位、125MSPS、功率可扩展MDAC。提出了一种具有增益提升、共模反馈和自举的高增益、高单位增益带宽运算放大器电路。此外,当采样率改变时,通过在运算放大器中设置不同电流源组合的偏置调制,可以显著调制整个MDAC的功率。在0.18um CMOS工艺上的仿真结果表明,当编程为125MSPS时,信号可以在2.1ns内正确设置;MDAC无杂散动态范围(SFDR)为73.1 dB,信噪比和失真比(SNDR)为60.23dB。当输入62MHz正弦信号时,它消耗6.8mw
{"title":"Design of power scaleable MD AC in high performance pipelined ADC","authors":"Fei Pei, Honghui Deng, Yongsheng Yin","doi":"10.1109/ICASID.2010.5551522","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551522","url":null,"abstract":"A 9-bit, 125MSPS, power scaleable MDAC applied in high performance pipelined ADC in 1.8V supply voltage, 0.18um CMOS process is presented in this paper. The related circuits: a high gain, high unit gain bandwidth operational amplifier with gain boosting, common-mode feedback and bootstrap are proposed. Additionally, when the sampling rate is changed, the power of the whole MDAC can be significantly modulated by setting modulations of bias in op amp with different combinations of current sources. Simulation results in a 0.18um CMOS process indicated that when programmed at 125MSPS, the signal can correctly set up in 2.1ns; MDAC exhibits a spurious free dynamic range (SFDR)of 73.1 dB and a signal-to-noise and distortion ratio(SNDR)of 60.23dB. It consumes 6.8mw when a 62MHz sine signal is fed in.1","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 International Conference on Anti-Counterfeiting, Security and Identification
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1