Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551835
Xingfa Huang, L. Li, Z. Zhang, Liang Chen, Jinshan Yu
Based on the application of high-speed, high-resolution A/D converter, this paper describes the design and implementation of a novel high-speed comparator. The comparator uses the high-speed, transmission delay stability technology, the auto-zero technology, and the cascade technology in order for the comparator to have the high-speed, high-resolution, transmission delay stability features. Its performances are verified by a 14-bit 125MSPS pipelined A/D converter which is developed in 0.35um CMOS-based process technology. The SFDR of the A/D converter is up to 87 dB at an input clock of 125MHz with an input signal of 10MHz.
{"title":"High-speed comparator used for high-speed, high-resolution A/D converter","authors":"Xingfa Huang, L. Li, Z. Zhang, Liang Chen, Jinshan Yu","doi":"10.1109/ICASID.2010.5551835","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551835","url":null,"abstract":"Based on the application of high-speed, high-resolution A/D converter, this paper describes the design and implementation of a novel high-speed comparator. The comparator uses the high-speed, transmission delay stability technology, the auto-zero technology, and the cascade technology in order for the comparator to have the high-speed, high-resolution, transmission delay stability features. Its performances are verified by a 14-bit 125MSPS pipelined A/D converter which is developed in 0.35um CMOS-based process technology. The SFDR of the A/D converter is up to 87 dB at an input clock of 125MHz with an input signal of 10MHz.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551482
Lianfeng Huang, Yuexin Weng, Runfii Zhang
Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.
{"title":"Wireless distributed network key-agreement protocol based on discrete logarithm","authors":"Lianfeng Huang, Yuexin Weng, Runfii Zhang","doi":"10.1109/ICASID.2010.5551482","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551482","url":null,"abstract":"Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551339
Yuanming Chen, Wei‐dong He, Guoyun Zhou, Xuemei He, Hua Zhou, Y. Mo, B. He
The manufacture of RFID antenna tags (RFIDs) using silk-screen printing technology with conductive silver paste is one of economic methods to reduce the cost of RFIDs. The distance between conductive particles is minified via hot compaction to conductive silver paste, resulting in lower resistance and higher Q value. The compaction conditions, including temperature, pressure and time, were systematically studied based on the analysis method of uniform design, with regression equation by nonlinear regression analysis fitted by Minitab Statistical Analysis Software. The effect of environmental factors to resistance of RFID antenna was also studied through the high and low temperature impact test and the constant temperature and humidity test. The results indicate that resistance of RFID antenna printed with conductive silver paste can be reduced more than 50%, the resistance variation of RFID antenna can be predicted by regression equation with correlation coefficient 99.8% in certain range and antenna printed with conductive silver paste have good environmental adaptability.
{"title":"Compaction uniformity and environmental adaptability of printed RFID antenna","authors":"Yuanming Chen, Wei‐dong He, Guoyun Zhou, Xuemei He, Hua Zhou, Y. Mo, B. He","doi":"10.1109/ICASID.2010.5551339","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551339","url":null,"abstract":"The manufacture of RFID antenna tags (RFIDs) using silk-screen printing technology with conductive silver paste is one of economic methods to reduce the cost of RFIDs. The distance between conductive particles is minified via hot compaction to conductive silver paste, resulting in lower resistance and higher Q value. The compaction conditions, including temperature, pressure and time, were systematically studied based on the analysis method of uniform design, with regression equation by nonlinear regression analysis fitted by Minitab Statistical Analysis Software. The effect of environmental factors to resistance of RFID antenna was also studied through the high and low temperature impact test and the constant temperature and humidity test. The results indicate that resistance of RFID antenna printed with conductive silver paste can be reduced more than 50%, the resistance variation of RFID antenna can be predicted by regression equation with correlation coefficient 99.8% in certain range and antenna printed with conductive silver paste have good environmental adaptability.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551343
Fagui Liu, Pingan Yang, Wei Shen, Yue-Dong Lin, Yang Zhang
The enterprise-class RFID Middleware demands the flexibility to switch its data access strategies on the persistence layer; however, the traditional frameworks of persistence layer such as Hibernate, iBatis, etc. are seldom of dynamic switching characteristic which makes them incapable to cater for the enterprise-class RFID Middleware on its persistence layer. This paper begins with the analysis of the traditional data access strategies of persistence layer. With the foundation of in-depth studying OSGi, Spring and current mainstream frameworks of persistence layer, it points out a feasible method to implement dynamic switching by CBSD. Hence, the SpringDM-based modularization of Hibernate, an open source persistence layer framework, is firstly proposed. With further insight and development, a dynamic model based on SpringDM is put forward which achieves the flexibility to switch the data access strategies effortlessly at will. It could also be regarded as the general form of deploying the J2EE persistence frameworks to OSGi to provide support for the OSGi-ized multi-frameworks and realize the applications of RFID Middleware's persistence layer.
{"title":"Modulization approach & application of OSGi -based RFID middleware persistence Layer","authors":"Fagui Liu, Pingan Yang, Wei Shen, Yue-Dong Lin, Yang Zhang","doi":"10.1109/ICASID.2010.5551343","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551343","url":null,"abstract":"The enterprise-class RFID Middleware demands the flexibility to switch its data access strategies on the persistence layer; however, the traditional frameworks of persistence layer such as Hibernate, iBatis, etc. are seldom of dynamic switching characteristic which makes them incapable to cater for the enterprise-class RFID Middleware on its persistence layer. This paper begins with the analysis of the traditional data access strategies of persistence layer. With the foundation of in-depth studying OSGi, Spring and current mainstream frameworks of persistence layer, it points out a feasible method to implement dynamic switching by CBSD. Hence, the SpringDM-based modularization of Hibernate, an open source persistence layer framework, is firstly proposed. With further insight and development, a dynamic model based on SpringDM is put forward which achieves the flexibility to switch the data access strategies effortlessly at will. It could also be regarded as the general form of deploying the J2EE persistence frameworks to OSGi to provide support for the OSGi-ized multi-frameworks and realize the applications of RFID Middleware's persistence layer.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551357
Qiang Chen, Mingjie Zhuang
In this paper, we derive an expression of the instantaneous signal-to noise ratio (SNR) for 4 transmit antennas and 2 receive antennas quasi-orthogonal space-time block codes (QSTBC) system with Jafarkhani code, which as a criteria of antenna selection in spatial correlated Rayleigh fading channels. Under the condition of the correlation matrix is known, both capacity performance and bit error performance on the QSTBC systems with antenna selection are investigated. Computer simulations results show that channel correlation can degrade the performance of QSTBC communications system. Namely, channel correlation can increase system BER and reduce the capacity of the system.
{"title":"Performce analysis of QSTBC systems based on transmit antenna selection in correlation channel","authors":"Qiang Chen, Mingjie Zhuang","doi":"10.1109/ICASID.2010.5551357","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551357","url":null,"abstract":"In this paper, we derive an expression of the instantaneous signal-to noise ratio (SNR) for 4 transmit antennas and 2 receive antennas quasi-orthogonal space-time block codes (QSTBC) system with Jafarkhani code, which as a criteria of antenna selection in spatial correlated Rayleigh fading channels. Under the condition of the correlation matrix is known, both capacity performance and bit error performance on the QSTBC systems with antenna selection are investigated. Computer simulations results show that channel correlation can degrade the performance of QSTBC communications system. Namely, channel correlation can increase system BER and reduce the capacity of the system.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551504
Z. Ren, Jia-ning Huang
This article studies the information reconstruction of VDR and AIS data fusion, and performs analysis on the information recorded by VDR and broadcast by AIS, as well as the structure, technology, and system function of voyage data record reconstruction system based on AIS information fusion.
{"title":"The information reconstruction system of VDR & AIS data fusion","authors":"Z. Ren, Jia-ning Huang","doi":"10.1109/ICASID.2010.5551504","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551504","url":null,"abstract":"This article studies the information reconstruction of VDR and AIS data fusion, and performs analysis on the information recorded by VDR and broadcast by AIS, as well as the structure, technology, and system function of voyage data record reconstruction system based on AIS information fusion.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551829
Wenyuan Ling, Chaodong Li Guogang
According to the stochastic process of Brownian bridge theory, a DAC model of INL and segment ratio is presented based on the INL probability density for segmental current-steering DAC. The approximate formula for influence of chip yield in the current mismatch is obtained and the model is carried out by Monte Carlo simulation method. It is demonstrated that DAC yield is lower compared using thermometer-code to using binary-code in the low-bits. When transform bits N<12, the greater binary-code(>[N/2]), the higher yield. Binary-code bits is not suitable for large when N≥12.
{"title":"Modeling of brownian-bridge-based analysis of the segmental D/A converters yield","authors":"Wenyuan Ling, Chaodong Li Guogang","doi":"10.1109/ICASID.2010.5551829","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551829","url":null,"abstract":"According to the stochastic process of Brownian bridge theory, a DAC model of INL and segment ratio is presented based on the INL probability density for segmental current-steering DAC. The approximate formula for influence of chip yield in the current mismatch is obtained and the model is carried out by Monte Carlo simulation method. It is demonstrated that DAC yield is lower compared using thermometer-code to using binary-code in the low-bits. When transform bits N<12, the greater binary-code(>[N/2]), the higher yield. Binary-code bits is not suitable for large when N≥12.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116851729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551401
Hongqing Hu, Guoqiang Ni
Traditional image enhancement algorithm based on the Retinex theory has some limitations due to its hypothesis that the incident light is changing smoothly. In addition, the algorithm introduces color distortion and appears a halo phenomenon during the strong contrast between the light and dark when it is processing the three components of the incident light. Logarithm is used to deal with dynamic compression to reduce the contrast of the image. Considered these limitations, this article summarizes several current improved algorithms. All the algorithms mentioned in the article have a very good performance in the color constancy, contrast, and the computational cost.
{"title":"The improved algorithm for the defect of the Retinex image enhancement","authors":"Hongqing Hu, Guoqiang Ni","doi":"10.1109/ICASID.2010.5551401","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551401","url":null,"abstract":"Traditional image enhancement algorithm based on the Retinex theory has some limitations due to its hypothesis that the incident light is changing smoothly. In addition, the algorithm introduces color distortion and appears a halo phenomenon during the strong contrast between the light and dark when it is processing the three components of the incident light. Logarithm is used to deal with dynamic compression to reduce the contrast of the image. Considered these limitations, this article summarizes several current improved algorithms. All the algorithms mentioned in the article have a very good performance in the color constancy, contrast, and the computational cost.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125994398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551486
Gui Feng, Qiwei Lin
A monitoring alarm system for the elder was designed in this paper. We use a series of continuous human posture detecting to determine whether the elder is in a normal condition, otherwise to give an alarm to ambulance center. The system is mainly used to help elder person to give an alarm when he or her is in suddenness or fall ill unexpectedly at home alone. In this paper we use background difference algorithm to achieve the motion area extraction, and then determine whether the motion area is a person, if it is a person, then there is a need for posture recognition. As for posture, we use support vector machines to classification and recognition. Finally, according to a series of posture, we determine the status of the elderly.
{"title":"Design of elder alarm system based on body posture reorganization","authors":"Gui Feng, Qiwei Lin","doi":"10.1109/ICASID.2010.5551486","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551486","url":null,"abstract":"A monitoring alarm system for the elder was designed in this paper. We use a series of continuous human posture detecting to determine whether the elder is in a normal condition, otherwise to give an alarm to ambulance center. The system is mainly used to help elder person to give an alarm when he or her is in suddenness or fall ill unexpectedly at home alone. In this paper we use background difference algorithm to achieve the motion area extraction, and then determine whether the motion area is a person, if it is a person, then there is a need for posture recognition. As for posture, we use support vector machines to classification and recognition. Finally, according to a series of posture, we determine the status of the elderly.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115282585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-18DOI: 10.1109/ICASID.2010.5551846
Xinmin Dai, Xiaoyao Xie
With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16J mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solution for the coverage extension and throughput enhancement of IEEE 802.16e network. However, security issues can restrain its development. IEEE standard 802.16J-2009 has been published in 2009. Although a number of advanced security schemes are employed in IEEE 802.16j, it still has a few security flaws. In this paper, the security architecture is described in IEEE 802.16J standard. The security mechanism of IEEE 802.16J under different mode (centralized security control and distributed security control) is discussed. In particular, the new features on security sublayer in IEEE 802.16J are analyzed in detail. Finally, some possible existed security deficiencies are revealed, and their impacts on multi-hop relay system are assessed.
{"title":"Analysis and research of security mechanism in IEEE 802.16j","authors":"Xinmin Dai, Xiaoyao Xie","doi":"10.1109/ICASID.2010.5551846","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551846","url":null,"abstract":"With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16J mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solution for the coverage extension and throughput enhancement of IEEE 802.16e network. However, security issues can restrain its development. IEEE standard 802.16J-2009 has been published in 2009. Although a number of advanced security schemes are employed in IEEE 802.16j, it still has a few security flaws. In this paper, the security architecture is described in IEEE 802.16J standard. The security mechanism of IEEE 802.16J under different mode (centralized security control and distributed security control) is discussed. In particular, the new features on security sublayer in IEEE 802.16J are analyzed in detail. Finally, some possible existed security deficiencies are revealed, and their impacts on multi-hop relay system are assessed.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121416663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}