首页 > 最新文献

2010 International Conference on Anti-Counterfeiting, Security and Identification最新文献

英文 中文
High-speed comparator used for high-speed, high-resolution A/D converter 高速比较器用于高速、高分辨率A/D转换器
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551835
Xingfa Huang, L. Li, Z. Zhang, Liang Chen, Jinshan Yu
Based on the application of high-speed, high-resolution A/D converter, this paper describes the design and implementation of a novel high-speed comparator. The comparator uses the high-speed, transmission delay stability technology, the auto-zero technology, and the cascade technology in order for the comparator to have the high-speed, high-resolution, transmission delay stability features. Its performances are verified by a 14-bit 125MSPS pipelined A/D converter which is developed in 0.35um CMOS-based process technology. The SFDR of the A/D converter is up to 87 dB at an input clock of 125MHz with an input signal of 10MHz.
基于高速、高分辨率A/D转换器的应用,本文介绍了一种新型高速比较器的设计与实现。比较器采用高速、传输延时稳定技术、自动归零技术、级联技术,使比较器具有高速、高分辨率、传输延时稳定的特点。采用基于0.35um cmos工艺技术开发的14位125MSPS流水线a /D转换器验证了其性能。在输入时钟为125MHz,输入信号为10MHz时,A/D转换器的SFDR高达87 dB。
{"title":"High-speed comparator used for high-speed, high-resolution A/D converter","authors":"Xingfa Huang, L. Li, Z. Zhang, Liang Chen, Jinshan Yu","doi":"10.1109/ICASID.2010.5551835","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551835","url":null,"abstract":"Based on the application of high-speed, high-resolution A/D converter, this paper describes the design and implementation of a novel high-speed comparator. The comparator uses the high-speed, transmission delay stability technology, the auto-zero technology, and the cascade technology in order for the comparator to have the high-speed, high-resolution, transmission delay stability features. Its performances are verified by a 14-bit 125MSPS pipelined A/D converter which is developed in 0.35um CMOS-based process technology. The SFDR of the A/D converter is up to 87 dB at an input clock of 125MHz with an input signal of 10MHz.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wireless distributed network key-agreement protocol based on discrete logarithm 基于离散对数的无线分布式网络密钥协议
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551482
Lianfeng Huang, Yuexin Weng, Runfii Zhang
Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.
由于无线分布式网络设备的处理能力有限,大多数设备都采用对称加密算法对数据进行加密,两者的通信都需要共享密钥,并且在业务中需要定期更换密钥。但密钥协议过程容易受到窃听攻击、修改攻击、中间人攻击等攻击。提出了一种基于离散对数问题的无线分布式网络密钥协商协议。用于防止上述攻击。
{"title":"Wireless distributed network key-agreement protocol based on discrete logarithm","authors":"Lianfeng Huang, Yuexin Weng, Runfii Zhang","doi":"10.1109/ICASID.2010.5551482","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551482","url":null,"abstract":"Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compaction uniformity and environmental adaptability of printed RFID antenna 印刷RFID天线的压实均匀性和环境适应性
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551339
Yuanming Chen, Wei‐dong He, Guoyun Zhou, Xuemei He, Hua Zhou, Y. Mo, B. He
The manufacture of RFID antenna tags (RFIDs) using silk-screen printing technology with conductive silver paste is one of economic methods to reduce the cost of RFIDs. The distance between conductive particles is minified via hot compaction to conductive silver paste, resulting in lower resistance and higher Q value. The compaction conditions, including temperature, pressure and time, were systematically studied based on the analysis method of uniform design, with regression equation by nonlinear regression analysis fitted by Minitab Statistical Analysis Software. The effect of environmental factors to resistance of RFID antenna was also studied through the high and low temperature impact test and the constant temperature and humidity test. The results indicate that resistance of RFID antenna printed with conductive silver paste can be reduced more than 50%, the resistance variation of RFID antenna can be predicted by regression equation with correlation coefficient 99.8% in certain range and antenna printed with conductive silver paste have good environmental adaptability.
采用导电银浆丝印技术制造RFID天线标签是降低RFID成本的经济方法之一。通过热压实使导电颗粒之间的距离缩小到导电银浆,从而降低电阻,提高Q值。采用均匀设计分析方法,系统研究了压实条件(温度、压力、时间),采用Minitab统计分析软件进行非线性回归分析,拟合回归方程。通过高低温冲击试验和恒温恒湿试验,研究了环境因素对RFID天线电阻的影响。结果表明,导电银浆印刷的RFID天线电阻可降低50%以上,在一定范围内相关系数可达99.8%的回归方程可预测RFID天线的电阻变化,且导电银浆印刷的天线具有良好的环境适应性。
{"title":"Compaction uniformity and environmental adaptability of printed RFID antenna","authors":"Yuanming Chen, Wei‐dong He, Guoyun Zhou, Xuemei He, Hua Zhou, Y. Mo, B. He","doi":"10.1109/ICASID.2010.5551339","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551339","url":null,"abstract":"The manufacture of RFID antenna tags (RFIDs) using silk-screen printing technology with conductive silver paste is one of economic methods to reduce the cost of RFIDs. The distance between conductive particles is minified via hot compaction to conductive silver paste, resulting in lower resistance and higher Q value. The compaction conditions, including temperature, pressure and time, were systematically studied based on the analysis method of uniform design, with regression equation by nonlinear regression analysis fitted by Minitab Statistical Analysis Software. The effect of environmental factors to resistance of RFID antenna was also studied through the high and low temperature impact test and the constant temperature and humidity test. The results indicate that resistance of RFID antenna printed with conductive silver paste can be reduced more than 50%, the resistance variation of RFID antenna can be predicted by regression equation with correlation coefficient 99.8% in certain range and antenna printed with conductive silver paste have good environmental adaptability.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modulization approach & application of OSGi -based RFID middleware persistence Layer 基于OSGi的RFID中间件持久层的模块化方法及应用
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551343
Fagui Liu, Pingan Yang, Wei Shen, Yue-Dong Lin, Yang Zhang
The enterprise-class RFID Middleware demands the flexibility to switch its data access strategies on the persistence layer; however, the traditional frameworks of persistence layer such as Hibernate, iBatis, etc. are seldom of dynamic switching characteristic which makes them incapable to cater for the enterprise-class RFID Middleware on its persistence layer. This paper begins with the analysis of the traditional data access strategies of persistence layer. With the foundation of in-depth studying OSGi, Spring and current mainstream frameworks of persistence layer, it points out a feasible method to implement dynamic switching by CBSD. Hence, the SpringDM-based modularization of Hibernate, an open source persistence layer framework, is firstly proposed. With further insight and development, a dynamic model based on SpringDM is put forward which achieves the flexibility to switch the data access strategies effortlessly at will. It could also be regarded as the general form of deploying the J2EE persistence frameworks to OSGi to provide support for the OSGi-ized multi-frameworks and realize the applications of RFID Middleware's persistence layer.
企业级RFID中间件要求在持久层灵活地切换其数据访问策略;然而,传统的持久层框架(如Hibernate、iBatis等)很少具有动态切换特性,这使得它们无法在其持久层上满足企业级RFID中间件的需求。本文首先分析了持久层的传统数据访问策略。在深入研究OSGi、Spring和当前主流持久层框架的基础上,提出了一种可行的CBSD实现动态切换的方法。因此,首先提出了基于springdm的Hibernate模块化,这是一个开源的持久化层框架。经过深入的研究和开发,提出了一种基于SpringDM的动态模型,实现了数据访问策略的灵活切换。它也可以看作是将J2EE持久化框架部署到OSGi的通用形式,为OSGi化的多框架提供支持,实现RFID中间件持久化层的应用。
{"title":"Modulization approach & application of OSGi -based RFID middleware persistence Layer","authors":"Fagui Liu, Pingan Yang, Wei Shen, Yue-Dong Lin, Yang Zhang","doi":"10.1109/ICASID.2010.5551343","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551343","url":null,"abstract":"The enterprise-class RFID Middleware demands the flexibility to switch its data access strategies on the persistence layer; however, the traditional frameworks of persistence layer such as Hibernate, iBatis, etc. are seldom of dynamic switching characteristic which makes them incapable to cater for the enterprise-class RFID Middleware on its persistence layer. This paper begins with the analysis of the traditional data access strategies of persistence layer. With the foundation of in-depth studying OSGi, Spring and current mainstream frameworks of persistence layer, it points out a feasible method to implement dynamic switching by CBSD. Hence, the SpringDM-based modularization of Hibernate, an open source persistence layer framework, is firstly proposed. With further insight and development, a dynamic model based on SpringDM is put forward which achieves the flexibility to switch the data access strategies effortlessly at will. It could also be regarded as the general form of deploying the J2EE persistence frameworks to OSGi to provide support for the OSGi-ized multi-frameworks and realize the applications of RFID Middleware's persistence layer.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performce analysis of QSTBC systems based on transmit antenna selection in correlation channel 基于相关信道发射天线选择的QSTBC系统性能分析
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551357
Qiang Chen, Mingjie Zhuang
In this paper, we derive an expression of the instantaneous signal-to noise ratio (SNR) for 4 transmit antennas and 2 receive antennas quasi-orthogonal space-time block codes (QSTBC) system with Jafarkhani code, which as a criteria of antenna selection in spatial correlated Rayleigh fading channels. Under the condition of the correlation matrix is known, both capacity performance and bit error performance on the QSTBC systems with antenna selection are investigated. Computer simulations results show that channel correlation can degrade the performance of QSTBC communications system. Namely, channel correlation can increase system BER and reduce the capacity of the system.
本文推导了具有Jafarkhani码的4个发射天线和2个接收天线的准正交空时分组码(QSTBC)系统的瞬时信噪比表达式,并将其作为空间相关瑞利衰落信道中天线选择的准则。在相关矩阵已知的情况下,研究了带天线选择的QSTBC系统的容量性能和误码性能。计算机仿真结果表明,信道相关会降低QSTBC通信系统的性能。即信道相关会增加系统的误码率,降低系统的容量。
{"title":"Performce analysis of QSTBC systems based on transmit antenna selection in correlation channel","authors":"Qiang Chen, Mingjie Zhuang","doi":"10.1109/ICASID.2010.5551357","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551357","url":null,"abstract":"In this paper, we derive an expression of the instantaneous signal-to noise ratio (SNR) for 4 transmit antennas and 2 receive antennas quasi-orthogonal space-time block codes (QSTBC) system with Jafarkhani code, which as a criteria of antenna selection in spatial correlated Rayleigh fading channels. Under the condition of the correlation matrix is known, both capacity performance and bit error performance on the QSTBC systems with antenna selection are investigated. Computer simulations results show that channel correlation can degrade the performance of QSTBC communications system. Namely, channel correlation can increase system BER and reduce the capacity of the system.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The information reconstruction system of VDR & AIS data fusion VDR与AIS数据融合的信息重构系统
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551504
Z. Ren, Jia-ning Huang
This article studies the information reconstruction of VDR and AIS data fusion, and performs analysis on the information recorded by VDR and broadcast by AIS, as well as the structure, technology, and system function of voyage data record reconstruction system based on AIS information fusion.
本文研究了VDR和AIS数据融合的信息重建,分析了VDR记录的信息和AIS广播的信息,以及基于AIS信息融合的航次数据记录重建系统的结构、技术和系统功能。
{"title":"The information reconstruction system of VDR & AIS data fusion","authors":"Z. Ren, Jia-ning Huang","doi":"10.1109/ICASID.2010.5551504","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551504","url":null,"abstract":"This article studies the information reconstruction of VDR and AIS data fusion, and performs analysis on the information recorded by VDR and broadcast by AIS, as well as the structure, technology, and system function of voyage data record reconstruction system based on AIS information fusion.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling of brownian-bridge-based analysis of the segmental D/A converters yield 分段数模转换器成品率的布朗桥分析建模
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551829
Wenyuan Ling, Chaodong Li Guogang
According to the stochastic process of Brownian bridge theory, a DAC model of INL and segment ratio is presented based on the INL probability density for segmental current-steering DAC. The approximate formula for influence of chip yield in the current mismatch is obtained and the model is carried out by Monte Carlo simulation method. It is demonstrated that DAC yield is lower compared using thermometer-code to using binary-code in the low-bits. When transform bits N<12, the greater binary-code(>[N/2]), the higher yield. Binary-code bits is not suitable for large when N≥12.
根据布朗桥理论的随机过程,提出了一种分段电流转向DAC的基于INL概率密度的INL和分段比的DAC模型。得到了电流失配对芯片良率影响的近似公式,并用蒙特卡罗模拟方法建立了模型。结果表明,与在低位使用二进制码相比,使用温度计码的DAC产率更低。当变换位为N[N/2])时,良率更高。当N≥12时,二进制码位不适合大。
{"title":"Modeling of brownian-bridge-based analysis of the segmental D/A converters yield","authors":"Wenyuan Ling, Chaodong Li Guogang","doi":"10.1109/ICASID.2010.5551829","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551829","url":null,"abstract":"According to the stochastic process of Brownian bridge theory, a DAC model of INL and segment ratio is presented based on the INL probability density for segmental current-steering DAC. The approximate formula for influence of chip yield in the current mismatch is obtained and the model is carried out by Monte Carlo simulation method. It is demonstrated that DAC yield is lower compared using thermometer-code to using binary-code in the low-bits. When transform bits N<12, the greater binary-code(>[N/2]), the higher yield. Binary-code bits is not suitable for large when N≥12.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116851729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The improved algorithm for the defect of the Retinex image enhancement 针对视网膜图像增强缺陷的改进算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551401
Hongqing Hu, Guoqiang Ni
Traditional image enhancement algorithm based on the Retinex theory has some limitations due to its hypothesis that the incident light is changing smoothly. In addition, the algorithm introduces color distortion and appears a halo phenomenon during the strong contrast between the light and dark when it is processing the three components of the incident light. Logarithm is used to deal with dynamic compression to reduce the contrast of the image. Considered these limitations, this article summarizes several current improved algorithms. All the algorithms mentioned in the article have a very good performance in the color constancy, contrast, and the computational cost.
传统的基于Retinex理论的图像增强算法假设入射光是平滑变化的,存在一定的局限性。此外,该算法在对入射光的三个分量进行处理时,引入了色彩失真,在明暗强烈对比时出现了光晕现象。采用对数处理动态压缩,降低图像的对比度。考虑到这些限制,本文总结了几种当前改进的算法。文中提到的所有算法在色彩一致性、对比度和计算成本方面都有很好的表现。
{"title":"The improved algorithm for the defect of the Retinex image enhancement","authors":"Hongqing Hu, Guoqiang Ni","doi":"10.1109/ICASID.2010.5551401","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551401","url":null,"abstract":"Traditional image enhancement algorithm based on the Retinex theory has some limitations due to its hypothesis that the incident light is changing smoothly. In addition, the algorithm introduces color distortion and appears a halo phenomenon during the strong contrast between the light and dark when it is processing the three components of the incident light. Logarithm is used to deal with dynamic compression to reduce the contrast of the image. Considered these limitations, this article summarizes several current improved algorithms. All the algorithms mentioned in the article have a very good performance in the color constancy, contrast, and the computational cost.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125994398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of elder alarm system based on body posture reorganization 基于人体姿态重组的老年人报警系统设计
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551486
Gui Feng, Qiwei Lin
A monitoring alarm system for the elder was designed in this paper. We use a series of continuous human posture detecting to determine whether the elder is in a normal condition, otherwise to give an alarm to ambulance center. The system is mainly used to help elder person to give an alarm when he or her is in suddenness or fall ill unexpectedly at home alone. In this paper we use background difference algorithm to achieve the motion area extraction, and then determine whether the motion area is a person, if it is a person, then there is a need for posture recognition. As for posture, we use support vector machines to classification and recognition. Finally, according to a series of posture, we determine the status of the elderly.
本文设计了一种老年人监控报警系统。我们使用一系列连续的人体姿势检测来判断老人是否处于正常状态,否则向救护中心报警。该系统主要用于帮助老人在家中发生突发情况或意外生病时进行报警。本文使用背景差分算法来实现运动区域的提取,然后判断运动区域是否为人,如果是人,那么就需要进行姿态识别。对于姿态,我们使用支持向量机进行分类和识别。最后,根据一系列的姿势,我们确定老年人的状态。
{"title":"Design of elder alarm system based on body posture reorganization","authors":"Gui Feng, Qiwei Lin","doi":"10.1109/ICASID.2010.5551486","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551486","url":null,"abstract":"A monitoring alarm system for the elder was designed in this paper. We use a series of continuous human posture detecting to determine whether the elder is in a normal condition, otherwise to give an alarm to ambulance center. The system is mainly used to help elder person to give an alarm when he or her is in suddenness or fall ill unexpectedly at home alone. In this paper we use background difference algorithm to achieve the motion area extraction, and then determine whether the motion area is a person, if it is a person, then there is a need for posture recognition. As for posture, we use support vector machines to classification and recognition. Finally, according to a series of posture, we determine the status of the elderly.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115282585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis and research of security mechanism in IEEE 802.16j IEEE 802.16j安全机制的分析与研究
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551846
Xinmin Dai, Xiaoyao Xie
With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16J mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solution for the coverage extension and throughput enhancement of IEEE 802.16e network. However, security issues can restrain its development. IEEE standard 802.16J-2009 has been published in 2009. Although a number of advanced security schemes are employed in IEEE 802.16j, it still has a few security flaws. In this paper, the security architecture is described in IEEE 802.16J standard. The security mechanism of IEEE 802.16J under different mode (centralized security control and distributed security control) is discussed. In particular, the new features on security sublayer in IEEE 802.16J are analyzed in detail. Finally, some possible existed security deficiencies are revealed, and their impacts on multi-hop relay system are assessed.
随着无线技术的发展,无线网络市场蓬勃发展。ieee802.16 j移动多跳中继(MMR)网络为ieee802.16 e网络的覆盖扩展和吞吐量增强提供了一个有吸引力的解决方案,因此很有可能获得巨大的市场成功。然而,安全问题制约了其发展。IEEE 802.16J-2009标准已于2009年发布。尽管IEEE 802.16j采用了许多先进的安全方案,但它仍然存在一些安全缺陷。本文在IEEE 802.16J标准中描述了安全体系结构。讨论了IEEE 802.16J在不同模式下(集中式安全控制和分布式安全控制)的安全机制。详细分析了IEEE 802.16J标准在安全子层方面的新特性。最后指出了可能存在的安全缺陷,并对其对多跳中继系统的影响进行了评估。
{"title":"Analysis and research of security mechanism in IEEE 802.16j","authors":"Xinmin Dai, Xiaoyao Xie","doi":"10.1109/ICASID.2010.5551846","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551846","url":null,"abstract":"With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16J mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solution for the coverage extension and throughput enhancement of IEEE 802.16e network. However, security issues can restrain its development. IEEE standard 802.16J-2009 has been published in 2009. Although a number of advanced security schemes are employed in IEEE 802.16j, it still has a few security flaws. In this paper, the security architecture is described in IEEE 802.16J standard. The security mechanism of IEEE 802.16J under different mode (centralized security control and distributed security control) is discussed. In particular, the new features on security sublayer in IEEE 802.16J are analyzed in detail. Finally, some possible existed security deficiencies are revealed, and their impacts on multi-hop relay system are assessed.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121416663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 International Conference on Anti-Counterfeiting, Security and Identification
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1