25-27 Oct. 2013
Filter Results
-
Identity authentication scheme of cloud storage for user anonymity via USB token
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (1)An identity authentication scheme specially designed for cloud storage via USB token is presented in this paper. Meanwhile, a secure cloud storage model, in which the excellent features of the proposed scheme are fully displayed, is introduced and detailed cryptanalysis are implemented to illustrate that the scheme is able to achieve all the existing criteria of the USB token-based identity authen... View full abstract»
-
Evaluation of distributed security systems server modules peak workload
Publication Year: 2013, Page(s):1 - 4In this paper we examine distributed security systems with dedicated server modules which perform client modules managing and monitoring. Distributed security systems provide optimal solutions for various problems such as user authentication and system components access control. Workload of distributed access control systems server modules has distinct peak periods because an amount of user authen... View full abstract»
-
Scalable Intrusion Detection System for cellular networks
Publication Year: 2013, Page(s):1 - 8By the end of 2011, the number of the subscribers of the cellular networks has reached 6 billion [1]. The number is expected to reach as many as people population in the whole world by the end of 2013 [2]. Despite this huge number of mobile subscribers served by so many mobile networks, the cellular networks suffer from severe security vulnerabilities and attacks. In this paper we propose applying... View full abstract»
-
Research on the forecast model of security situation for information system based on Internet of things
Publication Year: 2013, Page(s):1 - 5According to analysis of the Internet of things (IOT) Information System, data security forecast and other related technologies, we make studies on the forecast methods of the new information system based on the Internet of things and put forward the fine-grain optimization forecast model-The Forecast Model of Security Situation For Information System based on Internet of Things (SSISFM), in which... View full abstract»
-
Overview on attack graph generation and visualization technology
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (7)Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and v... View full abstract»
-
Study on temperature effects based on measuring power distribution system of PUF
Publication Year: 2013, Page(s):1 - 3Hardware for security mechanisms such as authentication, cryptographic protocols, digital rights management and hardware metering depend heavily on the security of embedded secret keys. In the Power Distribution System (PDS) of an IC and describe how these measurements can be applied to a Physical Unclonable Function (PDF). We introduce active temperature control to the PDF analysis. Adding temper... View full abstract»
-
An error correction coding combined robust video watermarking algorithm for H. 264 standard
Publication Year: 2013, Page(s):1 - 4Based on new characteristics of H. 264/AVC, video compression coding standard, a robust video watermarking algorithm for H. 264 that combined with the error correction coding technology was put forward in the paper. In order to improve the robustness to the attack, the error correction code was applied first on the watermark information, then the Lagrangian optimization coding control model was in... View full abstract»
-
A class of cascaded Bitfilter for generating pseudonoise sequences
Publication Year: 2013, Page(s):1 - 3
Cited by: Papers (1)For generating pseudonoise (PN)-sequences using relatively simple circuits, this paper presents a class of cascaded Bitfilter for generating PN-sequences. The Bitfilter is cascaded with two Bitfilters of different lengths, and the length of the generated PN-sequences is the product of lengths of two m-sequences generated by the two Bitfilters, respectively. The design example is also presented in ... View full abstract»
-
H. 264 video standard based zero watermarking technology
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (1)Combined with the H.264/AVC video encoding standard, a new digital video watermarking technology - zero watermarking technology was proposed in the paper. It breaks traditional idea of digital watermarking technique; the important characteristics of video data were used to construct the watermark information. In this paper we construct zero watermark information based on the characteristics of DCT... View full abstract»
-
Implementation of the Wireless Smart Sensor Network for spatial comfort performance of Hanok residence
Publication Year: 2013, Page(s):1 - 4The purpose of this study is to investigate the adaptability of the Wireless Smart Sensor Network (WSSN) for a more efficient, convenient monitoring system for analyzing spatial comfort performance towards Hanok, a representative type of Korean traditional residential facility. The comfort factor for a residential performance would be able to be easily identified everywhere by the WSSN and Predica... View full abstract»
-
MORIF: A MAC protocol for full-duplex transmissions in wireless star networks
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (1)This paper introduces a MAC protocol MORIF (Modified Response and Immediate Forwarding) for the full-duplex star network, which consists of coordinators and end nodes. The protocol defines the routing, advanced requesting and immediately forwarding mechanisms, which help a lot in solving the existing important problems, such as hidden terminal, congestion and high end-to-end delays. By modeling wi... View full abstract»
-
Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks
Publication Year: 2013, Page(s):1 - 5
Cited by: Papers (4)In this paper, we investigate a low complexity power allocation and relay-jammer selection in a distributed wireless secure networks model with one source, one eavesdropper, one destination and multiple friendly intermediate nodes. A two-phase cooperative jamming scheme is proposed, in which one decode-and-Forward (DF) relay and one or two jammers are selected from the intermediate nodes to enhanc... View full abstract»
-
Design and implementation of SIP B2BUA server
Publication Year: 2013, Page(s):1 - 5
Cited by: Papers (1)The SIP(Session Initiation Protocol) is the core control protocol of the Next Generation Networks(NGN), which is used for initiating, modifying and tearing down multimedia sessions on IP data network. Because the SIP server is the core facility of NGN, its realization is especially important. One way to realize the SIP server is the proxy server, which mainly provides routing service. Namely, it e... View full abstract»
-
Design and implementation QoS system based on OpenFlow
Publication Year: 2013, Page(s):1 - 5
Cited by: Papers (1)In this paper, we design an architecture to implement a QoS system based on OpenFlow. The system can filter malicious packets that have no permission to gain quality of service, and can guarantee scheduling the fastest path for QoS packets in working network. By predicting and estimating current network flows, we implement to assign optimal path for QoS flow without affecting the rest of the norma... View full abstract»
-
Optimization study of the contention window in 802.11 DCF
Publication Year: 2013, Page(s):1 - 5This paper first introduces the basic principle of IEEE 802.11 DCF and analyses the effect of the two system parameters, network size and minimize contention window, on the performance in terms of saturation throughput and probability of collisions. To overcome the shortcomings of the original 802.11DCF, the influence of the contention window's size was analyzed. 802.11DCF-SD (Success Decrease) me... View full abstract»
-
A dynamic and mixed routing algorithm for 2D mesh NoC
Publication Year: 2013, Page(s):1 - 4To solve the congestion of NoC caused by overload such as injection rate increase, this paper proposes a novel routing algorithm, that is Dynamic and Mixed Routing(MIXROUT) which is based on XY Routing(XY) and Multiple and Load-Balance Path Routing(MULTI). Although MULTI is an adaptive routing that can relieve traffic congestion state, it has a higher operating power and temperature than other rou... View full abstract»
-
A novel intercell interference coordination algorithm based on X2 interface for LTE system
Publication Year: 2013, Page(s):1 - 4Long Term Evolution (LTE) is treated as a mainstream wireless communication technology from the 3G to 4G. The Orthogonal Frequency Division Multiple Access (OFDMA) is introduced to solve the innercell interference in the downlink of LTE. However the intercell interference especially for the edge users is still remain unsolved. In this paper, we propose a novel and general interference coordination... View full abstract»
-
An effective list scheduling algorithm for homogeneous multi-core processor
Publication Year: 2013, Page(s):1 - 5
Cited by: Papers (1)With increasing of the number of processors, the quantity of data and the communication traffic in multi-core parallel systems, data scheduling becomes an important factor to restrict the performance improvement. Based on the classic list scheduling-HEFT algorithm, an improved algorithm has been proposed in this paper to make better result of reordering the same priority level tasks. The presented... View full abstract»
-
Study on cooperative communication in energy constrained networks
Publication Year: 2013, Page(s):1 - 5Diversity gain can be achieved when cooperative transmission adopted in the wireless networks, which can provide much help to weak channel communication. Much has been done on the cooperative protocol and the performance analysis. In this paper, a new cooperative schedule is proposed. In which we have discussed three issues: when cooperative transmission should be adopted, how to choose the relay ... View full abstract»
-
The design of a low-voltage CSDAC current source array
Publication Year: 2013, Page(s):1 - 5To satisfy the requirement of the modern communication system and the mixed signal field, a kind of current source array is designed which applies to 12 bit, 1.2V and 400MSPS DAC in this paper. According to the design of the parameters of current source tubes which is based on the research of current source mismatch, this paper focuses on improving the current source output impedance technology an... View full abstract»
-
A study on optimized layout transformation algorithm
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (1)In the prediction and improvement of integrated circuit yield, converting the optimized layout image to a standard format is necessary. This paper presents a new algorithm to recognize maximal rectangles based on single net structure. In an optimized layout image, we get all candidates through scanning the border. According the correspondence between candidates and maximal rectangles, we identify ... View full abstract»
-
The first stage design of a SHA-less 12-bit 200-Ms/s pipeline ADC in 130-nm CMOS
Publication Year: 2013, Page(s):1 - 5
Cited by: Papers (1)A first stage of a SHA-less 12-bit 200 MSps pipeline analog-to-digital converter (ADC) is designed in this paper. A high speed and high precision comparator is designed in order to reduce the transmission delay of the comparator. RC network of the multiplying digital-to-analog converter (MDAC) and Sub-ADC should be strict matched in order to reduce the sampling errors between the two path. The pro... View full abstract»
-
Side-poly technique for enhanced breakdown voltage of Trench-NPT-IGBT
Publication Year: 2013, Page(s):1 - 4In this paper, a brand-new Side-poly electrode is introduced to improve the peak electric field of the conventional Trench-NPT-IGBT. By providing an additional electric field opposite to the original one, the proposed structure is able to counteract the electric field concentration under the bottom of the trench, and therefore increases the breakdown voltage and reduces the threshold voltage at th... View full abstract»
-
A high precision CMOS band-gap reference with exponential curvature-compensation
Publication Year: 2013, Page(s):1 - 5
Cited by: Papers (1)An exponential curvature compensation technique for the high precision band-gap reference (BGR) is presented in this paper, in order to reduce the temperature coefficient (TC) of the traditional band-gap reference, the circuit exploits the temperature characteristics of the current gain ß of BJTs, and generates the current which has non-linear relationship with the temperature to compensate for th... View full abstract»
-
A design of charge pump phase locked loop for DAC
Publication Year: 2013, Page(s):1 - 5Low jitter charge pump phase locked loop (CPPLL) is designed for 12 bit digital to analog converter (DAC) in this paper. It's reference frequency is from 3M to 100M. The design uses the model of SMIC 0.13um mixed-signal process, its power supply is 1.2V, the simulating tools are cadence's Spectre and Hspice. This paper mainly includes circuit design of Phase Frequency Detector (PFD), Charge Pump (... View full abstract»