Aiming at the specific protocol of RFID technology,a 915MHz CMOS transmitter front-end for OOK modulation is implemented in a 0.18μm CMOS process. The transmitter incorporates a class-E power amplifier (PA), a modu...Aiming at the specific protocol of RFID technology,a 915MHz CMOS transmitter front-end for OOK modulation is implemented in a 0.18μm CMOS process. The transmitter incorporates a class-E power amplifier (PA), a modulator, and a control logic unit. The direct-conversion architecture minimizes the required on-and-off-chip components and provides a low-cost and efficient solution. A novel structure is proposed to provide the modulation depth of 100% and 18% ,respectively. The PA presents an output ldB power of 17.6dBm while maintaining a maximum PAE of 35.4%.展开更多
An alternative method was introduced for voltage sag source location based on S and TT transformed disturbance powers. It is done to avoid the wrong and inconclusive detection of conventional disturbance power method ...An alternative method was introduced for voltage sag source location based on S and TT transformed disturbance powers. It is done to avoid the wrong and inconclusive detection of conventional disturbance power method proposed in the literature. Unlike in the case of the traditional method, the proposed method first transforms the recorded voltage and current during the sag event to some special features before calculating the new version of disturbance powers. The effectiveness of the proposed method has been verified through simulation and actual data from an industrial power system. The results show that the presented method can correctly detect the location of voltage sag source.展开更多
A new method based on phase-shift and N-1 Support Vector Machines(SVMs)is presented for power quality(PQ)disturbance detection and identification.Through phase-shift and simple algebra operation,the method detects out...A new method based on phase-shift and N-1 Support Vector Machines(SVMs)is presented for power quality(PQ)disturbance detection and identification.Through phase-shift and simple algebra operation,the method detects out the PQ disturbances easily and effectively.Then a data dealing process is carried out to extract features from the detecting outputs.Then SVM theory is introduced into the identification of PQ disturbances.N kinds of PQ disturbances are classified with an N-1 SVMs classifier.The testing results show that the proposed method can detect and classify the PQ disturbances successfully.Moreover,the classifier has a good performance on training speed and correct ratio.展开更多
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif...Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.展开更多
The paper proposes a low power non-volatile baseband processor with wake-up identification(WUI) receiver for LR-WPAN transceiver.It consists of WUI receiver,main receiver,transmitter,non-volatile memory(NVM) and power...The paper proposes a low power non-volatile baseband processor with wake-up identification(WUI) receiver for LR-WPAN transceiver.It consists of WUI receiver,main receiver,transmitter,non-volatile memory(NVM) and power management module.The main receiver adopts a unified simplified synchronization method and channel codec with proactive Reed-Solomon Bypass technique,which increases the robustness and energy efficiency of receiver.The WUI receiver specifies the communication node and wakes up the transceiver to reduce average power consumption of the transceiver.The embedded NVM can backup/restore the states information of processor that avoids the loss of the state information caused by power failure and reduces the unnecessary power of repetitive computation when the processor is waked up from power down mode.The baseband processor is designed and verified on a FPGA board.The simulated power consumption of processor is 5.1uW for transmitting and 28.2μW for receiving.The WUI receiver technique reduces the average power consumption of transceiver remarkably.If the transceiver operates 30 seconds in every 15 minutes,the average power consumption of the transceiver can be reduced by two orders of magnitude.The NVM avoids the loss of the state information caused by power failure and energy waste caused by repetitive computation.展开更多
Instead of merely inferring that our beliefs are in a correlation to the facts, I will contend that what matters is the logic of their inferential structure. This will reveal what is actually true for their relation a...Instead of merely inferring that our beliefs are in a correlation to the facts, I will contend that what matters is the logic of their inferential structure. This will reveal what is actually true for their relation and not just real for experience. Given one and two-sided inferences, the conditions of their functional relation will be consistent within a square of opposition; for contraries, contradictions and sub-contraries in a way that probability theory is not. Within this model of inferences, the two-sided concept of inferences will also have a modal value for its relation to the one-sided concept of inferences. Proposing that empirical, formal, speculative, and an Intuitionist Speculative understanding of logic will have a modal identity within a dialectical principle.展开更多
文摘Aiming at the specific protocol of RFID technology,a 915MHz CMOS transmitter front-end for OOK modulation is implemented in a 0.18μm CMOS process. The transmitter incorporates a class-E power amplifier (PA), a modulator, and a control logic unit. The direct-conversion architecture minimizes the required on-and-off-chip components and provides a low-cost and efficient solution. A novel structure is proposed to provide the modulation depth of 100% and 18% ,respectively. The PA presents an output ldB power of 17.6dBm while maintaining a maximum PAE of 35.4%.
基金the financial support from the Universiti Kebangsaan Malaysia under the research grant UKM-DLP-2011-059
文摘An alternative method was introduced for voltage sag source location based on S and TT transformed disturbance powers. It is done to avoid the wrong and inconclusive detection of conventional disturbance power method proposed in the literature. Unlike in the case of the traditional method, the proposed method first transforms the recorded voltage and current during the sag event to some special features before calculating the new version of disturbance powers. The effectiveness of the proposed method has been verified through simulation and actual data from an industrial power system. The results show that the presented method can correctly detect the location of voltage sag source.
文摘A new method based on phase-shift and N-1 Support Vector Machines(SVMs)is presented for power quality(PQ)disturbance detection and identification.Through phase-shift and simple algebra operation,the method detects out the PQ disturbances easily and effectively.Then a data dealing process is carried out to extract features from the detecting outputs.Then SVM theory is introduced into the identification of PQ disturbances.N kinds of PQ disturbances are classified with an N-1 SVMs classifier.The testing results show that the proposed method can detect and classify the PQ disturbances successfully.Moreover,the classifier has a good performance on training speed and correct ratio.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60873216Scientific and Technological Research Priority Projects of Sichuan Province under Grant No. 2012GZ0017Basic Research of Application Fund Project of Sichuan Province under Grant No. 2011JY0100
文摘Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.
基金supported in part by the National Natural Science Foundation of China(No.61306027)
文摘The paper proposes a low power non-volatile baseband processor with wake-up identification(WUI) receiver for LR-WPAN transceiver.It consists of WUI receiver,main receiver,transmitter,non-volatile memory(NVM) and power management module.The main receiver adopts a unified simplified synchronization method and channel codec with proactive Reed-Solomon Bypass technique,which increases the robustness and energy efficiency of receiver.The WUI receiver specifies the communication node and wakes up the transceiver to reduce average power consumption of the transceiver.The embedded NVM can backup/restore the states information of processor that avoids the loss of the state information caused by power failure and reduces the unnecessary power of repetitive computation when the processor is waked up from power down mode.The baseband processor is designed and verified on a FPGA board.The simulated power consumption of processor is 5.1uW for transmitting and 28.2μW for receiving.The WUI receiver technique reduces the average power consumption of transceiver remarkably.If the transceiver operates 30 seconds in every 15 minutes,the average power consumption of the transceiver can be reduced by two orders of magnitude.The NVM avoids the loss of the state information caused by power failure and energy waste caused by repetitive computation.
文摘Instead of merely inferring that our beliefs are in a correlation to the facts, I will contend that what matters is the logic of their inferential structure. This will reveal what is actually true for their relation and not just real for experience. Given one and two-sided inferences, the conditions of their functional relation will be consistent within a square of opposition; for contraries, contradictions and sub-contraries in a way that probability theory is not. Within this model of inferences, the two-sided concept of inferences will also have a modal value for its relation to the one-sided concept of inferences. Proposing that empirical, formal, speculative, and an Intuitionist Speculative understanding of logic will have a modal identity within a dialectical principle.