首页 > 最新文献

2011 IEEE International Conference on Computer Science and Automation Engineering最新文献

英文 中文
An exact bound on regular Loop subdivision surface 正则环细分曲面上的精确界
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952499
Guorong Zhou, Yuhua Zhang, Mingming Shan, Youzhi Wang, Yaohan Zhang, Xiao-Ming Zeng
We propose an algorithm of region division and computations for the basis functions of regular Loop subdivision surface. By means of this algorithm we obtain an exact bound between regular Loop subdivision surface patch and its control mesh. The bound is given by maximum Euclidean norm of the first differences of the control vertices of the surface patch.
提出了一种区域划分算法,并对规则环细分曲面的基函数进行了计算。通过该算法,我们得到了规则环路细分曲面块与其控制网格之间的精确边界。该边界由控制顶点的一阶差的最大欧几里德范数给出。
{"title":"An exact bound on regular Loop subdivision surface","authors":"Guorong Zhou, Yuhua Zhang, Mingming Shan, Youzhi Wang, Yaohan Zhang, Xiao-Ming Zeng","doi":"10.1109/CSAE.2011.5952499","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952499","url":null,"abstract":"We propose an algorithm of region division and computations for the basis functions of regular Loop subdivision surface. By means of this algorithm we obtain an exact bound between regular Loop subdivision surface patch and its control mesh. The bound is given by maximum Euclidean norm of the first differences of the control vertices of the surface patch.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preprocessing for solid reconstruction from engineering drawing 工程图实体重构的预处理
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952795
Shao-Ping Jiang, Zi-Gang Fu
This paper proposed a new preprocessing method for the reconstruction of three dimensional shapes from a practical engineering drawing which clarify the entities in the drawing and construct an efficient data structure to express the topology relationships among endpoints and edges. For dealing with non standard three-view drawing, a new composite-three-view representation is proposed to organize the auxiliary views, which extends the scope of engineering drawing can be handled.
本文提出了一种从实际工程图中重建三维形状的预处理方法,该方法明确了图中的实体,构建了一种有效的数据结构来表达端点和边缘之间的拓扑关系。针对非标准三视图图的处理,提出了一种新的复合三视图表示法来组织辅助视图,扩大了工程图的处理范围。
{"title":"Preprocessing for solid reconstruction from engineering drawing","authors":"Shao-Ping Jiang, Zi-Gang Fu","doi":"10.1109/CSAE.2011.5952795","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952795","url":null,"abstract":"This paper proposed a new preprocessing method for the reconstruction of three dimensional shapes from a practical engineering drawing which clarify the entities in the drawing and construct an efficient data structure to express the topology relationships among endpoints and edges. For dealing with non standard three-view drawing, a new composite-three-view representation is proposed to organize the auxiliary views, which extends the scope of engineering drawing can be handled.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127961332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A priority queue-based hierarchical photo clustering method using photo timestamps 使用照片时间戳的基于优先级队列的分层照片聚类方法
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952654
Dong-Sung Ryu, Sun-young Park, Kwanghwi Kim, Hwan-Gue Cho
Widespread distribution of digital cameras and the low price of memory are acclimating people to taking many more photos than before. As the number of photos to be managed grows, photo management tasks become more and more burdensome. One of the most time-consuming aspects of photo management is photo classification. A person must make many folders, group photos, and label grouped photos. In order to assist in this task, we proposed a priority queue-based hierarchical photo clustering method that partitions ordered photos by their temporal context. The temporal context we considered is the variance of time gaps between photos taken in a window (its size is user-designated). A recursive partitioning called by a priority queue enables classified photo groups with maximum variance to be selected primarily. In an experiment, we compared our system with Cooper's temporal clustering method in terms of precision and recall. Our method is superior when the photo timestamp difference has a uniform pattern. For further work, we propose a visualization method for the clustered photos.
数码相机的广泛普及和低价格的内存使人们习惯于拍摄比以前更多的照片。随着需要管理的照片数量的增加,照片管理任务变得越来越繁重。照片管理中最耗时的一个方面是照片分类。一个人必须制作许多文件夹,将照片分组,并给分组的照片贴上标签。为了帮助完成这一任务,我们提出了一种基于优先级队列的分层照片聚类方法,该方法根据照片的时间上下文对有序照片进行分区。我们考虑的时间上下文是在窗口中拍摄的照片之间的时间间隔的方差(其大小是用户指定的)。由优先级队列调用的递归分区允许优先选择方差最大的分类照片组。在实验中,我们将我们的系统与Cooper的时间聚类方法在准确率和召回率方面进行了比较。当照片时间戳差异具有统一的模式时,我们的方法是优越的。为了进一步的工作,我们提出了一种聚类照片的可视化方法。
{"title":"A priority queue-based hierarchical photo clustering method using photo timestamps","authors":"Dong-Sung Ryu, Sun-young Park, Kwanghwi Kim, Hwan-Gue Cho","doi":"10.1109/CSAE.2011.5952654","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952654","url":null,"abstract":"Widespread distribution of digital cameras and the low price of memory are acclimating people to taking many more photos than before. As the number of photos to be managed grows, photo management tasks become more and more burdensome. One of the most time-consuming aspects of photo management is photo classification. A person must make many folders, group photos, and label grouped photos. In order to assist in this task, we proposed a priority queue-based hierarchical photo clustering method that partitions ordered photos by their temporal context. The temporal context we considered is the variance of time gaps between photos taken in a window (its size is user-designated). A recursive partitioning called by a priority queue enables classified photo groups with maximum variance to be selected primarily. In an experiment, we compared our system with Cooper's temporal clustering method in terms of precision and recall. Our method is superior when the photo timestamp difference has a uniform pattern. For further work, we propose a visualization method for the clustered photos.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115821574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel index structure R*Q-tree based on lazy splitting and clustering 一种新的基于延迟分割和聚类的索引结构R* q树
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952707
Pan Jin, Q. Song
The original R*Q-tree is the most popular query index of special database, but it is not suitable for the situation of frequent insertion and deletion, because its' construction cost is much more than the other query methods. Therefore, the novel R*Q-tree splitting technology has been proposed as for improving the shortcomings of the original R*Q-tree. When the novel R*Q-tree has objects inserted into it the nodes may overflow. During this, rather than split the node immediately, it attempts to insert nodes in the adjacent neighboring nodes until they were full. Then it uses clustering technology to split the nodes, data items were reorganized the nodes between in the neighboring nodes and spitted nodes. The novel R*Q-tree ensuring the premise of query performance greatly reduced the cost of structure and significantly improve the space utilization of the index structure. Finally, the analysis and experiments show that the efficiency of the novel R*Q-tree is improved. But also among the novel R*Q-tree and the promoter region, there is no duplication elements, which made structure of the novel R*Q-tree simplified. Lazy splitting; Clustering; R*Q-tree
原R*Q-tree是特殊数据库中最常用的查询索引,但由于其构建成本远高于其他查询方法,因此不适合频繁插入和删除的情况。因此,提出了一种新的R*Q-tree拆分技术,以改进原有R*Q-tree的不足。当新R* q树有对象插入时,节点可能溢出。在此过程中,它不是立即分割节点,而是尝试在相邻的相邻节点中插入节点,直到它们被填满。然后利用聚类技术对节点进行拆分,对相邻节点和拆分节点之间的节点进行数据项重组。新颖的R* q树在保证查询性能的前提下,大大降低了结构成本,显著提高了索引结构的空间利用率。最后,分析和实验表明,该算法的效率得到了提高。而且在新的R*Q-tree和启动子区域之间,不存在重复元件,使得新的R*Q-tree结构简化。懒惰的分裂;聚类;R * Q-tree
{"title":"A novel index structure R*Q-tree based on lazy splitting and clustering","authors":"Pan Jin, Q. Song","doi":"10.1109/CSAE.2011.5952707","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952707","url":null,"abstract":"The original R*Q-tree is the most popular query index of special database, but it is not suitable for the situation of frequent insertion and deletion, because its' construction cost is much more than the other query methods. Therefore, the novel R*Q-tree splitting technology has been proposed as for improving the shortcomings of the original R*Q-tree. When the novel R*Q-tree has objects inserted into it the nodes may overflow. During this, rather than split the node immediately, it attempts to insert nodes in the adjacent neighboring nodes until they were full. Then it uses clustering technology to split the nodes, data items were reorganized the nodes between in the neighboring nodes and spitted nodes. The novel R*Q-tree ensuring the premise of query performance greatly reduced the cost of structure and significantly improve the space utilization of the index structure. Finally, the analysis and experiments show that the efficiency of the novel R*Q-tree is improved. But also among the novel R*Q-tree and the promoter region, there is no duplication elements, which made structure of the novel R*Q-tree simplified. Lazy splitting; Clustering; R*Q-tree","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132065513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application of improved DBD algorithm based bp neural network on fault diagnosis for fuel supply system in a certain diesel engine 基于bp神经网络的改进DBD算法在柴油机供油系统故障诊断中的应用
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952510
Fuzhou Feng, A. Si, Wei Xing
In order to overcome the drawbacks of a neural network based on back propagation (BP) algorithm, such as too slow to converge and easy to be trapped into a local minimum, a new modified algorithm is proposed in this paper, in which the grads information of the network are exchanged dynamically in each iteration step, and the increment factor of learning rate and interaction function in delta-bar-delta (DBD) algorithm are improved based on the idea of cross and mutation in Genetic algorithm (GA). The new algorithm has been applied in the fault diagnosis of a fuel supply system in a certain diesel engine successfully.
为了克服基于BP算法的神经网络收敛速度慢、容易陷入局部极小值等缺点,本文提出了一种新的改进算法,该算法在每个迭代步动态交换网络的梯度信息。基于遗传算法(GA)的交叉和突变思想,对delta-bar-delta (DBD)算法的学习率增量因子和交互函数进行了改进。该算法已成功应用于某型柴油机供油系统的故障诊断。
{"title":"Application of improved DBD algorithm based bp neural network on fault diagnosis for fuel supply system in a certain diesel engine","authors":"Fuzhou Feng, A. Si, Wei Xing","doi":"10.1109/CSAE.2011.5952510","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952510","url":null,"abstract":"In order to overcome the drawbacks of a neural network based on back propagation (BP) algorithm, such as too slow to converge and easy to be trapped into a local minimum, a new modified algorithm is proposed in this paper, in which the grads information of the network are exchanged dynamically in each iteration step, and the increment factor of learning rate and interaction function in delta-bar-delta (DBD) algorithm are improved based on the idea of cross and mutation in Genetic algorithm (GA). The new algorithm has been applied in the fault diagnosis of a fuel supply system in a certain diesel engine successfully.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132346990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Continuous core/periphery architecture features of C2 organizations analysis based on Social Network Analysis 基于Social Network analysis的C2组织持续核心/外围架构特征分析
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5953169
Chang Shuchun, Li Lixing
The Command and Control Relationships Network Models are constructed. The architecture features of these models are analyzed using “continuous core/periphery model” in Social Network Analysis. It can be seen from research, whether a C2 organization network model has “core/periphery” architecture feature can be judged by calculating and analyzing. If the clear degree of the feature is distinct, the nodes of model can be separated into core, semi-periphery and periphery. The relationships between structure features and organizations efficiency are endeavor to be discovered.
构建了命令与控制关系网络模型。使用Social Network Analysis中的“连续核心/外围模型”分析了这些模型的架构特征。从研究中可以看出,C2组织网络模型是否具有“核心/外围”架构特征,可以通过计算和分析来判断。如果特征清晰程度明显,则可以将模型节点分为核心、半外围和外围。试图发现组织结构特征与组织效率之间的关系。
{"title":"Continuous core/periphery architecture features of C2 organizations analysis based on Social Network Analysis","authors":"Chang Shuchun, Li Lixing","doi":"10.1109/CSAE.2011.5953169","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5953169","url":null,"abstract":"The Command and Control Relationships Network Models are constructed. The architecture features of these models are analyzed using “continuous core/periphery model” in Social Network Analysis. It can be seen from research, whether a C2 organization network model has “core/periphery” architecture feature can be judged by calculating and analyzing. If the clear degree of the feature is distinct, the nodes of model can be separated into core, semi-periphery and periphery. The relationships between structure features and organizations efficiency are endeavor to be discovered.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current-controlled CCDDCC with controlled current gain 具有可控电流增益的电流控制CCDDCC
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952914
U. Torteanchai, M. Kumngern, K. Dejhan
This paper presents a new active building block for analog signal processing, called the current-controlled differential difference current conveyor (CCDDCC) with controlled current gain. Its parasitic resistance at X-terminal can be controlled by an external bias current and the current at Z-terminal can be electronically controlled by a current ratio and can be made insensitive to temperature and integrated circuit processing. PSPICE simulation results of proposed CCDDCC with controlled current gain and its application are also presented.
本文提出了一种新的用于模拟信号处理的主动构件,称为电流增益可控的电流控制差分电流输送机(CCDDCC)。它的x端寄生电阻可以通过外部偏置电流控制,z端电流可以通过电流比电子控制,并且可以使其对温度和集成电路处理不敏感。给出了该控制电流增益的CCDDCC的PSPICE仿真结果及其应用。
{"title":"Current-controlled CCDDCC with controlled current gain","authors":"U. Torteanchai, M. Kumngern, K. Dejhan","doi":"10.1109/CSAE.2011.5952914","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952914","url":null,"abstract":"This paper presents a new active building block for analog signal processing, called the current-controlled differential difference current conveyor (CCDDCC) with controlled current gain. Its parasitic resistance at X-terminal can be controlled by an external bias current and the current at Z-terminal can be electronically controlled by a current ratio and can be made insensitive to temperature and integrated circuit processing. PSPICE simulation results of proposed CCDDCC with controlled current gain and its application are also presented.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aeronautical channel modeling in frequency-domain for block-data transmission systems 块数据传输系统的航空信道频域建模
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952946
Xinle Yu, Dandan Song, Zhanxin Yang
In this Paper, we proposed a method of Aeronautics channel modeling for block-Data transmission systems, the channel model is generated in frequency domain instead of time domain. The characteristics of aeronautical channel are introduced. The analysis and simulation of channel modeling method in frequency domain are proposed in the end of this paper.
本文提出了一种用于块数据传输系统的航空信道建模方法,该方法在频域生成信道模型,而不是在时域生成。介绍了航空信道的特点。最后对频域信道建模方法进行了分析和仿真。
{"title":"Aeronautical channel modeling in frequency-domain for block-data transmission systems","authors":"Xinle Yu, Dandan Song, Zhanxin Yang","doi":"10.1109/CSAE.2011.5952946","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952946","url":null,"abstract":"In this Paper, we proposed a method of Aeronautics channel modeling for block-Data transmission systems, the channel model is generated in frequency domain instead of time domain. The characteristics of aeronautical channel are introduced. The analysis and simulation of channel modeling method in frequency domain are proposed in the end of this paper.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133909014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unbalanced replication by evaluating popularity over web scalable storage 通过评估web可扩展存储的流行程度来评估不平衡复制
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952831
Ting-wei Chen, Carlos Madrazo, Takeshi Tsuchiya, K. Koyanagi
A peer-to-peer-based storage system has become a common way to alleviate network congestion and the limitation of storage space for providing file sharing, distributed computation, and instant messaging. Since the peer-to-peer technique has been used in file sharing, replications of a file is produced for a quick response and high availability. On the other hand, too much replications of a file may waste storage after the file become unpopular. The objective is to manage replications of file efficiently. In the proposed method, a popularity level is defined for evaluating the popularity of a file, used to determine the increasing or decreasing of the number of replications. The popularity level has three thresholds to determine replication of file. Thresholds are setting up by the 80–20 rule, and it changes dynamically overtime. We conclude that the popularity of file and its number of replication affect each other to use storage efficiently.
基于点对点的存储系统已经成为缓解网络拥塞和存储空间限制的一种常用方式,用于提供文件共享、分布式计算和即时通信。由于在文件共享中使用了点对点技术,因此产生文件的副本以获得快速响应和高可用性。另一方面,过多的文件复制可能会在文件变得不受欢迎后浪费存储空间。目标是有效地管理文件的副本。在所提出的方法中,定义了用于评估文件的流行程度的流行级别,用于确定复制数量的增加或减少。流行级别有三个阈值来确定文件的复制。阈值是根据80-20规则设置的,并且随着时间的推移会动态变化。本文认为,文件的流行程度和文件的复制次数是相互影响的,可以有效地利用存储空间。
{"title":"Unbalanced replication by evaluating popularity over web scalable storage","authors":"Ting-wei Chen, Carlos Madrazo, Takeshi Tsuchiya, K. Koyanagi","doi":"10.1109/CSAE.2011.5952831","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952831","url":null,"abstract":"A peer-to-peer-based storage system has become a common way to alleviate network congestion and the limitation of storage space for providing file sharing, distributed computation, and instant messaging. Since the peer-to-peer technique has been used in file sharing, replications of a file is produced for a quick response and high availability. On the other hand, too much replications of a file may waste storage after the file become unpopular. The objective is to manage replications of file efficiently. In the proposed method, a popularity level is defined for evaluating the popularity of a file, used to determine the increasing or decreasing of the number of replications. The popularity level has three thresholds to determine replication of file. Thresholds are setting up by the 80–20 rule, and it changes dynamically overtime. We conclude that the popularity of file and its number of replication affect each other to use storage efficiently.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Over the air provisioning of industrial wireless devices using elliptic curve cryptography 利用椭圆曲线加密的工业无线设备的空中供应
Pub Date : 2011-06-10 DOI: 10.1109/CSAE.2011.5952541
Deji Chen, M. Nixon, Thomas Lin, Song Han, Xiuming Zhu, A. Mok, R. Xu, Julia Deng, An Liu
Security has become a key consideration in industrial settings. Newer technologies, such as wireless sensor networks, have adopted the position that security is mandatory. For wireless sensor applications it is important to secure data in transit in the air, to authenticate data originating from, or arriving at the wireless devices and applications, and, most important, to protect the safety and integrity of the legacy process control and plant safeguarding systems that the new wireless world interconnects into. Current industrial wireless mesh networks, such as WirelessHART™, ISA100.11a, and WIA-PA, have adopted AES 128 bit encryption for both securing communications and data. To ensure that devices and applications are authenticated special join keys are used. The process of loading these keys is called provisioning. To ensure that join keys remain secret they are loaded offline through special wired interfaces or provisioned over the air using less secure mechanisms. What is needed is a low cost efficient public key mechanism that can be utilized over the air while not compromising security. This paper examines the use of elliptic curve cryptography for this purpose. We realize this technique on a WirelessHART mesh network. Efforts are underway to incorporate this approach as an addition to the WirelessHART standard.
安全已成为工业环境中的一个关键考虑因素。较新的技术,如无线传感器网络,已经采取了安全是强制性的立场。对于无线传感器应用来说,重要的是保护空中传输的数据,验证来自或到达无线设备和应用的数据,最重要的是保护新无线世界互连的传统过程控制和工厂保护系统的安全性和完整性。目前的工业无线网状网络,如WirelessHART™,ISA100.11a和WIA-PA,都采用AES 128位加密来保护通信和数据。为了确保对设备和应用程序进行身份验证,使用了特殊的连接键。加载这些键的过程称为配置。为了确保连接密钥保持秘密,它们通过特殊的有线接口离线加载,或者使用不太安全的机制在空中提供。我们需要的是一种低成本高效的公钥机制,这种机制可以在不损害安全性的情况下通过空中使用。本文探讨了椭圆曲线密码的使用。我们在WirelessHART网状网络上实现了这种技术。目前正在努力将这种方法作为WirelessHART标准的补充。
{"title":"Over the air provisioning of industrial wireless devices using elliptic curve cryptography","authors":"Deji Chen, M. Nixon, Thomas Lin, Song Han, Xiuming Zhu, A. Mok, R. Xu, Julia Deng, An Liu","doi":"10.1109/CSAE.2011.5952541","DOIUrl":"https://doi.org/10.1109/CSAE.2011.5952541","url":null,"abstract":"Security has become a key consideration in industrial settings. Newer technologies, such as wireless sensor networks, have adopted the position that security is mandatory. For wireless sensor applications it is important to secure data in transit in the air, to authenticate data originating from, or arriving at the wireless devices and applications, and, most important, to protect the safety and integrity of the legacy process control and plant safeguarding systems that the new wireless world interconnects into. Current industrial wireless mesh networks, such as WirelessHART™, ISA100.11a, and WIA-PA, have adopted AES 128 bit encryption for both securing communications and data. To ensure that devices and applications are authenticated special join keys are used. The process of loading these keys is called provisioning. To ensure that join keys remain secret they are loaded offline through special wired interfaces or provisioned over the air using less secure mechanisms. What is needed is a low cost efficient public key mechanism that can be utilized over the air while not compromising security. This paper examines the use of elliptic curve cryptography for this purpose. We realize this technique on a WirelessHART mesh network. Efforts are underway to incorporate this approach as an addition to the WirelessHART standard.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134308846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2011 IEEE International Conference on Computer Science and Automation Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1