首页 > 最新文献

Proceedings of 2014 International Conference on Cloud Computing and Internet of Things最新文献

英文 中文
Analysis of information transmission in GEO+IGSO+MEO constellation GEO+IGSO+MEO星座信息传输分析
Yi Liu, Bin Wu, Bo Wang
Satellite constellations with more and more powerful functions are now in busy construction, which makes its status higher and higher in aerospace filed. GEO+IGSO+MEO constellation can provide regional and global navigation. Different demands of various information transmission via Inter-satellite links (ISL) are analyzed based on research hotspots.
卫星星座的建设日益繁忙,其功能也越来越强大,在航天领域的地位也越来越高。GEO+IGSO+MEO星座可以提供区域和全球导航。根据研究热点,分析了各种星间链路信息传输的不同需求。
{"title":"Analysis of information transmission in GEO+IGSO+MEO constellation","authors":"Yi Liu, Bin Wu, Bo Wang","doi":"10.1109/CCIOT.2014.7062524","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062524","url":null,"abstract":"Satellite constellations with more and more powerful functions are now in busy construction, which makes its status higher and higher in aerospace filed. GEO+IGSO+MEO constellation can provide regional and global navigation. Different demands of various information transmission via Inter-satellite links (ISL) are analyzed based on research hotspots.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using V-Model methodology, UML process-based risk assessment of software and visualization 采用V-Model方法,基于UML过程的软件风险评估和可视化
M. Naeem, Weihua Zhu, A. A. Memon, A. Khalid
Risk Assessment is one of the most critical parts of software engineering process, and risks are the factors that could be results in software failure if they are not correctly handled. In this Paper, we propose a solution to reduce risks using UML visualization of software processes in detail, and V-Model (Software Development Lifecycle Model) techniques are performed to produce verified results in each phase of development lifecycle. Using all above aspects and research findings, we propose “Risk Assessment V-Model”. Furthermore, we use “Do Sale Process” to discuss different properties of our model. This model is quite in general and can be applicable and expendable for many kinds of software systems.
风险评估是软件工程过程中最关键的部分之一,风险是如果处理不当可能导致软件失败的因素。在本文中,我们提出了一个使用UML可视化软件过程来减少风险的解决方案,并且V-Model(软件开发生命周期模型)技术在开发生命周期的每个阶段被执行以产生经过验证的结果。综合以上各方面和研究成果,提出了“风险评估v模型”。此外,我们使用“销售过程”来讨论我们模型的不同属性。该模型非常通用,可以适用于许多类型的软件系统。
{"title":"Using V-Model methodology, UML process-based risk assessment of software and visualization","authors":"M. Naeem, Weihua Zhu, A. A. Memon, A. Khalid","doi":"10.1109/CCIOT.2014.7062536","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062536","url":null,"abstract":"Risk Assessment is one of the most critical parts of software engineering process, and risks are the factors that could be results in software failure if they are not correctly handled. In this Paper, we propose a solution to reduce risks using UML visualization of software processes in detail, and V-Model (Software Development Lifecycle Model) techniques are performed to produce verified results in each phase of development lifecycle. Using all above aspects and research findings, we propose “Risk Assessment V-Model”. Furthermore, we use “Do Sale Process” to discuss different properties of our model. This model is quite in general and can be applicable and expendable for many kinds of software systems.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125411842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimization of Neural Network based on Genetic Algorithm and BP 基于遗传算法和BP的神经网络优化
Shiwei Zhang, Hanshi Wang, Lizhen Liu, Chao Du, Jingli Lu
In order to improve the intelligence, high efficiency, humanization of the type of the search and eliminate games, and also to improve the search performance and rule out the accuracy of the target during intelligent games running. This paper puts forward a comprehensive method that combines Genetic Algorithm, Neural Network and Back Propagation (BP) to solve the insufficiency of computing power and low efficiency by using a single algorithm in Intelligence games. In this method, Genetic Algorithm will be used in weight training of Neural Network first of all. It will not stop iterating until Genetic Algorithm evolves into a certain degree or network errors satisfies the requirements, and delivers the best chromosome we get to Neural Network. Then BP trains the data that runs through the Neural Network, which is Neural Network's second training. Finally, the paper applies the new way in the Mine Clearance experiment. By comparing this experiment with only using Genetic Algorithm or Neural Network, it finds out that the proposed method significantly improves the minesweepers accuracy.
为了提高智能、高效率、人性化的搜索和消除游戏的类型,同时也为了提高智能游戏运行过程中搜索性能和排除目标的准确性。本文提出了一种遗传算法、神经网络和反向传播(BP)相结合的综合算法,解决智能博弈中单一算法计算能力不足、效率低的问题。该方法首先将遗传算法应用于神经网络的权值训练。它不会停止迭代,直到遗传算法进化到一定程度或网络误差满足要求,并将我们得到的最佳染色体传递给神经网络。然后BP对流经神经网络的数据进行训练,这是神经网络的第二次训练。最后,将该方法应用于扫雷实验。通过与仅使用遗传算法或神经网络的实验对比,发现该方法显著提高了扫雷准确率。
{"title":"Optimization of Neural Network based on Genetic Algorithm and BP","authors":"Shiwei Zhang, Hanshi Wang, Lizhen Liu, Chao Du, Jingli Lu","doi":"10.1109/CCIOT.2014.7062537","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062537","url":null,"abstract":"In order to improve the intelligence, high efficiency, humanization of the type of the search and eliminate games, and also to improve the search performance and rule out the accuracy of the target during intelligent games running. This paper puts forward a comprehensive method that combines Genetic Algorithm, Neural Network and Back Propagation (BP) to solve the insufficiency of computing power and low efficiency by using a single algorithm in Intelligence games. In this method, Genetic Algorithm will be used in weight training of Neural Network first of all. It will not stop iterating until Genetic Algorithm evolves into a certain degree or network errors satisfies the requirements, and delivers the best chromosome we get to Neural Network. Then BP trains the data that runs through the Neural Network, which is Neural Network's second training. Finally, the paper applies the new way in the Mine Clearance experiment. By comparing this experiment with only using Genetic Algorithm or Neural Network, it finds out that the proposed method significantly improves the minesweepers accuracy.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127761353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cognitive theory applied to radar system 认知理论在雷达系统中的应用
Chenghong Zhou, Weiping Qian
Cognition, a basic concept in psychology, is the set of a human's inner mental activities and processes related to knowledge. Actually it is possible to introduce cognition into engineering systems to construct intelligent systems with human cognitive functions. Cognitive radar is such a successful case that improves the working performance in complex environment. The article starts with the concept of cognition and cognitive radar, subsequently followed by the basic elements including intelligent information processing, information feedback. The fundamentals about how cognition increases the perceptual ability of radar are discussed in detail.
认知是心理学的一个基本概念,是人类与知识相关的内在心理活动和过程的集合。实际上,将认知引入工程系统,构建具有人类认知功能的智能系统是可能的。认知雷达就是这样一个成功的案例,它提高了复杂环境下的工作性能。本文从认知和认知雷达的概念入手,论述了智能信息处理、信息反馈等基本要素。详细讨论了认知增强雷达感知能力的基本原理。
{"title":"Cognitive theory applied to radar system","authors":"Chenghong Zhou, Weiping Qian","doi":"10.1109/CCIOT.2014.7062527","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062527","url":null,"abstract":"Cognition, a basic concept in psychology, is the set of a human's inner mental activities and processes related to knowledge. Actually it is possible to introduce cognition into engineering systems to construct intelligent systems with human cognitive functions. Cognitive radar is such a successful case that improves the working performance in complex environment. The article starts with the concept of cognition and cognitive radar, subsequently followed by the basic elements including intelligent information processing, information feedback. The fundamentals about how cognition increases the perceptual ability of radar are discussed in detail.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of structure from motion 从运动观察结构
Gao Yi, Luo Jianxin, Qiu Hang-ping, Wu Bo
As a useful technology of 3D reconstruction based on binocular stereo vision, structure from motion is widely used in many fields and highly valuable in applications. However, few reviews have been focused on this technology. In this paper, the basic principles are overviewed. More specifically, the related works and main methods are discussed. Finally some future research directions are summarized.
运动构造作为一种基于双目立体视觉的三维重建技术,在许多领域得到了广泛的应用,具有很高的应用价值。然而,很少有评论关注这项技术。本文对其基本原理进行了概述。具体论述了相关工作和主要方法。最后对今后的研究方向进行了总结。
{"title":"Survey of structure from motion","authors":"Gao Yi, Luo Jianxin, Qiu Hang-ping, Wu Bo","doi":"10.1109/CCIOT.2014.7062508","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062508","url":null,"abstract":"As a useful technology of 3D reconstruction based on binocular stereo vision, structure from motion is widely used in many fields and highly valuable in applications. However, few reviews have been focused on this technology. In this paper, the basic principles are overviewed. More specifically, the related works and main methods are discussed. Finally some future research directions are summarized.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing 基于虹膜特征提取的云计算一次性消息认证码方案
Z. Abduljabbar, Hai Jin, Deqing Zou, A. Yassin, Z. Hussien, M. Hussain
Cloud computing suffers from a number of problems in terms of security issues. Authentication and integrity play an important role in the security field and numerous concerns have been raised to recognizeor protect any tampering with exchanges of text between two entities (sender and receiver) within the cloud environment. Many schemes in this area can be vulnerable to well known methods of attack such as replay attack, forgery attack, dictionary, insider, and modification attacks. A robust scheme is therefore required to detect or prevent any modification or manipulation of a message during transmission. In this paper, we propose a new message authentication code (MAC) based on feature extraction of the user's iris in order to assure the integrity of the user's message. Features are extracted from the user's iris to generate a message code for each user's login and to prohibit malicious attacks such as replay, forgery and insider attacks. Our proposed scheme enjoys several important security attributes such as a user's one time bio-key, robust message anonymity, data integrity for a user's message, phase key agreement, bio-key management,and one time message code for each user's session. Finally, our security analysis and experimental results demonstrate and prove the invulnerability and efficiency of our proposed scheme.
云计算在安全性方面存在许多问题。身份验证和完整性在安全领域中扮演着重要的角色,在云环境中,识别或保护对两个实体(发送方和接收方)之间文本交换的任何篡改已经引起了许多关注。该领域的许多方案容易受到众所周知的攻击方法的攻击,例如重放攻击、伪造攻击、字典攻击、内部攻击和修改攻击。因此,需要一个健壮的方案来检测或防止在传输过程中对消息的任何修改或操作。为了保证用户信息的完整性,本文提出了一种基于用户虹膜特征提取的消息认证码(MAC)。从用户的虹膜中提取特征,为每个用户的登录生成消息代码,并禁止恶意攻击,如重播,伪造和内部攻击。我们提出的方案具有几个重要的安全属性,如用户的一次性生物密钥、健壮的消息匿名性、用户消息的数据完整性、阶段密钥协议、生物密钥管理和每个用户会话的一次性消息代码。最后,我们的安全分析和实验结果验证了我们所提出方案的安全性和有效性。
{"title":"An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing","authors":"Z. Abduljabbar, Hai Jin, Deqing Zou, A. Yassin, Z. Hussien, M. Hussain","doi":"10.1109/CCIOT.2014.7062499","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062499","url":null,"abstract":"Cloud computing suffers from a number of problems in terms of security issues. Authentication and integrity play an important role in the security field and numerous concerns have been raised to recognizeor protect any tampering with exchanges of text between two entities (sender and receiver) within the cloud environment. Many schemes in this area can be vulnerable to well known methods of attack such as replay attack, forgery attack, dictionary, insider, and modification attacks. A robust scheme is therefore required to detect or prevent any modification or manipulation of a message during transmission. In this paper, we propose a new message authentication code (MAC) based on feature extraction of the user's iris in order to assure the integrity of the user's message. Features are extracted from the user's iris to generate a message code for each user's login and to prohibit malicious attacks such as replay, forgery and insider attacks. Our proposed scheme enjoys several important security attributes such as a user's one time bio-key, robust message anonymity, data integrity for a user's message, phase key agreement, bio-key management,and one time message code for each user's session. Finally, our security analysis and experimental results demonstrate and prove the invulnerability and efficiency of our proposed scheme.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Power and performance analysis of the Graph 500 benchmark on the Single-chip Cloud Computer 图500基准测试在单芯片云计算机上的功耗和性能分析
Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su
The concerns of data-intensiveness and energy awareness are actively reshaping the design of high-performance computing (HPC) systems nowadays. The Graph500 is a widely adopted benchmark for evaluating the performance of computing systems for data-intensive workloads. In this paper, we introduce a data-parallel implementation of Graph500 on the Intel Single-chip Cloud Computer (SCC). The SCC features a non-coherent many-core architecture and multi-domain on-chip DVFS support for dynamic power management. With our custom-made shared virtual memory programming library, memory sharing among threads is done efficiently via the shared physical memory (SPM) while the library has taken care of the coherence. We conduct an in-depth study on the power and performance characteristics of the Graph500 workloads running on this system with varying system scales and power states. Our experimental results are insightful for the design of energy-efficient many-core systems for data-intensive applications.
对数据密集型和能源意识的关注正在积极地重塑当今高性能计算(HPC)系统的设计。Graph500是一个广泛采用的基准,用于评估数据密集型工作负载的计算系统的性能。本文介绍了Graph500在英特尔单芯片云计算机(SCC)上的数据并行实现。SCC具有非相干多核架构和片上多域DVFS支持动态电源管理。使用我们定制的共享虚拟内存编程库,线程之间的内存共享可以通过共享物理内存(SPM)高效地完成,同时库也考虑了一致性。我们对运行在该系统上的Graph500工作负载在不同系统规模和电源状态下的功耗和性能特征进行了深入研究。我们的实验结果对数据密集型应用中节能多核系统的设计具有深刻的见解。
{"title":"Power and performance analysis of the Graph 500 benchmark on the Single-chip Cloud Computer","authors":"Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su","doi":"10.1109/CCIOT.2014.7062496","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062496","url":null,"abstract":"The concerns of data-intensiveness and energy awareness are actively reshaping the design of high-performance computing (HPC) systems nowadays. The Graph500 is a widely adopted benchmark for evaluating the performance of computing systems for data-intensive workloads. In this paper, we introduce a data-parallel implementation of Graph500 on the Intel Single-chip Cloud Computer (SCC). The SCC features a non-coherent many-core architecture and multi-domain on-chip DVFS support for dynamic power management. With our custom-made shared virtual memory programming library, memory sharing among threads is done efficiently via the shared physical memory (SPM) while the library has taken care of the coherence. We conduct an in-depth study on the power and performance characteristics of the Graph500 workloads running on this system with varying system scales and power states. Our experimental results are insightful for the design of energy-efficient many-core systems for data-intensive applications.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small file access optimization based on GlusterFS 基于GlusterFS的小文件访问优化
Xie Tao, Liang Alei
This paper describes a strategy to optimize small file's reading and writing performance on traditional distributed file system. Traditional distributed file system like GlusterFS stores data within local file system (XFS, EXT3, EXT4, etc.), which shows a significant bottleneck on file metadata lookup. We try to re-design metadata structure by merging small file into large file, thus to reduce size of metadata, so we can store the whole files' metadata inside main memory. We design and implement the whole strategy on GlusterFS, test results show a great performance optimization on small file operation.
本文介绍了一种在传统分布式文件系统上优化小文件读写性能的策略。像GlusterFS这样的传统分布式文件系统将数据存储在本地文件系统(XFS、EXT3、EXT4等)中,这在文件元数据查找方面显示出明显的瓶颈。我们尝试通过将小文件合并为大文件来重新设计元数据结构,从而减小元数据的大小,从而将整个文件的元数据存储在主存中。我们在GlusterFS上设计并实现了整个策略,测试结果表明在小文件操作上有很大的性能优化。
{"title":"Small file access optimization based on GlusterFS","authors":"Xie Tao, Liang Alei","doi":"10.1109/CCIOT.2014.7062514","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062514","url":null,"abstract":"This paper describes a strategy to optimize small file's reading and writing performance on traditional distributed file system. Traditional distributed file system like GlusterFS stores data within local file system (XFS, EXT3, EXT4, etc.), which shows a significant bottleneck on file metadata lookup. We try to re-design metadata structure by merging small file into large file, thus to reduce size of metadata, so we can store the whole files' metadata inside main memory. We design and implement the whole strategy on GlusterFS, test results show a great performance optimization on small file operation.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Publicly verifiable delegation of set intersection 集合交集的公开可验证委托
Tingting Wang, Yanqin Zhu, Xizhao Luo
We study the verifiable delegation of set intersection in the model of authenticated data structures, where a weak client in storage and computation stores its dataset composed of some sets into a powerful server. The client can issue update and set intersection query over outsourced data. The server returns the result and a proof of its correctness. Our scheme allows any entity to publicly verify the correctness of set intersection query, and requires no secret key. Based on characteristic polynomials of sets, our authenticated data structure firstly provides a practical and specific method for set intersection through polynomial evaluations. It achieves optimal verification and proof complexity, as well as optimal update complexity without bearing any extra space overhead. The overhead for computing actual answer and proofs is reduced significantly in contrast with previous methods based on bilinear-map accumulators. The intersection query comes up in keyword search, database queries and other applications. Indeed, our scheme can be effectively used in such scenarios. The security of our constructions is based on co-Computational Diffie-Hellman assumption.
研究了认证数据结构模型中集合交集的可验证委托问题,其中存储和计算的弱客户端将由若干集合组成的数据集存储到一个强大的服务器中。客户端可以对外包数据发出更新和设置交集查询。服务器返回结果并证明其正确性。我们的方案允许任何实体公开验证集合交叉查询的正确性,并且不需要密钥。基于集合的特征多项式,我们的认证数据结构首次通过多项式求值为集合相交提供了一种实用而具体的方法。它实现了最佳的验证和证明复杂性,以及最佳的更新复杂性,而无需承担任何额外的空间开销。与以往基于双线性映射累加器的方法相比,该方法大大减少了计算实际答案和证明的开销。交叉查询出现在关键字搜索、数据库查询和其他应用程序中。实际上,我们的方案可以有效地用于这样的场景。我们的结构的安全性是基于协同计算的Diffie-Hellman假设。
{"title":"Publicly verifiable delegation of set intersection","authors":"Tingting Wang, Yanqin Zhu, Xizhao Luo","doi":"10.1109/CCIOT.2014.7062500","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062500","url":null,"abstract":"We study the verifiable delegation of set intersection in the model of authenticated data structures, where a weak client in storage and computation stores its dataset composed of some sets into a powerful server. The client can issue update and set intersection query over outsourced data. The server returns the result and a proof of its correctness. Our scheme allows any entity to publicly verify the correctness of set intersection query, and requires no secret key. Based on characteristic polynomials of sets, our authenticated data structure firstly provides a practical and specific method for set intersection through polynomial evaluations. It achieves optimal verification and proof complexity, as well as optimal update complexity without bearing any extra space overhead. The overhead for computing actual answer and proofs is reduced significantly in contrast with previous methods based on bilinear-map accumulators. The intersection query comes up in keyword search, database queries and other applications. Indeed, our scheme can be effectively used in such scenarios. The security of our constructions is based on co-Computational Diffie-Hellman assumption.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on outdoor solar cell distributed monitoring with ZigBee wireless sensor network: Algorithms and application 基于ZigBee无线传感器网络的户外太阳能电池分布式监测研究:算法与应用
Zheng Tao, Chen Yan-guang, Liu Meng-zhu, Yang Yi, Zhou Hong-wei, Liu Xu-yang, Yao Jin-kun
I-V curve and MPP are key parameters for solar cell performance measuring. A low-cost testing system based on Zigbee for outdoor solar cell outdoor measuring is presented in this paper. The testing algorithm combining constant scale and incremental conductance algorithm is discussed. Interpolation method for I-V curve reconstruction and its error source are analyzed. This paper also reports the specific structure of our outdoor solar cell testing system. Using the developed algorithm and test system, we present a detailed numerical investigation and experiments about distributed outdoor solar cell measurement. The results show that this method can provide high-precision solar cell characters measuring with low complexity.
I-V曲线和MPP是太阳能电池性能测量的关键参数。提出了一种基于Zigbee的低成本户外太阳能电池户外测试系统。讨论了恒尺度与增量电导相结合的测试算法。分析了I-V曲线重构的插值方法及其误差来源。本文还报道了我国户外太阳能电池测试系统的具体结构。利用开发的算法和测试系统,对分布式户外太阳能电池的测量进行了详细的数值研究和实验。结果表明,该方法能够以较低的复杂度提供高精度的太阳能电池特性测量。
{"title":"Research on outdoor solar cell distributed monitoring with ZigBee wireless sensor network: Algorithms and application","authors":"Zheng Tao, Chen Yan-guang, Liu Meng-zhu, Yang Yi, Zhou Hong-wei, Liu Xu-yang, Yao Jin-kun","doi":"10.1109/CCIOT.2014.7062531","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062531","url":null,"abstract":"I-V curve and MPP are key parameters for solar cell performance measuring. A low-cost testing system based on Zigbee for outdoor solar cell outdoor measuring is presented in this paper. The testing algorithm combining constant scale and incremental conductance algorithm is discussed. Interpolation method for I-V curve reconstruction and its error source are analyzed. This paper also reports the specific structure of our outdoor solar cell testing system. Using the developed algorithm and test system, we present a detailed numerical investigation and experiments about distributed outdoor solar cell measurement. The results show that this method can provide high-precision solar cell characters measuring with low complexity.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of 2014 International Conference on Cloud Computing and Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1