首页 > 最新文献

2013 International Conference on Information Science and Cloud Computing Companion最新文献

英文 中文
An Energy-Saving Algorithm in Networked Embedded System Based on Critical Tasks Served First Strategy 基于关键任务优先策略的网络化嵌入式系统节能算法
Bing Xue, Z. Zhao, Lu Wang, Xiaoli Zhu
Lots of collaborative applications that contain a number of dependent tasks run in networked embedded system, such as wireless sensor network, Cyber-Physical-System and so on. For the reasons that deadlines of some collaborative applications are usually not so hard and lifetime of whole system depends on energy dissipation, it is meaningful to figure out a good strategy for balancing delay with system energy dissipation. Considering this issue, our research focuses on trying to minimize total system energy dissipation for extending lifetime of whole system, on the premise that delay of finish time is acceptable. In this paper, we point out which tasks are critical among independent tasks from the perspective of energy-saving and propose BESF (Biggest Energy Span First) algorithm that first allocates the task with biggest energy span. Actually, BESF algorithm references BEATA algorithm, however, BESF could not only further decrease energy-consumption of whole system comparing with existing related algorithms, like BEATA, GEATA, but also still ensure that the finish time is tolerable. Experimental results show that in most situations, BESF algorithm is able to save more energy comparing with existing algorithms.
在无线传感器网络、信息物理系统等网络化嵌入式系统中,运行着大量包含大量依赖任务的协同应用。由于某些协同应用的最后期限通常不太严格,而整个系统的寿命取决于能量消耗,因此找出一种好的延迟与系统能量消耗的平衡策略是有意义的。考虑到这一问题,我们的研究重点是在可接受完工时间延迟的前提下,尽量减少系统总能耗,以延长整个系统的寿命。本文从节能的角度指出了独立任务中哪些任务是关键任务,提出了优先分配最大能量跨度任务的BESF(最大能量跨度优先)算法。实际上,BESF算法参考了BEATA算法,但与现有的BEATA、GEATA等相关算法相比,BESF不仅可以进一步降低整个系统的能耗,而且仍然可以保证完成时间在可容忍范围内。实验结果表明,在大多数情况下,与现有算法相比,BESF算法能够节省更多的能量。
{"title":"An Energy-Saving Algorithm in Networked Embedded System Based on Critical Tasks Served First Strategy","authors":"Bing Xue, Z. Zhao, Lu Wang, Xiaoli Zhu","doi":"10.1109/ISCC-C.2013.37","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.37","url":null,"abstract":"Lots of collaborative applications that contain a number of dependent tasks run in networked embedded system, such as wireless sensor network, Cyber-Physical-System and so on. For the reasons that deadlines of some collaborative applications are usually not so hard and lifetime of whole system depends on energy dissipation, it is meaningful to figure out a good strategy for balancing delay with system energy dissipation. Considering this issue, our research focuses on trying to minimize total system energy dissipation for extending lifetime of whole system, on the premise that delay of finish time is acceptable. In this paper, we point out which tasks are critical among independent tasks from the perspective of energy-saving and propose BESF (Biggest Energy Span First) algorithm that first allocates the task with biggest energy span. Actually, BESF algorithm references BEATA algorithm, however, BESF could not only further decrease energy-consumption of whole system comparing with existing related algorithms, like BEATA, GEATA, but also still ensure that the finish time is tolerable. Experimental results show that in most situations, BESF algorithm is able to save more energy comparing with existing algorithms.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method Based on Random Search Algorithm for Unequal Circle Packing Problem 一种基于随机搜索算法的不等圆布局问题的求解方法
Ying Shang, Jizheng Chu
We propose a random search algorithm to resolve the problem of packing circles into a rectangular container. With our method, all the circles are put into a large space randomly, and then by introducing the bow shift area, the searching space can be reduced and the local optimal solution can be list. By moving, turning and other disturbance methods, it will achieve the global optimization in the whole area. We designed exactly software to verify our algorithm. With our approach, the best optimal layout is irrelevant with the initial layout and the position of the biggest circle.
我们提出了一种随机搜索算法来解决将圆装入矩形容器的问题。该方法将所有的圆随机放置在一个大的空间中,然后通过引入弓形偏移区来缩小搜索空间,从而得到局部最优解。通过移动、转向等扰动方法,实现对整个区域的全局优化。我们专门设计了软件来验证我们的算法。通过我们的方法,最佳优化布局与初始布局和最大圆的位置无关。
{"title":"A Method Based on Random Search Algorithm for Unequal Circle Packing Problem","authors":"Ying Shang, Jizheng Chu","doi":"10.1109/ISCC-C.2013.19","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.19","url":null,"abstract":"We propose a random search algorithm to resolve the problem of packing circles into a rectangular container. With our method, all the circles are put into a large space randomly, and then by introducing the bow shift area, the searching space can be reduced and the local optimal solution can be list. By moving, turning and other disturbance methods, it will achieve the global optimization in the whole area. We designed exactly software to verify our algorithm. With our approach, the best optimal layout is irrelevant with the initial layout and the position of the biggest circle.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134259897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Multi-tenant PaaS Cloud Security on Java Platform 基于Java平台的多租户PaaS云安全研究
Changyun Jia, Min Zhu, Xiaoming Liu
This paper focuses on the potential security risk embedded in the model of multi-tenant sharing virtual machine service. Also the characteristics of current Java virtual machine standard model and the typical problems that may be encountered under the multi-tenant circumstances will be further discussed. Additionally, major solutions to the above problems of Java application server, including MVM, I-JVM and improved OSGI model, will be deeply analyzed in this paper. Through introduction to the GAE of commercial multi-tenant PaaS platform, this paper presents a clear and precise discussion and clarification to the solutions of security problems on the platform of multi-tenant PaaS.
本文重点分析了多租户共享虚拟机服务模型中存在的安全隐患。此外,还将进一步讨论当前Java虚拟机标准模型的特点以及在多租户环境下可能遇到的典型问题。此外,本文还将深入分析Java应用服务器解决上述问题的主要方法,包括MVM、I-JVM和改进的OSGI模型。本文通过对商用多租户PaaS平台的GAE的介绍,对多租户PaaS平台安全问题的解决方案进行了清晰、准确的讨论和阐述。
{"title":"Research on Multi-tenant PaaS Cloud Security on Java Platform","authors":"Changyun Jia, Min Zhu, Xiaoming Liu","doi":"10.1109/ISCC-C.2013.112","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.112","url":null,"abstract":"This paper focuses on the potential security risk embedded in the model of multi-tenant sharing virtual machine service. Also the characteristics of current Java virtual machine standard model and the typical problems that may be encountered under the multi-tenant circumstances will be further discussed. Additionally, major solutions to the above problems of Java application server, including MVM, I-JVM and improved OSGI model, will be deeply analyzed in this paper. Through introduction to the GAE of commercial multi-tenant PaaS platform, this paper presents a clear and precise discussion and clarification to the solutions of security problems on the platform of multi-tenant PaaS.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115414503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on XML Keyword Query Method Based on Semantic 基于语义的XML关键字查询方法研究
Guofeng Zhao, S. Tian
In this paper, we study the problem of effective keyword search over XML documents, Keyword search for smallest lowest common ancestor(SLCA) in XML data has recently been proposed as a meaningful way to identify interesting data nodes in XML data where their sub trees contain an input set of keywords. XML retrieval technology has been concerned widely by information retrieval researchers. XML data contains rich semantic information, but most of query methods can't make full use of the semantic information. There will be missed case if there is no enough semantic information. This paper proposed a new XML keyword query algorithm based on semantic(SKSA) to solve the question above. The algorithm takes full use of the node semantic information based on structural semantic. The same or similar results will be returned to users if there is no the keyword in XML document, which avoids the missed case. The test experiment result on the real XML data sets shows that SKSA has higher recall rate, and can match the user's query intention better.
在本文中,我们研究了XML文档的有效关键字搜索问题,XML数据中的最小最低共同祖先关键字搜索(SLCA)最近被提出作为一种有意义的方法来识别XML数据中感兴趣的数据节点,这些节点的子树包含一个输入关键字集。XML检索技术一直受到信息检索研究者的广泛关注。XML数据包含了丰富的语义信息,但大多数查询方法不能充分利用这些语义信息。如果没有足够的语义信息,就会出现漏格。本文提出了一种新的基于语义的XML关键字查询算法(SKSA)来解决上述问题。该算法充分利用了基于结构语义的节点语义信息。如果XML文档中没有该关键字,则将向用户返回相同或类似的结果,从而避免了遗漏的情况。在真实XML数据集上的测试实验结果表明,SKSA具有较高的查全率,能够更好地匹配用户的查询意图。
{"title":"Research on XML Keyword Query Method Based on Semantic","authors":"Guofeng Zhao, S. Tian","doi":"10.1109/ISCC-C.2013.120","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.120","url":null,"abstract":"In this paper, we study the problem of effective keyword search over XML documents, Keyword search for smallest lowest common ancestor(SLCA) in XML data has recently been proposed as a meaningful way to identify interesting data nodes in XML data where their sub trees contain an input set of keywords. XML retrieval technology has been concerned widely by information retrieval researchers. XML data contains rich semantic information, but most of query methods can't make full use of the semantic information. There will be missed case if there is no enough semantic information. This paper proposed a new XML keyword query algorithm based on semantic(SKSA) to solve the question above. The algorithm takes full use of the node semantic information based on structural semantic. The same or similar results will be returned to users if there is no the keyword in XML document, which avoids the missed case. The test experiment result on the real XML data sets shows that SKSA has higher recall rate, and can match the user's query intention better.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115735869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach of Face Identification in Line Drawings 线条图中人脸识别的新方法
Weikun Sun, Xin Pan
Face identification is the key step for reconstruction of a three dimensional object from a single two-dimensional line drawing depicting it. Many methods have been presented to solve this problem, and none of them considered the convexity of cycle polygon. In this paper we propose a new approach of face identification in line drawings, which combines together graph theory and convex property of polygons. With considering the convexity, we can overcome the difficulty of non-convex cycle polygons and our algorithm can deal with 3D solids of over 10,000 potential faces with efficiency. A couple of examples are provided in the end to show that our approach can handle some complex 3D reconstructions.
人脸识别是从单一的二维线条描绘物体重建三维物体的关键步骤。目前已有许多解决这一问题的方法,但都没有考虑到圆多边形的凸性。本文提出了一种将图论与多边形的凸性相结合的线条图人脸识别新方法。在考虑凸性的基础上,克服了非凸循环多边形的困难,算法可以高效地处理超过10000个潜在面的三维实体。最后给出了几个例子,表明我们的方法可以处理一些复杂的3D重建。
{"title":"A New Approach of Face Identification in Line Drawings","authors":"Weikun Sun, Xin Pan","doi":"10.1109/ISCC-C.2013.24","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.24","url":null,"abstract":"Face identification is the key step for reconstruction of a three dimensional object from a single two-dimensional line drawing depicting it. Many methods have been presented to solve this problem, and none of them considered the convexity of cycle polygon. In this paper we propose a new approach of face identification in line drawings, which combines together graph theory and convex property of polygons. With considering the convexity, we can overcome the difficulty of non-convex cycle polygons and our algorithm can deal with 3D solids of over 10,000 potential faces with efficiency. A couple of examples are provided in the end to show that our approach can handle some complex 3D reconstructions.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116381382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Logic-Based Fault Diagnosis of Simply Supported Bridge Using Modal Frequency as Input Variable 以模态频率为输入变量的模糊逻辑简支桥故障诊断
Yongchun Cheng, H. Guo, Xianqiang Wang, Yubo Jiao
Fault diagnosis of bridge is critical to guarantee the safe operation of structure. A fuzzy logic-based damage detection method is proposed in this paper to identify the single and multiple damages of bridge. Modal frequency is adopted as input parameter, while the damage severity is output one. Gauss and Bell functions are used as membership functions for input and output parameters, respectively. The fuzzy rule base is established according to suitable acquisition method. Numerical simulation for a simply supported bridge is used to verify the feasibility of the proposed method. The results reveal that the established fuzzy system possesses favorable memory, inference and anti-noise abilities. Its anti-noise level is favorable. The fuzzy logic method is feasible for fault diagnosis of bridge structure with single and multiple damaged locations under noise effect.
桥梁故障诊断是保证结构安全运行的关键。提出了一种基于模糊逻辑的桥梁损伤识别方法。模态频率为输入参数,损伤程度为输出参数。高斯函数和贝尔函数分别作为输入参数和输出参数的隶属函数。根据合适的获取方法建立模糊规则库。通过对一座简支桥的数值模拟,验证了所提方法的可行性。结果表明,所建立的模糊系统具有良好的记忆能力、推理能力和抗噪声能力。其抗噪声水平良好。模糊逻辑方法对于噪声影响下的单、多损伤位置的桥梁结构故障诊断是可行的。
{"title":"Fuzzy Logic-Based Fault Diagnosis of Simply Supported Bridge Using Modal Frequency as Input Variable","authors":"Yongchun Cheng, H. Guo, Xianqiang Wang, Yubo Jiao","doi":"10.1109/ISCC-C.2013.74","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.74","url":null,"abstract":"Fault diagnosis of bridge is critical to guarantee the safe operation of structure. A fuzzy logic-based damage detection method is proposed in this paper to identify the single and multiple damages of bridge. Modal frequency is adopted as input parameter, while the damage severity is output one. Gauss and Bell functions are used as membership functions for input and output parameters, respectively. The fuzzy rule base is established according to suitable acquisition method. Numerical simulation for a simply supported bridge is used to verify the feasibility of the proposed method. The results reveal that the established fuzzy system possesses favorable memory, inference and anti-noise abilities. Its anti-noise level is favorable. The fuzzy logic method is feasible for fault diagnosis of bridge structure with single and multiple damaged locations under noise effect.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123628340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Genetic Algorithm Based on Local Modularity for Community Detection in Complex Network 基于局部模块化的复杂网络社区检测改进遗传算法
Xinwu Yang, Rui Li
Community detection has been an issue in complex network research. In the paper, according to the definition of weak community, we firstly propose a local modularity and then design a new mutation operator with better efficiency based on local modularity. The mutation operator selects the neighbor node that can best embody the definition of weak community structures as mutated result, which makes the mutated candidate solution closer to the optimal solution. Furthermore, to accelerate the emergence of the optimal solution, the roulette selection is integrated into a uniform crossover operator. On the basis of the above works, an improved Genetic Algorithm based on the local modularity (IGALM) is presented for Community detection. The proposed algorithm is tested and compared to the other algorithms on both computer-generated network and real-world networks. The comparative experimental results reflect that the new algorithm is feasible and effective in small and large scale complex networks.
社区检测一直是复杂网络研究中的一个热点问题。本文根据弱群落的定义,首先提出了一种局部模块化,然后基于局部模块化设计了一种新的效率更高的突变算子。突变算子选择最能体现弱群体结构定义的相邻节点作为突变结果,使突变后的候选解更接近最优解。此外,为了加速最优解的出现,将轮盘选择整合到一个统一的交叉算子中。在以上工作的基础上,提出了一种改进的基于局部模块化的社区检测遗传算法(IGALM)。该算法在计算机生成的网络和实际网络上进行了测试,并与其他算法进行了比较。对比实验结果表明,新算法在小型和大型复杂网络中都是可行和有效的。
{"title":"An Improved Genetic Algorithm Based on Local Modularity for Community Detection in Complex Network","authors":"Xinwu Yang, Rui Li","doi":"10.1109/ISCC-C.2013.42","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.42","url":null,"abstract":"Community detection has been an issue in complex network research. In the paper, according to the definition of weak community, we firstly propose a local modularity and then design a new mutation operator with better efficiency based on local modularity. The mutation operator selects the neighbor node that can best embody the definition of weak community structures as mutated result, which makes the mutated candidate solution closer to the optimal solution. Furthermore, to accelerate the emergence of the optimal solution, the roulette selection is integrated into a uniform crossover operator. On the basis of the above works, an improved Genetic Algorithm based on the local modularity (IGALM) is presented for Community detection. The proposed algorithm is tested and compared to the other algorithms on both computer-generated network and real-world networks. The comparative experimental results reflect that the new algorithm is feasible and effective in small and large scale complex networks.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Attack on Mona: Secure Multi-owner Data Sharing for Dynamic Groups in the Cloud 对Mona的攻击:云中动态组的安全多所有者数据共享
Zhongma Zhu, Z. Jiang, R. Jiang
With the characters of low maintenance and little management cost, cloud computing offers an effective and economical approach for data sharing in the cloud among group members. However, since the cloud is untrustworthy, the security guarantees for the sharing data become our concerns. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue. Recently, Liu et al presented a secure multi-owner data sharing scheme, named Mona, which was claimed that any group member could anonymously share data with others by exploiting group signature technique. Meanwhile, the scheme could address fine-grained access control, which means that not only the group members could use the sharing data resource at any time, but also the new users were able to use the sharing data immediately after their revocations and the revoked users will not be allowed to use the sharing data again after they are removed from the group. However, through our security analysis, the Mona scheme still has some security vulnerabilities. It will easily suffer from the collusion attack, which can lead to the revoked users getting the sharing data and disclosing other legitimate members' secrets. In addition, there is another security shortage in the user registration phase, which is how to protect the private key when distributing it in the unsecure communication channels. This kind of attack can also lead to disclosing the user's secret data.
云计算具有维护成本低、管理成本低的特点,为群组成员之间在云中共享数据提供了一种有效而经济的方法。然而,由于云是不可信的,共享数据的安全保障成为我们关注的问题。不幸的是,由于成员的频繁变化,在提供隐私保护的同时共享数据仍然是一个具有挑战性的问题。最近,Liu等人提出了一种名为Mona的安全多所有者数据共享方案,该方案声称任何组成员都可以利用组签名技术匿名地与他人共享数据。同时,该方案能够解决细粒度的访问控制问题,即不仅组内成员可以随时使用共享数据资源,而且新用户在撤销后可以立即使用共享数据,被撤销的用户在退出组后将不再被允许使用共享数据。但是,通过我们的安全性分析,Mona方案仍然存在一些安全漏洞。它很容易遭受合谋攻击,导致被撤销用户获取共享数据,泄露其他合法用户的秘密。此外,在用户注册阶段还存在另一个安全不足,即在不安全的通信通道中分发私钥时如何保护私钥。这种攻击还可能导致用户的秘密数据泄露。
{"title":"The Attack on Mona: Secure Multi-owner Data Sharing for Dynamic Groups in the Cloud","authors":"Zhongma Zhu, Z. Jiang, R. Jiang","doi":"10.1109/ISCC-C.2013.135","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.135","url":null,"abstract":"With the characters of low maintenance and little management cost, cloud computing offers an effective and economical approach for data sharing in the cloud among group members. However, since the cloud is untrustworthy, the security guarantees for the sharing data become our concerns. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue. Recently, Liu et al presented a secure multi-owner data sharing scheme, named Mona, which was claimed that any group member could anonymously share data with others by exploiting group signature technique. Meanwhile, the scheme could address fine-grained access control, which means that not only the group members could use the sharing data resource at any time, but also the new users were able to use the sharing data immediately after their revocations and the revoked users will not be allowed to use the sharing data again after they are removed from the group. However, through our security analysis, the Mona scheme still has some security vulnerabilities. It will easily suffer from the collusion attack, which can lead to the revoked users getting the sharing data and disclosing other legitimate members' secrets. In addition, there is another security shortage in the user registration phase, which is how to protect the private key when distributing it in the unsecure communication channels. This kind of attack can also lead to disclosing the user's secret data.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Multi-objective TT&C Mission Planning Technique for On-Orbit Service 在轨服务多目标测控任务规划技术
Jing Li, Xiaosong Gu, Gangqiang Ye
The multi-objective TT&C (Tracking, Telemetry and Command) mission planning technique is studied based on the background of both ground-based and space-based TT&C mission to the OOS (On-Orbit Service) type of “one-station to multi-objective”. Firstly, the characteristics and constraint condition of OOS TT&C mission are analyzed. Secondly, the space-based and ground-based TT&C mission planning models are established. Finally, using typical OOS mission as an example, the method of TT&C resource planning is simulated for ground-based multi-objective and ISL (InterSatellite Link). The optimized design of TT&C events, optimization scheduling of TT&C resources and automatic implementation strategies of TT&C operations are included to the TT&C mission in this paper. The research results show that the ground-based TT&C resource can be saved by using of space-based TT&C resource. The technical reference can be provided for the implementation of future spacecraft OOS by the research results.
以“一站多目标”在轨服务模式下的地基和天基测控任务为背景,研究了多目标测控任务规划技术。首先,分析了OOS测控任务的特点和约束条件。其次,建立了天基和地基测控任务规划模型;最后,以典型OOS任务为例,对地面多目标和星间链路的测控资源规划方法进行了仿真。本文的测控任务包括测控事件的优化设计、测控资源的优化调度和测控操作的自动实施策略。研究结果表明,利用天基测控资源可以节约地面测控资源。研究成果可为未来航天器OOS的实施提供技术参考。
{"title":"Multi-objective TT&C Mission Planning Technique for On-Orbit Service","authors":"Jing Li, Xiaosong Gu, Gangqiang Ye","doi":"10.1109/ISCC-C.2013.87","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.87","url":null,"abstract":"The multi-objective TT&C (Tracking, Telemetry and Command) mission planning technique is studied based on the background of both ground-based and space-based TT&C mission to the OOS (On-Orbit Service) type of “one-station to multi-objective”. Firstly, the characteristics and constraint condition of OOS TT&C mission are analyzed. Secondly, the space-based and ground-based TT&C mission planning models are established. Finally, using typical OOS mission as an example, the method of TT&C resource planning is simulated for ground-based multi-objective and ISL (InterSatellite Link). The optimized design of TT&C events, optimization scheduling of TT&C resources and automatic implementation strategies of TT&C operations are included to the TT&C mission in this paper. The research results show that the ground-based TT&C resource can be saved by using of space-based TT&C resource. The technical reference can be provided for the implementation of future spacecraft OOS by the research results.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127555405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Design of the Clock Synchronization for the Bridge Health Monitoring System Based on Wireless Sensor Network 基于无线传感器网络的桥梁健康监测系统时钟同步的研究与设计
Hongke Xu, M. Song, Xiaohong Wang, Jiayu Yang, Enmao Quan
This paper constructs a bridge health monitoring system based on Wireless Sensor Network. In order to detect and obtain the bridge's status information, we have studied the clock synchronization problem between the sensor nodes in wireless sensor network of the bridge health monitoring system. The clock synchronization simulation verifies the design of asymmetrical clock synchronization algorithm in the wireless sensor of the bridge health monitoring system is valid and reliable. The simulation results show that this clock synchronization algorithm can realize the clock synchronization and be able to monitor real-time bridge conditions.
本文构建了一个基于无线传感器网络的桥梁健康监测系统。为了检测和获取桥梁的状态信息,研究了桥梁健康监测系统无线传感器网络中各传感器节点之间的时钟同步问题。时钟同步仿真验证了桥梁健康监测系统无线传感器中不对称时钟同步算法设计的有效性和可靠性。仿真结果表明,该时钟同步算法能够实现时钟同步,并能够实时监控桥梁状况。
{"title":"Research and Design of the Clock Synchronization for the Bridge Health Monitoring System Based on Wireless Sensor Network","authors":"Hongke Xu, M. Song, Xiaohong Wang, Jiayu Yang, Enmao Quan","doi":"10.1109/ISCC-C.2013.107","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.107","url":null,"abstract":"This paper constructs a bridge health monitoring system based on Wireless Sensor Network. In order to detect and obtain the bridge's status information, we have studied the clock synchronization problem between the sensor nodes in wireless sensor network of the bridge health monitoring system. The clock synchronization simulation verifies the design of asymmetrical clock synchronization algorithm in the wireless sensor of the bridge health monitoring system is valid and reliable. The simulation results show that this clock synchronization algorithm can realize the clock synchronization and be able to monitor real-time bridge conditions.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127495209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 International Conference on Information Science and Cloud Computing Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1