{"title":"Design of smartphone based authentication protocol for beacon detection in disaster system","authors":"Jae-Pil Lee, Jae-Gwang Lee, Eun-Su Mo, Jun-Hyeon Lee, Ki-Su Yoon, Jae-Kwang Lee","doi":"10.1109/ICEICT.2016.7879660","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879660","url":null,"abstract":"Sensor network technology has received increasing interest recently. Sensor network technology is to sense an object or environmental information and collect, analyze and process necessary information in order to predict and prevent Disasters. Sensor network technology consists of wireless communication and due to the lower computing capability and limited power supply, security risk increases. In this study, authentication protocol is designed to identify authenticated sensors by using HIGHT coding algorithm in the smart phone environment. And the authentication record in the authentication server is inspected to provide only normal sensor information to Disaster service users in this proposed authentication protocol.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuang Ma, Peng-Yuan Wang, Fu-Liang Zhang, F. Meng, Qun Wu
{"title":"Electrically controlled leaky wave antenna with wide-angle scanning based on liquid crystal","authors":"Shuang Ma, Peng-Yuan Wang, Fu-Liang Zhang, F. Meng, Qun Wu","doi":"10.1109/ICEICT.2016.7879779","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879779","url":null,"abstract":"In this paper, a design method of electrically controlled leaky wave antenna based on liquid crystal is proposed and investigated. The leaky wave antenna is composed of a rectangular waveguide and an inverted PCB micro-strip structure with eight short slots. By loading bias voltage to the liquid crystal, the leaky wave antenna implements wide beam scanning on fixed frequencies. Simulation results indicate that a 36° beam scanning range is realized in Ku band.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Camera security network design and realization based on PCA facial recognition algorithms","authors":"Chaoqun Jing, Tian Liang, Qijun Lei","doi":"10.1109/ICEICT.2016.7879643","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879643","url":null,"abstract":"Single-Camera Video Surveillance (SCVS) has mainly been applied in the passive monitoring. Video surveillance covers small area. The video information is not sufficient without the joint tracking capability. Currently poor performance in most similar networks is mainly due to unintelligence and low real-time. In this paper we proposed a distributed smart multi-eyes camera network by utilizing smart phones, which presents not only the schemes but also its concrete realization. Using the smart camera network with good self-organization in time, the target would be captured and tracked in good manner and the running track for the target can be restored and recovered anytime. This work is aimed at utilizing unused mobile phones to form a security network. The contribution is aimed at improving the accuracy stranger invasion detection. In order to finish the task of recognizing faces of distant targets, we use PCA-based facial recognition algorithm to enhance the effective resolution. We list different approaches of increasing the resolution and use the best approach to handle different situation. In the mean time we designed and realized the overall structure of the security network including database module design, client terminal design and monitoring node design, forming a robust and energy saving network. This paper can provide valuable reference for the design of the practical security network which is currently in high social demand.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DPSK modulation OTDM system at 40Gbps","authors":"Luo Wen, Guan Yalin","doi":"10.1109/ICEICT.2016.7879655","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879655","url":null,"abstract":"Optical Time Division Multiplexing (OTDM) is one of the effective methods to improve the transmission rate of optical communications [1]. Optical communications researchers use optical method to convert electric time division-multiplexing signal into higher rate optical signal. OTDM system overcomes the limited rate of electronic communication [7]. In this paper, we simulate and design a point to point 40Gbps OTDM system by using OptiSystem, and use DPSK (Differential Phase-Shift Keying) modulation format in this system. It achieves efficient and reliable transmission of data which satisfies an ever-growing demand for bandwidth of high-speed optical fiber communications.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method for 3D model identification using histogram normalization based on conformal factor","authors":"Ruichen Jin, Jongweon Kim","doi":"10.1109/ICEICT.2016.7879717","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879717","url":null,"abstract":"Various people upload a large number of 3D models on website. For protecting the copyright of 3D contents, the technologies for 3D model identification then became necessary. In this paper, we present a method using conformal factor to extract the node of 3D model's topology and combine the data of vertexes histogram of projection from center of sphere to the surface of sphere reference to the latitude and longitude. We resize the 3D models with minimum radius bounding and normalize the size of radius bounding sphere and histogram. It can increase the robustness in various transform and attacks. We use conformal factor to get the 3D model's topology and extract the skeleton and nodes of 3D model. From analyzing the structure of the skeleton and nodes of 3D model, we classify the models. It can improve the identification rate. After this process, we get progressive results in 3D model identification.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planar EBG structure for broadband suppression of simultaneous switching noise","authors":"Panpan Chen, Qun Wu, Shao-Rui Shi","doi":"10.1109/ICEICT.2016.7879772","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879772","url":null,"abstract":"Simultaneous switching noise is the main reason that greatly affects power integrity of power distribution network. In order to suppress simultaneous switching noise in low frequency range and expand the stop-band bandwidth, we propose a new type planar electromagnetic band-gap (EBG) structure which is achieved by increasing the connection bridge between the patches. It can be directly embedded in high-speed circuit PCB. When the suppression depth is −30dB, the stop-band is 0.29–7.21GHz. The proposed electromagnetic band-gap structure can effectively decrease the lower cutoff frequency and expand the stop-band bandwidth which is confirmed by simulation.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"44 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attitude estimation by using MEMS IMU with Fuzzy Tuned Complementary Filter","authors":"Dung Quoc Duong, Jinwei Sun, T. Nguyen, Lei Luo","doi":"10.1109/ICEICT.2016.7879720","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879720","url":null,"abstract":"This paper presents a novel tuning method for complementary filter exploited for attitude estimation. The complementary filter is the choice of the day in fields where computational simplicity, low power consumption and low cost involved are of prime significance with little interest in the highest degree of accuracy. It is well-known that attitude estimation based on gyroscope measurement alone quickly diverges due to inherent bias issue which is compensated by accelerometer using filtering algorithms. Conventional Complementary Filters (CCF) employed for attitude estimation have fixed filters gain which makes them impassive to the dynamic situation through which the system undergoes, resulting in erroneous estimations in such case. The more complex algorithms have been employed at the cost of computational complexity but are not suitable for most applications based on simple approach and resources. In this paper, Fuzzy Tuned Complementary Filter (FTCF) is proposed to eradicate this issue with the obvious benefit of least computational burden. The proposed algorithm is appraised and validated in conjunction with the well-established Kalman filter using MEMS-based IMU.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadband DDC based on polyphase filter and its FPGA implementation","authors":"Tong Liu, Jianfgui Han, Zhigang Li","doi":"10.1109/ICEICT.2016.7879676","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879676","url":null,"abstract":"Digital Down Conversion (DDC) is one of the key technologies for software radio, which converts high frequency data streams into low frequency data streams for easy subsequent real-time processing by DSP devices. This paper presents a under the digital frequency conversion method based on polyphase filtering. Using Field Programmable Gate Array (FPGA) under the high speed digital frequency conversion was implemented, and introduced including Numerical Controlled Oscillator(NCO), frequency mixing module, CIC filter, HB filters, FIR filter, are discussed in detail. Meanwhile, use the software radio platform of my laboratory and the chipscope to collect data, and use the Matlab analyze the data, to verify the correctness and feasibility of the theoretical simulation.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng
{"title":"A secret communication system via SD-SMSE","authors":"Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng","doi":"10.1109/ICEICT.2016.7879670","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879670","url":null,"abstract":"Setting up a communication system should also pay attention to both security and concealment in addition to the validity and reliability of the information, especially in military communication. In this paper, we introduce an application of the SD-SMSE framework under the secret communication, and the application combines overlay and underlay access with encryption. At the receiving end, we use the received key to restore the original information from the received encrypted information. The simulation results approve the feasibility of the framework under the given new application, which improves the utilization of spectrum and ensures the security of communication.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The optimization of conformal array based on the CVCPSO","authors":"Qingchao Zhu, Q. Lai","doi":"10.1109/ICEICT.2016.7879746","DOIUrl":"https://doi.org/10.1109/ICEICT.2016.7879746","url":null,"abstract":"In order to optimize the radiation performance of conformal array, the CVCPSO is introduced in this paper. The amplitude of elements can be optimized by the CVCPSO when the arrangement form is settled. The CVCPSO is much easier to find the global optimal position while BPSO shows a weak ability to escape from regional optimal values. Results show that the array optimized by the CVCPSO presents lower PSLL and higher gain.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}