{"title":"Clock synchronization technology based on FPGA","authors":"Chen Yong, Wu Hao, Tan Xiaofeng, Wu Wenbo","doi":"10.1109/ICCSN.2015.7296124","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296124","url":null,"abstract":"To solve clock synchronization problem in distributed system, two hardware methods were introduced. External 1PPS clock was used to generate synchronized clock (S clock) in local frequency domain. In one method, 1PPS clock was directly tracked and locked by hardware logic, and then stimulates S clock immediately. 1PPS glitch and clock-lost problems in field were solved. In the other method, the multi-clocks mathematical models were built to correct 1PPS clock self-jitter. All the program were realized in one FPGA chip with NiosII soft CPU, which were pure physical layer synchronization style. Compared to traditional software solutions in the host computer, hardware clock synchronization can reach microseconds precision, and is more stable.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trust bootstrapping model for defense agents","authors":"Yang-Zhe Yu, Chunhe Xia, Zhong Li","doi":"10.1109/ICCSN.2015.7296132","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296132","url":null,"abstract":"In the system of computer network collaborative defense (CNCD), defense agents newly added to defense network lack of historical interaction, which leads to the failure of trust establishment. To solve the problem of trust bootstrapping in CNCD, a trust type based trust bootstrapping model was introduced. Trust type, trust utility and defense cost was discussed first. Then the constraints of defense tasks were gained based on the above analysis. According to the constraints obtained, we identified the trust type and assigned the initial trustworthiness to defense agents (DAs). The simulated experiment shows that the methods proposed in the present work have lower failure rate of tasks and better adaptability.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134139097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of residue number system (RNS) to image processing using orthogonal transformation","authors":"G. Armah, Emmanuel Ahene","doi":"10.1109/ICCSN.2015.7296177","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296177","url":null,"abstract":"Several techniques for image encryption have been proposed over the years with significant consideration of basic cryptographic goals such as authentication, integrity and confidentiality. Recently, another method for encrypting image data using an Orthogonal transform namely Walsh Hadamard transform on residual number system have been proposed. In this paper, we basically analyse this approach and propose an efficient method for this type of encryption scheme. We modify the transform algorithm of the previous technique by implementing the Fast Walsh Hadamard transform algorithm. The fast Walsh Hadamard transform algorithm has been proved to be the efficient algorithm to compute the Walsh Hadamard transform with computational complexity of O(N log N). We emphasise that the naive implementation of the Walsh Hadamard transform yields a computational complexity of O(N2). In this paper we demonstrate the efficiency of our approach using 32 chosen eigenvalues in the key generation algorithm. The eigenvalues are derived from a reference image. Throughout the processes on the image data, we use modular arithmetic to ensure that computations with the resulting RNS become very efficient. Moreover, the approach considers image in a divided matrix domain and finally combines all independent cryptographic operations as encryption is a one-to-one mapping. This deals with the possibility of having any pixel value ill-stored or wrongly received at the receiver end, without affecting the decryption process. However, the final recovered image will differ by a negligible amount.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel robust algorithm attenuating non-line-of-sight errors in indoor localization","authors":"Bo You, Xueen Li, Xudong Zhao, Yijun Gao","doi":"10.1109/ICCSN.2015.7296117","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296117","url":null,"abstract":"In time of arrival (TOA) based indoor personnel positioning system, the human body mounted with positioning devices could cause non-line-of-sight (NLOS) propagation and further give rise to large ranging errors, thus reducing the accuracy of localization. A novel NLOS identification and mitigation method based on UWB signal power is proposed in this paper, which solves the problem that the performance of classical least squares (LS) algorithm severely degrades in NLOS environments. An improved self-learning LS localization algorithm is also introduced, overcoming the drawbacks of LS estimator that it requires at least three range estimates for an unambiguous solution. Furthermore, we demonstrate the proposed approach outperforms traditional LS algorithm with an increasing localization accuracy by 50% in NLOS scenarios.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RGB-D geometric features extraction and edge-based scene-SIRFS","authors":"Bingjie Yang, E. Chen, Shou-yi Yang, Wenjuan Bai","doi":"10.1109/ICCSN.2015.7296174","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296174","url":null,"abstract":"In this paper, we propose a geometric features extraction approach for RGB-D image and its application in intrinsic scene properties recovery. Our approach extracts geometric features, and make use of both 3D shape information from depth map and edge information from RGB image. Geometric features are categorized as occlusion edges and fold edges. The proposed method can not only extract the edge information from the RGB-D image accurately and efficiently, but also classify the edge information effectively. Moreover, our algorithm is close to the real time processing. Besides, we present an application of these geometric features as edge-based intrinsic scene properties recovery. Experimental results demonstrate that our proposed of geometric features extraction and edge-based intrinsic scene properties recovery outperforms Scene-SIRSF algorithms.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on pulse power spectrum calculation method based on TCM","authors":"Xingsheng Che, Xinqiao Xu, Juan Sun, Hui Xu","doi":"10.1109/ICCSN.2015.7296179","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296179","url":null,"abstract":"A new method of calculating human pulse spectrum is introduced, which is combined with the characteristics of Chinese medicine theory and human pulse. The method comprises 3 parts, typical cycle selection, resampling and normalized processing, and utilizing data captured from Cun, Guan and Chi position of radial artery on both hands. The calculation result of smooth pulse and taut pulse were analyzed based on Traditional Chinese Medicine (TCM) description, and compared with the power spectrum calculated by traditional method in order to prove the rationality. The conclusion of relationship between energy distribution and pulse characteristics was reached.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Zeng, Mingqiang Yang, Zhen-Xing Cui, A. Al-Kabbany
{"title":"An improved saliency detection using wavelet transform","authors":"Wei Zeng, Mingqiang Yang, Zhen-Xing Cui, A. Al-Kabbany","doi":"10.1109/ICCSN.2015.7296181","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296181","url":null,"abstract":"With a saliency map providing the information of locations where are visually salient to human visual system, region based image processing can be performed more efficiently. In this paper, we propose a method to compute the saliency map. Firstly we reconstruct from different levels in wavelet transform with different weight to obtain feature maps which can represent features from edge to texture to gain the local saliency map. Then we segment and merge similar regions to calculate the global saliency. The final saliency map is computed by modulating local saliency value with its global saliency value. Our proposed model outperforms many of the relevant state-of-the-art saliency detection models.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ping He, Boli Zhai, Yan Yi, Jianchun Cai, Zucheng Dai, Xianfeng Cheng
{"title":"Design of the mobile learning platform based on the 3g technique and cloud calculation","authors":"Ping He, Boli Zhai, Yan Yi, Jianchun Cai, Zucheng Dai, Xianfeng Cheng","doi":"10.1109/ICCSN.2015.7296161","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296161","url":null,"abstract":"Through the analysis of the all new ambulation study environment under the technique of the 3G and cloud calculation blend, and put forward design speculation of the ambulation study terrace and the system structure function structure diagram according to 3 G technique and cloud calculation, and pointed out the improvement measure and usage foreground of ambulation study terrace.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ramadan, Fagen Li, Chunxiang Xu, K. Oteng, Hesham Ibrahim
{"title":"Authentication and key agreement scheme for CDMA cellular system","authors":"M. Ramadan, Fagen Li, Chunxiang Xu, K. Oteng, Hesham Ibrahim","doi":"10.1109/ICCSN.2015.7296138","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296138","url":null,"abstract":"The code division multiple access (CDMA) system is considered to be the most secured cellular standard because of its strong security techniques such as scrambling and interleaving. These security techniques have been improved from the GSM security system. However, the CDMA cellular standard still has some limitations particularly in term of authentication and key agreement process. In this paper, a new authentication and key agreement protocol is proposed to provide a security technique to ensure the mutual authentication of both the mobile station and the network provider, as well as provide a key agreement protocol for session keys by using short and efficenent signature with bilinear pairing method with some modifications to make the proposed scheme more compatible for the CDMA cellular system.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel preamble-aided symbol timing estimation for burst communication","authors":"Zhao Wu, Yu Zhang, Long Jiang, Song Jian","doi":"10.1109/ICCSN.2015.7296158","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296158","url":null,"abstract":"Burst data transmission is widely used in wireless communications. Rapid and robust symbol timing is critical for burst communication and it has a great impact on the performance of subsequent demodulation and the whole system. Feed-forward symbol timing has the advantage of fast convergence and it is very suitable for burst communication. Feed-forward symbol timing estimation, generally speaking, can be classified into two broad categories: non-data-aided symbol timing estimation and data-aided symbol timing estimation. In this paper we present a novel data-aided symbol timing estimation. The symbol timing offset estimation is based on the cross correlation output of the preamble and square processing is utilized, which is similar to the non-data-aided symbol timing. The proposed estimation exhibits good performance with low complexity. Besides, it is shown by computer simulations that the method is not sensitive to roll-off factor and works well at low SNR.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126321985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}