{"title":"Low Power Interactive Operating System and SCADA Based Universal Wireless Gateway for Automation Using Cloud Technology","authors":"A. Ramesh, Manas Agarwal","doi":"10.1109/ICISCE.2015.182","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.182","url":null,"abstract":"Over the past decade, automation has become a trend in every dimension of the technology namely industrial, automobile, aerospace, defence and information technology. But the automation in different fields demands different platforms. Therefore to achieve uniformity and congruity, this paper provides a UNIVERSAL WIRELESS GATEWAY FOR AUTOMATION to support the automation of all the above mentioned fields. SCADA (Supervisory control and Data Acquisition) and Cloud technologies are the two most rapidly evolving technologies in the last few years. The integration of automation with other technologies always escalates its resourcefulness. So an embedded system is proposed and built to endorse the collaboration of SCADA and Cloud technologies to achieve automation through supervision and control of a system or a set of systems from a remote place over different networks. A low power operating system design techniques is presented to avail the services of the input/output devices consuming less power. This paper also provides a platform to supervise and monitor a huge system and avail the cloud services using minimum resources and cost of implementation.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124588271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An RFID-Based Dynamic Positioning Scheme with MATLAB GUI","authors":"Mengna Xie, Mei Wang, Zhenghong Liu","doi":"10.1109/ICISCE.2015.135","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.135","url":null,"abstract":"This paper focuses on a RFID-Based dynamic positioning scheme, aiming to locate an object by using a moving RFID reader and reference tags without recording any measurement data, e.g., the time of arrival (TOA) of the signal, or the received signal strength indication (RSSI). To address the problem of blindness of location path, a RFID-based positioning scheme with MATLAB GUI, is proposed based on the theory of the original dynamic positioning method. The status of all the tags read by moving reader can be monitored whenever necessary. Moreover, a power-adjustable method of location path is proposed for saving positioning time. Results of experiments indicate that the proposed dynamic positioning scheme is user-friendly control and can positioning accurately with low cost, which would be applied in localization of warehouse management in the future.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"123 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121189159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm for Secure Outsourcing Composite Modular Exponentiation","authors":"Jie Liu, Bo Yang","doi":"10.1109/ICISCE.2015.107","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.107","url":null,"abstract":"Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that this algorithm is secure in the one-malicious model and give efficiency analysis later. Comparing with other algorithms, ours is more efficient for composite modular exponentiation. Finally, we use this algorithm to realize a outsource-secure algorithm for Shamir's Identitybased Signature scheme.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124347505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Codes Derived from Two Construction Methods","authors":"L. Huimin, Dong Xuedong, L. Zhenxing","doi":"10.1109/ICISCE.2015.197","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.197","url":null,"abstract":"There are mainly two efficient constructing methods for quantum codes, the construction named after Calderbank, Shor and Stean, and the hermitian code construction. We compare two methods in quantum cyclic codes and quantum duadic codes separately, and show that the hermitian code construction is better in terms of existence conditions of codes and the code parameters.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124474720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-polynomial LFSR Based BIST Pattern Generator for Pseudorandom Testing","authors":"H. Ren, Z. Xiong","doi":"10.1109/ICISCE.2015.132","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.132","url":null,"abstract":"In this paper, a new linear feedback shift register (LFSR) structure for scan-based built-in self-test (BIST), which has at least two characteristic polynomials, is proposed. Multiple polynomials are utilized to generate the pattern sequences for feeding the scan chain of the circuit under test in pseudorandom testing phase. Using the proposed LFSR, same or even better fault coverage can be achieved in pseudorandom testing phase with less hardware cost, hence can also reduce the test application time in deterministic testing phase. Experimental results demonstrate the advantages of the proposed LFSR over the conventional ones.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low Cost Anti-aliasing Scheme for Mobile Devices","authors":"Daolu Zha, Xi Jin, An Wu, Tian Xiang, Xueliang Du","doi":"10.1109/ICISCE.2015.11","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.11","url":null,"abstract":"An improved anti-aliasing sampling algorithm is submitted to reduce the increasing memory consumption caused by super-sampling in mobile devices. Six-point anisotropy sampling blends the two samples of a pixel, as well as the nearby pixels. Experiment results showed that six-point anisotropy sampling has reduced the memory consumption by 50% than traditional FLIPQUAD anti-aliasing super-sampling algorithm. This method has similar quality to FLIPQUAD with only 50% memory consumption.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DST Hardware Structure of HEVC","authors":"J. Nan, N. Yu, Wei Lu, Dong-fang Wang","doi":"10.1109/ICISCE.2015.127","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.127","url":null,"abstract":"HEVC (High Efficiency Video Coding) is a new generation of video coding standard which is proposed by ITU-T VCEG and ISO/IEC MPEG for the increasingly widespread application of high-definition video. On the basis of original DCT transform of H.264, HEVC has proposed a DST transform with the size of 4×4. We design the hardware structure of pipelined DST by analyzing software algorithm, according to the parallel characteristics of the ASIC, only with shifters, addition, counters and 4-2 compression method. After logic synthesis using SMIC 0.13μm standard cell library, simulation results show that the proposed architecture of 4×4 DST logic gates for 7K. The design can meet the demanding of timing sequence under the circumstance of real-time processing of 3840×2160@25fps sequences of images under 300MHz, and is very suitable for VLSI HD encoder.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous Challenge-Response Authentication Solution Based on Smart Card in Cloud Environment","authors":"Guifen Zhao, Ying Li, Liping Du, Xin Zhao","doi":"10.1109/ICISCE.2015.42","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.42","url":null,"abstract":"In order to achieve secure authentication, an asynchronous challenge-response authentication solution is proposed. SD key, encryption cards or encryption machine provide encryption service. Hash function, symmetric algorithm and combined secret key method are adopted while authenticating. The authentication security is guaranteed due to the properties of hash function, combined secret key method and one-time authentication token generation method. Generate random numbers, one-time combined secret key and one-time token on the basis of smart card, encryption cards and cryptographic technique, which can avoid guessing attack. Moreover, the replay attack is avoided because of the time factor. The authentication solution is applicable for cloud application systems to realize multi-factor authentication and enhance the security of authentication.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matching of Feature Points for Moneynote Fragment Assembly","authors":"Chih-Ying Gwo, Chia-Hung Wei, An-Wen Deng","doi":"10.1109/ICISCE.2015.72","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.72","url":null,"abstract":"Banknotes, known as a bill, paper money, or simply a note, may be shredded by a scrap machine, ripped up by hand, or damaged in accidents. To assemble broken money note pieces is one of the time-consuming tasks encountered by forensic institutes. This paper proposes an effective scheme to match feature points and rotate the orientation of each fragment for banknote assembly. The experimental results show that the proposed scheme achieves the least errors in the estimated rotation angle.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132494015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Model Predictive Control for a Bicycle-Rider System","authors":"Chih-Keng Chen, T. Chu","doi":"10.1109/ICISCE.2015.185","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.185","url":null,"abstract":"In this study, a bicycle-rider system was developed. Model predictive control (MPC) is used to control the system follows reference roll-angle. Control inputs are steering torque on the handle bar and the leaning torque of rider's upper body. The performance of the controller, the interaction between rider's motion and the bicycle dynamics are discussed via simulation results.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130740190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}