{"title":"Examples of quadrocopter control on ROS","authors":"L. Cheng, H. Liu","doi":"10.1109/ICASID.2015.7405668","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405668","url":null,"abstract":"In this paper, the first example to be studied is a system that could localize a quadrocopter in an environment which is either indoor or outdoor without the help of GPS signals. The onboard camera of a quadrocopter without requiring any external sensors or markers will be used. In this system, firstly, the pose estimation based on SLAM (simultaneous localization and mapping) is used[4][7]. Secondly, extended Kalman filter is used to compensate the delay due to data communications and computations. Thirdly, a PID controller is used to control the drone's position and orientation[13][3]. The second example to be studiedis the Ardrone could be simply controlled by a human hand that fulfilled by using a leap motion controller with hand gestures and the controller is connected to ROS platform[10] under Ubuntu.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"12 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Map-based multi-path routing protocol in VANETs","authors":"Yiming Lin, Weitian Huang, Yuliang Tang","doi":"10.1109/ICASID.2015.7405680","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405680","url":null,"abstract":"Due to vehicle movement and propagation loss of radio channel, providing a routing protocol for reliable multihop communication in VANETs is particularly challenging. In this paper, we present a map-based multi-path routing protocol for VANETs - MBMPR, which utilizes GPS, digital map and sensors in vehicle. With global road information, MBMPR finds an optimal forward path and an alternate path using Dijkstra algorithm, which improves the reliability of data transmission. Considering the load balance problem in junctions, a congestion detection mechanism is proposed. Aiming at the packet loss problem due to target vehicle's mobility, MBMPR adopts recovery strategy using location-based services and target vehicle mobility prediction. The simulations demonstrate MBMPR has significant performances comparing with classical VANETs routing protocols.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A data-rate-regulable UWOC system using RZ-OOK modulation","authors":"Mingbo Wang, Kai Wu, Huiying Xu","doi":"10.1109/ICASID.2015.7405678","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405678","url":null,"abstract":"In this paper, we demonstrated a data-rate-regulable laser communication system model with moderate data rate which can be up to several hundred kilobits per second (kbps) while data rate is regulable. We use continuous-wave (cw) blue laser (λ =443nm) which can be driven with TTL-level as the transmitter. Although continuous-wave (cw) blue laser are readily available, they cannot be easily modulated at high frequency (less than 2 MHz). After comparing the current commonly used modulation method of optical communication and specially analyzed the key technology for underwater/undersea wireless optical communication (UWOC) according to the situation of our lab. We put forward an improved \"return to zero\" On-Off Keying (RZ-OOK) modulation method to complete the UWOC system model. The improved RZ-OOK modulation method is easier and more flexible in some cases.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133142419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of wireless transmission using CC3100 based on RT-Thread","authors":"Lingfeng Qiu, Zhiyuan Shi, Hezhi Lin, Chao Feng","doi":"10.1109/ICASID.2015.7405683","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405683","url":null,"abstract":"A design scheme of wireless data transmission system is presented, which adopts Nuvoton N32926 embedded microprocessor as the system controller and RT-Thread embedded operation system is used. This paper describes the compiling and transplanting of TI CC3100 device driver, such that the system can send the data to CC3100 via the N32926 SPI interface. Finally, the description of how the system accomplishes the reception and transmission of data by the RF module of CC3100. This paper introduces the structure of the system framework and the realization of wireless transmission module.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic configuration for IPv4/IPv6 address mapping in 4over6 technology","authors":"Zilong Liu, Jiang Dong, Yong Cui, Chaokun Zhang","doi":"10.1109/ICASID.2015.7405677","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405677","url":null,"abstract":"The configuration for address mapping is an important process for IPv4-over-IPv6 (4over6) technology, which is the major scenario of IPv6 transition. However, it is not straightforward to use current configuration methods because they were only designed to solve part of the configuration scenario. In this paper, we first analyze the challenges of current configuration solutions. After that, we propose a dynamic configuration mechanism for address mapping based on the DHCPv4 over DHCPv6 (DHCP4o6) lease query. The boarder router device (BR) in 4over6 transition is able to obtain the IPv4/IPv6 heterogeneous lease of customer premises equipment (CPE) in bulk or in real-time with the help of our method. The lease will then be used to build the address mapping table. We implement the prototype system and verify it in a real 4over6 network at Tsinghua University. The results show that our mechanism satisfies the requirement of quick establishment of address mapping table when BR device is being initiated. Furthermore, our solution reduces the load of BR device comparing to current methods.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122032554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of network structure entropy to convergence rate of distributed synchronization algorithm in RGGs","authors":"S. Ni, Jingfeng Qian, Qi Yang","doi":"10.1109/ICASID.2015.7405673","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405673","url":null,"abstract":"In this paper, we firstly introduce the random geometric graph (RGG) as the model of wireless sensor networks (WSNs), and point out that the convergence rate of distributed synchronization algorithm in WSNs is depended on the second largest eigenvalue of the update matrix based on the network topology. Then we take three network structure entropies, which are degree distribution entropy, Wu entropy and SD entropy, into consideration of the convergence rate. The relationship between network structure entropy and the convergence rate is also studied. After the simulations of the three network structure entropy, we find that the degree distribution entropy is more suitable to reflect the characteristic of RGG. Finally, we verify that when the network is more regular, the degree distribution entropy will decrease and the convergence rate of the networks will hereby increase.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved cache strategy based on WSP cooperation","authors":"Biao Liang, Yuchun Guo, Yishuai Chen, Zhe Zhang","doi":"10.1109/ICASID.2015.7405651","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405651","url":null,"abstract":"The rapid development of Video On Demand (VoD) service especially in wireless network incurs huge bandwidth costs. To reduce the bandwidth pressure and improve the user experience, Wireless Service Providers (WSP) began deploy cache in the Mobile Switching Center (MSC) following the power law distribution observation of video popularity for the whole system. However, based on the Sina Video dataset we find that for each MSC the popularity distribution does not necessarily follow the power law distribution and hence it is beneficial for the MSCs to cooperate in cache based on the aggregated power law distribution. In this paper, we propose two models for cooperative cache among MSCs. One is cooperative cache model of MSCs of the same WSP, the other one is cooperative cache model of MSCs of different WSPs. Then we propose a novel heuristic cache algorithm for the MSCs cooperation of the same WSP by considering the aggregated popularity distribution, the individual popularity distribution of each MSC and the physical distance among MSCs. We evaluate the performance of the proposed models and heuristic cache algorithm with the previously mentioned dataset. Results show that our heuristic cache algorithm is effective and efficient the performance gain reaches 88.48% of the performance gain of optimal solution at most. And the time cost reduces to 0.003% of that in the optimal solution by using cluster. In addition, we propose a number of visits interval method to select a proper cycle of cache update to obtain higher and more stable hit rate of cache.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid construction of LDPC codes with (14, 8) Hamming code","authors":"Huan Ma, Yangwen Yu, Lijun Zhang, L. Cheng","doi":"10.1109/ICASID.2015.7405682","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405682","url":null,"abstract":"A method for constructing LDPC codes is presented based on a (14, 8) extended Hamming code which is formed via column splitting of the (7, 4) Hamming code. With this code and hybrid construction, it is effortless to generate an LDPC code by mapping the (14, 8) extended Hamming code to components of the parity-check matrix of the LDPC code. Simulation results show that the capacity of hybrid construction of PEG code and the (14, 8) extended Hamming code with rate 0.9288 is only a difference of 2 dB around to the Shannon limit owing to the gorgeous property of the (14, 8) code with sum-product algorithm decoding.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LTE user plane data transmission design based on layout optimization","authors":"Zhibin Gao, Lianfeng Huang, Rui Zhang","doi":"10.1109/ICASID.2015.7405660","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405660","url":null,"abstract":"The user plane is one of the most important issues of LTE (Long Term Evolution) system design. The implementation of the user plane data transmission is directly related to the real-time performance and efficiency of the system. Based on the research of the protocol stack data processing, the software architecture of the user plane and data transmission submodules are designed in this paper. Then the solution of the interface between L1C (L1 Layer Control Plane) and physical layer are put forward and implemented on the hardware platform of BCM (Broadcom). At last, the performance of the whole system tested on the hardware is given, and the results show that the designed architecture and interface can meet the demand of LTE system.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A type encryption system of text information based on Chen-Mobius transformation","authors":"Cheng Zou, Guogang Li, Wuxun Su","doi":"10.1109/ICASID.2015.7405656","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405656","url":null,"abstract":"A new type encryption system of text information is present. Then how the encrypted information is transferred through the internet into the target sockets applied the LabVIEW platform is also present here. The evaluation results of the Chen-Mobius transforms of some often-used digital signals are applied in the new type encryption system of text information. At first the text information is transformed into binary information by some general encoding mode. Then the binary information is encoded by the set of the sample values of the inverse transform of Chen-Mobius transforms of some often-used digital signals and form the data streams of the encrypted information. The data streams of the encrypted information then are transferred through the internet into the target sockets obeying TCP/IP and applied the LabVIEW platform. That is the sending terminal of the system. At the receiving sockets the data streams of the encrypted information are decoded by the set of the sample values of corresponding digital signal. And then the decoded information is transformed into the original text information by some general decoding mode.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}