2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)最新文献

筛选
英文 中文
Examples of quadrocopter control on ROS 在ROS上控制四旋翼机的例子
L. Cheng, H. Liu
{"title":"Examples of quadrocopter control on ROS","authors":"L. Cheng, H. Liu","doi":"10.1109/ICASID.2015.7405668","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405668","url":null,"abstract":"In this paper, the first example to be studied is a system that could localize a quadrocopter in an environment which is either indoor or outdoor without the help of GPS signals. The onboard camera of a quadrocopter without requiring any external sensors or markers will be used. In this system, firstly, the pose estimation based on SLAM (simultaneous localization and mapping) is used[4][7]. Secondly, extended Kalman filter is used to compensate the delay due to data communications and computations. Thirdly, a PID controller is used to control the drone's position and orientation[13][3]. The second example to be studiedis the Ardrone could be simply controlled by a human hand that fulfilled by using a leap motion controller with hand gestures and the controller is connected to ROS platform[10] under Ubuntu.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"12 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Map-based multi-path routing protocol in VANETs VANETs中基于地图的多路径路由协议
Yiming Lin, Weitian Huang, Yuliang Tang
{"title":"Map-based multi-path routing protocol in VANETs","authors":"Yiming Lin, Weitian Huang, Yuliang Tang","doi":"10.1109/ICASID.2015.7405680","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405680","url":null,"abstract":"Due to vehicle movement and propagation loss of radio channel, providing a routing protocol for reliable multihop communication in VANETs is particularly challenging. In this paper, we present a map-based multi-path routing protocol for VANETs - MBMPR, which utilizes GPS, digital map and sensors in vehicle. With global road information, MBMPR finds an optimal forward path and an alternate path using Dijkstra algorithm, which improves the reliability of data transmission. Considering the load balance problem in junctions, a congestion detection mechanism is proposed. Aiming at the packet loss problem due to target vehicle's mobility, MBMPR adopts recovery strategy using location-based services and target vehicle mobility prediction. The simulations demonstrate MBMPR has significant performances comparing with classical VANETs routing protocols.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A data-rate-regulable UWOC system using RZ-OOK modulation 采用RZ-OOK调制的数据速率可调UWOC系统
Mingbo Wang, Kai Wu, Huiying Xu
{"title":"A data-rate-regulable UWOC system using RZ-OOK modulation","authors":"Mingbo Wang, Kai Wu, Huiying Xu","doi":"10.1109/ICASID.2015.7405678","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405678","url":null,"abstract":"In this paper, we demonstrated a data-rate-regulable laser communication system model with moderate data rate which can be up to several hundred kilobits per second (kbps) while data rate is regulable. We use continuous-wave (cw) blue laser (λ =443nm) which can be driven with TTL-level as the transmitter. Although continuous-wave (cw) blue laser are readily available, they cannot be easily modulated at high frequency (less than 2 MHz). After comparing the current commonly used modulation method of optical communication and specially analyzed the key technology for underwater/undersea wireless optical communication (UWOC) according to the situation of our lab. We put forward an improved \"return to zero\" On-Off Keying (RZ-OOK) modulation method to complete the UWOC system model. The improved RZ-OOK modulation method is easier and more flexible in some cases.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133142419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of wireless transmission using CC3100 based on RT-Thread 基于RT-Thread的CC3100无线传输的设计与实现
Lingfeng Qiu, Zhiyuan Shi, Hezhi Lin, Chao Feng
{"title":"Design and implementation of wireless transmission using CC3100 based on RT-Thread","authors":"Lingfeng Qiu, Zhiyuan Shi, Hezhi Lin, Chao Feng","doi":"10.1109/ICASID.2015.7405683","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405683","url":null,"abstract":"A design scheme of wireless data transmission system is presented, which adopts Nuvoton N32926 embedded microprocessor as the system controller and RT-Thread embedded operation system is used. This paper describes the compiling and transplanting of TI CC3100 device driver, such that the system can send the data to CC3100 via the N32926 SPI interface. Finally, the description of how the system accomplishes the reception and transmission of data by the RF module of CC3100. This paper introduces the structure of the system framework and the realization of wireless transmission module.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic configuration for IPv4/IPv6 address mapping in 4over6 technology 4over6技术中IPv4/IPv6地址映射的动态配置
Zilong Liu, Jiang Dong, Yong Cui, Chaokun Zhang
{"title":"Dynamic configuration for IPv4/IPv6 address mapping in 4over6 technology","authors":"Zilong Liu, Jiang Dong, Yong Cui, Chaokun Zhang","doi":"10.1109/ICASID.2015.7405677","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405677","url":null,"abstract":"The configuration for address mapping is an important process for IPv4-over-IPv6 (4over6) technology, which is the major scenario of IPv6 transition. However, it is not straightforward to use current configuration methods because they were only designed to solve part of the configuration scenario. In this paper, we first analyze the challenges of current configuration solutions. After that, we propose a dynamic configuration mechanism for address mapping based on the DHCPv4 over DHCPv6 (DHCP4o6) lease query. The boarder router device (BR) in 4over6 transition is able to obtain the IPv4/IPv6 heterogeneous lease of customer premises equipment (CPE) in bulk or in real-time with the help of our method. The lease will then be used to build the address mapping table. We implement the prototype system and verify it in a real 4over6 network at Tsinghua University. The results show that our mechanism satisfies the requirement of quick establishment of address mapping table when BR device is being initiated. Furthermore, our solution reduces the load of BR device comparing to current methods.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122032554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of network structure entropy to convergence rate of distributed synchronization algorithm in RGGs RGGs中网络结构熵对分布式同步算法收敛速度的影响
S. Ni, Jingfeng Qian, Qi Yang
{"title":"Effect of network structure entropy to convergence rate of distributed synchronization algorithm in RGGs","authors":"S. Ni, Jingfeng Qian, Qi Yang","doi":"10.1109/ICASID.2015.7405673","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405673","url":null,"abstract":"In this paper, we firstly introduce the random geometric graph (RGG) as the model of wireless sensor networks (WSNs), and point out that the convergence rate of distributed synchronization algorithm in WSNs is depended on the second largest eigenvalue of the update matrix based on the network topology. Then we take three network structure entropies, which are degree distribution entropy, Wu entropy and SD entropy, into consideration of the convergence rate. The relationship between network structure entropy and the convergence rate is also studied. After the simulations of the three network structure entropy, we find that the degree distribution entropy is more suitable to reflect the characteristic of RGG. Finally, we verify that when the network is more regular, the degree distribution entropy will decrease and the convergence rate of the networks will hereby increase.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved cache strategy based on WSP cooperation 基于WSP合作的改进缓存策略
Biao Liang, Yuchun Guo, Yishuai Chen, Zhe Zhang
{"title":"An improved cache strategy based on WSP cooperation","authors":"Biao Liang, Yuchun Guo, Yishuai Chen, Zhe Zhang","doi":"10.1109/ICASID.2015.7405651","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405651","url":null,"abstract":"The rapid development of Video On Demand (VoD) service especially in wireless network incurs huge bandwidth costs. To reduce the bandwidth pressure and improve the user experience, Wireless Service Providers (WSP) began deploy cache in the Mobile Switching Center (MSC) following the power law distribution observation of video popularity for the whole system. However, based on the Sina Video dataset we find that for each MSC the popularity distribution does not necessarily follow the power law distribution and hence it is beneficial for the MSCs to cooperate in cache based on the aggregated power law distribution. In this paper, we propose two models for cooperative cache among MSCs. One is cooperative cache model of MSCs of the same WSP, the other one is cooperative cache model of MSCs of different WSPs. Then we propose a novel heuristic cache algorithm for the MSCs cooperation of the same WSP by considering the aggregated popularity distribution, the individual popularity distribution of each MSC and the physical distance among MSCs. We evaluate the performance of the proposed models and heuristic cache algorithm with the previously mentioned dataset. Results show that our heuristic cache algorithm is effective and efficient the performance gain reaches 88.48% of the performance gain of optimal solution at most. And the time cost reduces to 0.003% of that in the optimal solution by using cluster. In addition, we propose a number of visits interval method to select a proper cycle of cache update to obtain higher and more stable hit rate of cache.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid construction of LDPC codes with (14, 8) Hamming code LDPC码与(14,8)汉明码的混合构造
Huan Ma, Yangwen Yu, Lijun Zhang, L. Cheng
{"title":"Hybrid construction of LDPC codes with (14, 8) Hamming code","authors":"Huan Ma, Yangwen Yu, Lijun Zhang, L. Cheng","doi":"10.1109/ICASID.2015.7405682","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405682","url":null,"abstract":"A method for constructing LDPC codes is presented based on a (14, 8) extended Hamming code which is formed via column splitting of the (7, 4) Hamming code. With this code and hybrid construction, it is effortless to generate an LDPC code by mapping the (14, 8) extended Hamming code to components of the parity-check matrix of the LDPC code. Simulation results show that the capacity of hybrid construction of PEG code and the (14, 8) extended Hamming code with rate 0.9288 is only a difference of 2 dB around to the Shannon limit owing to the gorgeous property of the (14, 8) code with sum-product algorithm decoding.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LTE user plane data transmission design based on layout optimization 基于布局优化的LTE用户平面数据传输设计
Zhibin Gao, Lianfeng Huang, Rui Zhang
{"title":"LTE user plane data transmission design based on layout optimization","authors":"Zhibin Gao, Lianfeng Huang, Rui Zhang","doi":"10.1109/ICASID.2015.7405660","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405660","url":null,"abstract":"The user plane is one of the most important issues of LTE (Long Term Evolution) system design. The implementation of the user plane data transmission is directly related to the real-time performance and efficiency of the system. Based on the research of the protocol stack data processing, the software architecture of the user plane and data transmission submodules are designed in this paper. Then the solution of the interface between L1C (L1 Layer Control Plane) and physical layer are put forward and implemented on the hardware platform of BCM (Broadcom). At last, the performance of the whole system tested on the hardware is given, and the results show that the designed architecture and interface can meet the demand of LTE system.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A type encryption system of text information based on Chen-Mobius transformation 一种基于Chen-Mobius变换的文本信息类型加密系统
Cheng Zou, Guogang Li, Wuxun Su
{"title":"A type encryption system of text information based on Chen-Mobius transformation","authors":"Cheng Zou, Guogang Li, Wuxun Su","doi":"10.1109/ICASID.2015.7405656","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405656","url":null,"abstract":"A new type encryption system of text information is present. Then how the encrypted information is transferred through the internet into the target sockets applied the LabVIEW platform is also present here. The evaluation results of the Chen-Mobius transforms of some often-used digital signals are applied in the new type encryption system of text information. At first the text information is transformed into binary information by some general encoding mode. Then the binary information is encoded by the set of the sample values of the inverse transform of Chen-Mobius transforms of some often-used digital signals and form the data streams of the encrypted information. The data streams of the encrypted information then are transferred through the internet into the target sockets obeying TCP/IP and applied the LabVIEW platform. That is the sending terminal of the system. At the receiving sockets the data streams of the encrypted information are decoded by the set of the sample values of corresponding digital signal. And then the decoded information is transformed into the original text information by some general decoding mode.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信