Int. J. Embed. Syst.最新文献

筛选
英文 中文
Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices 数据外包系统中基于格的可撤销密文策略属性加密
Int. J. Embed. Syst. Pub Date : 2020-08-10 DOI: 10.1504/ijes.2020.110655
Xixi Yan, Chaochao Yang, Qichao Zhang, Jinxia Yu
{"title":"Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices","authors":"Xixi Yan, Chaochao Yang, Qichao Zhang, Jinxia Yu","doi":"10.1504/ijes.2020.110655","DOIUrl":"https://doi.org/10.1504/ijes.2020.110655","url":null,"abstract":"Attribute-based encryption mechanism is widely used in outsourcing systems because of its characteristics of 'one-to-many' communication. However, users' attributes often change dynamically. In order to solve the problem of attribute revocation in the attribute-based encryption scheme in the outsourcing systems, a revocable ciphertext policy attribute-based encryption in data outsourcing systems from lattices is proposed. The scheme uses the LWE problem to construct the encryption and decryption algorithm, which can resist the quantum attack. Tree-access structure is adopted to realise flexible fine-grained access strategy. In addition, with the help of the data outsourcing management server, the attribute key and ciphertext are updated to achieve immediate attribute revocation. The scheme is proved to be secure under the selective attribute and selective plaintext attacks. The comparative analysis shows that the scheme has a significant improvement in performance, and it supports immediate attribute revocation, which is more suitable for the dynamic change of users in the outsourcing systems, such as social network platforms.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature selection optimisation of software product line using metaheuristic techniques 基于元启发式技术的软件产品线特征选择优化
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10026155
Hitesh Yadav, A. Charan Kumari, R. Chhikara
{"title":"Feature selection optimisation of software product line using metaheuristic techniques","authors":"Hitesh Yadav, A. Charan Kumari, R. Chhikara","doi":"10.1504/ijes.2020.10026155","DOIUrl":"https://doi.org/10.1504/ijes.2020.10026155","url":null,"abstract":"The role of software product line (SPL) is very important in representing the same system with multiple variants. Feature models are used to define SPL. In this paper, genetic algorithm (GA), hyper-heuristic algorithm and particle swarm optimisation (PSO) have been applied for feature selection optimisation in SPL. Also, an improved fitness function is applied for optimisation of features in SPL. The objective function is designed by taking reusability and consistency of features (components) into consideration. Furthermore, we have used a case study and discussed about software product line in detail. A non-parametric test, i.e., Kruskal-Wallis test has been performed to analyse performance and computation time of 20 to 1,000 features sets and identify core features. Through extensive experimental analysis, it is observed that PSO outperforms GA and hyper-heuristic algorithm.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A feature selection model for prediction of software defects 用于软件缺陷预测的特征选择模型
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029444
Amit Kumar, Y. Kumar, Ashima Kukkar
{"title":"A feature selection model for prediction of software defects","authors":"Amit Kumar, Y. Kumar, Ashima Kukkar","doi":"10.1504/ijes.2020.10029444","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029444","url":null,"abstract":"Software is a collection of computer programs written in a programming language. Software contains various modules which make it a complex entity and it can increase the defect probability at the time of development of the modules. In turn, cost and time to develop the software can be increased. Sometimes, these defects can lead to failure of entire software. It will lead to untimely delivery of the software to the customer. This untimely delivery can responsible for withdrawal or cancellation of project in future. Hence, in this research work, some machine learning algorithms are applied to ensure timely delivery and prediction of defects. Further, several feature selection techniques are also adopted to determine relevant features for defect prediction.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications 基于属性的访问控制和身份验证机制,使用智能卡用于基于云的物联网应用
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029445
B. Gupta, Megha Quamara
{"title":"Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications","authors":"B. Gupta, Megha Quamara","doi":"10.1504/ijes.2020.10029445","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029445","url":null,"abstract":"With exploding growth in information technology (IT), numerous services and applications having enhanced capabilities are coming into picture with an aim to serve the users. Internet of things (IoT) along with its enabling cutting-edge technologies is establishing a scenario where these services can be utilised effectively. However, with large number of users and applications, it becomes challenging to safeguard the identifying information being transmitted to provide access to these services. This paper presents a refined version of an integrated attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications. System-wide attributes not only restrict the users to access the remote cloud services, but also ensure user anonymity. We also implement the proposed mechanism on ACPT and AVISPA tool for its validation and to verify its correctness. Moreover, we present an analysis of its security and performance efficiency on the basis of different parameters.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114305944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of vision aided strapdown integrated navigation in lane vehicles 视觉辅助捷联组合导航在车道车辆中的应用
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029469
Qi Wang, Chang-song Yang, Shaoen Wu
{"title":"Application of vision aided strapdown integrated navigation in lane vehicles","authors":"Qi Wang, Chang-song Yang, Shaoen Wu","doi":"10.1504/ijes.2020.10029469","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029469","url":null,"abstract":"The application of global navigation satellite system (GNSS) is extensive in lane applications with the development of science and technology. Vision aided strapdown integrated navigation is an effective aided-navigation method in the case of GNSS failure in lane vehicles, which plays an important role in realising high-precision navigation of lane navigation system. A vision-aided navigation system based on GNSS positioning is constructed using the electrical powered platform as the research object. The hardware platform of vision navigation system is presented and digital image processing is used to segment the collected lane image. The image pre-processing operation, including denoising filtering and greyscale processing, is carried out to complete the segmentation and get the effective navigation area. According to the effective area of navigation, a navigation datum line is extracted by the least squares linear fitting and Hough transform. According to the camera imaging model and the camera's internal and external parameters, the navigation datum line in the image coordinates is transformed into the world coordinates, and the heading angle is calculated. Kalman filter algorithm is used to fuse the navigation parameters of the vision navigation module and the GNSS positioning module, and the integrated navigation model is established.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Release and collection method of residual energy for one-dimensional linear-zone internet of things 一维线性区域物联网剩余能量的释放与收集方法
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029454
Haibo Luo, Zhiqiang Ruan
{"title":"Release and collection method of residual energy for one-dimensional linear-zone internet of things","authors":"Haibo Luo, Zhiqiang Ruan","doi":"10.1504/ijes.2020.10029454","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029454","url":null,"abstract":"Energy consumption is one of the most important considerations when designing routing and transmission protocols of sensing networks in internet of things. In order to achieve low and balanced power consumption, an effective method is to refer to the residual energy of nodes. Some existing energy-efficiency routing algorithms are designed according to the residual energy of nodes, but they do not give the way of residual energy collection. In this paper, we design a strategy for releasing and collecting residual energy for one-dimensional linear topology networks. By listening to the broadcast messages and evaluating residual energy of forward nodes, nodes can dynamically update the residual energy information of all potential forwarders. The collection error is also analysed theoretically. This method can be applied to opportunistic routing and relay node selection algorithms. The simulation results show that our proposed method has very low collection error, and the error will not accumulate with the operation of the network.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121574622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm 基于改进HBF优化算法的物联网云环境下基于容器的边缘计算任务调度
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029448
Bhabendu Kumar Mohanta, B. Sahoo, A. K. Turuk, Srichandan Sobhanayak, Kavita Jaiswal, Debasish Jena
{"title":"Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm","authors":"Bhabendu Kumar Mohanta, B. Sahoo, A. K. Turuk, Srichandan Sobhanayak, Kavita Jaiswal, Debasish Jena","doi":"10.1504/ijes.2020.10029448","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029448","url":null,"abstract":"In conventional cloud computing technology, cloud resources are provided centrally by massive data centres. Therefore, edge computing technology has been proposed, where cloud services can be extended to the edge of the network to decrease a network congestion. The management of the resources is a major challenge before the researcher. Therefore, in this paper, a task scheduling algorithm based on hybrid bacteria foraging optimisation (HBFA) has been proposed for allocating and executing an application's tasks. The proposed algorithm aims to minimise the completion time and maximise resource utilisation in the edge network. A rigorous simulation has been done to test performance of the proposed strategy to compare it with state of art algorithms. The proposed strategy shows better performance compared to the existing work.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Home security alarm system for middle-aged people living alone 专为独居中年人设计的家庭安防报警系统
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029446
Guangyi Ma, Hui Xu, Xijie Zhou, Wei Sun
{"title":"Home security alarm system for middle-aged people living alone","authors":"Guangyi Ma, Hui Xu, Xijie Zhou, Wei Sun","doi":"10.1504/ijes.2020.10029446","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029446","url":null,"abstract":"How to ensure middle-aged people's security has become an urgent social issue in China. Existing security systems are difficult to initialise with fast electrodes consumption. Therefore, we designed a smart security device suitable for middle-aged and elderly users. We select STM32 and CC2530 as master controller for the device, which is equipped with a camera module, GSM/GPRS module, smoke sensors, flame sensors, and infrared sensors. The camera module is used to capture the live pictures of the monitored areas, then these pictures will be transmitted to the users by the GSM module. Multiple CPU can increase the speed of operation, and ZigBee technology for wireless transmission can lower the loss of the supply. Compared with other security systems, the proposed program optimises the interface to make interaction operation easier for middle-aged and older users. The experimental results show that the proposed system has low power dissipation, convenient operation and high stability.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127345787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID aided SINS integrated navigation system for lane applications 用于车道应用的RFID辅助SINS综合导航系统
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029468
Qi Wang, Chang-song Yang, Shaoen Wu
{"title":"RFID aided SINS integrated navigation system for lane applications","authors":"Qi Wang, Chang-song Yang, Shaoen Wu","doi":"10.1504/ijes.2020.10029468","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029468","url":null,"abstract":"To improve the lane vehicle position accuracy, RFID technology is applied to correct the position of the SINS irregularly with label positioning. The acceleration data of the vehicle in three directions is measured by the accelerometers of the inertial measurement unit; the attitude matrix is updated in real time using the angular velocity of the gyroscope output space, and the acceleration component is transformed into the geographic coordinate system, and the acceleration of the inertial measurement unit. The data is subjected to an integral operation process to obtain a spatial displacement value of the vehicle. The real-time updating algorithm of the attitude matrix and the processing of the inertial measurement unit signal are presented. The quaternion-based algorithm is used to solve the attitude matrix as well as updating the coordinate system of the inertial navigation attitude matrix in real time. The Hilbert-Huang transform is used to filter the acceleration signal to solve the integrator saturation problem caused by the low-frequency component of the acceleration signal. The EMD algorithm based on the continuous root mean square error is applied in rejecting the low-frequency components in the signal. The simulation experiments show that the system can be reliable and high precision.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122695933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending the lifetime of NAND flash-based SSD through compacted write 通过压缩写入来延长基于NAND闪存的SSD的寿命
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029449
Haitao Wu, Tianming Yang, Ping Huang, Wen-Kuang Chou
{"title":"Extending the lifetime of NAND flash-based SSD through compacted write","authors":"Haitao Wu, Tianming Yang, Ping Huang, Wen-Kuang Chou","doi":"10.1504/ijes.2020.10029449","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029449","url":null,"abstract":"In the traditional file system, the partial page write will result in internal fragmentation and write amplification of NAND flash-based SSDs due to the page-alignment of write. Although large page sizes are useful for increasing the flash capacity and throughput, they may decrease the performance and lifetime of flash storage systems for the frequent partial page writes. After analysing the various realistic workload traces, we observe that the partial page writes are common for those heads and tails of large write requests. This observation makes compacted write possible, which compresses two partial page writes from the same large write request into one page before data are written into flash. Therefore, we propose a compacted write for page-level FTL scheme, called CWFTL, to extend the lifetime of SSD. The experiment results show that CWFTL really reduces the times of data written to flash and the average read/write response time.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信