Int. J. Embed. Syst.最新文献

筛选
英文 中文
Scale-adaptive vehicle tracking based on background information 基于背景信息的尺度自适应车辆跟踪
Int. J. Embed. Syst. Pub Date : 2020-04-28 DOI: 10.1504/ijes.2020.10029030
Wei Sun, Yuzhou Zhao, Xiaorui Zhang, Yang Wu
{"title":"Scale-adaptive vehicle tracking based on background information","authors":"Wei Sun, Yuzhou Zhao, Xiaorui Zhang, Yang Wu","doi":"10.1504/ijes.2020.10029030","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029030","url":null,"abstract":"To solve the problem of low accuracy and poor robustness of vehicle tracking in complex traffic scenes, scale-adaptive vehicle tracking based on background information is therefore proposed to this paper. The traditional correlation filter tracking algorithm is less dependent on background information. This easily leads to tracking error. We propose to use the background information of the vehicle and the surrounding as a sample set to establish a position classifier. It transforms the target tracking problem into the classification of the target and the background. This also improves the position accuracy of the tracking target response point when the background is complex. The dimensions of the vehicle change as the relative distance between the vehicle and the camera changes, affecting the tracking reliability. This algorithm crops Histogram of Oriented Gradient (HOG) features of the different-scale vehicle images and establishes a scale classifier. It determines the best scale of the target built on the output response peak of the scale classifier. This improves the adaptability of classifier against vehicle scale change. Extensive experimental results demonstrate that the method improves the accuracy and robustness of vehicle tracking significantly.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimedia push system based on a wellness slot machine 基于健康老虎机的多媒体推送系统
Int. J. Embed. Syst. Pub Date : 2020-04-28 DOI: 10.1504/ijes.2020.10029018
Yi-Chun Chang, Jian-Wei Li, Chia-Ching Lin, Fu-Syuan Yang
{"title":"Multimedia push system based on a wellness slot machine","authors":"Yi-Chun Chang, Jian-Wei Li, Chia-Ching Lin, Fu-Syuan Yang","doi":"10.1504/ijes.2020.10029018","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029018","url":null,"abstract":"In an aged society, more than 80% of elders who are still healthy or sub-healthy people with self-care abilities, sociability and the society support system should access mental care which can be effectuated in a play therapy program. Based on electronic games supplemented by a media push system, the wellness slot machine practised in this study is a play therapy platform through which a preventive care service program for recreational effects and health promotion is planned for elders. For necessary information available to elderly participants of wellness slot machines such as ads for community activities and promotional films naturally and constantly, the multimedia push system in this study is designed and practised in a wellness slot machine with which the media content is pushed to the elderly participants actively without excessive manual operations.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129583908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-knowledge identification scheme with companion matrices of primitive polynomials 原始多项式伴矩阵的零知识辨识方案
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027498
Huawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li
{"title":"Zero-knowledge identification scheme with companion matrices of primitive polynomials","authors":"Huawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li","doi":"10.1504/ijes.2020.10027498","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027498","url":null,"abstract":"This paper proposes the matrix power problem, that is, to find x given CxDx, where C and D are the companion matrices of primitive polynomials over finite field. And a new zero-knowledge identification scheme based on matrix power problem is proposed. It is perfect zero-knowledge for honest verifiers. Due to its simplicity, and low-memory and low-computation costs, the proposed scheme is suitable for using in computationally limited devices for identification such as smart cards.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and addressing of internet of things based on distributed ID 基于分布式ID的物联网识别与寻址
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027496
Rui Ma, Yue Liu, Ke Ma, Xu An Wang
{"title":"Identification and addressing of internet of things based on distributed ID","authors":"Rui Ma, Yue Liu, Ke Ma, Xu An Wang","doi":"10.1504/ijes.2020.10027496","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027496","url":null,"abstract":"Identification and addressing the entity which accesses the internet through the wireless network with various short distance transmission protocols is a key issue. To solve the problem, by combining with the existing identification and addressing technology of the internet and the IOT, this paper proposes a method based on distributed ID. This method can be divided into two stages. It first designs the structure of distributed ID. Using the distributed address allocation algorithm, it implements the automatic allocation of the distributed ID as well as the distributed ID resolution among the global IOT. After that, an addressing scheme is designed to meet demands of the IOT addressing. It first defines the structure of addressing and then implements the routing addressing algorithm which combines the cluster-tree algorithm with the ad hoc on-demand distance vector routing algorithm. This scheme could improve the routing efficiency as well as achieve lower cost, lower energy consumption and higher reliability of the addressing. By the simulation on NS-2 platform, the experimental results highlight the feasibility and effectiveness of the proposed method from three aspects: the correctness of identification allocation, the effectiveness of addressing scheme, and the stability of data transmission.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design for the external frame of a resonant accelerometer sensor 设计一种谐振式加速度计传感器的外部框架
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027522
Jun Yu Li, Jing Jiang, Yunchan Zhou, Pengfei Guo, Xinze Li, Dongchen Xu
{"title":"Design for the external frame of a resonant accelerometer sensor","authors":"Jun Yu Li, Jing Jiang, Yunchan Zhou, Pengfei Guo, Xinze Li, Dongchen Xu","doi":"10.1504/ijes.2020.10027522","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027522","url":null,"abstract":"In this paper, a model of resonant accelerometer is studied in order to improve its sensitivity and quality factor. We establish both mechanical and mathematical models of the accelerometer and analyse the system energy dissipation. Some conclusions are obtained for decoupling the internal structure and the external frame which can help improve the performance of the system. Simulation results show that the choice of the structure parameter can influence the energy dissipation of the system greatly and all of this can be plenary theoretical basis of designing high quality resonant accelerometer.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware fixed-priority scheduling for periodic tasks with shared resources and IO devices 具有共享资源和IO设备的周期性任务的能量感知固定优先级调度
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027507
Yi-wen Zhang
{"title":"Energy-aware fixed-priority scheduling for periodic tasks with shared resources and IO devices","authors":"Yi-wen Zhang","doi":"10.1504/ijes.2020.10027507","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027507","url":null,"abstract":"Many researches have focused on energy management for the processor. However, DPM via I/O device scheduling for real-time periodic tasks with shared resources has drawn little attention. We address the problem of the I/O device energy consumption minimisation for shared resources. Furthermore, we present an energy-aware IO devices fixed-priority scheduling algorithm based on the RM scheduling. It contains two parts: job scheduling and device scheduling. Job scheduling ensures that each task can complete its execution within its deadline. Device scheduling decides to turn off devices to save energy. The experimental results show that it can achieve significant energy savings.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wind weather prediction based on multi-output least squares support vector regression optimised by bat algorithm 基于bat算法优化的多输出最小二乘支持向量回归的风力天气预报
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027513
Dingcheng Wang, Yiyi Lu, Beijing Chen, Youzhi Zhao
{"title":"Wind weather prediction based on multi-output least squares support vector regression optimised by bat algorithm","authors":"Dingcheng Wang, Yiyi Lu, Beijing Chen, Youzhi Zhao","doi":"10.1504/ijes.2020.10027513","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027513","url":null,"abstract":"As a kind of clean energy, wind energy is widely disseminated and has been widely researched. Compared with other methods, the support vector machine algorithm is more logical. Least squares support vector machine can improve training efficiency. Therefore, the method of multi-output least squares support vector regression is used to forecast the wind speed and wind direction in this paper. The bat algorithm is simple in structure and easy to understand. It has been applied to solve optimisation problems with MSVR. Compared with single output support vector machines, multi-output support vector machine readily solves problems of complex structure. The simulation model is established to predict the value of wind speed and wind direction by using different algorithms. The simulation results show that the multi-output least squares support vector machines prediction model based on bat optimisation algorithm has better feasibility and effectiveness.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure data deletion in cloud storage: a survey 云存储中的安全数据删除:一项调查
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027520
Minyao Hua, Yinyuan Zhao, Tao Jiang
{"title":"Secure data deletion in cloud storage: a survey","authors":"Minyao Hua, Yinyuan Zhao, Tao Jiang","doi":"10.1504/ijes.2020.10027520","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027520","url":null,"abstract":"With the rapid development of cloud computing, individual people, firms, industries and governments are moving their data to clouds to meet the data explosion challenge. Secure data deletion is becoming a hot issue in cloud storage research. Different from traditional data deletion, the securely deleted data should be non-recoverable. In this paper, we present a survey of current secure data deletion technologies and make comparisons of them for both private cloud storage and public cloud storage. For private cloud storage, we introduce two main deletion methods: physical destruction and disk replication. For public cloud storage, we analyse the existing deletion methods such as balanced-tree-based, trusted-third-parties-based, policy-based secure data deletion methods and so on, in accordance with the two aspects of verifiable secure data deletion and verifiable non-recoverability of data. Finally, we analyse the deficiencies among current researches and propose some future directions for improvement in secure data deletion.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125492788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks TBPA:基于tesla的车辆自组织网络隐私保护认证方案
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027527
Xincheng Li, Ya-li Liu, Xinchun Yin
{"title":"TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks","authors":"Xincheng Li, Ya-li Liu, Xinchun Yin","doi":"10.1504/ijes.2020.10027527","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027527","url":null,"abstract":"Vehicular ad hoc networks (VANETs) aim to strengthen traffic safety and improve traffic efficiency through wireless communication among vehicles and fixed infrastructures. However, to protect the communication from different potential attacks, identity and message authentication is a necessary solution to guarantee security. In this paper, an efficient privacy preserving authentication scheme based on TESLA called TBPA is proposed. Bilinear mapping is adopted to produce pseudonyms offline and realise anonymity. Besides, TBPA extends TESLA protocol and generates mapping values with time-related messages to achieve timely verification, which increases the efficiency of the scheme. Performance analysis shows that our scheme possesses excellent security and privacy properties and can resist different malicious attacks.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131389422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of a reliable constraint algorithm on MIMO signal detection 一种可靠的MIMO信号检测约束算法研究
Int. J. Embed. Syst. Pub Date : 2020-03-10 DOI: 10.1504/ijes.2020.10027525
Hongzhi Zhou, Yingying Feng, Bin Xu, Shujing Li, Linguo Li
{"title":"Research of a reliable constraint algorithm on MIMO signal detection","authors":"Hongzhi Zhou, Yingying Feng, Bin Xu, Shujing Li, Linguo Li","doi":"10.1504/ijes.2020.10027525","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027525","url":null,"abstract":"For common nonlinear QR decomposition detection algorithm in MIMO system, this paper proposes reliability constraints QR algorithm (RC-QR algorithm) with low complexity. The reliability of soft estimates is judged by shadow area constraint method. Besides, constellation points are introduced as the candidate points. Then the optimal candidate point is chosen from multiple candidate points for feedback. Relative to conventional QR DE composition algorithm, the RC-QR algorithm can significantly improve system interference and greatly reduce error propagation in decision feedback by increasing the algorithm complexity only by a small amount. The simulation results show that the performance of our algorithm improves very obviously when the antenna configuration is 4 × 4 or 6 × 6. When bit error rate is 5 × 1,000, 6 dB signal to noise ratio can be saved. Meanwhile, RC-QR algorithm can flexibly balance bit error rate detection performance and operation complexity through controlling constraint threshold and the quantity of candidate points.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114694088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信