Int. J. Embed. Syst.最新文献

筛选
英文 中文
Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing 云计算中加密数据的高效、可公开验证的联合关键字搜索
Int. J. Embed. Syst. Pub Date : 2019-12-04 DOI: 10.1504/ijes.2019.10025616
K. Nie, Yunling Wang, Xiaoling Tao
{"title":"Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing","authors":"K. Nie, Yunling Wang, Xiaoling Tao","doi":"10.1504/ijes.2019.10025616","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025616","url":null,"abstract":"Cloud computing has brought many appealing features for its users, such as on-demand computing resources, flexible and ubiquitous access and economical cost. Individuals and enterprises are motivated to outsource mass data to the cloud server. However, the privacy and security of the users' data are the main obstacles preventing the application of cloud computing. Searchable encryption technique is a positive way to protect users' sensitive data, while preserving search ability over encrypted data on the server side. However, the cloud server may be lazy and return part of the search results to its users as a result of intending to relieve their workload. Therefore, a verification mechanism should be established to guarantee the correctness and completeness of the search results. In this paper, we present an efficient publicly verifiable keyword search scheme over encrypted data. Our scheme achieves the conjunctive keyword search and ensures the correctness and completeness of the search results even if the untrusted cloud server returns an empty set deliberately. Compared with existing conjunctive keyword search schemes, our scheme is more efficient in the aspect of verifying the search results. Furthermore, we prove that the proposed scheme can achieve the desired security properties.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122092191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models and algorithms of the positioning and trajectory stabilisation system with elements of structural analysis for robotic applications 机器人定位与轨迹稳定系统的结构分析模型与算法
Int. J. Embed. Syst. Pub Date : 2019-12-03 DOI: 10.1504/IJES.2019.10019645
A. Zhilenkov, S. Chernyi
{"title":"Models and algorithms of the positioning and trajectory stabilisation system with elements of structural analysis for robotic applications","authors":"A. Zhilenkov, S. Chernyi","doi":"10.1504/IJES.2019.10019645","DOIUrl":"https://doi.org/10.1504/IJES.2019.10019645","url":null,"abstract":"The efficiency of mobile robotic systems in different applications including wearable robotics, underwater and even spacecraft application, and therefore the efficiency of solving the tasks assigned to them, is significantly determined by the functionality of these control systems, their technical and operational features. Biomechatronic systems with microactuators possess the most extensive functional capabilities, but their essential disadvantage is the consumption of the energy, which limits the useful operation time of the whole system. To solve the research problem aspect and number of similar tasks aimed at increasing the energy efficiency trajectory planning tasks for mechatronic systems, it is necessary to assess the degree of impact of various factors on the operation of these systems including positioning system functionality. The simulation includes an assessment of the reliability of calculating the Earth's magnetic field parameters, as well as an assessment of the quality of object stabilisation by resetting the total momentum with the aid of the system under review.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126702262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Local connectedness over soft rough topological space 软粗糙拓扑空间上的局部连通性
Int. J. Embed. Syst. Pub Date : 2019-12-03 DOI: 10.1504/ijes.2019.10025615
L. Fu, Hua Fu, Zhen Liu, Fei You
{"title":"Local connectedness over soft rough topological space","authors":"L. Fu, Hua Fu, Zhen Liu, Fei You","doi":"10.1504/ijes.2019.10025615","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025615","url":null,"abstract":"In this paper, the local connectedness of the soft rough topological space is discussed based on the soft connected rough topological space. Continuous mapping is defined over the soft rough topological space; the property of soft connectedness under continuous mapping is discussed. Connectedness of soft points and local connectedness are defined in the soft connected rough topological space, and the local properties of connectedness are given.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130682498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of current-controllable batteries charging system based on multi-stage mechanism 基于多级机构的电流可控电池充电系统的研制
Int. J. Embed. Syst. Pub Date : 2019-12-03 DOI: 10.1504/ijes.2019.103988
H. Lin, Chi-Wei Liu, J. Lin
{"title":"Development of current-controllable batteries charging system based on multi-stage mechanism","authors":"H. Lin, Chi-Wei Liu, J. Lin","doi":"10.1504/ijes.2019.103988","DOIUrl":"https://doi.org/10.1504/ijes.2019.103988","url":null,"abstract":"Increasing demand for back-up electric power supply has enforced the development of efficient battery chargers in industry. However, the study of an effective charging management mechanism still needs a further improvement to overcome some limitations of traditional methods. For this reason, this paper proposes a current-controllable batteries charging system using multi-stage charge mechanism for achieving more effective performance. First, a high frequency two-transistor forward converter is designed to provide necessary DC power supply for both charger and control unit. For the charger, it is designed based on an ideal multi-state strategy and it can provide a desired/changeable constant charging current. Also, each battery is ensured at a balanced level by the proposed battery equilibrium circuit before the charging process. The experimental results confirm that the proposed charging system is superior in terms of flexibility, high efficiency and self-management capability.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125107710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISIRS: information theory-based social influence with recommender system 基于信息理论的社会影响与推荐系统
Int. J. Embed. Syst. Pub Date : 2019-12-03 DOI: 10.1504/ijes.2019.10025648
Fang Long, Hai-lan Shen, Xiaoheng Deng
{"title":"ISIRS: information theory-based social influence with recommender system","authors":"Fang Long, Hai-lan Shen, Xiaoheng Deng","doi":"10.1504/ijes.2019.10025648","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025648","url":null,"abstract":"With explosive growth of information, recommender systems have made great progress during past ten years. The improvement in accuracy of recommendation has great commercial value. However, the accuracy still has a large space to improve, and the cold-start problem also restricts the performance of recommender systems. Aiming at optimising these two problems, ISIRS model is proposed. ISIRS integrates social influence into recommendations. Considering celebrity effect in sociology, ISIRS applies information theory to capture the social influence in a social network. As a result, ISIRS can find famous persons in a social network by sorting social influence of all people. ISIRS then makes use of the preferences of these famous people to make recommendations more accurate. The results of experiments show that ISIRS model outperforms the recommendation based on users, the recommendation based on items and the MF recommendation algorithm, even though the rating matrix and trust relationship are sparse. These results prove ISIRS can help both the accuracy and the cold-start problem in recommendations.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114488351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel fast Fourier transform in SPMD style of Cilk 并行快速傅里叶变换的SPMD风格的Cilk
Int. J. Embed. Syst. Pub Date : 2019-12-02 DOI: 10.1504/ijhpcn.2018.10017004
Jun Shen, Hai Jiang, Meng-Yen Hsieh, T. Weng, Kuan-Ching Li, Teng Xian Wang
{"title":"Parallel fast Fourier transform in SPMD style of Cilk","authors":"Jun Shen, Hai Jiang, Meng-Yen Hsieh, T. Weng, Kuan-Ching Li, Teng Xian Wang","doi":"10.1504/ijhpcn.2018.10017004","DOIUrl":"https://doi.org/10.1504/ijhpcn.2018.10017004","url":null,"abstract":"In this paper, we propose a parallel one-dimensional non-recursive fast Fourier transform (FFT) program based on conventional Cooley-Tukey's algorithm written in C using Cilk in single program multiple data (SPMD) style. As a highly compact designed code, this code is compared with a highly tuned parallel recursive fast Fourier transform (FFT) using Cilk, which is included in Cilk package of version 5.4.6. Both algorithms are executed on multicore servers, and experimental results show that the performance of the SPMD style of Cilk fast Fourier transform (FFT) parallel code is highly competitive and promising.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient public integrity auditing with secure deduplication in cloud computing 云计算中高效的公共完整性审计和安全的重复数据删除
Int. J. Embed. Syst. Pub Date : 2019-12-02 DOI: 10.1504/ijes.2019.10025627
Huixia Huo, Tao Jiang, Shichong Tan, Xiaoling Tao
{"title":"Efficient public integrity auditing with secure deduplication in cloud computing","authors":"Huixia Huo, Tao Jiang, Shichong Tan, Xiaoling Tao","doi":"10.1504/ijes.2019.10025627","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025627","url":null,"abstract":"With the rapid development of cloud computing, storing data to cloud server becomes an increasing trend which promotes integrity auditing and data deduplication to be two hot research topics. Recently, some existing schemes addressed a problem about integrity auditing with deduplication. However, these schemes did not support aggregating authentication tags of different users in the integrity auditing process, which caused a heavy computation cost to the third party auditor TPA, especially in the batch auditing process. In this paper, we propose an efficient public auditing with secure deduplication scheme using the idea of aggregate signature, which makes the TPA verify the correctness of integrity proof generated by the cloud service provider with a constant computation cost. Our scheme can also efficiently support batch auditing, whose auditing complexity on the TPA is independent of the number of auditing tasks. Finally, we prove that our scheme is secure and efficient through security analysis and performance evaluation.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An authenticated hierarchical asymmetric group key agreement protocol based on identity 一种基于身份认证的分层非对称组密钥协议
Int. J. Embed. Syst. Pub Date : 2019-12-02 DOI: 10.1504/ijes.2019.10025637
Yong Gan, Bingli Wang, Yuan Zhuang, Zengyu Cai, Qikun Zhang
{"title":"An authenticated hierarchical asymmetric group key agreement protocol based on identity","authors":"Yong Gan, Bingli Wang, Yuan Zhuang, Zengyu Cai, Qikun Zhang","doi":"10.1504/ijes.2019.10025637","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025637","url":null,"abstract":"Asymmetric group key agreement protocol is to negotiate a shared group encryption key. Each member can calculate a decryption key corresponding to the encryption key. With the rapid development of network and system technology, secure information exchange has been one of the foci. In this paper, we propose an authenticated hierarchical asymmetric group key agreement protocol based on identity. Based on the realisation of a round of asymmetric group key agreement, the protocol carries out a second round of agreement. Different levels of secrets exchange information between a group of players with different permissions as the number of rounds increases, which can achieve anonymity and authentication and support dynamic group key updating of nodes to achieve forward and backward security of group key. The protocol proved to be secure under the assumption of bilinear computational Diffie-Hellman problem. The performance analysis shows that the proposed scheme is efficient.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method of vision-based seat belt detection 基于视觉的安全带检测新方法
Int. J. Embed. Syst. Pub Date : 2019-12-02 DOI: 10.1504/ijes.2019.10025626
Zhongming Yang, Hui Xiong, Zhaoquan Cai, Yu Peng
{"title":"A new method of vision-based seat belt detection","authors":"Zhongming Yang, Hui Xiong, Zhaoquan Cai, Yu Peng","doi":"10.1504/ijes.2019.10025626","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025626","url":null,"abstract":"In the traffic management system, it can greatly improve the management efficiency if the algorithm that monitors automatically detects whether the driver fastens the seat belt; however, currently prevalent detecting methods cannot achieve satisfactory results in aspects of the detecting rate, the image quality requirement and the colour difference between seat belt and the surrounding environment. We propose a method of seat belt detection based on visual positioning. The algorithm locates the window according to the licence plate position and the contour statistics obtained from the gradient. The face detection is used to adjust and determine the seat belt detection area in the window. Finally, the method of seat belt detection based on the connected area is used to detect whether the seat belt is fastened. Experiments show that the successful rate of the proposed method is much higher than other existing methods, and satisfactory results are obtained.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From real-time design model to RTOS-specific models: a model-driven methodology 从实时设计模型到特定于rtos的模型:模型驱动的方法
Int. J. Embed. Syst. Pub Date : 2019-12-02 DOI: 10.1504/ijes.2019.10025625
Rania Mzid, C. Mraidha, Jean-Philippe Babau, M. Abid
{"title":"From real-time design model to RTOS-specific models: a model-driven methodology","authors":"Rania Mzid, C. Mraidha, Jean-Philippe Babau, M. Abid","doi":"10.1504/ijes.2019.10025625","DOIUrl":"https://doi.org/10.1504/ijes.2019.10025625","url":null,"abstract":"The refinement of a real-time operating system (RTOS)-independent real-time design model to a RTOS-specific model is a critical phase in a model-based approach. Model-based approaches allow early verification of the timing properties at the design level. At this phase, if the hardware architecture is supposed to be known, the technological platform is not defined. Hence, some assumptions on the platform are implicitly made to achieve timing verification on the one hand and to keep RTOS- independence of the design model on the other hand. However, at the implementation level, these assumptions may be not implementable for the target RTOS. In this paper, we propose a design refinement toward implementation methodology (DRIM) to address the refinement problem. The proposed approach guides the designer for the selection of the appropriate RTOS when deployment problems are raised. Nevertheless, the mapping phase generates the appropriate RTOS-specific model. A robotic case study shows the applicability of the proposed approach.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133672579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信