{"title":"ECC-Based RFID Authentication Protocol","authors":"Xingchun Yang, Chunxiang Xu, C. Li","doi":"10.11989/JEST.1674-862X.70517019","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.70517019","url":null,"abstract":"The radio frequency identification (RFID) technology has been widely used so far in industrial and commercial applications. To develop the RFID tags that support elliptic curve cryptography (ECC), we propose a scalable and mutual authentication protocol based on ECC. We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy. We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements. Compared with other recent ECC-based RFID authentication protocols, our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy, tag computation cost, and communications cost.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"320-329"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66001942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Meter Development for Cloud-Based Home Electricity Monitor System","authors":"Y. Chen, S. S. Berutu, Yue Wang","doi":"10.11989/JEST.1674-862X.90616103","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.90616103","url":null,"abstract":"Α cloud-based home electricity data-monitoring system, which is based on an Arduino Mega controller, is proposed for monitoring the electricity consumption (electrical power) and power quality (PQ) in home. This system is also capable of monitoring the fundamental frequency and supply-voltage transients to ensure that the appliances operate in a safe operation range. The measured data (voltage and current) are transmitted through a WiFi device between the Arduino controller and server. The transmission control protocol (TCP) server is set up to acquire the high-data transmission rate. The server system immediately displays the calculated parameters and the waveform of the acquired signal. A comparison with a standard measurement device shows that the proposed system, which can be built at a low cost, exhibits the same functions as a factory product.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"378-390"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66001757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of 10-MW High-Temperature Superconductor Wind Generator with Overlapped Field Coil Arrangement","authors":"Z. Jiang, Jiangping Hu","doi":"10.11989/JEST.1674-862X.6110117","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.6110117","url":null,"abstract":"The electromagnetic characteristics and iron loss of a high-temperature superconductor wind generator (HWG) equipped with an overlapped field coil arrangement (OFCA) are studied by comparing with the one equipped with the conventional field coil arrangement (CFCA). Through a quantitative analysis, it was found that HWG with OFCA exhibits better electromagnetic characteristics than HWG with CFCA and can reduce the iron loss by eliminating the magnetic flux sag caused by the adjacent field coil sides with the same current flow direction. In addition, the OFCA topology can further reduce the volume of the wind generator.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"358-366"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66001884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristic Length of Metallic Nanorods under Physical Vapor Deposition","authors":"Kai-Feng Jun, Bojun Wang, Haiyuan Chen","doi":"10.11989/JEST.1674-862X.90418013","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.90418013","url":null,"abstract":"By using physical vapor deposition (PVD) to grow metallic nanorods, the characteristic length is controllable, which can be identified by two different growth modes: Mode I and Mode II. In Mode I, the growth of metallic nanorods is dominated by the monolayer surface steps. Whereas in Mode II, the growth mechanism is mainly determined by the multilayer surface steps. In this work, we focused on the analysis of the physical process of Mode I, in which the adatoms diffuse on the monolayer surface at beginning, then diffuse down to the next monolayer surface, and finally result in the metallic nanorods growth. Based on the physical process, both the variations of the characteristic length and the numerical solutions were theoretically proposed. In addition, the two-dimensional (2D) lattice kinetic Monte Carlo simulations were employed to verify the theoretical derivation of the metallic nanorods growth. Our results pay a new way for modifying the performance of metallic nanorods-based applications and devices.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"350-357"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66001685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational Intelligence Prediction Model Integrating Empirical Mode Decomposition, Principal Component Analysis, and Weighted k -Nearest Neighbor","authors":"Lillian H. Tang, Heping Pan, Yiyong Yao","doi":"10.11989/JEST.1674-862X.80124016","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.80124016","url":null,"abstract":"On the basis of machine leaning, suitable algorithms can make advanced time series analysis. This paper proposes a complex k-nearest neighbor (KNN) model for predicting financial time series. This model uses a complex feature extraction process integrating a forward rolling empirical mode decomposition (EMD) for financial time series signal analysis and principal component analysis (PCA) for the dimension reduction. The information-rich features are extracted then input to a weighted KNN classifier where the features are weighted with PCA loading. Finally, prediction is generated via regression on the selected nearest neighbors. The structure of the model as a whole is original. The test results on real historical data sets confirm the effectiveness of the models for predicting the Chinese stock index, an individual stock, and the EUR/USD exchange rate.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"341-349"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46540999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Jiang, Junlong Wang, Jinyu Zhan, Jinghuan Yu, Haibo Hu
{"title":"Data Bucket-Based Fragment Management for Solid State Drive Storage System","authors":"Wei Jiang, Junlong Wang, Jinyu Zhan, Jinghuan Yu, Haibo Hu","doi":"10.11989/JEST.1674-862X.80113010","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.80113010","url":null,"abstract":"The current storage mechanism considered little in data’s keeping characteristics. These can produce fragments of various sizes among data sets. In some cases, these fragments may be serious and harm system performance. In this paper, we manage to modify the current storage mechanism. We introduce an extra storage unit called data bucket into the classical data manage architecture. Next, we modify the data manage mechanism to improve our designs. By keeping data according to their visited information, both the number of fragments and the fragment size are greatly reduced. Considering different data features and storage device conditions, we also improve the solid state drive (SSD) lifetime by keeping data into different spaces. Experiments show that our designs have a positive influence on the SSD storage density and actual service time.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"330-340"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42209510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Theresal Thangappan , Brintha Therese , Adi Suvarnamma , Gadda Sai Swapna
{"title":"Review on dynamic bandwidth allocation of GPON and EPON","authors":"Theresal Thangappan , Brintha Therese , Adi Suvarnamma , Gadda Sai Swapna","doi":"10.1016/j.jnlest.2020.100044","DOIUrl":"10.1016/j.jnlest.2020.100044","url":null,"abstract":"<div><p>The passive optical network (PON) technology has been drastically improved in recent years. In spite of using the optical technology, the utilization of the entire bandwidth is a very challenging task. The main categories of PON are the Ethernet passive optical network (EPON) and gigabit passive optical network (GPON). These two networks use the dynamic bandwidth allocation (DBA) algorithm to attain the maximum usage of bandwidth, which is provided in the network dynamically according to the need of the customers with the support of the service level agreement (SLA). This paper will provide a clear review about the DBA algorithm of both technologies as well as the comparison.</p></div>","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 4","pages":"Article 100044"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jnlest.2020.100044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48030823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Active Islanding Detection Technique for Multi-Inverter Power System","authors":"Zhang Jie, Yuhua Cheng, Kai Chen, Gen Qiu","doi":"10.11989/JEST.1674-862X.80831011","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.80831011","url":null,"abstract":"Due to the increased penetration of multi-inverter distributed generation systems (DGs), different DGs technologies, inverter control methods, and other inverter functions are challenging the capabilities of islanding detection. In addition, multi-inverter networks connecting the distribution system point of common coupling (PCC) create islanding at paralleling inverters, which adds on to the vulnerability of islanding detection. Furthermore, available islanding detection must overcome more challenges from non-detection zones (NDZs) under reduced power mismatches. Therefore, in this study, a new method called parameter self-adapting active islanding detection was utilized to minimize the dilution effect and reduce the non-detecting zones in multi-inverter power systems. The method utilizes an active frequency drift (AFD) method and applies a positive feedback gain of parameter adaptive, which significantly minimizes the NDZs at parallel inverters. The simulation and experimental outcomes indicate that the proposed method can effectively weaken the dilution effect in multi-inverter networks connecting the distribution system PCC.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":" ","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43340711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pei-Xin Liu, Zhao-Sheng Zhu, Xiao-Feng Ye, Xiao-Feng Li
{"title":"Conditional random field tracking model based on a visual long short term memory network","authors":"Pei-Xin Liu, Zhao-Sheng Zhu, Xiao-Feng Ye, Xiao-Feng Li","doi":"10.1016/j.jnlest.2020.100031","DOIUrl":"10.1016/j.jnlest.2020.100031","url":null,"abstract":"<div><p>In dense pedestrian tracking, frequent object occlusions and close distances between objects cause difficulty when accurately estimating object trajectories. In this study, a conditional random field tracking model is established by using a visual long short term memory network in the three dimensional space and the motion estimations jointly performed on object trajectory segments. Object visual field information is added to the long short term memory network to improve the accuracy of the motion related object pair selection and motion estimation. To address the uncertainty of the length and interval of trajectory segments, a multimode long short term memory network is proposed for the object motion estimation. The tracking performance is evaluated using the PETS2009 dataset. The experimental results show that the proposed method achieves better performance than the tracking methods based on independent motion estimation.</p></div>","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 4","pages":"Article 100031"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jnlest.2020.100031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46494684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Light-Weight Selective Image Encryption for Privacy Preservation","authors":"Yi-Hui Chen, Eric Jui-Lin Lu, Chu-Fan Wang","doi":"10.11989/JEST.1674-862X.80327011","DOIUrl":"https://doi.org/10.11989/JEST.1674-862X.80327011","url":null,"abstract":"To protect personal privacy and confidential preservation, access control is used to authorize legal users for safe browsing the authorized contents on photos. The access control generates an authorization rule according to each permission assignment. However, the general access control is inappropriate to apply in some social services (e.g., photos posted on Flickr and Instagram, personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed. With low maintenance loads, this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation. The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"234-240"},"PeriodicalIF":0.0,"publicationDate":"2020-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42906278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}