Forthcoming articles

 


International Journal of Embedded Systems

 

These articles have been peer-reviewed and accepted for publication in IJES, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJES are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Embedded Systems (106 papers in press)

 

Regular Issues

 

  • On the security of a security-mediator-based sharing stored data in the cloud   Order a copy of this article
    by Jianhong Zhang, Qiaocui Dong, Jian Mao, Xu Min 
    Abstract: As an important service of cloud computing, the cloud storage can relieve the burden for storage management and maintenance since the data owners' data are moved to the cloud from their local computing system. However, after data are outsourced to the cloud, data owners no longer physically possess the storage of their data. To ensure the correct storage of the outsourced data, data owners need to periodically execute the integrity verification of data. However, in most existing data integrity checking protocols, a data owner's identity is inevitably revealed to public verifiers in the process of integrity verification. Recently, in order not to compromise the privacy of data owners' identity and not to increase overheads significantly, Wang et al proposed an efficient publicly verifiable approach to ensure cloud data integrity by including a security mediator. The identity of the data owner is hidden through the signature, which is produced by the security mediator. Unfortunately, in this paper, we show that their scheme is insecure. It is prone to unforgeability attack, tamper attack and active attack.
    Keywords: attack; tamper attack; active attack; data integrity checking; security analysis; cloud storage.

  • A local HMM for indoor positioning based on fingerprinting and displacement ranging   Order a copy of this article
    by Ayong Ye, Jianfei Shao, Zhijiang Yang 
    Abstract: Hidden Markov models (HMMs) are powerful probabilistic tools for modelling sequential data, and have been applied to indoor positioning tentatively by combining RSSI fingerprinting method with inertial sensors. In that case, positioning is considered as from an isolated location estimating to a sequential locations transition process. Then the positioning is transformed to the prediction problem in HMMs. However, because the location estimating depends on the previous estimated location and its estimating error, the cumulative error and the resonance error may increase in a continuous positioning process over time. This paper presents an approach to divide the whole continuous positioning process into specified-size sub-processes, and each of them is independent. For this approach, the cumulative and resonance error caused by iterative estimation could be reduced efficiently. Meanwhile, we develop a prototype system, and conduct comprehensive experiments. The evaluation results demonstrate the effectiveness of the proposed approach.
    Keywords: indoor positioning; hidden Markov models; RSSI fingerprinting; displacement ranging; Wi-Fi; accelerometer.

  • Efficient leakage-resilient blind and partially blind signatures   Order a copy of this article
    by Shuguang Dai, Zhengjun Jiang, Fangguo Zhang 
    Abstract: The techniques of blind and partially blind signatures play an important role in numerous applications, most prominently in electronic voting and electronic cash. In this paper, we first present formal definitions of leakage-resilient blind and partially blind signatures. Subsequently, we propose an efficient leakage-resilient blind signature scheme and an efficient leakage-resilient partially blind signature scheme in the continual leakage model. The proposed leakage-resilient blind signature scheme is the first protocol that is secure even in a setting where the adversary may obtain leakage information on the signer or user's internal state, including secret key and the randomness. However, in the only known leakage-resilient blind signature scheme which was proposed by R"{u}ckert, the adversary is given the leakage information only about the signer's secret key. The proposed partially blind signature scheme is the first leakage-resilient partially blind signature scheme. Also, we analyse their security and efficiency in the generic bilinear group model.
    Keywords: blind signature; partially blind signature; leakage-resilient; bilinear pairings; e-commerce.

  • GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption   Order a copy of this article
    by Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu 
    Abstract: This paper introduces a variant of ciphertext-policy attribute-based encryption called Group-Oriented Ciphertext-Policy Attribute-Based Encryption (GO-CP-ABE). In the new notion, a message is encrypted under an access structure over attributes and users are described by their attributes. In addition, users are divided into different groups and each user belongs to only one group. Users within the same group can merge their attributes to decrypt successfully, if the union of their attributes satisfies the access structure embedded in the ciphertext. But users from different groups can not realise this cooperative decryption. We define the security model of GO-CP-ABE and present an efficient design by revising an existing CP-ABE scheme.
    Keywords: attribute-based encryption; group-oriented; access structure.

  • An autonomous fault-resistant system for mission-critical embedded sensor nodes   Order a copy of this article
    by Hsung-Pin Chang, Tsung-Yu Yeh 
    Abstract: Wireless sensor networks (WSNs) are promising new instruments for monitoring and collecting data about some outside world phenomena. For some mission-critical applications, the WSNs are expected to provide continuous, unattended service for months or even years. However, hardware reliability poses a major challenge to this expectation. Based on a dual-mote architecture, this paper designs and implements an autonomous fault-resistant system. First, a software-based minimal-overhead fault detection method is proposed to detect failures in various hardware components. When a hardware failure is detected, the sensor node lifetime is prolonged by proposing the partial replacement and full replacement fault recovery schemes. Both fault detection and recovery schemes are implemented in the SOS kernel on the mica2 mote. Experimental results indicate that, except for the memory access trap, most failures can be successfully detected through low-cost software detectors. In addition, the fault recovery scheme can choose proper replacement methods for different application modules and successfully increase the lifetime of sensor nodes.
    Keywords: fault management; fault detection; fault recovery; SOS; embedded sensor nodes

  • Fast elliptic curve algorithm using deformed Fibonacci-type series   Order a copy of this article
    by Shuanggen Liu 
    Abstract: The elliptic curve scalar multiplication is the most important operation in elliptic curve cryptography. The efficient and secure scalar multiplication can be constructed by combining the addition chain and elliptic curve. In this paper, we propose an explicit algorithm which is a kind of "double-addition" addition chain based on the Fibonacci type sequence. The "double-addition" sequence of arbitrary integer k is calculated by using the Fibonacci and golden ratio addition chain method. In addition, each cycle of this method is fixed to perform double point and a point add operations, based on the "double-addition" of the elliptic curve scalar multiplication algorithm, so as to be able to resist the simple power attack. At the same time, the length of the chain is greatly shortened by using the double point operation compared with the chain of the Fibonacci. Experimental results showed that the average chain length has attained 38% to 55% reduction compared with other doubling-free addition chain methods.
    Keywords: elliptic curve cryptosystem; scalar multiplication; addition chain; Fibonacci sequence

  • A dynamic test prioritisation based on DU-chain coverage for regression testing   Order a copy of this article
    by Lili Pan 
    Abstract: Test case prioritisation schedules the test cases for execution in an order that attempts to maximise some objective function or expose faults earlier in testing. Many test case prioritisation techniques have been proposed in the past that prioritise testing cases based on mainly test-requirement coverage and ignore many other testing factors. In view of the DU-chain importance in programs, this paper presents a test case prioritisation approach of method-based DU-chain coverage. The technique combines the DU-chain coverage and fault detection rate as test-case quantitative factors based on method. Different from existing techniques, the new approach makes use of information from executed testing and modules coupling, and dynamically calculates priority quantitative value for every test case. The experiments performed show that the dynamic prioritisation approach is the fault-detection effective,and the APFD of the test suites constructed by the dynamic prioritisation approach is higher than that of the test suites constructed by the static prioritisation technique.
    Keywords: software testing; regression testing; test case prioritisation; DU-chain coverage; class method.

  • Effective traffic signs recognition via kernel PCA network   Order a copy of this article
    by Jianming Zhang, Qianqian Huang, Honglin Wu, Yangchun Liu 
    Abstract: The classification of traffic sign images is easily affected by the change of weather, camera angles, occlusion, etc. The traditional image recognition methods not only require high image quality, but also need to find effective features manually. However, the convolutional neural networks can automatically extract high-level abstract features that are robust to the variations. This paper presents a novel and effective traffic signs recognition approach via the kernel PCA network, based on convolutional neural networks. The kernel PCA network uses a two-layer convolutional network to extract abstract features, and convolution kernels in each layer are directly calculated by the kernel principal component analysis. After nonlinear mapping and pooling, support vector machines are applied to the final classification. The approach can achieve a high recognition rate on the German traffic signs recognition benchmark dataset containing reliable ground-truth data.
    Keywords: kernel PCA network; kernel principal component analysis; German traffic signs recognition benchmark

  • Transportation modes behaviour analysis based on raw GPS dataset   Order a copy of this article
    by Qiuhui Zhu, Min Zhu, Mingzhao Li, Min Fu, Zhibiao Huang, Qihong Gan, Zhenghao Zhou 
    Abstract: Significant information exists in the Global Positioning System (GPS) data for understanding behaviours and transport planning. However, fine-grained identification of transportation modes is still required in the literature. In this paper, we present a robust framework to identify different means of transportation modes from raw GPS datasets. We make the following contributions. (1) We design an effective trajectory segmentation algorithm to divide raw GPS trajectory into single mode segments based on logical assumptions. (2) We propose several modern features, which are more discriminating than traditional features. (3) We adopt an additional segment expansion procedure by considering the whole trajectory. Experiments prove that our framework achieves a promising accuracy for identifying transportation modes.
    Keywords: GPS; transportation mode; random forest classifier.

  • A novel cognitive radio spectrum allocation scheme with chaotic gravitational search algorithm   Order a copy of this article
    by Lin Guo, Zhigang Chen 
    Abstract: Cognitive Radio (CR) is a promising solution to the lack of spectrum, as well as spectrum inefficiency, in current communication networks. A major demand of this technology is for efficient and fair spectrum assignment to unlicensed (secondary) users. This paper presented a novel method to address this challenge in CR networks, based on the Graph Coloring Problem (GCP) and Gravitational Search Algorithm (GSA). In addition, the chaotic search process has been designed in the method to avoid falling into local optimum. Last, we compare the performance of the proposed algorithm with Particle Swarm Optimisation (PSO), Genetic Algorithms (GA) and Quantum Genetic Algorithm (QGA ).
    Keywords: cognitive radio system; spectrum allocation; gravitation search algorithm; chaotic search

  • Dynamic frequency scaling for embedded systems with memory-intensive applications   Order a copy of this article
    by Hyoungjong Kim, Moonju Park 
    Abstract: Power management of embedded systems is an important issue as they are typically powered from limited energy storage. To reduce the power consumption of the CPU, which is the most power-consuming device when the system is actively running, a dynamic frequency/voltage scaling (DFS) technique has been used widely and become essential in embedded systems. DFS techniques use various information, such as CPU utilisation, the number of ready threads, and/or cache miss rate. In this paper, we consider the cycles per instruction (CPI) as the primary indicator of energy efficiency in relation to the CPU frequency. By testing and analysing applications characteristics on a real target hardware, we observe that memory access affects the CPI, and found that higher CPI lowers the energy efficiency and performance gain we can get by frequency scale-up. Based on the observation, we propose a new DFS algorithm that monitors the CPI value to determine the CPU frequency. Experimental results show that the proposed DFS algorithm provides higher energy efficiency for memory-intensive application; it reduces the energy consumption by about 28.6%, without causing delay in execution. The proposed algorithm is designed to consider the effect of memory access for more efficient support of memory-intensive applications, but it works well with CPU-intensive application and mixed type of application also.
    Keywords: dynamic frequency scaling; embedded system; scheduling

  • A hardware in the loop emulator for a satellite control system   Order a copy of this article
    by Mokhtar Aboelaze, Mohamed Shehata, Sumaia Atiwa 
    Abstract: Design and testing of algorithms for satellite attitude control is not an easy task. Once the system is deployed (the satellite is launched) there is no room for error or system modifications. That, of course, requires extensive testing and simulation before deployment. However, simulation can not capture all aspects of system operation. For example, capturing jitter in the system due to hardware issues such as cache miss, interrupts, dynamic scheduling, or instruction prediction is almost impossible. In such a case, a hardware in the loop (HiL) simulation platform is used to capture real-time system behaviour. In this paper, we propose and implement an HiL simulator for a small satellite on FPGA. The model implements the satellite dynamics as well as jitter and noise added to the signal. We use our emulator to study the effect of fixed point implementation on the controller performance. Our results indicates that we can achieve a 50% power saving using fixed point implementation (as compared to floating point implementation) with almost no performance degradation. We also use the HiL platform to test the effect of noise and jitter on the system performance.
    Keywords: hardware in the loop; satellite attitude control; FPGA; variable structure control.

  • A study of IP-based vehicular gateway with IPv6   Order a copy of this article
    by He Yu, Guihe Qin, Minghui Sun, Xin Yan, Xingchen Wu 
    Abstract: With the progress of ambient sensor networks (ASNs), there is a trend that each node in ASNs should gather information and a server will supply intelligent service for users by processing and analysing the information. In order to achieve this purpose, each node and server must communicate with each other freely. IPv6 lets any host generate unique IP address and supplies far more addresses than IPv4. Therefore, it is necessary to migrate the IP address of each node from IPv4 to IPv6. As a proof-of-concept, we use the vehicle as an example. We propose the design and implementation of an IPv6-based In-Vehicle Gateway (IVG), and achieve end-to-end access between IPv6-based CAN (Controller Area Network) unit and Ethernet. We use tunnel technology to solve the issue through IPv4 to IPv6, develop address mapping method, and implement this notion in a prototype vehicle.
    Keywords: controller area network; IPv4-to-IPv6 tunnel; in-vehicle gateway; heterogeneous network.

  • Generating verifiable LOTOS specifications from UML models: a graph transformation based approach   Order a copy of this article
    by Salim Djaaboub, Elhillali Kerkouche, Allaoua Chaoui 
    Abstract: The increasing complexity and widespread use of complex and critical systems requires advanced techniques and tools to address their specification, verification and validation. The goal of this paper is to integrate two standard languages (UML and LOTOS) for the specification, verification and validation of dynamic behaviours of critical systems. The main purpose of this integration is to take benefits of the ease-of-use of the graphical notation of UML in system modelling and the formal notation of LOTOS in system verification. In this paper, we propose a graph transformation based approach to generate automatically LOTOS specifications from UML dynamic models. This approach enables developers on the one hand to model the behaviours of systems using graphical UML statechart and communication diagrams, and on the other hand to generate automatically verifiable LOTOS specifications. The proposed approach is automated using AToM3 tool, and it is illustrated through the modelling and verification of two embedded systems.
    Keywords: UML; LOTOS; statechart diagram; communication diagram; critical systems; formal methods; verification; graph transformation; AToM3.

  • Multiple features fusion for facial expression recognition based on ELM   Order a copy of this article
    by Lingzhi Yang, Xiaojuan Ban, Yitong Li, Guang Yang 
    Abstract: Traditional facial expression recognition includes a feature extractor and a classifier. In this paper, a multiple features fusion approach for facial expression recognition is proposed to improve the recognition accuracy. We consider a feature level fusion method, serial feature fusion, and decision level fusion, linear opinion pool, to combine multiple features. Local binary patterns, local directional number pattern and edge orientation histograms are used to extract features. Then, extreme learning machine is used as the classifier for expression classification. Experiments on JAFFE and CK+ show the method achieves better results.
    Keywords: facial expression recognition; feature extraction; extreme learning machine; multiple features fusion.

  • Research of dynamic load balancing based on stimulated annealing algorithm   Order a copy of this article
    by Huyin Zhang, Kan Wang 
    Abstract: This article analyses the advantages and shortcomings of classical load balancing algorithms based on dynamic feedback on a server cluster, and combined stimulated annealing with this strategy to put forward an optimised model of dynamic load balancing. This model uses the stimulated annealing algorithm to calculate accurate performance parameters of load information on every service node, then estimates the actual load of nodes by dynamic feedback, in order to ensure a reasonable distribution of tasks. Experimental results show that in the case of a large amount of requests, this algorithm, in comparison with classical load balancing strategy of dynamic feedback, can effectively reduce the response time of tasks and ensure high throughput, which could improve the whole system performance.
    Keywords: server cluster; load balancing; dynamic feed-back; stimulated annealing; optimisation.

  • Differential-linear cryptanalysis of Simon32/64   Order a copy of this article
    by Yanqin Chen, Wenying Zhang 
    Abstract: Simon is a family of lightweight block ciphers designed by the US National Security Agency in 2013. Simon 2n/k is a cipher in this family with k-bit key and 2n-bit block. So far, there have been several cryptanalytic results on this cipher by means of differential cryptanalysis, linear cryptanalysis and impossible differential cryptanalysis. In this paper, we improve the previous linear cryptanalysis by differential-linear cryptanalysis, which is based on the use of a differential-linear distinguisher constructed by concatenating a linear approximation with a differential. The number of attacks is not increased, but the time complexity of attack on 18-round Simon32 is reduced from 2^{32} to 2^{19}. In addition, we present a key recovery attack on 18 and 19 rounds of Simon32 based on differential-linear distinguisher.
    Keywords: Simon block cipher; differential cryptanalysis; linear cryptanalysis; differential-linear cryptanalysis.

  • Efficient VLR group signatures for smart cards   Order a copy of this article
    by Kamil Kluczniak, Lucjan Hanzlik, Jianfeng Wang 
    Abstract: Group signatures are signature schemes that reveal only the group membership information of the signer. Verifier local revocation group signatures are group signatures that do not require the signer to update his secret key in order to provide revocation in the group. In this paper, we design a practical verifier local revocation group signature based on bilinear maps. Our scheme is the first VLR group signature using pairings that does not require expensive operations done by a signer, such as exponentiation in the target group or pairing evaluation. This makes our signature scheme especially suitable for implementation on devices with restricted resources, such as smart cards.
    Keywords: VLR group signatures; smart cards; resource restricted hardware; strong Diffie-Hellman assumption; revocation.

  • Mechanical amelioration to improve hexapod robot speed   Order a copy of this article
    by Long Gao, Jianping Yin, En Zhu, Tianhang Liu, Wei Chen, Minghui Qiu 
    Abstract: This paper describes the design and simulation of crab-like hexapod robot. Mechanical amelioration and new lateral walking gait were designed to improve the speed and obstacle-crossing ability of the robot. The legs were designed with variable length claws, which were constructed to study the influence of leg length on robot performance. Through simulation and feasibility-checking processes, the lengths of the legs were optimised. The test results proved that the crab-like robot performs better than the straight-walk robot in speed and obstacle-climbing ability.
    Keywords: crab-like robot; speed; simulation; prototype.

  • A lightweight and efficient encryption scheme based on LFSR   Order a copy of this article
    by Guangfu Wu, Keke Wang, Jinjun Zhang, Jiguang He 
    Abstract: Privacy and trust in wireless networks have attracted plenty of attention in the information age. Various types of high-complexity encrypt algorithm are exploited for improving the security of the communication, such as providing security in Global System for Mobile communication (GSM) cell phones. This paper proposes a new algorithm, which combines the Vigen
    Keywords: Vigenère cipher; encryption; decryption; linear feedback shift register.

  • Electric power communication bandwidth prediction based on adaptive extreme learning machine   Order a copy of this article
    by Li Di, Zheng Zheng, Song Wang, Ruidong Zhang, Min Xia, Kai Hu 
    Abstract: Bandwidth demand forecasting is the basis and foundation of power communication network planning. For the traditional neural network learning, there are many problems, such as slow convergence speed, more iterative times, and easy to fall into local optimum. An adaptive extreme learning machine model based on the theory of extreme learning machine and K nearest neighbour theory is proposed to predict the bandwidth of electric power communication. The adaptive metrics of inputs can solve the problems of amplitude changing and trend determination, and reduce the effect of the over-fitting of networks. The proposed algorithms are validated using real data of a province in China. The results show that this method is better than the traditional neural network, auto-regressive models, self-organisation models, and single extreme learning machine model. It can be used in electric power communication bandwidth prediction.
    Keywords: electric power communication; bandwidth prediction; extreme learning machine; K nearest neighbours.

  • Spatial descriptor embedding for near-duplicate image retrieval   Order a copy of this article
    by Yunlong Wang, Zhili Zhou 
    Abstract: The existing methods for near-duplicate image retrieval are mostly dependent on the bag-of-words (BOW) model. However, the procedure of quantisation leads to the low discrimination of visual words, causing many false local matches. In this paper, we propose a novel spatial descriptor embedding method for near-duplicate image retrieval, which encodes the relationship of the SIFT dominant orientation and the exact spatial position between local features and their context to be spatial descriptors, and then embeds them in the index to improve the distinctiveness of visual words. Moreover, a secondary matching structure for spatial descriptors matching is used to effectively and efficiently implement the near-duplicate image retrieval. Experimental results on Copydays illustrate that our method achieves superior performance to the state-of-the-art methods.
    Keywords: near-duplicate; bag-of-words; spatial descriptor embedding.

  • A method for electric load data verification and repair in home environment   Order a copy of this article
    by Qi Liu, Shengjun Li, Xiaodong Liu, Nigel Linge 
    Abstract: Home energy management (HEM) and smart home have become popular. HEM collects and analyses the electric load data to make the power use safe, reliable, economical, efficient and environmentally friendly. Without the correct data, the correct decisions and plans could not be made, so the data quality is of great importance. This paper focuses on the verification and repair of the electric load data in a family home environment. Owing to the irregularity of modern peoples lifestyles, this paper proposes a system of N + 1 framework to handle this properly. It collected every appliances information and the power buss information to make them verify each other, so it can solve the stochastic uncertainty problem and verify if the data is correct or not to ensure the datas quality. During data upload, there are many factors such as smart meter malfunctions, communication failures, which will cause some wrong data. To repair the wrong data, a proposed method called LBboosting integrates two curve-fitting methods. As the results show, the method has a better performance than up-to-date methods.
    Keywords: data verify; data repair; load data quality; power systems; home energy management.

  • Traffic flow detection method based on vertical virtual road Induction Line   Order a copy of this article
    by Jieren Cheng 
    Abstract: Traffic flow detection is an important part of an intelligent transportation system and it has a wide range of applications. We analyse the existing methods of traffic flow detection and propose a traffic flow detection method based on vertical virtual road induction line (VVRIL). Firstly, according to the direction of vehicle travel, we set a VVRIL in the middle of the driveway. Secondly, the background image is gained from the video image with a Gaussian mixture model. We then make differential operation between the background image and video image to get a binary image, in which we set the values of the foreground pixels as 1 and that of background pixels as 0. Thirdly, we extract the values of the pixels in the VVRIL of the binary image. Besides, we regard the vehicle maximum length obtained by self-learning as the length of the detection zone and get the information of vehicles in the VVRIL. Finally, we get the number of vehicles through the analysis of vehicle centre coordinates in the VVRIL of each video image. Experimental and theoretical analyses show that the method is accurate enough to meet the requirement of real-time performance.
    Keywords: road induction line; traffic flow detection; self-learning; Gaussian mixture model.

  • Router-shared-pair mesh: a reconfigurable fault-tolerant network-on-chip architecture   Order a copy of this article
    by YaLi Chen, Kaixin Ren, Naijie Gu 
    Abstract: This paper proposes a fault-tolerant scheme on a network-on-chip-based system-on-chip (NoC-based SoC), for problems of isolated processing element (PE) and parted regions caused by permanent faults. The scheme is referred to as router-shared-pair mesh (RSPmesh). The topology architecture of the RSPmesh uses the design that a pair of neighbouring PEs share a pair of routers, and uses MUXs to provide diversity for link-connections between routers. A topology reconfiguration algorithm and a routing algorithm corresponding to the RSPmesh are also proposed. Thus, when there are faulty routers or links, RSPmesh-based NoC can be reconfigured to a new 2D mesh NoC with maybe smaller size, but regular and with no faults, and it is able to serve all healthy PEs. The RSPmesh uses no spare routers, and only makes several routers disable according to actual needs in topology reconfiguration. Evaluation and experimental results show that the proposed scheme achieves significant improvements in reliability.
    Keywords: network-on-chip; fault tolerant; isolated PE problem; parted regions problem; topology reconfiguration; 2D mesh; router-shared-pair mesh.

  • Application source code modification for processor architecture lifetime improvement   Order a copy of this article
    by Montassar Ben Saad, Ahmed Jedidi, Smail Niar, Mohammed Abid 
    Abstract: In the optimal functioning of SoCs, two significant metrics of quality are the most important: lifetime and reliability. This paper focuses on methods to increase the lifetime of a processor. Two methods are presented: Relax Point Injection (RPI) and Code Structure Adaptation (CSA). In RPI, a specific treatment is incorporated into the application code to prevent a harmful rise in the temperature of the chip. The MTTF of the processor is increased by 33.88% through means of an RPI method. However, the execution time of the application is sometimes increased by the RPI by more than 12%. In the CSA method, the arrangement of the application code is regulated to improve the lifetime of the processor. The MTTF of the processor is increased up to 28% by the CSA technique and the implementation time is maintained.
    Keywords: mean time to failure; thermal dissipation; relax point injection; code structure adaptation.

  • Iterative algorithms for impulsive noise reduction in OFDM-based power line communications   Order a copy of this article
    by Samir Laksir, Abdelaali Chaoub, Ahmed Tamtaoui 
    Abstract: Power Line Communications (PLC) is a technology that permits data transmission using electrical networks. In the last few years, multimedia transmission (e.g. audio, image and video) over electrical signals has received a huge amount of research interest thanks to the already-existing indoor networks. However, impulsive noise presents the most impairments in PLC systems caused by switching transients in the in-home networking. In this paper, we propose some iterative suppression algorithms based on accurate impulsive noise estimation, using an adaptive threshold under a target false alarm probability. The proposed algorithms detect the amplitudes of impulsive noise, and then cancel them iteratively from the received contaminated signal. The results show that the proposed algorithms provide noticeable improvement in terms of bit error rate, peak signal-to-noise ratio, and visual reconstructed image quality, when compared to that of the conventional methods.
    Keywords: power line communications; orthogonal frequency division multiplexing; multimedia transmission; impulsive noise; iterative suppression algorithms; false alarm probability; impulsive noise estimation; bit error rate; peak signal-to-noise ratio; visual image quality.

  • A new scheme for improving the utilisation of nested-cloud resources   Order a copy of this article
    by Yuan Ni, Zhiwei Zhang 
    Abstract: In recent years, cloud computing has played an important role in IT fields. It brings benefits such as high computing efficiency, cost saving, provisioning on-demand of computing resources and high utilisation of the hardware. However, with more fields and business cloud computing involved, the inherent problems in its structure are restricting the further development of cloud computing. The most serious problem is how to achieve the highest usage of the cloud resources. In this paper, we present a scheme based on multi-layer nested virtualisation. It can make full use of the allocations of a virtual machine provided by an Infrastructure-as-a-Service (IaaS) provider. Furthermore, we also propose a corresponding task scheduling algorithm for the nested cloud environment. The task scheduling considers both the computing efficiency and the monetary cost paid for the cloud service. In order to justify our proposal, we use KVM as unmodified multiple hypervisors to run multi-layer VMs on x86 platform. We also do simulations to test our task scheduling algorithm. The result shows encouraging support for our proposal.
    Keywords: cloud architecture; multi-layer nested virtualisation; task scheduling; KVM; Intel-VT.

  • A provably secure delegated authentication scheme and its applications   Order a copy of this article
    by Qun Lin, Jianzhong Li, Xuechang Ren 
    Abstract: In a proxy signature scheme, an original signer can delegate his/her signing capability to a proxy signer, so that the proxy signer can sign on behalf of the original signer. Proxy signature is an important technology in delegated authentication scheme, so it is important to design provably secure proxy signature schemes. In 2012, Boldyreva et a1. gave the definition of proxy signature and formalised a model of security for proxy signature schemes. They not only formalised a model of security for proxy signature schemes, but also specified the adversary's capabilities and goals. In this paper, we propose a new provably secure proxy signature scheme under this model, which is more efficient than that of the existing ones. Furthermore, we use this signature scheme to construct a proxy blind signature scheme, and give the security analysis of the new scheme. Proxy blind signature can be applied in cloud computing.
    Keywords: proxy signature; provable security; proxy blind signature; cloud computing.

  • Region-based trilateral filter for depth video coding   Order a copy of this article
    by Chunyue Hu 
    Abstract: 3D video systems using depth-image-based rendering (DIBR) are attracting significant interest because of their low processing cost. In order to enable these systems, the depth video must be coded in addition to the texture video. During the coding process, coding artifacts in the depth map could cause video quality degradation of virtual view. In this paper, a region-based trilateral filter for depth video coding is proposed to improve the coding quality. First, the depth map is split into multiple objects with the label of segmentation. Then, in order to remove the artifacts from different objects and preserve the sharp edge, each pixel is filtered by using neighboring pixels belong to the same object. The proposed method has been evaluated with several 3D video sequences in HEVC platform. Experimental results demonstrate that the rendering quality can achieve a considerable gain under the same bitrate.
    Keywords: 3D video; HEVC; depth video coding; trilateral filter.

  • Can finger knuckle patterns help to strengthen e-banking security?   Order a copy of this article
    by Abdallah Meraoumia, Djamel Samai, Salim Chitroub 
    Abstract: Communication via the internet has become vital for any kind of information exchange, private, public, commercial, or military. Banks are the first that have used the internet for financial transactions (e-banking). However, the safe use of e-banking implies that all precautions have been considered to identify legitimate users and thus avoid economic and social damage that may be caused by any possible fraud. In this context, we propose in this paper a secure biometric system dedicated to e-banking for reducing the fraud risk and strengthening the customer confidence. The fuzzy commitment concept associated with the Finger-Knuckle-Print (FKP) is the core of our proposed system. However, such a system will only be efficient if the FKP features are accurately extracted. For this, we have developed a new method of feature extraction called Adaptive Extended Binary Pattern (AELBP). The obtained experimental results have been judged promising for a high security of e-banking with guaranteed trust from costumers.
    Keywords: information security; cryptography; fuzzy commitment; biometrics; finger-knuckle-print; feature extraction; local binary pattern; data fusion.

  • Interactive map matching and its visualisation: techniques and system   Order a copy of this article
    by Li Cai, Bingyu Zhu, Yifeng Luo, Shuigeng Zhou 
    Abstract: The trajectory data of taxis is an important kind of traffic data. Many traffic applications need to perform processing and analysis on trajectory data. Visualising trajectory data of vehicles on road maps is an important measure of reflecting and demonstrating the trend of traffic variation, where map matching from trajectory data to the road network plays the most crucial role in such a visualisation process. We design and implement a novel interactive visualised map matching system in this paper, namely MMatchingVis, which provides multiple front-end functions including road selection, data extraction, map matching algorithm selection, and result display, based on web techniques and Baidu Map. MMatchingVis employs the JStorm platform for trajectory data processing. We evaluate MMatchingVis' map matching results with the trajectory dataset collected from 6599 taxis in Kunming, and evaluation results show that MMatchingVis could efficiently process and analyse trajectory data, support multiple user interaction models, and provide fine-grained visualisation presentation.
    Keywords: visualisation; map matching; GPS trajectories data; user interaction; cloud computing.

  • Sign prediction and community detection in directed signed networks based on random walk theory   Order a copy of this article
    by Baofang Hu, Hong Wang, Yuanjie Zheng 
    Abstract: Previous studies on social networks often focused on networks with only positive edges between node pairs. As a significant extension, we applied the random walk theory based on graphs with both positive and negative edges. In particular, we derived the commute time similarity between node pairs in directed signed networks and proved that its corresponding Laplace spectral was a legal kernel to compute the similarities between node pairs. We used the similarity distance to predict the sign and direction of the edges on two real social networks based on the idea of collaborative filtering, and the experimental results showed that the method provided good performance. We also used the defined Laplacian spectrum of the directed signed networks to detect the community structure in two real-world networks and three synthetic networks, and the algorithm achieved good performance.
    Keywords: directed signed network; random walk; community detection; sign prediction; collaborative filtering.

  • Handling startling circumstances with IRM scheduler of real-time systems   Order a copy of this article
    by Mahmoud Naghibzadeh 
    Abstract: There are many vital real-time systems, such as avionics, mission-critical, industrial control, and space missions, which cannot tolerate any request overruns. Safeness analysis of such systems is directly dependent on the scheduling strategy being used. Rate-monotonic and earliest deadline first are the leading scheduling strategies for these systems. Before deployment, it is essential to make sure no task misses occur for such hard real-time systems. This is usually done by formally proving the safeness of the system for the given set of tasks. Besides, a scheduler is preferred which performs better in unexpected situations, such as when a transient fault occurs. The purpose of this paper is to first reveal some new behaviours of the intelligent rate-monotonic scheduler and then evaluate its performance in unexpected situations. Simulation results show that it performs better than both rate-monotonic and earliest deadline first in such situations.
    Keywords: scheduling; intelligent rate-monotonic; pre-emption; deadline miss.

  • A practical approach for estimating human daily water intake   Order a copy of this article
    by Bin Dai, Rung-Ching Chen, Yuan-Yu Ding 
    Abstract: The proportion of water in the human body must keep in a proper level to maintain normal physiological action. Daily water consumption needs to be properly supplemented in time to protect the health of human beings. Water consumption is related to age, body weight, temperature, physical activity, etc. These factors are generally difficult to express with crisp data, and it is not easy to get accurate values of recommended daily water intake. The main objective of this paper is to build a recommended daily water intake system and a practical application using fuzzy reasoning methods. We also compared the actual recommended values with our system output values to find the differences. We have designed an application on the Arduino platform and use Bluetooth electronic scale to connect to smart phones to help people to control their daily water intake. The experiment results proved that the recommendation system is effective in actual applications.
    Keywords: recommendation system; daily water intake; fuzzy system; Arduino; electronic scale.

  • Efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings   Order a copy of this article
    by Hang Tu, Cui Jingsong 
    Abstract: The potential for vehicular ad hoc networks (VANETs) in improving traffic, enhancing road safety and reducing traffic accidents has attracted attention from academia, industry, and governments. To ensure secure communication in VANETs, a number of authentication schemes, including those with batch verification, were proposed in recent years. However, studies have demonstrated that most of the existing schemes suffer from bad performance or weak security. To address those problems, we construct a new identity-based digital signature (IBDS) scheme using bilinear pairings. The IBDS scheme is then used to construct a new identity-based conditional privacy-preserving authentication (IBCPPA) scheme for VANETs without the need for a map-to-point hash function or double secret keys. Using simulations, we demonstrate that our provably-secure IBCPPA scheme not only achieves better performance than related schemes, but also overcomes the inefficiency problem of the double secret keys in related schemes (i.e. the system does have to manage two secret keys to provide security).
    Keywords: authentication; vehicular ad-hoc networks; security; bilinear pairing.

  • A new efficient privacy-preserving data publish-subscribe scheme   Order a copy of this article
    by Ping Chen, Zhiying Wang, Xiaoling Tao 
    Abstract: Data publish-subscribe is an efficient service for users to share and receive data selectively. Owing to the powerful computing resources and storage capacity, the cloud platform is considered as the most appropriate choice to publish and subscribe large-scale data generated in real-world life. However, the cloud platform may be curious about the content of published data and subscribers' interests. In this paper, we aimed at realising a secure and efficient privacy-preserving data publish-subscribe scheme on cloud platforms. On one hand, we adopt ciphertext-policy attribute-based encryption (CP-ABE) to encrypt the data based on its access policy. Moreover, part of the decryption computation is shifted to the cloud platform to reduce subscribers' computation overhead. On the other hand, we use an efficient searchable encryption scheme based on bloom filter tree (BFtree) to protect subscribers' privacy and match their interests with encrypted data. Not only that, publishers and subscribers can also exchange their roles in our scheme. The security analysis and experimental results prove that our scheme is efficient and secure in privacy-preserving data publish-subscribe service.
    Keywords: privacy-preserving; data publish-subscribe; CP-ABE; BFtree; cloud platform.

  • A new identity-based public auditing against malicious auditor in the cloud   Order a copy of this article
    by Kun Qian, Hui Huang 
    Abstract: With the development of cloud computing, the integrity of data is becoming increasingly important. The auditing schemes for data integrity allow data owners to verify the integrity of the data stored in an untrusted server. Most of public auditing schemes are based on the public key infrastructure (PKI), which may lead to certificate management problems. Recently, an identity-based public auditing scheme was proposed and it could effectively reduce computation cost of auditors and solve certificate management problems. However, the scheme was proved to be insecure. In this paper, we consider the malicious auditor and propose a new identity-based public auditing against malicious auditors in cloud computing. The new construction is proved to be secure by assuming the hardness of the computation Diffie-Hellman problem (CDHP). Finally, compared with the existing identity-based auditing scheme, our scheme is efficient and reduces the computation overhead of the auditor.
    Keywords: data storage; cloud computing; public auditability.

  • EEG control variable algorithm and motion control strategy for toy rail car   Order a copy of this article
    by Hongguang Pan, Mei Wang, Xiaokang Wang, Jzau-Sheng Lin 
    Abstract: For training the thought concentration ability of hyperactivity sufferers, this paper proposed a kind of electroencephalogram (EEG) control variable extraction method and the motion control strategy. Firstly, the technologies of EEG acquisition from frontal lobe, and the wireless data transmission from the acquisition card to the Pad Phone were realised. Then, through the wavelet Mallat algorithm and FFT to extract the EEG control variable, the accurate controls of start, stop, and running velocity of the toy rail car were implemented. Thirdly, the mathematical model between the velocity and the EEG control variable was established, and then the start threshold, the swerve control and the speed adjust method were accurately designed using this model, so that the delay start and the swerve speed were solved. In addition, the wireless data transmissions among the Pad Phone, the EEG acquisition module and the rail-electric potential controller were realised. Finally, it was proved that the proposed EEG control variables and the control strategy effectively fulfill the accurate speed control and the stable motion control.
    Keywords: EEG; wavelet transform; Mallat algorithm; FFT; motion control.

  • DPVFS: a dynamic procrastination cum DVFS scheduler for multicore hard real time systems   Order a copy of this article
    by Shubhangi Gawali, Biju Raveendran 
    Abstract: Optimising energy consumption has become primary focus of research in recent years. Static and dynamic energy optimisation during task scheduling is one of the most prominent measures available. This is achieved mainly by shutdown and slowdown techniques. In uniprocessor real-time systems, the most widely used shutdown and slowdown techniques are Dynamic Procrastination (DP) and Dynamic Voltage and Frequency Scaling (DVFS). This paper proposes DPVFS a hard real-time task scheduler for multicore system to optimise overall energy consumption without deadline misses. DPVFS combines DP and DVFS for multicore systems to save overall energy consumption. DPVFS shut the processor down whenever possible with the help of procrastination. If shutdown is not possible, it adjusts the voltage and frequency to reduce dynamic energy consumption. The experimental evaluation of DPVFS with synthetically generated benchmark program suites shows savings of 18.8% and 33.2% of overall energy over DP-based schedulers and DVFS-based schedulers respectively.
    Keywords: procrastination; dynamic voltage and frequency scaling; multi-core real-time scheduling.

  • Energy oriented EDF for real-time systems   Order a copy of this article
    by Gil Kedar, Avi Mendelson, Israel Cidon 
    Abstract: Energy is a major concern when designing real-time systems. A common method for saving energy while still guaranteeing the real time constraints is to embed dynamic voltage and frequency scaling (DVFS) mechanisms and dynamic power management (DPM) mechanisms within a real-time scheduling algorithm, such as EDF. This paper proposes a new extension to the EDF scheduler, termed energy oriented EDF (EO-EDF). The new scheduler makes it possible to change the original EDF task execution order to better use the slack time and thus decrease the energy consumption, while still meeting the task deadlines. The new task order is defined according to a novel criterion we invented, termed task prediction order (TPO). The paper introduces two new versions of the EO-EDF scheduler, termed TPO-EDF and STPO-EDF. While STPO-EDF applies the TPO criterion in a static manner, TPO-EDF allows it to be used dynamically. We simulate the new proposed algorithms using both synthetic workloads and real time benchmarks. The evaluations show that integrating both the TPO-EDF and STPO-EDF scheduling algorithms with DVFS and DPM mechanisms achieves an energy saving of 30% on average, in comparison with current known EDF-based using DVFS and DPM mechanisms.
    Keywords: low energy; real-time; scheduling; EDF; EO-EDF; TPO.

  • Model construction and application of coal mine CPS perception and control layer   Order a copy of this article
    by Ping Ren, Jingzhao Li, Dayu Yang 
    Abstract: Coal mine cyber-physical system (CPS) is a complex system that combines the information resources and the physical resources, which are established above and below ground. The system realises the integrated design of the information world and the physical world, so that the integrated system is more reliable and efficient. The key technology of coal mine CPS is the construction of a physical system model and information processing. Aiming at the situation of the coal mine industrial system consisting of several different physical systems, in this paper we first analyse the parametric model of infection control layer and construct the continuous-time system model, including the non-memory continuous time system model, the memory system model, the feedback control system, and the discrete-time system model. During the actual production process, considering that some systems of coal mine CPS are continuous time and discrete time hybrid systems, by analysing the parameters of the inclined lane signal subsystem, the anti-wrong turnout subsystem, the anti-slip car subsystem, the frequency control system, such as system function, input signal, state transition, and control output, a hybrid system state model with n inputs and m outputs is proposed, and the parameters application model of perception and control layer is obtained. In practical application, the inclined lane transportation architecture has achieved good results.
    Keywords: cyber-physical system; perception and control layer; coal-mining industry; inclined tunnel transportation; model; status.

  • MOESIF: an MC/MP cache coherence protocol with improved bandwidth usage   Order a copy of this article
    by Geeta Patil, Biju Raveendran, Neethu Bal Mallaya 
    Abstract: This paper proposes a novel cache coherence protocol MOESIF - to improve the off-chip and on-chip bandwidth usage. This is achieved by reducing the number of write backs to next level memory and by reducing the number of responders to a cache miss when multiple copies of data exists in private caches. Experimental evaluation of various SPLASH-2 benchmark programs on CACTI 5.3 and CACOSIM simulators reveals that the MOESIF protocol outperforms all other hardware-based coherence protocols in terms of energy consumption and access time. MOESIF protocol on average offers 94.62%, 88.94%, 88.88% and 4.47% energy saving, and 96.37%, 92.83%, 92.77% and 9.21% access time saving over MI, MESI, MESIF and MOESI protocols, respectively, for different numbers of cores/processors.
    Keywords: cache coherence; MC/MP cache; energy-efficient coherence protocols;.

  • A detection model of malicious Android applications based on Naive Bayes   Order a copy of this article
    by ChunDong Wang, Yi Zhao, XiuLiang Mo 
    Abstract: With the popularity of mobile devices, thousands of malicious applications targeting mobile devices, including the popular Android platform, are created on a daily basis, which cause substantial losses for their users. How to detect malicious applications efficiently has become a new and ever-growing challenge. However, previous studies overlooked malicious potential permission combinations as a feature in detection. In this paper, according to the Android permission mechanism, we propose and implement a detection model based on Naive Bayes. The model uses the Apriori algorithm to effectively mine the potential correlation in permissions among the various malicious applications. Then, in order to improve the performance of the Android malware detection system, the additional feature methodology proposed in this paper is used to deal with samples which have dangerous permission combinations. Combined with the improved Naive Bayes classifier, samples are classified into two categories. The experimental result reveals that the optimal detection rate in our detection model is 95.63%. Thus, it significantly improves the accuracy of the Naive Bayes in the detection of malicious Android applications.
    Keywords: Android permission; malware detection; machine learning.

  • An efficient privacy-preserving friendship-based recommendation system   Order a copy of this article
    by Bingpeng Ou, Jingjing Guo 
    Abstract: With the development of the internet, recommendation systems play a significant role for providing personalised services. However, it also raises serious concerns about privacy since the system collects a lot of personal information. Thus, plenty of schemes have been proposed to address the privacy issues by using cryptographic techniques. However, with the rapid increase of users and items, most existing cryptography-based schemes are inefficient. In this paper, we propose an efficient privacy-preserving scheme for recommendation systems. Compared with existing schemes, our scheme does not require that friends of users are online during computing predicted rating. Finally, we evaluate the performance of our scheme with the MovieLens 20m dataset, and it shows that our scheme can reduce the overhead of computation and communication.
    Keywords: recommendation system; privacy-preserving; homomorphic encryption; proxy re-encryption.

  • A result correctness verification mechanism for cloud computing based on MapReduce   Order a copy of this article
    by Ziao Liu, Tao Jiang, Xiaoling Tao 
    Abstract: MapReduce is widely applied as a parallel programming model to process massive amounts of data in cloud computing environment. However, in open systems, the workers of MapReduce framework are provided by various administration domains and may be unreliable or malicious. The existing schemes of MapReduce processing model based on multiply duplicate tasks can effectively detect the lazy and non-collusive workers. However, they cannot cope with the vulnerability that malicious workers collude to return incorrect results and thereby undermine the final computation results of users outsourced tasks. In this paper, we present an effective result correctness verification mechanism for MapReduce in public cloud computing environment. By using task duplication and weighted correctness attestation graph, our mechanism can effectively detect both non-collusive and collusive malicious workers in public cloud environments. In order to further improve the detection speed, we introduce a worker selection method based on trust values and consistency relationship. Finally, analysis and experimental results indicate that our mechanism can guarantee higher detection rate with proper additional computation overhead.
    Keywords: cloud computing; result correctness; MapReduce; attestation graph.

  • A new approximate image verification mechanism in cloud computing   Order a copy of this article
    by Mengping Yin 
    Abstract: With the growing prevalence of cloud computing, more and more data especially images and videos are stored in cloud servers. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to cloud servers. It is discovered that highly correlated data exist in storage outsourcing and much useful information can be extracted from these correlated data and used for cloud-based services. In the paper, we propose a scheme of encrypted image verification in cloud computing for mobile devices. Many existing schemes focus on verification of query results for outsourced text data or identical images. Different from that, the proposed scheme aims to verify the correctness of query results for similar images. Through the successful query of similar images, power and memory resources of mobile devices can be saved. The security of our scheme is analysed in the random oracle model, and analysis shows that the scheme is secure against adaptive chosen-keyword attack. And what's more, the experimental results demonstrate that our scheme is an efficient one.
    Keywords: correctness verification; encrypted image; cloud computing; local sensitive hashing.

  • Local connectedness over soft rough topological space   Order a copy of this article
    by Li Fu, Hua Fu, Zhen Liu, Fei You 
    Abstract: In this paper, the connectedness of the soft topological space is further discussed, based on the soft connected rough topological space. Continuous mapping is defined in the soft rough topological space, and the property of soft connectedness under continuous mapping is discussed. The connectedness of soft points and local connectedness are defined in the soft connected rough topological space, and the local properties of connectedness are given.
    Keywords: soft rough formal context; soft connected rough topological space; soft point; local connected space; connected branch.

  • Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing   Order a copy of this article
    by Kai Nie, Yunling Wang 
    Abstract: Cloud computing has brought appealing features for its users, such as on-demand computing resources, flexible and ubiquitous access and economical cost. Individuals and enterprises are motivated to outsource data to cloud servers. However, the privacy and security of users' data are obstacles preventing application of cloud computing. Searchable encryption is a way to protect sensitive data, while preserving search ability over encrypted data. However, the server may be lazy and return part of results for self-benefit. Therefore, a verification mechanism should be established to guarantee the integrity of search results. In this paper, we present an efficient publicly verifiable conjunctive keyword search scheme. Our scheme ensures the correctness and completeness of search results even if the result is an empty set. Compared with existing keyword search schemes, our scheme is more efficient to verify the search results. Furthermore, we prove that the proposed scheme can achieve the desired security properties.
    Keywords: cloud computing; privacy-preserving; keyword search; completeness.

  • A design methodology for mobile and embedded applications on FPGA-based dynamic reconfigurable hardware   Order a copy of this article
    by Darshika G. Perera, Kin Fun Li 
    Abstract: With the proliferation of mobile and embedded devices, multiple running applications are becoming a necessity on these devices. Apart from optimised hardware-software architectures, state-of-the-art techniques and design methodologies are needed to support complex applications running on mobile and embedded systems. We envision in the near future, many mobile devices will be implemented and delivered on FPGA-based reconfigurable chips. Our previous analysis illustrated that FPGA-based dynamic reconfigurable systems are currently the best option to deliver embedded applications that have stringent requirements. However, computation models and application characteristics also play significant roles in determining whether FPGA-based reconfigurable hardware is indeed a good match for specific applications on a mobile or embedded platform. In addition, there are different methods of reconfiguring the hardware on chip dynamically. Selecting a specific reconfiguration method and designing the corresponding hardware architectures for an application are important and challenging tasks in reconfigurable computing systems. In this work, we propose a design methodology for FPGA-based dynamic reconfigurable hardware that serves as a guideline to the embedded hardware designers in mapping the computation models and characteristics of an application to the most suitable reconfiguration methods. The most common pipelined and parallel (functional) computation models are used as case studies to illustrate the design methodology.
    Keywords: design methodology; embedded applications; FPGAs; mobile devices; dynamic reconfigurable hardware.

  • Development of a charging system for current-controllable batteries based on a multi-stage mechanism   Order a copy of this article
    by Hsiung Cheng Lin, Chi-Wei Liu, Jhih-Siang Lin 
    Abstract: Increasing demand for back-up electric power supply has enforced the development of efficient batteries charger in industry. However, the study of an effective charging management mechanism still needs a further improvement to overcome some limitations of traditional methods. For this reason, this paper proposes a current-controllable batteries charging system using multi-stage charge mechanism for achieving more effective performance. Firstly, a high frequency two-transistor forward converter is designed to provide necessary DC power supply for both charger and control unit. For the charger, it is designed based on an ideal multi-state strategy, and it can provide a desired/changeable constant charging current. Also, each battery is ensured at a balanced level by the proposed battery equilibrium circuit before the charging process. The experimental results confirm that the proposed charging system is superior in term of flexibility, high efficiency, and self-management capability.
    Keywords: battery equilibrium; lead-acid batteries; current-controllable; self-management; charger.

  • A method of crime rate forecast based on wavelet transform and neural network   Order a copy of this article
    by Li Mao, Wei Du 
    Abstract: Accurate prediction of crime is highly challenging. In order to improve the efficiency of situational crime prevention, the temporal distribution of the crime rate within 24 hours is analysed and a forecast model combining Discrete Wavelet Transform and Resilient Back-Propagation Neural Network (DWT-RBPNN) is presented. First, historical crime incidence sequences obtained by the sliding window are decomposed by DWT. Then RBPNN-trained decomposition sequences are used to predict the incidence of future trends and details. Finally, the trends and details are reconstructed to get the final prediction sequence. The experimental results show that the proposed model has relatively high accuracy and feasibility on the crime rate prediction compared with the single method of BPNN. The utility of the DWT-RBPNN model can offer an exciting new horizon to provide crime rate forecasting and early warning in situational crime prevention.
    Keywords: crime rate forecasting; sliding window; discrete wavelet transform; neural network; resilient back-propagation.

  • From real-time design model to RTOS-specific models: a model-driven methodology   Order a copy of this article
    by Rania Mzid, Chokri Mraidha, Jean-Philippe Babau, Mohamed Abid 
    Abstract: The refinement of a Real-Time Operating System (RTOS)-independent real-time design model to a RTOS-specific model is a critical phase in a model-based approach. Model-based approaches allow early verification of the timing properties at the design level. At this phase, if the hardware architecture is supposed to be known, the technological platform (here the RTOS) is not defined. Hence, some assumptions on the platform are implicitly made to achieve timing verification on the one hand and to keep RTOS-independence of the design model on the other hand. However, at the implementation level, these assumptions may be not implementable for the target RTOS. In addition, a difference between the semantic of the software resources used to build the design model and those provided by the RTOS may occur, which may lead to a mismatch between the original design model and the implementation one and affect thus the timing properties. In this paper, we propose a Design Refinement toward Implementation Methodology (DRIM) to address the refinement problem. Having the real-time design model as entry and based on an abstract and a concrete platform models, the methodology firstly evaluates the feasibility of deployment of the given design model on the considered RTOS. When no feasibility problem is raised, the mapping phase generates the appropriate RTOS-specific model. Nevertheless, when the design model is not implementable, the methodology informs the designer about the problem before the effective deployment and guides him for the selection of the appropriate RTOS.
    Keywords: design-level verification; real-time operating systems; model-driven approach; design model; RTOS-specific model; UML; MARTE.

  • A new method of vision-based seat belt detection   Order a copy of this article
    by Zhongming Yang, Hui Xiong, Zhaoquan Cai, Peng Yu 
    Abstract: In the traffic management system, it can greatly improve the management efficiency through the algorithm that monitors and automatically detects whether the driver fastens the seat belt. However, currently prevalent detecting methods cannot achieve satisfactory results in aspects of the detecting rate, the image quality requirement and the colour difference between seat belt and the surrounding environment. In this paper, we propose a method of seat belt detection based on visual positioning. The algorithm locates the window according to the licence plate position and the contour statistics obtained from the gradient. The face detection is used to adjust and determine the seat belt detection area in the window. Finally, the method of seat belt detection based on the connected area is used to detect whether the seat belt is fastened. Experiments show that the successful rate of the proposed method is much higher than other existing methods, and satisfactory results are obtained.
    Keywords: seat belt detection; connected components; big data in traffic; structured image data.

  • Biclique cryptanalysis on block cipher Midori   Order a copy of this article
    by Hongluan Zhao, Guoyong Han 
    Abstract: Biclique cryptanalysis can greatly decrease computation and data complexity by using the main idea of meet-in-the-middle attack and the basic principle of the biclique structure. Midori is a hardware-oriented lightweight block cipher designed by Banik et al. in ASIACRYPT 2015. In this paper, we first demonstrate the lightweight block cipher Midori64/128 and present a general method of biclique attack. Next, we describe how to construct a biclique and attack a full-round Midori block cipher. By investigating the simple key schedule and the encryption structure, we construct a five-round biclique structure of four-dimensional and a four-round biclique structure for Midori64, with data complexity of 2^36 and 2^16 and with computational complexity of 2^126.45 and 2^126.69 , respectively. Moreover, we use a four-round biclique structure to attack Midori128 with data complexity of 2^72 and computational complexity of 2^127.33 . These are superior to the current known results.
    Keywords: biclique cryptanalysis; Midori; meet-in-the-middle; block cipher.

  • Efficient public integrity auditing with secure deduplication in cloud computing   Order a copy of this article
    by Huixia Huo, Tao Jiang, Shichong Tan, Xiaoling Tao 
    Abstract: With the rapid development of cloud computing, storing data to cloud servers has become an increasing trend, which promotes integrity auditing and data deduplication to be two hot research topics. Recently, some existing schemes addressed a problem about integrity auditing with deduplication. However, these schemes did not support aggregating authentication tags of different users in the integrity auditing process, which caused a heavy computation cost to the third party auditor (TPA), especially in the batch auditing process. In this paper, we propose an efficient public auditing with secure deduplication scheme using the idea of aggregate signature, which allows the TPA to verify the correctness of integrity proof generated by the cloud service provider with a constant computation cost. Our scheme can also efficiently support batch auditing, whose auditing complexity on the TPA is independent of the number of auditing tasks. Finally, we prove that our scheme is secure and efficient through security analysis and performance evaluation.
    Keywords: efficient integrity auditing; secure deduplication; aggregate signature; batch auditing; cloud computing.

Special Issue on: ICESC 2014 Electronic System Design and Computational Intelligence

  • A novel filter algorithm for impulse noise removal from digital images in a library database system   Order a copy of this article
    by Yaqin Li, Lan Qiu, Cao Yuan 
    Abstract: Library database systems are generated from a lot of online images. They are stored in databases that grow massively and become difficult to capture, form, store, manage, share, analysse and visualise via typical database software tools. In this paper, a switching median and morphological filter is presented for removing impulse noise. The noise detector is first adopted to identify noise pixels by combining the morphological gradient based on the erosion and dilation operators with the top-hat transform. Then the detected impulses are removed by the hybrid filter, which combines the improved median filter using only the noise-free pixels with the conditional morphological filter using the improved morphological operations. The results of simulations demonstrate that the proposed filter can realise accurate noise detection, and it has significantly better restoration performance than a number of decision-based filters at the various noise ratios.
    Keywords: impulse noise; noise detector; median filter; morphological filter.

Special Issue on: Data Management and Intelligent Application for the Internet of Things

  • Access-driven cache attack resistant and fast AES implementation   Order a copy of this article
    by Yadong Wan, Xinqiang Luo, Yue Qi, Jie He, Qin Wang 
    Abstract: The traditional Advanced Encryption Standard (AES) implementations based on four lookup tables (4-T) of 1KB size, have high encryption performance, but face access-driven cache attack at the same time. In this paper, we present an AES implementation based on one lookup table of 512B with optimised structure, named 1-T, to improve the access-driven cache attack resistant ability. Furthermore, we optimise the implementation of round function of 1-T to eliminate the speed influence from the shrunken lookup table. The experiment result shows that the attack resistant ability of 1-T is much higher than 4-Ts under the same cache setting, and that the encryption time of 1-T is increased by 43.5% and 106.3% compared with 4-Ts on the ARM and the x86 platform, respectively, but the storage overhead is only 28% of 4-Ts.
    Keywords: AES encryption; look-up table; access-driven cache attack; WSN

Special Issue on: 3PGCIC 2014 The Challenges of Pervasive Computing Security and Intelligence

  • Static compliance checking beyond separation of duty constraints   Order a copy of this article
    by Yang Bo, Chunhe Xia, Yang Luo, Qing Tang 
    Abstract: Compliance requirements, such as separation of duty and binding of duty, have to be satisfied in many application domains. Existing compliance checking frameworks either have limited expressiveness or rely on model checking, which has a small applicable range and low efficiency. To overcome these limitations, we improve high level expression separation of duty algebra to (1) describe both SoD and BoD constraints to make it more expressive; (2) to describe a user-task relationship to perform compliance checking. In order to make the improved high level policy act on the concrete process, we (1) construct mapping rules to translate the improved high level policies to low level constraints described in description logic; (2) propose a reasoning framework to check for business process compliance. We report on the applicability of our approach via a case study.
    Keywords: business process compliance; high level policy; low level constraint; description logic; framework

  • An algorithm of video network transmission based on unbalanced multiple description coding   Order a copy of this article
    by ShanGuo Lv, YiQin Cao 
    Abstract: The drop-rate and net delay during video network transmission are two important factors in ensuring video network transmission quality. The purpose of network congestion control is to reduce the bad quality impact of video network transmission caused by net delay and the drop-rate. This paper proposes an algorithm of video network transmission based on unbalanced multiple description coding, which is capable of quickly recovering from packet losses and ensuring continuous playback, and furthermore is adaptive to both multiple path and single path transmission. A Markov model was employed to predict the state of network congestion based on available bandwidth detection, and the video transmission path was changed on the basis of the prediction. Experiments show that, compared with the RED algorithm, the algorithm is much more effective to estimate network congestion, reduce video packet loss-rate and net delay, thus the video network transmission quality can be ensured more effectively.
    Keywords: unbalanced multiple description coding ;bandwidth detection ;Markov model

  • Study on the local path planning for intelligent vehicles based on an improved VFH method   Order a copy of this article
    by Yingwei Yan, Yu Du, Wenan Zhou 
    Abstract: A local path planning method has been proposed and implemented for intelligent vehicles, the vector field histogram sharp (VFH#). In this study, an intelligent vehicle was made to manoeuvre through obstacles by the VFH# method. This local path planning method is the result of an improvement on a method called VFH (Vector Field Histogram). The VFH method is sensitive to the threshold value for determining candidate sectors. It is difficult for an intelligent vehicle to travel through narrow corridors by the VFH method. The VFH# method enlarges obstacles to avoid collisions. It also designs a new means of acquiring the magnitude of the obstacle vector to eliminate sensitivity. In each sector, it chooses the largest magnitude as the resistance value among obstacle vectors. The method is applied to an electric vehicle to verify the performance, and it achieves an excellent result.
    Keywords: local path planning; vector field histogram sharp; intelligent vehicle

Special Issue on: RFID Applications in the Internet of Things

  • A modified Q-learning algorithm to solve cognitive radio jamming attack   Order a copy of this article
    by Feten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir, Rabah Attia 
    Abstract: Since the jamming attack is one of the most severe threats in cognitive radio networks, we study how Q-learning can be used to pro-actively avoid jammed channels. However, Q-learning needs a long training period to learn the behaviour of the jammer. We take advantage of wideband spectrum sensing to speed up the learning process, and we use the already learned information to minimise the number of collisions with the jammer. The learned anti-jamming strategy depends on the elected reward strategy, which reflects the preferences of the cognitive radio. We start with a reward strategy based on the avoidance of the jammed channels, then we propose an amelioration to minimise the amount of frequency switching. The effectiveness of our proposal is evaluated in the presence of different jamming strategies and compared with the original Q-learning algorithm. We compare also the anti-jamming strategies related to the two proposed reward strategies.
    Keywords: cognitive radio, jamming, Markov decision process, Q-learning

  • RFID IoT-enabled warehouse for safety management using product class based storage and potential fields methods   Order a copy of this article
    by Sourour Trab, Eddy Bajic, Ahmed Zouinkhi, Mohamed Naceur Abdelkrim, Hassen Chekir 
    Abstract: Security and risk management in warehouses and logistics is a key factor to achieve a sustainable and safe supply chain. The paper aims at proposing RFID-IoT-enabled warehouse management focused on safety assurance for goods and people leveraging product Class Based Storage (pCBS), communicating object, RFID and IoT components. Security issues between products, storage locations, transportation equipment, environment and people are handled with the use of potential fields methods associated with smart product management in RFID-IoT warehouse architecture. A dynamic calculation of suitable storage locations is proposed founded on negotiation mechanisms between products and shelves, and their availability and compatibility constraints according to the pCBS method. A safe and secure product storage path discovery method is presented using attractive/repulsive potential fields for path minimisation while maximizing security level along the way. A multi-agent based simulation with NetLogo demonstrates the effectiveness of the proposal allowing to achieve safety warehouse management by using smart product reactivity against critical risks.
    Keywords: product class based storage, potential fields methods, communicating object, IoT, RFID, negotiation mechanisms, simulation, NetLogo.

Special Issue on: PCC 2014 Frontiers in Pervasive Computing

  • Energy-aware list-based scheduling for parallel applications in cloud   Order a copy of this article
    by Yongxing Liu, Kenli Li, Zhuo Tang, Keqin Li 
    Abstract: As the growth of energy consumption has been explosive in current data centres and cloud systems, it has drawn greater attention in academia, industry and government. Task scheduling is core to systems, it has become an important method to reduce energy dissipation. This paper proposes an Energy Aware List-based Scheduling algorithm called EALS for parallel applications in the context of Service Level Agreements (SLA) on cloud data centres. First, the EALS algorithm comprehensively considers the high power processors to minimise the number of high power processors used. Then, the algorithm tries to migrate some tasks from a high power processor to a low power processor for energy saving. Finally, the EALS algorithm takes a more efficient way to assign the time slots among tasks based on the dynamic voltage scaling (DVS) technique. To demonstrate the effectiveness of the EALS algorithm, randomly generated graphs and several real-world applications are tested in our experiments. The experimental results show that the EALS algorithm can save up to 43.96% energy consumption for various parallel applications as well as balance the scheduling performance.
    Keywords: cloud data centre; directed acyclic graph; dynamic voltage scaling; energy-aware scheduling; service level agreement.

  • User similarity based gender-aware travel location recommendation by mining geotagged photos   Order a copy of this article
    by Zhenxing Xu, Ling Chen, Haodong Guo, Mingqi Lv, Gencai Chen 
    Abstract: The popularity of camera phones and photo-sharing websites, e.g. Flickr and Panoramio, has led to huge volumes of community-contributed geotagged photos, which could be regarded as digital footprints of photo takers. Thus, mining geotagged photos for travel recommendation has become a hot topic. However, most existing work recommends travel locations based on the knowledge mined from photo logs (e.g. time, location), and largely ignores the knowledge implied in the photo contents. In this paper, we propose a geotagged photos mining-based personalised gender-aware travel location recommendation approach, which considers both photo logs and photo contents. Firstly, it uses an entropy-based mobility measure to classify geotagged photos into tour photos or non-tour photos. Secondly, it conducts gender recognition based on face detection from tour photos. Thirdly, it builds the gender-aware profile of travel locations and users. Finally, it recommends personalised travel locations considering both user gender and similarity. Our approach is evaluated on a dataset, which contains geotagged photos taken in eleven cities of China. Experimental results show that our approach has the potential to improve the performance of travel location recommendation.
    Keywords: geotagged photos; gender recognition; travel location recommendation

  • An abstraction layer enabling pervasive hardware-reconfigurable systems   Order a copy of this article
    by Alessandro Cilardo, Nicola Mazzocca, Paolo Prinetto 
    Abstract: Field-programmable gate array technologies are creating a new range of challenges for pervasive and ubiquitous systems. Revisiting and extending approaches borrowed from the purely software domain is a fundamental opportunity in this scenario. In particular, this paper addresses code mobility, a well-established approach used to dynamically adapt a distributed system based on the actual application needs, and extends it to a deep code mobility concept, allowing "logical" hardware components to be migrated across a pervasive infrastructure. The work presents the architecture and the prototype implementation of a reconfigurable computing framework providing full support to deep code mobility through an abstraction layer which exposes a portable view of the underlying reconfigurable hardware. The paper then thoroughly discusses two application scenarios, hardware-accelerated distributed data mining and autonomous online testing, confirming the impact of deep code mobility in real-world pervasive computing contexts.
    Keywords: pervasive computing; ubiquitous systems; code mobility; adaptive systems; reconfigurable computing; field programmable gate array

  • Scheduling deadline-constrained scientific workflow using chemical reaction optimisation algorithm in clouds   Order a copy of this article
    by Chaokun Yan, Huimin Luo, Zhigang Hu 
    Abstract: The advent of cloud computing as a new model of service provisioning in distributed systems encourages researchers to investigate its benefits and drawbacks on executing scientific applications such as workflows. One of the most challenging problems in clouds is workflow scheduling, i.e., the problem of satisfying the QoS requirements of the users as well as minimising the cost of workflow execution. In this paper, a novel meta-heuristic method, called chemical reaction optimisation (CRO), is developed to solve deadline-constrained workflow scheduling, which tries to minimise the cost of workflow execution while meeting a user-defined deadline. A set of appropriate parameter can be obtained based on orthogonal experimental designs (OED) and factor analysis. Experiments are done in two real workflow applications, and the results demonstrate the effectiveness of the proposed algorithm.
    Keywords: cloud; SaaS; deadline; scientific workflow; chemical reaction optimisation

Special Issue on: ICA3PP 2015 and PRDC 2015 Dependability in Parallel and Distributed Computing

  • A language-based intrusion detection approach for automotive embedded networks   Order a copy of this article
    by Studnia Ivan, Eric Alata, Vincent Nicomette, Mohamed Kaaniche, Youssef Laarouchi 
    Abstract: The increase in connectivity and complexity of modern automotive networks presents new opportunities for potential hackers trying to take over a vehicle. To protect the automotive networks from such attacks, security mechanisms, such as firewalls or secure authentication protocols, may be included. However, should an attacker succeed in bypassing such measures and gain access to the internal network, these security mechanisms become unable to report about the attacks causing such a breach, occurring from the internal network. To complement these preventive security mechanisms, we present a non-intrusive network-based intrusion detection approach fit for vehicular networks, such as the widely used CAN. Leveraging the high predictability of embedded automotive systems, we use language theory to elaborate a set of attack signatures derived from behavioural models of the automotive calculators in order to detect a malicious sequence of messages transiting through the internal network.
    Keywords: automotive networks; security; intrusion detection; CAN; finite state automata; regular languages

  • An analytic evaluation on soft error immunity enhancement due to temporal triplication   Order a copy of this article
    by Ryutaro Doi, Masanori Hashimoto, Takao Onoye 
    Abstract: The chip-level soft error rate is increasing, owing to device miniaturisation and larger scale integration. Soft errors are one of the major factors that degrade the reliability of integrated circuits, and soft error aware design is demanded for applications that cannot allow any failures. As one of the soft error countermeasures, spatial redundancy has been widely studied and adopted in real products because of its small speed overhead and easiness of implementation. On the other hand, temporal redundancy, which is another well-known technique, is rarely adopted in practical applications and its usefulness has not been comparatively evaluated. This paper analytically evaluates the soft error immunity enhancement thanks to temporal triplication. The evaluation result shows that the failure rate reduction of the temporal triplication is comparable with that of the spatial triplication in the supposed pipeline hardware and computation model.
    Keywords: reliability; soft error; redundancy; temporal triplication; spatial triplication.

  • Area coverage estimation model for directional sensor networks   Order a copy of this article
    by Zhimin Liu, Weijia Jia, Guojun Wang 
    Abstract: Recently, directional sensor networks (DSNs) have received a great deal of attention owing to their wide range of applications in different fields. A directional sensor has a smaller angle of sensing range than an omni-directional sensor. Coverage is one of the fundamental problems of directional sensor networks at present, which reflects how well the environment is monitored. In this paper, we propose a coverage estimation model to estimate the coverage problem with boundary effect. In order to guide initial deployment of DSNs and better meet requirements with certain initial coverage probability effectively, a novel probability-based area coverage estimation model with boundary effect, named PCPMB, is proposed. Simulation results show that our proposed model outperforms the previous proposed model without boundary effect.
    Keywords: directional sensor networks; area coverage; coverage estimation; node estimation.
    DOI: 10.1504/IJES.2016.10006059
     

Special Issue on: Security for Embedded and Related Systems

  • Identification and addressing of the internet of things based on distributed ID   Order a copy of this article
    by Rui Ma, Yue Liu, Ke Ma 
    Abstract: It is a key issue that identification and addressing the entity which access the Internet through the wireless network with various short distance transmission protocols. To solve the problem, combining with the existing identification and addressing technology of the Internet and the IOT, this paper proposes a method based on distributed ID. This method can be divided into two stages. It first designs the structure of distributed ID. Using the distributed address allocation algorithm, it implements the automatic allocation of the distributed ID as well as the distributed ID resolution among the global IOT. After that, an addressing scheme is designed to meet demands of the IOT addressing. It first defines the structure of addressing and then implements the routing addressing algorithm which combines the cluster-tree algorithm with the ad-hoc on-demand distance vector routing algorithm. This scheme could improve the routing efficiency as well as achieve lower cost, lower energy consumption and higher reliability of the addressing. By the simulation on NS-2 platform, the experimental results highlight the feasibility and effectiveness of the proposed method from three aspects: the correctness of identification allocation, the effectiveness of addressing scheme, and the stability of data transmission.
    Keywords: internet of things; identification; addressing; AODV; cluster-tree

  • Constant-size ring signature scheme using multilinear maps   Order a copy of this article
    by Xiangsong Zhang, Zhenhua Liu, Fenghe Wang 
    Abstract: Ring signature is a group-oriented digital signature with anonymity. Most existing ring signature schemes use bilinear pairings, are provably secure in the random oracles, or are linear signature size to the number of ring member. In this paper, we use multilinear maps, which have been widely used to construct many novel cryptographic primitives recently, to present a ring signature scheme with constant signature size. The proposed scheme is proven to be anonymous against full key exposure and unforgeable against chosen-subring attacks based on the multilinear computational Diffie-Hellman assumption in the standard model. Furthermore, our scheme has the advantage of tighter security reduction by using an optimal security reduction technique.
    Keywords: ring signature; multilinear maps; security reduction; provable security; standard model.

  • Zero-knowledge identification scheme with companion matrices of primitive polynomials   Order a copy of this article
    by Huawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li 
    Abstract: This paper proposes the matrix power problem, that is, to find x given C^xD^x, where C and D are the companion matrices of primitive polynomials over finite field. A new zero-knowledge identification scheme based on matrix power problem is proposed. It is perfect zero-knowledge for honest verifiers. Owing to its simplicity, low-memory and low-computation costs, the proposed scheme is suitable for using in computationally limited devices for identification, such as smart cards.
    Keywords: finite field; primitive polynomials; companion matrix; discrete logarithm problem; identification scheme.

  • Identification of cascading dynamic critical nodes in complex networks   Order a copy of this article
    by Duan Dong-Li 
    Abstract: Catastrophic events occur frequently on the internet, power grids as well as other infrastructure systems, which can be considered, to some extent, to be triggered by minor events. To study the dynamic behaviour of these systems, we generally should simplify them as networks. The reason lies in that the network can be seen as the skeleton embedded in the internet system, power grid, transportation and traffic system, as well as other infrastructure systems. We should pay more attention to these backbone networks so as to explore the dynamic behaviour and mechanisms of the embedded systems more deeply and broadly. One of the major problems in the field of networks is how to identify the critical nodes. In this paper, we explore the identification method of cascading dynamic critical nodes in complex networks. By the average load oscillation extent of the affected nodes caused by attacking one node, we define the importance indicator of the attacked node with a cascading failure model based on a load preferential sharing rule. The indicator has two characteristics: one is that the failure consequence of the considered node can be clearly pointed out by its value. If I(i) ≥ 1, the node I will trigger the next round overload. If I(i) < 1=ki , the node i will be a single failure. If 1=ki ≤ I(i) < 1, the outcome will not be determined, namely the failure of i may trigger the overload of its neighbour node or may not. The other is that the evolution mechanism of node importance can be analysed with the factors of load redistribution mechanism, node capacity, and structural characteristics of the network. For example, we can see that the value of i determines the distribution of the node importance: in the case i = 1 we have I(i) ∼ k0 i , namely the node importance is independent of the nodes degree. If  ̸= 1 we have I(i) ∼ k-1 i , the node importance scales with the node degree and P(I) is driven by P(k). The experiments demonstrate the effectiveness and feasibility of the indicators and its algorithm, with which we also analyse the node importance evolution mechanism in depth.
    Keywords: complex networks; node importance; cascading failure; load redistribution rule; overload mechanism; scale-free networks; ER networks; power grid.

Special Issue on: Advances in Cyber Security, Analytics and Human Factors in IT

  • An intelligent paradigm for denoising motion artifacts in ECG processing: smart filters   Order a copy of this article
    by Maheswari Arumugam, Arun Kumar Arumugam Sangaiah 
    Abstract: A well recorded ECG contains complete information about the various heart diseases. The detection of cardiac diseases involves several stages, such as ECG signal pre-processing, feature extraction, feature classification and finally the identification of the cardiac disease from the detected abnormality. This paper concentrates on pre-processing of the ECG signal, which is the fundamental stage in the analysis of cardiac diseases. The identification of the various kinds of heart disease depends on accurate analysis of ECG signals. The analysis of a heart signal will be precise and accurate only if it is completely free from noise signals. A minute change in ECG due to noise signals changes the characteristics of ECG, which results in a wrong diagnosis of the heart disease. The main focus of this paper is on developing a novel smart filter design and implementing the proposed design for filtering the main noise signals that distort the original ECG signal. The main noise signals are identified as power line interference, baseline wander and electromyography. In this paper the proposed filter design is compared in terms of signal to noise ratio and power spectral density. Further, the comparison result indicates that the proposed filter design has a good response characteristic for noise filtration. The eradication of these noise signals helps us to achieve correct identification of heart disease and makes the life of physicians easier.
    Keywords: preprocessing; electrocardiogram; smart filter; baseline wander; power line interference; electromyography; signal to noise ratio

  • An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing   Order a copy of this article
    by Vaishali Thakare, John Singh 
    Abstract: The current cloud computing system consists of a large amount of sensitive data shared by cloud users. This sensitive data sharing is done in secure groups. Here, privacy and security of the group sharing data have become the two major issues, whereas secure and reliable group communication is a fertile research area that has gained a wide popularity in group-oriented and collaborative applications. Designing a dynamic, secure and efficient group-sharing framework is one of the important challenges in cloud computing. Because the cloud provider is a semi-trusted third party, traditional security frameworks cannot be used in group sharing. In this paper a TGDH ternary tree based secure group-sharing framework is proposed. TGDH with a ternary tree-based approach is more efficient than the binary tree approach in terms of strength of members in a subgroup, and the height of the binary tree increases when the number of members in a group increases, where the height of the tree is the number of iterations required to compute the group shared key. Similarly, computation and communication cost also increases when the number of members of a group increases proportionally. Furthermore, to show the strength of our proposed framework, the statistical comparison with existing TGDH protocol is shown. Finally, the extensive simulation results with CloudSim tool are shown to demonstrate the resource use by each member, VM allocation, cloudlets allocation and execution time of proposed construction.
    Keywords: cloud computing; TGDH protocol; group data sharing; security; ternary tree.

  • Privacy-preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing   Order a copy of this article
    by P.G. Shynu, John Singh K 
    Abstract: In the existing privacy-preserving Multi-Authority Attribute-based Encryption (MA-ABE) techniques, the users receive their secret keys from multiple authorities, where each authority maintains a different set of user attributes with major control established over a central authority, who manages all the attribute-related activities (causes collision attack). In such a type of scheme, the secret key is derived from user-sensitive attributes. But this enables multiple authorities to collect and analyse the user attributes with the intent to recognise a users identity, and this leads to compromised key attack and insider attack. In order to solve this issue, this paper defines a Privacy Preserving Secret key Extraction protocol (PPSE), which stores user attributes in a fuzzy attribute set format over the hash index. The hash index acts as a unique identity that enables easier extraction of the secret key from outsourced user attributes and it eliminates the need for the involvement of a central authority for user attribute management processes. This work is implemented using Charm Crypto (Akinyele et al., 2013), an extensible framework for rapid prototyping system. The experimental results show that our proposed scheme provides higher levels of user access provision with improved security and privacy properties in comparison with existing MA-ABE techniques.
    Keywords: cloud computing; multi-authority attribute-based encryption; privacy-preserving secret key extraction protocol; fuzzy attribute set.

  • Automated identification of callbacks in Android framework using machine learning techniques   Order a copy of this article
    by Xiupeng Chen, Rongzeng Mu, Yuepeng Yan 
    Abstract: The number of malicious Android applications has grown explosively, leaking massive privacy sensitive information. Nevertheless, the existing static code analysis tools relying on imprecise callbacks list will miss a high number of leaks, which is demonstrated in this paper. This paper presents a machine learning approach to identifying callbacks automatically in the Android framework. As long as there is a training set of hand-annotated callbacks, the proposed approach can detect all of them in the entire framework. A series of experiments are conducted to identify 20,391 callbacks on Android 4.2. This proposed approach, verified by a ten-fold cross validation, is effective and efficient in terms of precision and recall, with an average of more than 91%. The evaluation results show that many of newly discovered callbacks are indeed used, which furthermore confirms that the approach is suitable for all Android framework versions.
    Keywords: callbacks identification; machine learning; support vector machine; cross validation; static analysis; malware; privacy; Android framework; mobile application security.

  • Recovering multiple versions of YAFFS2 files based on hash and timestamps   Order a copy of this article
    by Yameng Li, Jingsha He, Na Huang, Gongzheng Liu 
    Abstract: With the popularity of digital devices, especially Android-based devices, digital forensic research targeted at Android-based devices has drawn increasing attention. Among the many issues in digital forensics, data recovery is one of the most important and has thus received a great deal of attention. In data recovery, deleted or updated data may contain important information about past activities of the user, making such information viable evidence as far as digital forensics is concerned. In this paper, according to special characteristics of YAFFS2, we propose a new method based on the notions of hash and timestamp to recover multiple versions of YAFFS2 files during which the relationship between timestamps and file operations are analysed. To verify the effectiveness of our proposed method, we will simulate a NAND chip under Linux and perform some experiments to show that the proposed method is both effective and efficient in the recovery of multiple versions of different types of YAFFS2 files as well as Android images.
    Keywords: security; digital forensics; data recovery; Android; YAFFS2; hash; timestamp.

  • A framework and a process for digital forensic analysis on smartphones with multiple data logs   Order a copy of this article
    by Elhadj Benkhelifa, Benjamin Thomas, Loai Tawalbeh, Yaser Jararweh 
    Abstract: Nowadays, mobile devices are considered an essential component of our daily lives. The rapid evolution in mobile computing has becomes a frustrating factor for law enforcement and the forensic community at large, because of the lack of industry standards, tools and training. Smartphones are becoming the most difficult to extract evidentiary data from. While many commercial forensic tools have made great strides in supporting data extraction, decoding, and analysis, some challenges remain. The smartphones not only keep us connected but also can act as a mobile office, a social tool, and an entertainment centre. The combination of functionality, processing power, and storage space makes smartphones a prime target for investigators. To our knowledge, there is no mobile forensic analysis solution that maps data from different sources including calls, geographical location, multimedia, and web logs. Based on this motivation, in this paper, we aim to propose a framework solution, which could contribute to the development of a novel and potentially market-leading mobile forensic tool.
    Keywords: mobile computing; digital analysis; side channel attacks; cryptography.

  • Token security for the internet of things   Order a copy of this article
    by Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almi’ani, Syed S. Rizvi, Akshat Hans 
    Abstract: The Internet of Things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life, and the number of IOT devices is growing day by day. This scenario leads the internet world to be less secure. Since storage in each device is the main issue, cloud servers are relied upon to store the data. The data is accessed by the registered users for that particular network leading to the problem of security when many devices try to access the same network. However, the One-Time Password (OTP) method to start the session is not enough for a secured connection. The previously existing secured connection algorithms, such as OAuth, are sometimes hacked by attackers. Most of the secured connections, such as accessing a bank website, are started with token-authentication. Even though the tokens are generated only for a particular session, it is prone to be vulnerable for the guessing attacks and inviting the malicious adversaries to exploit confidential data. Most of the home devices controlled by network companies could not provide more security as promised. Nowadays starting the session with the token is considered one of the easiest and secure ways to establish a secure connection. Therefore, in this paper, we introduce the two-factor verification and authentication method involved with hashing to secure the tokens issued for the connection. The security is provided at the identity provider layer that works on the TCP/IP layer. First, the authentication and authorisation are confirmed through two-way authentication, and the token is generated by the relying party. Since the generated token has a threat of guessing or cryptanalysis attack, we worked on making it more secure by using the cryptanalytics process. The cryptanalytics process is accomplished through the addition of logical operation of the token with OTP and hashing before sending the token to the user and service provider.
    Keywords: open authentication; one time password; hash-based message authentication code; RSA; SHA relying party; pseudorandom number generator; DSA PRNG ANSI X9.7 PRNG; data encryption standard; message-digest algorithm; service provider; identity layer.

Special Issue on: ICNC-FSKD'15 Theory and Practice on Internet of Things

  • Using zero moment point preview control formulation to generate nonlinear trajectories of walking patterns on humanoid robots   Order a copy of this article
    by Yunn-Lin Hwang, Thi-Na Ta, Kun-Nan Chen 
    Abstract: This paper design a desired Zero Moment Point (ZMP) trajectory and create a Centre of Mass (CoM) trajectory based on this ZMP, in order to solve the problem of generating nonlinear trajectories of walking pattern in stability a humanoid robot. The preview control formulation which follows the planned ZMP patterns while reducing the jerk (acceleration derivation) is considered to implement this trajectory. The walking pattern for a bipedal robot is generated by using a cart-table model. After that, the hip and foot trajectories planning that make the robot walk smoothly on the different ground conditions are proposed by using the cycloid function. According to these trajectories, the position of each leg joint of humanoid robot could be determined by inverse kinematics. Then, computer simulations are performed by using RecurDyn and MATLAB softwares to validate the proposed preview control formulation for the nonlinear walking patterns generation of a Bioloid humanoid robot. Finally, an experimental analysis with the real Bioloid robot is also described in this study.
    Keywords: centre of mass; humanoid robot; zero moment point; cart-table model; preview control; CoM Jacobian.

  • An adaptive denoising method for colour images of mobile phone based on bivariate shrinkage function   Order a copy of this article
    by Xuehui Wu, Xiaobo Lu 
    Abstract: The photography function of mobile phones has become the current trend, and the image quality has become our focus. The requirements for image denoising performance of mobile phones are higher and higher. This is different from traditional image denoising because mobile phone image denoising needs faster speed, less computing space and time, and higher efficiency. Wavelet transform denoising algorithm based on Bayesian theory can meet the denoising demand of mobile phone images because of its rapidity, validity and so on. However, denoising by wavelet transform is optimal for Gaussian noise, and the actual noise of images taken by mobile phones does not completely conform to Gaussian distribution, and then a down-sampling method is adopted to simulate the Gaussian noise. In this article, according to the actual requirements of mobile phone image denoising, an adaptive denoising method for colour images of mobile phones based on bivariate shrinkage function is proposed. Firstly, the actual image noise was made similar to the Gaussian noise by the down-sampling method, and then a kind of adaptive noise variance of the bivariate shrinkage function based on Bayesian denoising method is proposed to estimate the variance of the down-sampled image. Finally, the denoised image was grayed to further eliminate the noise in the flat areas. Simulation and actual experimental results showed that the method of this paper can get better denoising effect than other methods.
    Keywords: mobile phone image; denoising; down-sampling; bivariate shrinkage function; noise variance; graying

Special Issue on: ICICS 2016 Advances in Humanised Computing Systems and their Applications

  • A system for application development using aerial robots   Order a copy of this article
    by Mohammad Fraiwan, Ahmad Alsaleem, Hashem Abandeh, Omar Al-Jarrah 
    Abstract: Autonomous airborne systems have generated a lot of interest in civilian as well as military applications. The application development process for such systems is inherently expensive and is prone to costly errors. The majority of the developed applications involve routing and navigation toward targets coupled with obstacle avoidance. In this paper, we present the approach and algorithms that were employed to tackle the routing and avoidance problems. The proposed solutions were applied to land-based robots as well as a quad-rotor aerial system. The quad-rotor flight path navigation and routing was programmed based on GPS and on-board measurement data. Obstacle avoidance was implemented based on an algorithm that relies on the idea of a virtual potential field. Kalman filters were implemented to improve the accuracy of the measured data, while 3D visualisation was used to visually identify obstacles. In the case of in-building reconnaissance, where GPS signals are very weak and largely useless, data from laser sensors and proximity feeds was aggregated and processed to identify obstacles and the topology of the surrounding environment. The organisation and interaction of these various modules is described in detail.
    Keywords: quad-rotor; obstacle avoidance; Kalman filter; maps; potential field.

  • Petri net-based verification of security protocol implementation in software evolution   Order a copy of this article
    by Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, Brij Gupta 
    Abstract: Implementation of security protocols in software plays an important role to protect the whole system from vulnerabilities. In order to protect the system from new threats, software needs to adapt to new security requirements. Thus security upgrades and patches are implemented to the software. Previous works only focus on logical correctness of security protocols, but we focus on the successful implementation of security protocols in a program. A program evolves as programmers apply security patches to its source code. Hence, the process of verifying important security protocol implementation is difficult. In this paper, we propose model-driven security verification throughout software evolution. It consists of two major methods: (i) a reverse engineering method to translate a program into a Petri net model; and (ii) a model-driven verification method to confirm that the security protocol implementation is valid. Concretely, for a program X that implements a security protocol specification A, does its derivation Y also implement A? The answer is yes if Y inherits the behaviour of X. We applied behavioural inheritance analysis to verify security protocol implementation. We also illustrated the methods with an example in software evolution.
    Keywords: software evolution; reverse engineering; security protocol; Petri net; behavioural inheritance.

  • Knowledge-based auto-configuration system using ubiquitous robotics for services delivery in smart homes   Order a copy of this article
    by Mustafa Al-Khawaldeh, Xi Chen, Philip Moore, Ibrahim Al-Naimi 
    Abstract: The wide availability of services and devices within contemporary smart home environments make their management a challenging and rewarding task. Maintaining complex smart home systems throughout their lifecycle entails considerable resources and effort. These challenges have stimulated the need for dynamic auto-configurable services amongst such distributed systems. This research aims to devise methods to automate the activities associated with customised service delivery for dynamic home environments by exploiting recent advances in the field of ubiquitous robotics and Semantic Web technologies. It introduces a novel approach called the Knowledge-based Auto-configuration Ubiquitous Robotics for Smart Home Environments, which uses the Sobot to achieve auto-configuration of the system. A proof-of-concept testbed has been designed, implemented and validated via several case studies. The results show that the Sobot is capable of creating and executing new or alternative feasible configurations to meet the systems goal by using inferred facts based on the smart home ontological model, so that the system can adapt to the changed environment.
    Keywords: smart home; ubiquitous robotics; service delivery; Semantic Web; knowledge-based auto-configuration systems.

Special Issue on: Learning for Robotics

  • Conditional proxy broadcast re-encryption with fine grain policy scheme for cloud data sharing   Order a copy of this article
    by Sun Maosheng, Ge Chunpeng, Fang Liming, Wang Jiandong 
    Abstract: Conditional proxy broadcast re-encryption (CPBRE) enables a semi-trusted proxy to convert Alice's ciphertext satisfying a certain condition into a set of users' ciphertext. The proxy, however, cannot learn anything about the underlying plaintext. The traditional CPBRE schemes cannot support flexible control on conditions. In this paper, we present a new primitive named conditional proxy broadcast re-encryption with fine grain policy (CPBRE-FG). In a CPBRE-FG scheme, the re-encryption key is generated with an access tree, and the ciphertext is constructed under a set of descriptive conditions. The proxy can convert a ciphertext if and only if the set of conditions satisfies the access tree. We formalise the notion of CPBRE-FG and present an efficient CPBRE-FG scheme. Finally, we prove its effectiveness against chosen-ciphertext attack (CCA) security in the random oracle model.
    Keywords: conditional proxy re-encryption; proxy broadcast re-encryption; access policy; random oracle model.

Special Issue on: ICEDSA-2016 Advances in Electrical Engineering and Computer Science Systems and Applications

  • Analysing and modelling worm propagation speed in the smart grid communication infrastructure   Order a copy of this article
    by Anas AlMajali, Waleed Dweik 
    Abstract: In an Advanced Metering Infrastructure (AMI), smart meters may communicate in an ad-hoc fashion to perform functionalities such as remote metering and demand response. However, the AMI is susceptible to cyber-physical threats caused by malware such as worms. In this work, we derive a probabilistic model for worm propagation in the AMI. The accuracy of the model is validated using three worm propagation scenarios. This model can be used to estimate the time required to infect $N$ meters in the AMI, based on the worm propagation technique deployed by the attacker. In addition, we use the derived model to investigate the sensitivity of worm propagation to different parameters, such as transmission range, worm size, number and location of target meters. We also demonstrate how an attacker can improve the propagation speed of the worm by modifying the worm's target list. The latter is done by comparing the three introduced propagation scenarios. Improving the worm's propagation speed can amplify the possible physical consequence of the attack.
    Keywords: smart grid; cyber-physical security; advanced metering infrastructure.

  • Adaptive FIR filter for frequency and power estimation of sinusoids   Order a copy of this article
    by Fadia Elissa, Mohammad Mismar 
    Abstract: A new frequency and power estimation method which detects frequencies of an unknown number of source sinusoidal signals is suggested. The system contains an adaptive finite impulse response filter (FIR) that exploits one of several random search algorithms, particle swarm optimisation (PSO). PSO will work on minimising the overall output power by finding the frequencies of the roots on the unit circle. The pseudo-spectrum is achieved by frequency elimination of the roots, and the real power spectrum is derived from the pseudo-spectrum and the filter polynomial. The frequency, real power, and number of source signals are all estimated from the real power spectrum. After estimating the frequencies of the undesired interfering signals, the system can then work on suppressing these signals and maintaining the strength of the desired signals.
    Keywords: frequency estimation; signal power estimation; particle swarm optimisation.

  • Design of embedded atrial fibrillation detection scheme for wireless body area networks   Order a copy of this article
    by Manan AlMusallam, Adel Soudani 
    Abstract: Wireless Body Sensor Networks (WBSNs) and wearable technology are the new trends in healthcare applications. This technology can provide real-time monitoring of the patients biosignals and health condition. In this context, the analysis of ECG signals, reflecting the heart activity, is considered as a key tool in diagnosing cardiac disorders such as Atrial Fibrillation (AF) that can lead to strokes and heart failure. Classical approaches for sensor-based AF detection require continuous transmission of ECG signals to a remote server, which can rapidly exhaust the sensor energy and shorten the lifetime of the application. In this paper, we propose a new low-power scheme for AF episodes detection in the ECG signal that is intended for implementation in WBSN. The paper details the design of this scheme and demonstrates its high accuracy for AF detection and shows that it saves 93% of energy.
    Keywords: WBSN; ECG signal processing; features extraction; atrial fibrillation.

  • Neural network based study of PV panel performance in the presence of dust   Order a copy of this article
    by Moh'd Sami Ashhab, Omar Akash 
    Abstract: Neural networks are used to study PV solar panel performance dependence on accumulated dust and tilt angle. For every location in the world there is an optimum tilt angle of dust-free PV panels for best performance. However, in some areas dust is an obstacle for PV panel operation. Examples of such areas are the Middle East and the Arabian Gulf countries. The accumulation rate of dust depends on the location as well as the tilt angle of the PV panel. Relevant data are collected for two identical sets of PV panels in the city of Ras Al Khaimah in UAE, where significant amounts of dust are present. Each set includes four different PV panels with various tilt angles. One set is kept clean while the other set is left unclean. The data includes information about PV panel cleaning condition, tilt angle, date and output power. Available data are used to train a neural network model that predicts the PV panel power under the given conditions. Furthermore, the neural network model serves as a key for adjusting the tilt angle of the PV panels at an optimum value for best performance, taking into account the dust factor.
    Keywords: neural networks; optimisation; PV panels; tilt angle; dust.

  • An efficient fuzzy logic-based and bio-inspired QoS-compliant routing scheme for VANET   Order a copy of this article
    by Mohammed El Amine Fekair, Abderrahmane Lakas, Ahmed Korichi, Nasreddine Lagraa 
    Abstract: Vehicular ad hoc networks (VANET) are increasingly gaining popularity among researchers for their capacity to enable a wide range of applications associated with road traffic safety, infotainment and road transportation management. However, for real-time and multimedia applications to be successfully deployed in a vehicular network environment, certain quality of service (QoS) requirements needs to be met. In this paper we present a QoS-based routing protocol named FBQoS-Vanet which purpose is to accommodate various applications and services with specific QoS requirements. QoS-based routing over a vehicular ad hoc networks consists of finding routes that satisfy multiple QoS constraints simultaneously. These routes have to be effective in routing and delivering data of various real time and non-real time applications. We propose a protocol, which uses a bio-inspired Artificial Bee Colony (ABC) approach for discovering routes that respond to multi-QoS criteria. In addition, we use fuzzy logic based method to identify a feasible path among several available ones that are discovered by ABC for different traffic classes. In this method, we rely on the evaluation of a composite fuzzy cost expressed in terms of the QoS metrics, where the path must satisfy multiple criteria such as bandwidth, delay, jitter, and link expiry time. In this paper we present the architecture and the design of our protocol, and present the performance results that show the benefits of using our scheme for the purpose of routing various kind of traffic in VANET with different QoS requirements.
    Keywords: vehicular ad-hoc network; quality of service; fuzzy logic; artificial bee colony; bio-inspired; ad-hoc networks.

  • Radiofrequency and microwave spectroscopy investigation of bacteria solutions: determination of the aggregation threshold.   Order a copy of this article
    by Mustapha Merabet 
    Abstract: This paper presents novel approaches to assess and characterise the biomass concentration of bacteria in a culture medium. It is based on the use of the colloid inductive permitivity probe, which is not affected by the electrode polarisation, and on the analysis of the distribution of relaxation processes. The dielectric methods probe the interactions between the membranes of the cells and the applied electric fields in the radiofrequency and the dipolar interactions in the microwave frequency ranges. They allow the characterisation of each type of cell with a specific relaxation process and the estimation of the dipole-dipole interactions. The observed dielectric relaxation induced by the presence of bacteria in the medium is thoroughly investigated and the specific relaxation frequency is used as fingerprint of the cell strain, while the relaxation amplitude is related to its concentration. Specifically, the frequency-dependent dielectric responses of Lactobacilli in DMEM are investigated in the [75 kHz to 30 MHz] and in the [130 MHz to 20 GHz] ranges. The dielectric method is tested against biological standard methods, and used successfully to predict concentration of Lactobacilli in adverse conditions. Moreover, because of the direct measurement over large concentration ranges, the concentration threshold of the bacteria aggregation can be precisely identified.The transition from a first linear evolution to a second one having a different slope indicates a drastic changes in the interactions between cells and the electric field, which can be attributed to the cell aggregation. As a matter of fact, the behaviour of the amplitude of the medium-frequency relaxation process shows two distinct linear evolutions with an intersection corresponding to the aggregation threshold. The dielectric method can be easily adapted to the online monitoring of the growth of biological cells and to the control of the fermentation processes.
    Keywords: aggregation; biological cells; biological process; biomass; conductivity; conductivity measurement; dielectrics; dielectric measurement; dielectric spectroscopy; electromagnetic absorption; materials testing; microwave measurement; permitivity.

  • Experimental evaluation of various modified Smith predictor-based fractional order control design strategies in control of a thermal process with time delay   Order a copy of this article
    by Necdet Sinan Özbek, İlyas Eker 
    Abstract: In this study, a number of modified Smith Predictor (SP)-based fractional order control strategies are investigated experimentally on a thermal process. Controller design methods and tuning strategies are elaborated step by step. Further, control strategies are discussed in relation to design specifications, control cost, implementation issues, and operating modes encountered in practice. Performance comparison is presented via several illustrations and numerical measures. Particular attention is paid to the tracking precision, quality of the control signal, robustness against disturbances and energy efficiency. Complementary comments are addressed based on merits and demerits of each control technique.
    Keywords: time delay systems; Smith predictor; fractional order control; fuzzy logic.

  • Point clouds reduction model based on 3D feature extraction   Order a copy of this article
    by Hadeer Mostafa, Shereen Taie, Reda Elkhoribi, Ibraheem Farag, A.K. Helmy 
    Abstract: Light Detection and Ranging (LIDAR) is a remote sensing method that scans the Earths surface with high density to construct the digital elevation model. In this paper, we present a point clouds reduction model based on two 3D feature extraction techniques, namely the sharp feature detection algorithm and feature extraction technique based LIDAR point attributes. These techniques are used as initial selection criteria and are compared with the maximum and the minimum elevation criteria that give reduction with the highest accuracy. However, point clouds reduction algorithms lead to high consumption of time to generate a reduced file with high accuracy, which causes the need to propose a new model that considers the trade-off between the processing time and the accuracy. The results showed that the proposed model significantly reduced the processing time at the expense of accuracy reduction by 0.7% and 1.3% for the two used techniques respectively, which is acceptable for realistic applications.
    Keywords: light detection and ranging; digital elevation model; 3D features extraction; radial basis function; data reduction.

  • Designing a wireless sensor with ultra-capacitor and PV microcell for smart building energy management   Order a copy of this article
    by Fernando Del Ama Gonzalo, Belen Moreno, Juan A. Hernandez 
    Abstract: Building owners face a number of challenges, as they search for ways to reduce energy consumption, lower operating costs, and manage modern technology and systems. A research group from Aerospace School of Madrid has addressed these aims by developing a real-time Building Management System that consists of a plurality of transmitter nodes, a central controller, and a user interface. Monitoring, control, and actuation systems lack reliable and cost effective data logging and measuring devices of energy parameters in buildings. In this paper, a new concept of wireless sensors is recommended, powered by PV microcells and electric double layer capacitors. With these power sources, the sensor can send data every minute without being affected by the absence of sunlight. The feasibility of such a sensor was studied empirically and the findings are reported in this paper.
    Keywords: wireless sensors; ultra-capacitor tests; smart home energy management.
    DOI: 10.1504/IJES.2017.10009297
     

Special Issue on: Smart X 2016 Pervasive Computing for Smart Life

  • An improved human physiological simulation model for healthcare applications   Order a copy of this article
    by Liang Yu, Nan Jia, Ruomei Wang, Jiao Jiao, Qingzhen Xu 
    Abstract: Health care becomes more and more important in modern society. In order to prevent some health symptoms occurring in daily life, it is important to develop an efficient model to simulate the human physiological performance for predicting and reducing accidents such as dehydration, exertional heatstroke, syncope, even sudden death and so on. In this paper, a novel human physiological computer simulation model is introduced. A nonlinear heart rate regulation model and a two-node thermal regulation model are integrated together to simulate the human physiological indices such as core temperature, dehydration amount and heart rate. Experiment results show that the proposed physiological simulation model can well simulate the human physiological mechanisms, and some important numerical computation results predict the same trends as the experimental measurements. These simulation results can be used to analyse human physiological symptoms and assist health risk assessment.
    Keywords: computer simulation; human physiological model; health care; thermal regulation.

  • An improved incomplete AP clustering algorithm based on K nearest neighbours   Order a copy of this article
    by Zhikui Chen, Yonglin Leng, Yueming Hu 
    Abstract: With the fast development of the Internet of Things (IoT), a large amount of missing data is produced in the process of data collection and transmission. We refer to these data as incomplete data. Many traditional methods use imputation or discarding strategy to cluster incomplete data. In this paper, we propose an improved incomplete Affinity Propagation (AP) clustering algorithm based on K nearest neighbours (IAPKNN). IAPKNN firstly partitions the dataset into complete and incomplete dataset, and then clusters the complete dataset by AP clustering directly. Secondly, according to the similarity, IAPKNN extends the responsibility and availability matrices to the incomplete dataset. Finally, clustering algorithm is restarted based on the extended matrices. In addition, to address the clustering efficiency of a large scale dataset, we give a distributed clustering algorithm scheme. Experiment results demonstrate that IAPKNN is effective in clustering incomplete data directly.
    Keywords: incomplete data; affinity propagation clustering; K nearest neighbours.

  • A PID-FEC mechanism using cross-layer approach for video transmission over multi-hop wireless networks   Order a copy of this article
    by Longzhe Han, Xuecai Bao, Hongying Yu, Huasheng Zhu, Tanghuai Fan, Jia Zhao, Yeonseung Ryu 
    Abstract: Multi-hop Wireless Networks (MWNs) provide an important infrastructure for ubiquitous multimedia content access. MWNs consist of multiple wireless links, and each link may suffer channel fluctuation, signal fading, hidden terminal, and other imperfections. The accumulated packet losses greatly decrease the quality of multimedia services, particularly video streaming services. In order to overcome packet losses in MWNs, in this paper we propose a Proportional Integral Derivative control-based Forward Error Correction (PID-FEC) mechanism to improve the quality of video streaming services. The traditional FEC schemes require feedback information from the receiver in order to calculate redundant rates. In MWNs, the transmission delay and various multi-link statuses, however, limit the accuracy of feedback information for representation of real-time network conditions. Our proposed method adopts the cross-layer approach, and leverages the functionalities of different network layers. The Automatic Repeat reQuest (ARQ) on the Media Access Control (MAC) layer is used as an indicator of packet losses. With the packet loss information, the redundancy rates are adaptively regulated based on the PID control algorithm. Since the FEC feedback control mechanism is implemented on each wireless node, it does not generate any unnecessary FEC packets, supposing that the original packets are successfully received. Experimental results, presented herein, show that the PID-FEC achieves a better quality of video streaming, as well as a higher FEC efficiency, as compared with conventional FEC schemes, over a variety of network conditions.
    Keywords: forward error correction; cross-layer; video streaming; multi-hop wireless networks.

  • An iterative shrinkage threshold method for radar angular super-resolution   Order a copy of this article
    by Xin Zhang, Xiaoming Liu, Chang Liu, Zhenyu Na 
    Abstract: This paper proposes a fast Iterative Shrinkage Threshold (IST) method for improving radar angular resolution. Based on radar signal processing theory, the implementation of angular super-resolution is equivalent to restoring the radar's target angular information without changing the radar's working system. In this method we first establish a convex quadratic programming model by orthogonalising the antenna pattern matrix, which transforms the radar angular super-resolution problem into a constrained optimisation problem. Consequently, the restored angular information can be regarded as the optimal solution of a convex quadratic programming model. Then, the IST algorithm is employed by modifying the residual at each iteration to find this optimal solution of the model. The advantage of this method is to overcome the shortcoming of the ringing effect at a low signal to noise ratio (SNR), and the ill-posed problem existing in those classical super-resolution methods is addressed effectively. Simulations further confirm our theoretical discussion, and manifest that a desirable resolution performance is gained and comparisons of signal to restoration error ratio provide an amazing result that our method is superior to other methods in terms of efficiency while the SNR is less than 20 dB.
    Keywords: radar; super-resolution; constrained optimisation; iterative shrinkage threshold.

  • The power big data based energy analysis for intelligent community in smart grid   Order a copy of this article
    by Yiying Zhang, Kun Liang, Yeshen He, Ying Liu 
    Abstract: A smart grid deploys large numbers of intelligent terminals, to monitor or control the operating status and improve the energy efficiency and functional applications. In the intelligent community and smart industrial park, we deployed a variety of internet of things sensors to carry out applications for business users, ordinary users, and commercial users, and conducted an energy analysis. In this paper, we study the power efficiency problem of intelligent cells based on the power big data, and present the system architecture and key algorithm. We first propose a business intelligence architecture based on cloud computing for intelligent community (industrial park), which can meet the requirements of efficient storage and analysis of massive data. Then, we establish a multivariable, multi-dimensional intelligent electricity energy analysis model that improves the orderly power consumption efficiency. Meanwhile, based on Hadoop, HBase, Hive etc., we realise the ETL, OLAP, data mining and BIReport functions. We also present a novel parallel algorithm to achieve the data mining algorithms and data analysis algorithms, and solve the issue of processing speed of large-scale data analysis. We have deployed the business intelligence system in Gansu Province, Beijing, Shanghai and other areas of China. In terms of energy efficiency, it can save more than 8% costs. We focused on the user characteristics and electricity consumption, and analysed the energy efficiency and energy-related parameters. The analysis results guided the efficient use of electricity, and increased the functions of the intelligent community and the intelligent life preliminarily.
    Keywords: power big data; intelligent community; smart grid; power cloud.

  • The attack efficiency of PageRank and HITS algorithms on complex networks   Order a copy of this article
    by Yangqian Su, Yunfei Yi, Qin Jun 
    Abstract: With the growing of the network scales, network attack strategies with high attack efficiency and computational efficiency are becoming more and more important. Various attack strategies with various sorting methods have been proposed. However, most of them neglected the computational efficiency. Inspired by the high computational efficiency of PageRank and HITS algorithms that are used in web pages network, this paper introduces those two algorithms to the network attack separately and tries to explore the feasibility of those two new strategies. The initial experiments choose Degree and BC attack as the contrast group, and compare the attack efficiency in six virtual networks. The results indicate that considering the computational efficiency and attack efficiency simultaneously, PageRank strategy has a better attack performance than other compared strategies. Initial discussions about the results are also given.
    Keywords: PageRank algorithm; HITS algorithm; attack strategy.

  • Comprehensive vulnerability assessment and optimisation method of power communication network   Order a copy of this article
    by Chenchen Ji, Peng Yu, Wenjing Li, Puyuan Zhao 
    Abstract: Vulnerability assessment and optimisation for a power communication network can enhance the robustness and sustainability of the network. However, the current vulnerability assessment method lacks service and availability indicator considerations, and the corresponding optimisation method ignores dynamic processes for temporal factors as well. Aiming at this problem, a novel and comprehensive vulnerability assessment and optimisation method is proposed. Firstly, for vulnerability assessment, the influence factors are analysed from both static and dynamic aspects. Integrating these factors, a comprehensive vulnerability indicator is designed to assess the vulnerability of nodes and edges. And then, to relieve unbalanced vulnerability distribution in the network, a routing optimisation method is proposed through reconfiguration for service routes on the edge with high vulnerability. Finally, the simulation is taken under a real network. Vulnerability assessment with the defined indicator is executed, and the network vulnerability can be balanced with the optimisation method, which takes on effective theoretical and practical significance.
    Keywords: power communication network; comprehensive vulnerability; vulnerability balance; routing optimisation.

  • BranChain: a novel chain-based routing protocol in wireless sensor networks   Order a copy of this article
    by Li'e Zi, Wanli Chen, Xingcheng Liu, Xiang Chen 
    Abstract: Owing to their excellent scalability and efficiency, hierarchical routing protocols including LEACH and PAGASIS have become hotspots in wireless sensor networks (WSNs) research. As an improvement of the LEACH protocol, PEGASIS reduces the total amount of data transmitted in WSNs and prolongs the lifetime of the WSNs. Being such an elegant solution to energy consumption, however, there are still three deficiencies with PEGASIS: (1) the inevitability of long link between some neighbour nodes owing to the local optimal result of adopting greedy algorithm; (2) the overhead of the ineligible cluster head (CH); and (3) the overhead and time cost of chain rebuilding whenever a node becomes invalid. In order to solve these problems, an improved protocol, called the BranChain, short for the branched chain routing protocol, is proposed here. In the proposed algorithm, a novel scheme is employed, in which a long link avoiding algorithm, a network topology re-adjustment strategy, and a CH re-election mechanism are combined. In the BranChain protocol, whenever a long link comes into being, the node ready to be originally connected is supposed to form a new independent branched chain with the greedy algorithm. When all nodes get connected in the chain, the system will connect all the independent branched chains together by searching for the optimal paths between each two of the branched chains. When the sensor nodes, except for end points, die, the two broken branched chains will be connected with the same algorithm as that of the optimal paths searching. Simulation results show that, compared with PEGASIS, the BranChain protocol can significantly prolong the network lifetime, which is vital to WSNs.
    Keywords: wireless sensor networks; PEGASIS protocol; BranChain; energy efficiency; sensor nodes.
    DOI: 10.1504/IJES.2017.10009556
     

Special Issue on: IT4OD 2014 Information Technology for Organisation Development

  • An improved CUDA-based hybrid metaheuristic for fast controller of an evolutionary robot   Order a copy of this article
    by Nour EL-Houda Benalia, NourEddine Djedi, Salim Bitam, Nesrine Ouannes, Yves Duthen 
    Abstract: This paper proposes a novel parallel hybrid training approach to conceive an evolutionary robot. The proposed design aims to provide efficient behaviours to perform its tasks in a complex area, such as walking toward a hidden destination. Embedded in the robot brain, this training and evolution combination is typically accomplished by evolving considerable Recurrent Neural Networks (RNNs) using an Evolutionary Strategy (ES). The effectiveness of this proposal is improved by employing CUDA technology that executes the evolutionary process of RNNs in a parallel way. The modifications applied are intended to meet CUDA requirements in terms of CPU/GPU cooperation and memory management. Using a set of experiments performed by a GPGPU-based physical simulator named Open Dynamics Engine (ODE) and CUDA-based evolution, the effectiveness of the proposed parallel evolutionary training technique was validated for real movements of humanoid robots. This validation showed a promising speed-up, since this field requires very powerful computational resources.
    Keywords: artificial life, robotics; parallel evolutionary algorithms; recurrent neural network; GPU

Special Issue on: IEEE/IFIP EUC 2013 Embedded and Ubiquitous Computing

  • Energy-efficient analysis with end-to-end delay constraints in wireless sensor networks   Order a copy of this article
    by Gaocai Wang, Xinsheng Yu, Daofeng Li, Jin Ye 
    Abstract: Longer time sleep (low duty cycle) of sensor nodes with sleep-wake mechanism in wireless sensor networks will result in longer delay for transmission of data-collected, although it can reduce the nodes energy consumption and extend its lifetime. Therefore, it is an important and significant topic to balance energy consumption and delay in wireless sensor networks. In this paper, we mainly focus on an energy-efficient mechanism with end-to-end delay constraints. We divide input flows into multiple sub-flows in terms of a configurable weight of links in order to avoid excessive energy consumption of sensor nodes caused by forwarding too much collected data. So, collected data pass through multiple different links and sensor nodes to reach the sink node. We establish an analytic framework for end-to-end delay based on network calculus according to arrival process of flows and service process of sensor nodes. On the other hand, sensor nodes provide rate-latency guaranteed service for arrival flow based on their active time and the maximum capacity of links. The case study and numerical results show that the proposed method can provide an effectively balanced strategy between energy consumption and delay by adjusting the duty cycle of sensor nodes properly in wireless sensor networks.
    Keywords: wireless sensor networks; network calculus; delay; duty cycle; energy consumption