In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(...In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%.展开更多
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst...The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.展开更多
The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and ne...The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example, sensors. Therefore, we propose a standardized approach to present a service to the network and to access a networked service, which can be adopted by arbitrary types of devices. In this approach, services are specified and exposed through a set of standardized interfaces. Moreover, a virtual community concept is introduced to determine a secure boundary within which services can be freely discovered, accessed and composed into applications;a hierarchical management scheme is presented which enables the third party management of services and their underlying resources. In this way, application control logic goes into the network and environment context is dealt with intelligently by the system. A prototype system is developed to validate our ideas. Results show the feasibility of this open distributed system software architecture.展开更多
Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter...Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter from everywhere outside the region, have culminated in the formation of the present-day industrial cluster in Toyama, the largest in the whole area facing the Sea of Japan. Today an adaptation of the quasi-CRM (customer relationship management) business model of the HML system has proved to be a success in Mongolia. This fact seems to offer the authors some clues for dealing with those problems that healthcare and medical services in Japan and elsewhere are riddled with. In this paper, focusing on the common critical success factors (CSFs) behind the success of the authors' prototype HML system and its recent successful application in Mongolia, the authors will analyze these factors from the perspective of CRM. The authors will then clarify the following: (1) the usefulness of the business model for ensuring primary healthcare for people in developing countries; (2) the usefulness in our ubiquitous network society of applying ICT to the HML system; (3) possible contributions that the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society; and the authors will also suggest (4) the importance of elevating "individual self-medication" to "community-based self-medication".展开更多
Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up an...Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up and formation and development.After entering the 21 st century, new technologies and new ideas have emerged endlessly. The change in learning methods has led to the flip of classroom teaching, and ubiquitous learning has become more known as the pace of social development. The current higher vocational education presents the characteristics of disjointed education content, misaligned learning roles, and single teaching form. The integration of ubiquitous learning environment into vocational education teaching is a new direction for the development of vocational education.展开更多
With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mob...With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mobile society.Genie,which can act as the artificial intelligence assistance for 6G users,is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence.While Internet of Things(IoT)is the digital nervous system,genie acts like the brain of the overall system.Supported by 6G,IoT will step into the Artificial Intelligence of Things(AIoT)era and the AIoT networks have the abilities of intelligent perception,intelligent analysis,and intelligent control.In this paper,the concept of Ubiquitous⁃X is introduced,which is considered as the fundamental architecture of 6G network,and the definition and architecture of AIoT under Ubiquitous⁃X is also presented.Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed,including massive and intelligent connectivity,efficient computing,security,privacy,authentication,high scalability and efficiency.Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well.展开更多
Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method...Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method of learning the information through the internet or studying at specific place,such as school or library,and so on.People do not need to go to specific place at specific time to access the information that they want,but the learning information finds its way to people,which is the biggest difference from the existing method. Ubiquitous learning aims to solve current problems of education in more creative and learner-oriented way by creating an education environment where learners can learn with any terminal anytime and anywhere without regard to contents.The presentation this time would help promote the understanding of the Ubiquitous and explore the ubiquitous education environment that is capable of solving overall problems of education.In addition,it will propose a direction of ubiquitous learning scenario and the change in the educational environment.展开更多
Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range target...Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range targets impacts selection of waveform parameters. The coherent processing interval (CPI) must be long enough to achieve a certain signal-to-noise ratio (SNR) that ensures the efficiency of detection. The condition of detection in the case of low SNR is analyzed, and three different cases that would occur during integration are discussed and a method to determine the CPI is presented. The simulation results show that targets detection with SNR as low as -26 dB in the experimental system can possibly determine the CPI.展开更多
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m...The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.展开更多
The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that ...The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs.展开更多
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H...Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.展开更多
The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous co...The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne...Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.展开更多
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU...To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.展开更多
基金This research work was funded by Institutional Fund Projects under grant no.(IFPIP:624-611-1443)。
文摘In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%.
基金supported by Science and Technology Foundation of State Grid Corporation of China(Ubiquitous Power Internet of Things Technical Standard System)5442HL 190008National Key Research and Development Program of China(2020YFB0905900)。
文摘The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.
文摘The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example, sensors. Therefore, we propose a standardized approach to present a service to the network and to access a networked service, which can be adopted by arbitrary types of devices. In this approach, services are specified and exposed through a set of standardized interfaces. Moreover, a virtual community concept is introduced to determine a secure boundary within which services can be freely discovered, accessed and composed into applications;a hierarchical management scheme is presented which enables the third party management of services and their underlying resources. In this way, application control logic goes into the network and environment context is dealt with intelligently by the system. A prototype system is developed to validate our ideas. Results show the feasibility of this open distributed system software architecture.
文摘Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter from everywhere outside the region, have culminated in the formation of the present-day industrial cluster in Toyama, the largest in the whole area facing the Sea of Japan. Today an adaptation of the quasi-CRM (customer relationship management) business model of the HML system has proved to be a success in Mongolia. This fact seems to offer the authors some clues for dealing with those problems that healthcare and medical services in Japan and elsewhere are riddled with. In this paper, focusing on the common critical success factors (CSFs) behind the success of the authors' prototype HML system and its recent successful application in Mongolia, the authors will analyze these factors from the perspective of CRM. The authors will then clarify the following: (1) the usefulness of the business model for ensuring primary healthcare for people in developing countries; (2) the usefulness in our ubiquitous network society of applying ICT to the HML system; (3) possible contributions that the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society; and the authors will also suggest (4) the importance of elevating "individual self-medication" to "community-based self-medication".
文摘Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up and formation and development.After entering the 21 st century, new technologies and new ideas have emerged endlessly. The change in learning methods has led to the flip of classroom teaching, and ubiquitous learning has become more known as the pace of social development. The current higher vocational education presents the characteristics of disjointed education content, misaligned learning roles, and single teaching form. The integration of ubiquitous learning environment into vocational education teaching is a new direction for the development of vocational education.
基金National Key Research and Development Project of China(Grant No.2018YFB2100202).
文摘With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mobile society.Genie,which can act as the artificial intelligence assistance for 6G users,is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence.While Internet of Things(IoT)is the digital nervous system,genie acts like the brain of the overall system.Supported by 6G,IoT will step into the Artificial Intelligence of Things(AIoT)era and the AIoT networks have the abilities of intelligent perception,intelligent analysis,and intelligent control.In this paper,the concept of Ubiquitous⁃X is introduced,which is considered as the fundamental architecture of 6G network,and the definition and architecture of AIoT under Ubiquitous⁃X is also presented.Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed,including massive and intelligent connectivity,efficient computing,security,privacy,authentication,high scalability and efficiency.Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well.
文摘Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method of learning the information through the internet or studying at specific place,such as school or library,and so on.People do not need to go to specific place at specific time to access the information that they want,but the learning information finds its way to people,which is the biggest difference from the existing method. Ubiquitous learning aims to solve current problems of education in more creative and learner-oriented way by creating an education environment where learners can learn with any terminal anytime and anywhere without regard to contents.The presentation this time would help promote the understanding of the Ubiquitous and explore the ubiquitous education environment that is capable of solving overall problems of education.In addition,it will propose a direction of ubiquitous learning scenario and the change in the educational environment.
文摘Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range targets impacts selection of waveform parameters. The coherent processing interval (CPI) must be long enough to achieve a certain signal-to-noise ratio (SNR) that ensures the efficiency of detection. The condition of detection in the case of low SNR is analyzed, and three different cases that would occur during integration are discussed and a method to determine the CPI is presented. The simulation results show that targets detection with SNR as low as -26 dB in the experimental system can possibly determine the CPI.
文摘The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.
文摘The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs.
基金the "863" High Technology Research and Development Program of China (2006AA01Z226)the Scientific Research Foundation of Huazhong University of Science and Technology (2006Z011B)the Program for New Century Excellent Talents in University (NCET-07-0328).
文摘Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.
基金Supported by the National High Technology Research and Development Program of China(863 Program)(2013AA013704)the National Youth Natural Science Foundation of China(61300145,61332017)+2 种基金the Postdoctoral Science Foundation of China(2014M561294)the Science and Technology Development Program Funded Projects of Jilin Province(20150520065JH)the National Key Technology Support Program(2015BAK04B00)
文摘The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
基金Supported by the Ministry of Educationin China(No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
基金Supported by the Ministry of Educationin China (No.104086)
文摘To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.