Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment.
In the industrial era 4.0, it has surpassed increasingly complex technological advances in the information system that required a very high infrastructure and facilities and prevented fraud. Counterfeiting is a proced...
详细信息
In the industrial era 4.0, it has surpassed increasingly complex technological advances in the information system that required a very high infrastructure and facilities and prevented fraud. Counterfeiting is a proced...
详细信息
In the industrial era 4.0, it has surpassed increasingly complex technological advances in the information system that required a very high infrastructure and facilities and prevented fraud. Counterfeiting is a procedure following an entity, statistics, or documents (observe forged documents) with plans to deceive. Falsification of extensive information certificates is exacerbated by the current economic situation in Indonesia, which is currently occurring due to the widespread epidemic, namely COVID-19. The spread of the COVID-19 outbreak has had a significant impact and changes in all sectors, especially certificate forgery in Indonesia. The imitation of busy certificates is the main focus of this journal, focusing on journal publications combined with Blockchain technology. The sophistication of blockchain technology as authentication is comparing two or more items or additional tests to ensure the accuracy, correctness, or correctness of the information. This method uses qualitative methods with data sources based on case studies in controlled supervision with the basic concept of cryptography as the basis of analysis. From the decisions made, it is hoped that this will minimize the level of forgery of certificates widely measured during the COVID-19 era.
The need for cheap and efficient communication network makes wireless one that is in demand by many users to the need access information from the internet. Because wireless network has become one of the communication ...
The need for cheap and efficient communication network makes wireless one that is in demand by many users to the need access information from the internet. Because wireless network has become one of the communication tools that have been used by many people who are mobile, but the techniques used to protect the security of user data is not completely secure. The steps performed in this study, the first is to scan the wireless signals in the study site using Wi-Fi Scanner tools designed by the author using Visual Studio 2013. Then do security testing against wireless network, namely through the process Scan MAC (Media Access Control) SSID (Service Set Identifier), Frequency, and encryption used in access point that the existence of bugs can be known.
Plant fertility is very dependent on the levels of nutrients present in the soil. Measurement of soil nutrients can be done through laboratory tests and can also be done using IoT technology. IoT equipment is supporte...
详细信息
ISBN:
(纸本)9781728129310
Plant fertility is very dependent on the levels of nutrients present in the soil. Measurement of soil nutrients can be done through laboratory tests and can also be done using IoT technology. IoT equipment is supported by sensors that can be used to measure soil nutrients and the location of the soil is measured. Data from land measurements made through IoT technology can be stored and displayed in real-time through the cloud. This paper designs data sources derived from IoT -based nutrient measurement data to build data warehouse locations and soil nutrients. A data warehouse that is formed later can be done for analysis of the types of plants and fertilizers needed at a soil location.
In the United States food has become a weapon for social control. Hunger and conversely obesity have contributed to the subjugation of underserved populations and served to perpetuate social inequality. This research ...
详细信息
A typical video surveillance system consists of at least one camera, controlled by an operator. To decrease the human error rate and to generally lessen the burden of operators, many object tracking systems have been ...
详细信息
A typical video surveillance system consists of at least one camera, controlled by an operator. To decrease the human error rate and to generally lessen the burden of operators, many object tracking systems have been implemented, most of which work in 2D image space. If used centralized, this is a very expensive task. Furthermore, if several views are to be fused, large inaccuracies arise due to ground plane assumptions, for instance. Lastly, in outdoor setups, quite often there is a need for slower channels like Wireless LAN which cannot cope with the full resolution data stream. We provide a smart camera system which performs the intensive tasks like background estimation or feature extraction. A central unit only has to process the received data in feature space, increasing scalability. Additionally, the object tracking problem is converted to an accurate 3D feature tracking, avoiding difficulties such as proper object segmentation and adding increased trajectory accuracy. The feature regions are computed within the smart camera. A wide-baseline feature matching approach has been employed to allow more freedom in the placement of the single smart cameras.
作者:
Omid ShakerniaYi MaT. John KooShankar SastryDept. of Electrical Engineering & Computer Science
University of California at Berkeley Berkeley CA94720-1774 U.S.A. Tak-Kuen John Koo received the B.Eng. degree in 1992 in Electronic Engineering and the M.Phil. in 1994 in Information Engineering both from the Chinese University of Hong Kong. From 1994 to 1995
he was a graduate student in Signal and Image Processing Institute at the University of Southern California. He is currently a Ph.D. Candidate in Electrical Engineering and Computer Sciences at the University of California at Berkeley. His research interests include nonlinear control theory hybrid systems inertial navigation systems with applications to unmanned aerial vehicles. He received the Distinguished M.Phil. Thesis Award of the Faculty of Engineering The Chinese University of Hong Kong in 1994. He was a consultant of SRI International in 1998. Currently he is the team leader of the Berkeley AeRobot Team and a delegate of The Graduate Assembly University of California at Berkeley. He is a student member of IEEE and SIAM. S. Shankar Sastry received his Ph.D. degree in 1981 from the University of California
Berkeley. He was on the faculty of MIT from 1980-82 and Harvard University as a Gordon McKay professor in 1994. He is currently a Professor of Electrical Engineering and Computer Sciences and Bioengineering and Director of the Electronics Research Laboratory at Berkeley. He has held visiting appointments at the Australian National University Canberra the University of Rome Scuola Normale and University of Pisa the CNRS laboratory LAAS in Toulouse (poste rouge) and as a Vinton Hayes Visiting fellow at the Center for Intelligent Control Systems at MIT. His areas of research are nonlinear and adaptive control robotic telesurgery control of hybrid systems and biological motor control. He is a coauthor (with M. Bodson) of “Adaptive Control: Stability Convergence and Robustness Prentice Hall 1989.” and (with R. Murray and Z. Li) of “A Mathematical Introduction to Robotic Manipulati
In this paper, we use computer vision as a feedback sensor in a control loop for landing an unmanned air vehicle (UAV) on a landing pad. The vision problem we address here is then a special case of the classic ego-mot...
详细信息
In this paper, we use computer vision as a feedback sensor in a control loop for landing an unmanned air vehicle (UAV) on a landing pad. The vision problem we address here is then a special case of the classic ego-motion estimation problem since all feature points lie on a planar surface (the landing pad). We study together the discrete and differential versions of the ego-motion estimation, in order to obtain both position and velocity of the UAV relative to the landing pad. After briefly reviewing existing algorithm for the discrete case, we present, in a unified geometric framework, a new estimation scheme for solving the differential case. We further show how the obtained algorithms enable the vision sensor to be placed in the feedback loop as a state observer for landing control. These algorithms are linear, numerically robust, and computationally inexpensive hence suitable for real-time implementation. We present a thorough performance evaluation of the motion estimation algorithms under varying levels of image measurement noise, altitudes of the camera above the landing pad, and different camera motions relative to the landing pad. A landing controller is then designed for a full dynamic model of the UAV. Using geometric nonlinear control theory, the dynamics of the UAV are decoupled into an inner system and outer system. The proposed control scheme is then based on the differential flatness of the outer system. For the overall closed-loop system, conditions are provided under which exponential stability can be guaranteed. In the closed-loop system, the controller is tightly coupled with the vision based state estimation and the only auxiliary sensor are accelerometers for measuring acceleration of the UAV. Finally, we show through simulation results that the designed vision-in-the-loop controller generates stable landing maneuvers even for large levels of image measurement noise. Experiments on a real UAV will be presented in future work.
暂无评论