Recent Advances in Electrical & Electronic Engineering - Volume 8, Issue 2, 2015
Volume 8, Issue 2, 2015
-
-
Private Set Intersection Protocol Based on Threshold Scheme in Mobile Social Network
More LessAuthors: Lili Zhang, Fei Wang, Yanan Chang and Jian WangIn mobile social networks (MSNs), it is a crucial application to establish new connections within near range according to personal preferences. Existing systems are still far from practical applications. And they usually make all the users’ profiles completely public for the convenience of searches. However, in many applications, users’ profiles involve their privacy, which users do not want to publish. Based on homomorphic encryption and threshold scheme, we construct a user profiles matching protocol with strong privacy. The protocol is proven to be secure in the standard model.
-
-
-
A Service Transmission and Recovery Strategy Based on Cluster in Mobile Social Network Service Environment
More LessAuthors: Danmei Niu, Lanlan Rui, Haoqiu Huang and Xuesong QiuIn mobile social network service (MSNS) environment, users can establish a group relying on some relationships and share services within a group or among different groups. When the mobile devices provide services for a user, some service transmission paths will fail because of device movement or failure, and the user cannot receive required services. Recovering the service quickly and efficiently is the main problem of this paper. This paper presents a new service transmission and recovery strategy based on cluster in MSNS. Establishment mechanism of recovery point is adopted in the strategy. The recovery point is able to save and maintain the service data received from the service provider. When the service transmission fails, the upstream recovery point can directly resend the service data to its downstream recovery point. Simulation results show that this strategy can save the transmission time and improve the probability of successful transmission.
-
-
-
Network Traffic Classification Based on Multi-Classifier Selective Ensemble
More LessAuthors: Xiaoling Tao, Yong Wang, Yi Wei and Ye LongNetwork traffic classification is one of the foundations of recognizing, managing, and optimizing various network resources. Ensemble learning can be used to improve the classification accuracy. A study of the method shows that selecting part of the base classifiers to do ensemble learning can get better generalization ability than selecting all, as the number of the base classifiers is large. This paper proposes a novel network traffic classification method based on multi-classifier selective ensemble (NTCMCSE) and diversity measures, which chooses the classifiers with higher accuracy from the generated ones, and then selects the diverse classifiers with improved disagreement measure strategy to do ensemble prediction. It is shown that, compared with Bagging and GASEN, NTCMCSE achieves better generalization ability, less selection time of classifiers and fewer selected base classifiers.
-
-
-
The Most Cutting-edge Patents on Wireless Sensor Networks
More LessAuthors: Yuan Yang, Xiaonan Wang and Qi SunA wireless sensor network is a new technique for collecting and dealing with information, and is typically deployed to collect and monitor environmental parameters. In the future Internet, a wireless sensor network could provide direct and effective information for monitoring. Due to the characteristics of wireless sensor networks, they can be applied in many fields such as military defense, environmental monitoring, city management, agricultural control, and so on. In wireless sensor networks, the core technologies include routing, data transmission, etc. This paper surveys recent patents on wireless sensor networks which are mainly classified into five categories, namely power consumption, monitoring application, routing, data transmission and sensor nodes.
-
-
-
A Novel Power System Topology of Grid-Connected PV-Wind Hybrid System Using New Multiport Nine-Switch Converter
More LessAuthors: Mohamad R. Banaei and Hamid AbeshlooIn this paper, the new configuration for hybrid photovoltaic (PV)/wind power generation system is proposed in order to improve the power system operation. The proposed power topology is based on the new nine-switch multiport converter and all energy sources are connected in parallel to a common DC link. The output characteristics of wind turbine driven by permanent magnet synchronous generator (PMSG), PV module and battery storage are presented. In order to achieve the maximum power point tracking (MPPT) for input sources the perturbation and observation algorithm is employed. Also, the operational principle of the new nine switch multiport converter is detailed. The proposed configuration can be connected to grid and load (BTS Station) simultaneously and it is the main feature of this topology. Eventually, provided simulation results confirm the feasibility and effectiveness of the suggested hybrid system topology.
-
-
-
The Study of the Satellite Telemetry Parameters Prediction Method Based-on x-11 Model
More LessAuthors: Bing Chen, Hong-Zheng Fang, Hao-dong Ma and Huan-Zhen FanDuring the long-term operation process of the satellites in orbit, because of the design life and a variety of environmental factors, the telemetry parameters of satellite will occur slowly and regular changes reflects the decline of its functionality and performance. On the basis of a number patents and patents pending, the telemetry data of satellite firstly can be decomposed into different types of components (i.e. trend, seasonal and random) using x-11 method. Then, it proposed the overall flow of performance prediction. After that, the different prediction methods (such as AR model, BP neural network, non-parametric regression and so on) can be used to predict the performance trends of the telemetry parameters. The experimental telemetry parameters from a satellite power system are used to test the performance and the feasibility of the algorithm, and the results show that the telemetry parameters prediction method based on x-11 method achieves perfect efficiency in predicting the satellite performance.
-
-
-
A Possible Application of Memristors for Secondary Lightning Protection
More LessBy Georg ElmerThis paper proposes an application of memristors for secondary lightning protection purposes. Thank to their purely dissipative nature these devices could beneficially co-operate with spark gaps not being able to dissipate the energy of lightning current. This paper proposes the memristor to be connected in series to the spark gap ensuring the breaking of the short circuit follow current at the same time.
-
-
-
A Security Protocol for Trusted Access to Cloud Environment
More LessAuthors: Yanan Chang, Zhiyong Zhang and Jian WangWhen user access to the cloud computing environment, existing security protocols merely authenticate the identity of user and cloud server without considering their credibility of owning platforms. Remote attestation of trusted computing is to provide security evidence of their own platform for the both sides of communication accessed. Introducing the remote attestation mechanism into security protocol can avoid terminal security vulnerability when user accessed. By constructing of trusted access authentication framework using remote attestation mechanism, and a security protocol for trusted access to cloud environment is proposed. The proposed protocol with greater security and efficiency compared to other corrective schemes through attack resisting analysis and computational cost analysis, and proved secure using strand space model. Our scheme realizes two factors identity authentication and platform authentication for Mobile User and Cloud Server, as well as satisfies the privacy protection requirement of the platform configuration in cloud environment or cloud media digital rights management.
-
Most Read This Month