International Journal of Information and Communication Sciences

Volume 3, Issue 2, June 2018

  • Theoretical Re-Study on One-Way Barcode Communication Between Networks and Its Application Prospects

    Fuxu Yang, Luqiang Yang

    Issue: Volume 3, Issue 2, June 2018
    Pages: 19-25
    Received: Jun. 28, 2018
    Accepted: Jul. 19, 2018
    Published: Aug. 16, 2018
    Downloads:
    Views:
    Abstract: Information communication between networks is greatly growing, and its security becomes more important. In this article, a new way of network security communication, namely bar code communication was investigated. It used the general principle of the computer to quantify the information and generate the barcode instantly, and it was showed by using... Show More
  • An Exploration to Edition Identification of Ancient Chinese Maps

    Yang Fen

    Issue: Volume 3, Issue 2, June 2018
    Pages: 26-32
    Received: Jun. 05, 2018
    Accepted: Jul. 25, 2018
    Published: Aug. 18, 2018
    Downloads:
    Views:
    Abstract: Among the Chinese ancient resources collections, map is one remarkable kind of it. How to identify the edition of the maps has become the important work of the collation. Based on the Compilation Program of “Ancient Chinese Maps Collected in Peking University Library”, this article analyzes a large number of ancient Chinese maps, and summarizes fou... Show More
  • 3D Firework Reconstruction from a Given Videos

    Zhihong Wang, Linyi Hu

    Issue: Volume 3, Issue 2, June 2018
    Pages: 33-41
    Received: Sep. 16, 2018
    Accepted:
    Published: Sep. 18, 2018
    Downloads:
    Views:
    Abstract: Reconstruction of a 3-dimension(3D) firework show from a given videos is a key technology in light source simulation in computer graphics, which can be more effective and real than traditional method. Although the firework model is already very mature, however, to our best knowledge, there is not any existing method that can reconstruct a firework ... Show More
  • Example Based Light Sources Generation Method for 3D Scenes

    Linyi Hu, Zhihong Wang

    Issue: Volume 3, Issue 2, June 2018
    Pages: 42-49
    Received: Sep. 16, 2018
    Accepted:
    Published: Sep. 18, 2018
    Downloads:
    Views:
    Abstract: Lighting design is very important to improve rendering quality for some 3D scenes that are used in the VR applications with night simulation. Determining the properties of the light sources requires a large amount of artwork, especially when the number of lights is large. Most virtual scenes always have some geometric objects with similar structure... Show More
  • Fully Homomorphic Public-Key Encryption Against Ciphertext Square Attack with Two Ciphertexts

    Masahiro Yagisawa

    Issue: Volume 3, Issue 2, June 2018
    Pages: 50-65
    Received: Jul. 12, 2018
    Accepted: Sep. 04, 2018
    Published: Oct. 08, 2018
    Downloads:
    Views:
    Abstract: A fully homomorphic public-key encryption (FHPKE) is the important cryptosystem as the basic scheme for the cloud computing. Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, some fully homomorphic encryption schemes were proposed. In the systems proposed until now the bootstrapping process is the main bottleneck and th... Show More
  • Research on Scheduling Strategy of AFDX End System Based on Time/Event Trigger

    Ziran Shen, Leilei Yin, Yi Li, Yuanyuan Xu

    Issue: Volume 3, Issue 2, June 2018
    Pages: 66-74
    Received: Oct. 17, 2018
    Accepted:
    Published: Oct. 18, 2018
    Downloads:
    Views:
    Abstract: To meet different time delay requirements of different data, three scheduling strategies based on event, time and event-time are studied in this paper. The network calculus method is used to derive the maximum delay upper bound of virtual link based on three scheduling strategies, the relationship between the maximum delay upper, virtual link param... Show More