Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118486
Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng
For variety of localization algorithms, there are usually two types of node: anchor and agent. The agent has unknown position and need to be located, while the anchor is used as reference point with perfect known location. However, determining anchor position is not an easy task in practically, and manually localizing anchors is boring with increasing of anchor’s number. Moreover, anchor position may be changed by some uncontrollable interference during the localization period, which leads to significant localization error. In this paper, we propose an automatic setup method for anchor relative coordinate under the assumption with anchor position unknown to address the above problem. We first estimate the anchor relative clock skew based on the blink model. Then, the time-of-flight (TOF) among anchors and positions of anchors are jointly determined by a compensated operation using clock skew estimation. Finally, time-difference-of-arrival (TDOA) method is applied to locate the agent. Practical experiment based on Decawave DWIOOO UWB system is carried out to verify the validity of the algorithms in this paper.
{"title":"Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System","authors":"Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng","doi":"10.1109/ICCCS49078.2020.9118486","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118486","url":null,"abstract":"For variety of localization algorithms, there are usually two types of node: anchor and agent. The agent has unknown position and need to be located, while the anchor is used as reference point with perfect known location. However, determining anchor position is not an easy task in practically, and manually localizing anchors is boring with increasing of anchor’s number. Moreover, anchor position may be changed by some uncontrollable interference during the localization period, which leads to significant localization error. In this paper, we propose an automatic setup method for anchor relative coordinate under the assumption with anchor position unknown to address the above problem. We first estimate the anchor relative clock skew based on the blink model. Then, the time-of-flight (TOF) among anchors and positions of anchors are jointly determined by a compensated operation using clock skew estimation. Finally, time-difference-of-arrival (TDOA) method is applied to locate the agent. Practical experiment based on Decawave DWIOOO UWB system is carried out to verify the validity of the algorithms in this paper.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of the emergence and applications of 5G technology, the internet of vehicles (IoV) has facilitated intelligent transportation and altered people’s means of movement, becoming a crucial force supporting the development of the automotive industry. However, some difficulties and challenges have been encountered during the IoV development process. Because of insufficient public awareness regarding IoV, user trust and intention to use the IoV are currently affected by individual perceptions and reference groups (RGs). Therefore, this study investigated consumers in China—the country with the largest number of cars worldwide—as research subjects and used a combination of online questionnaires and physical field observations to examine IoV-related perceived importance (PI), perceived attraction (PA), perceived cost (PC), perceived trust (PT), usage intention (UI), and RGs. A total of 576 questionnaires were returned, among which 410 valid questionnaires were obtained, posting a valid response rate of 71.78%. The results were as follows: (1) PI, PA, and PT all had significant positive effects on UI, whereas PC had a significant negative effect on UI; (2) PI and PA had significant positive effects on PT, whereas PC had a significant negative effect on PT; (3) PT had a partial mediating effect on the positive relationships between perceived importance of control and safety (PICS) and UI and between PA and UI as well as the negative relationship between PC and UI; on the relationship between perceived importance of social entertainment and UI, PT had a perfect mediating effect; (4) RGs had a significant negative moderating effect on the PICS–PT and PA–PT relationships, whereas they had a marginally significant positive moderating effect on the PC–UI relationship.
{"title":"Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups","authors":"Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-chu Chan","doi":"10.1109/ICCCS49078.2020.9118548","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118548","url":null,"abstract":"Because of the emergence and applications of 5G technology, the internet of vehicles (IoV) has facilitated intelligent transportation and altered people’s means of movement, becoming a crucial force supporting the development of the automotive industry. However, some difficulties and challenges have been encountered during the IoV development process. Because of insufficient public awareness regarding IoV, user trust and intention to use the IoV are currently affected by individual perceptions and reference groups (RGs). Therefore, this study investigated consumers in China—the country with the largest number of cars worldwide—as research subjects and used a combination of online questionnaires and physical field observations to examine IoV-related perceived importance (PI), perceived attraction (PA), perceived cost (PC), perceived trust (PT), usage intention (UI), and RGs. A total of 576 questionnaires were returned, among which 410 valid questionnaires were obtained, posting a valid response rate of 71.78%. The results were as follows: (1) PI, PA, and PT all had significant positive effects on UI, whereas PC had a significant negative effect on UI; (2) PI and PA had significant positive effects on PT, whereas PC had a significant negative effect on PT; (3) PT had a partial mediating effect on the positive relationships between perceived importance of control and safety (PICS) and UI and between PA and UI as well as the negative relationship between PC and UI; on the relationship between perceived importance of social entertainment and UI, PT had a perfect mediating effect; (4) RGs had a significant negative moderating effect on the PICS–PT and PA–PT relationships, whereas they had a marginally significant positive moderating effect on the PC–UI relationship.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118523
L. Kirasamuthranon, P. Wardkein, J. Koseeyaporn
Among digital to analog modulation, phase shift keying is superior than amplitude shift keying and frequency shift keying. Especially, the quadrature phase shift keying is the most popular modulating technique. The reason is because this modulation is effective in bandwidth usage. However, the sudden change in amplitude during inversely phase changed, e.g. $pi/4Rightarrow-3pi/4$, requires more bandwidth for transmitting signal. Later, a QPSK modulator based phase locked loop (PLL) [6] is proposed which shows that its QPSK signal consumes less bandwidth compared to the conventional QPSK modulator [7], [8]. However, further study of [6] founds that redundant high frequency components exist in the output of phase detector (PD). In this paper, a new structure of PD of the PLL is proposed which is based on a multiplier circuit. The mathematical analysis of this circuit shows that there is only one high frequency component in the PD output. The simulation result also confirms well with the theoretical analysis which is found that the proposed PD can reduce roughly 29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.
在数模调制中,相移键控优于移幅键控和移频键控。其中,正交相移键控是最常用的调制技术。原因是这种调制在带宽使用方面是有效的。然而,在反相位变化过程中,振幅的突然变化,例如$pi/4Rightarrow-3pi/4$,需要更多的带宽来传输信号。后来,提出了一种基于QPSK调制器的锁相环(PLL)[6],与传统的QPSK调制器[7],[8]相比,其QPSK信号消耗的带宽更小。然而,进一步研究[6]发现,在鉴相器(PD)的输出中存在冗余的高频成分。本文提出了一种基于乘法器电路的锁相环PD的新结构。该电路的数学分析表明,在PD输出中只有一个高频分量。仿真结果与理论分析结果相吻合,发现所提出的PD可以减少约29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.
{"title":"Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator","authors":"L. Kirasamuthranon, P. Wardkein, J. Koseeyaporn","doi":"10.1109/ICCCS49078.2020.9118523","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118523","url":null,"abstract":"Among digital to analog modulation, phase shift keying is superior than amplitude shift keying and frequency shift keying. Especially, the quadrature phase shift keying is the most popular modulating technique. The reason is because this modulation is effective in bandwidth usage. However, the sudden change in amplitude during inversely phase changed, e.g. $pi/4Rightarrow-3pi/4$, requires more bandwidth for transmitting signal. Later, a QPSK modulator based phase locked loop (PLL) [6] is proposed which shows that its QPSK signal consumes less bandwidth compared to the conventional QPSK modulator [7], [8]. However, further study of [6] founds that redundant high frequency components exist in the output of phase detector (PD). In this paper, a new structure of PD of the PLL is proposed which is based on a multiplier circuit. The mathematical analysis of this circuit shows that there is only one high frequency component in the PD output. The simulation result also confirms well with the theoretical analysis which is found that the proposed PD can reduce roughly 29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114384406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118469
Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien
Dynamic Time Warping (DTW) is a representative of a distance measure that is able to calculate the distance between two time series. It is often used for the recognition of handwriting or spoken language. The metaheuristic Quantum Annealing (QA) can be used to solve combinatorial optimization problems. Similar to Simulated Annealing it seeks to find a global minimum of a target function. In order to use specialized QA hardware, the problem to be optimized needs to be translated into a Quadratic Unconstrained Binary Optimization (QUBO) problem. With this paper we investigate whether it is possible to transfer the DTW distance measure into a QUBO formulation. The motivation behind is the hope on an accelerated execution once the QA hardware scales up and the aspiration of gaining benefits due to quantum effects that are not given in the classical calculation. In principle, we find that it is possible to transform DTW into a QUBO formulation suitable for executing on QA hardware. Also, the algorithm returns not only the minimum total distance between two sequences, but also the corresponding warping path. However, there are several difficulties that make a manual intervention necessary.
{"title":"The Dynamic Time Warping Distance Measure as Q U BO Formulation","authors":"Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien","doi":"10.1109/ICCCS49078.2020.9118469","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118469","url":null,"abstract":"Dynamic Time Warping (DTW) is a representative of a distance measure that is able to calculate the distance between two time series. It is often used for the recognition of handwriting or spoken language. The metaheuristic Quantum Annealing (QA) can be used to solve combinatorial optimization problems. Similar to Simulated Annealing it seeks to find a global minimum of a target function. In order to use specialized QA hardware, the problem to be optimized needs to be translated into a Quadratic Unconstrained Binary Optimization (QUBO) problem. With this paper we investigate whether it is possible to transfer the DTW distance measure into a QUBO formulation. The motivation behind is the hope on an accelerated execution once the QA hardware scales up and the aspiration of gaining benefits due to quantum effects that are not given in the classical calculation. In principle, we find that it is possible to transform DTW into a QUBO formulation suitable for executing on QA hardware. Also, the algorithm returns not only the minimum total distance between two sequences, but also the corresponding warping path. However, there are several difficulties that make a manual intervention necessary.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121690928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118553
Qing-dao-er-ji Ren, Ying Qiu, Tiancheng Li
There are six deserts and sandy lands in the central and western part of Inner Mongolia, which is one of the main sources of sandstorms in China. In most areas, the surface is dry, the precipitation is low and the wind is strong in winter and spring. The analysis and study of sandstorms in this area is of great significance to the study and prediction of sandstorms in China. Based on the comprehensive analysis of the research status of sandstorms at home and abroad, the application of convolution neural network to classify satellite cloud images and establish prediction models of sandstorms are relatively few. The convolution neural network algorithm based on transfer learning is used to classify infrared satellite cloud images to establish Sand-dust Storm Prediction model, and the prediction accuracy of sand-dust storm prediction model established under different learning strategies is compared in the paper. The results show that the model training speed is fast and the accuracy and generalization ability of the model are improved by using the parameter migration initialization network in transfer learning. The Sand-dust Storm Prediction Model Based on the convolution neural network algorithm of transfer learning has a higher accuracy in predicting the occurrence of sand-dust storm and the change of learning strategies has an important influence on the prediction accuracy of sandstorm prediction model.
{"title":"Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia","authors":"Qing-dao-er-ji Ren, Ying Qiu, Tiancheng Li","doi":"10.1109/ICCCS49078.2020.9118553","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118553","url":null,"abstract":"There are six deserts and sandy lands in the central and western part of Inner Mongolia, which is one of the main sources of sandstorms in China. In most areas, the surface is dry, the precipitation is low and the wind is strong in winter and spring. The analysis and study of sandstorms in this area is of great significance to the study and prediction of sandstorms in China. Based on the comprehensive analysis of the research status of sandstorms at home and abroad, the application of convolution neural network to classify satellite cloud images and establish prediction models of sandstorms are relatively few. The convolution neural network algorithm based on transfer learning is used to classify infrared satellite cloud images to establish Sand-dust Storm Prediction model, and the prediction accuracy of sand-dust storm prediction model established under different learning strategies is compared in the paper. The results show that the model training speed is fast and the accuracy and generalization ability of the model are improved by using the parameter migration initialization network in transfer learning. The Sand-dust Storm Prediction Model Based on the convolution neural network algorithm of transfer learning has a higher accuracy in predicting the occurrence of sand-dust storm and the change of learning strategies has an important influence on the prediction accuracy of sandstorm prediction model.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118519
PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu
As we all know, the large number of counts is a challenging and time consuming task subject because of oversized number and complex conditions. However, the development of deep learning makes deep learning models very competitive in image segmentation. In this paper, we take cigarette filter rods as the research object. we first evaluate the standard Unet for the filter rod target recognition to separate target and background. Secondly, we use the focal loss function instead of the traditional cross-entropy function to solve the problem of imbalance between target and background area. Thirdly, we add a self-attention module in the traditional Unet convolutional layer to enhance the convolution effect. Fourth, we propose structural element detection criteria and round tangency matching strategy based on HMM (Hidden Markov Model) for the geometric relationship of filter rod position, which further improves the accuracy of the algorithm. We used Qu's [1], Mask-R-CNN [2], FCN [3], Deep-lab-V1 [4] and this paper’s algorithm to test the performance of 30000 images from the industrial site. The performance of this paper’s algorithm is completely better than the performance of the above algorithm.
{"title":"Batch Target Recognition Count under Complex Conditions Based on Att-Unet","authors":"PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu","doi":"10.1109/ICCCS49078.2020.9118519","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118519","url":null,"abstract":"As we all know, the large number of counts is a challenging and time consuming task subject because of oversized number and complex conditions. However, the development of deep learning makes deep learning models very competitive in image segmentation. In this paper, we take cigarette filter rods as the research object. we first evaluate the standard Unet for the filter rod target recognition to separate target and background. Secondly, we use the focal loss function instead of the traditional cross-entropy function to solve the problem of imbalance between target and background area. Thirdly, we add a self-attention module in the traditional Unet convolutional layer to enhance the convolution effect. Fourth, we propose structural element detection criteria and round tangency matching strategy based on HMM (Hidden Markov Model) for the geometric relationship of filter rod position, which further improves the accuracy of the algorithm. We used Qu's [1], Mask-R-CNN [2], FCN [3], Deep-lab-V1 [4] and this paper’s algorithm to test the performance of 30000 images from the industrial site. The performance of this paper’s algorithm is completely better than the performance of the above algorithm.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118464
Yihong Long, Feng Xiong
SM9 is a class of identity based cryptography (IBC) schemes released by the State Cryptography Administration of China. With SM9, a user’s private key is generated by a central system called private key generator (PKG) using a master key. To prevent the disastrous damage caused by the master key leakage and to meet the corporate customers’ requirement of involving in the key generation process, two collaborative SM9 private key generation schemes are proposed, in which a user’s SM9 private key is collaboratively generated by two separate PKGs sharing the master key. The two PKGs are deployed in an SM9 private key service provider’s site or one of the PKGs is deployed in the private key service provider’s site while the other is deployed in a corporate customer’s site. To alleviate the possible loss caused by the leakage of a user’s private key in the end device that has no dedicated cryptographic hardware, an SM9 signature collaborative generation scheme is proposed, in which the secret of a user’s SM9 private key is shared between the user’s end device and a dedicated cryptographic device, and the devices collaborate to generate the signature to a message with their respective secret shares when signing a message with the SM9 private key is required. The approach for the proposed schemes is secret sharing and homomorphic encryption. The proposed schemes effectively address the private key leakage issues mentioned above.
{"title":"Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption","authors":"Yihong Long, Feng Xiong","doi":"10.1109/ICCCS49078.2020.9118464","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118464","url":null,"abstract":"SM9 is a class of identity based cryptography (IBC) schemes released by the State Cryptography Administration of China. With SM9, a user’s private key is generated by a central system called private key generator (PKG) using a master key. To prevent the disastrous damage caused by the master key leakage and to meet the corporate customers’ requirement of involving in the key generation process, two collaborative SM9 private key generation schemes are proposed, in which a user’s SM9 private key is collaboratively generated by two separate PKGs sharing the master key. The two PKGs are deployed in an SM9 private key service provider’s site or one of the PKGs is deployed in the private key service provider’s site while the other is deployed in a corporate customer’s site. To alleviate the possible loss caused by the leakage of a user’s private key in the end device that has no dedicated cryptographic hardware, an SM9 signature collaborative generation scheme is proposed, in which the secret of a user’s SM9 private key is shared between the user’s end device and a dedicated cryptographic device, and the devices collaborate to generate the signature to a message with their respective secret shares when signing a message with the SM9 private key is required. The approach for the proposed schemes is secret sharing and homomorphic encryption. The proposed schemes effectively address the private key leakage issues mentioned above.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131592474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118489
Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei
Power amplifier (PA) nonlinearity typically plays a crucial role in the application of specific emitter identification (SEI), due to its uniqueness at the radio frequency (RF) frontend for particular emitter. For a multiple-antenna emitter with multiple PAs inside, this paper first presents a PA parameter estimator based on a two-stage linear least square (LLS) method in the MIMO multipath communication scenario. Treated as the RF fingerprint, the extracted nonlinear coefficients are then used to classify the individual multipleantenna emitters based on the minimum error probability (MEP) criterion. In addition, we analyze the impacts of mismatch of PA model and rank-deficient condition of the LLS problem in depth. Finally, the proposed approach is validated to be effective through extensive numerical simulations.
{"title":"Identification of Multiple-Antenna Emitters Using Power Amplifier Nonlinearity","authors":"Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei","doi":"10.1109/ICCCS49078.2020.9118489","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118489","url":null,"abstract":"Power amplifier (PA) nonlinearity typically plays a crucial role in the application of specific emitter identification (SEI), due to its uniqueness at the radio frequency (RF) frontend for particular emitter. For a multiple-antenna emitter with multiple PAs inside, this paper first presents a PA parameter estimator based on a two-stage linear least square (LLS) method in the MIMO multipath communication scenario. Treated as the RF fingerprint, the extracted nonlinear coefficients are then used to classify the individual multipleantenna emitters based on the minimum error probability (MEP) criterion. In addition, we analyze the impacts of mismatch of PA model and rank-deficient condition of the LLS problem in depth. Finally, the proposed approach is validated to be effective through extensive numerical simulations.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118542
Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang
Recently, type-II quasi-cyclic (QC) low-density parity-check (LDPC) codes have attracted increasing attention due to their compact structures and promising decoding performance. In this paper, the type-II QC-LDPC code standardized for use in near-earth application is implemented by FPGA. On the basis of analysis for the generator matrix and parity-check matrix of the code, the codec for the type-II LDPC code is designed. By using an XC4VLX200-FPGA, the maximum clock frequency of the encoder is 287MHz at the cost of 810 slices and 15 Blockrams, while the maximum clock frequency of the decoder is 244 MHz at the cost of 10481 slices and 74 Blockrams. The testing result for the codec performance shows that such a code can completely satisfy the requirement for on-board channel coding application. The codec developed in this paper has been successfully employed in many remote-sensing satellite missions in China.
{"title":"Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard","authors":"Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang","doi":"10.1109/ICCCS49078.2020.9118542","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118542","url":null,"abstract":"Recently, type-II quasi-cyclic (QC) low-density parity-check (LDPC) codes have attracted increasing attention due to their compact structures and promising decoding performance. In this paper, the type-II QC-LDPC code standardized for use in near-earth application is implemented by FPGA. On the basis of analysis for the generator matrix and parity-check matrix of the code, the codec for the type-II LDPC code is designed. By using an XC4VLX200-FPGA, the maximum clock frequency of the encoder is 287MHz at the cost of 810 slices and 15 Blockrams, while the maximum clock frequency of the decoder is 244 MHz at the cost of 10481 slices and 74 Blockrams. The testing result for the codec performance shows that such a code can completely satisfy the requirement for on-board channel coding application. The codec developed in this paper has been successfully employed in many remote-sensing satellite missions in China.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICCCS49078.2020.9118561
Hangpu Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei
Down/up-sampling-based video coding is an effective strategy to cope with limited bandwidth for transmission. In recent years, CNN-based super-resolution methods have also been integrated into the above coding strategy. However, it raises a problem of how to balance the calculation and reconstruction quality. In order to alleviate this problem, we propose an enhanced down/up-sampling-based video coding scheme, in which residual data is used to compensate the unrecovered details of the reconstructed video. We first down-sample the video prior to encoding at the encoder and then obtain the residual data by subtracting the super-resolution reconstructed video frame from the original video frame. The residual data is encoded and transmitted together with the low-resolution video sequence. The decoder first reconstructs the encoded low-resolution video with CNN-based super resolution method, and then uses residual data to compensate the missing details of the reconstructed video. To further enhance the perceived quality, we use a quality enhancement network to enhance the quality-compensated video. The experimental results show that the proposed scheme achieves superior quality improvement compared with HEVC anchor and the general down/up-sampling schemes.
{"title":"Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation","authors":"Hangpu Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei","doi":"10.1109/ICCCS49078.2020.9118561","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118561","url":null,"abstract":"Down/up-sampling-based video coding is an effective strategy to cope with limited bandwidth for transmission. In recent years, CNN-based super-resolution methods have also been integrated into the above coding strategy. However, it raises a problem of how to balance the calculation and reconstruction quality. In order to alleviate this problem, we propose an enhanced down/up-sampling-based video coding scheme, in which residual data is used to compensate the unrecovered details of the reconstructed video. We first down-sample the video prior to encoding at the encoder and then obtain the residual data by subtracting the super-resolution reconstructed video frame from the original video frame. The residual data is encoded and transmitted together with the low-resolution video sequence. The decoder first reconstructs the encoded low-resolution video with CNN-based super resolution method, and then uses residual data to compensate the missing details of the reconstructed video. To further enhance the perceived quality, we use a quality enhancement network to enhance the quality-compensated video. The experimental results show that the proposed scheme achieves superior quality improvement compared with HEVC anchor and the general down/up-sampling schemes.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}