首页 > 最新文献

2020 5th International Conference on Computer and Communication Systems (ICCCS)最新文献

英文 中文
A Novel Residual Carrier Frequency Offset Estimation Approach for LoRa Systems 一种新的LoRa系统剩余载波频偏估计方法
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118416
Pengxin Guan, Hongkang Yu, Hongfei Zhu, Yuping Zhao
Long Range (LoRa) technology is gaining considerable academic and commercial traction because of its potential for low power consumption, long transmission distance and wide coverage. In this paper, we focus on the effect of residual carrier frequency offset (RCFO) on LoRa systems, and fill in the blank of efficient estimation and compensation algorithm. We first provide mathematically description of the LoRa signal with RCFO and derive the modulus of the correlation function between the RCFO precompensated upchirp in preamble and the local upchirp. Then, we propose an efficient RCFO estimation algorithm based on the Golden Section Search. The simulation results show that compared with the traditional method, our method achieves higher accuracy of the RCFO estimation and restore the Bit Error Rate (BER) to an acceptable level after compensation.
远程(LoRa)技术由于其低功耗、长距离传输和广泛覆盖的潜力,正在获得相当大的学术和商业吸引力。本文主要研究了剩余载波频偏(RCFO)对LoRa系统的影响,填补了有效估计和补偿算法的空白。我们首先给出了带有RCFO的LoRa信号的数学描述,并推导了前导中RCFO预补偿的上啁啾与局部上啁啾之间的相关函数的模量。然后,我们提出了一种基于黄金分割搜索的高效RCFO估计算法。仿真结果表明,与传统方法相比,该方法可以获得更高的RCFO估计精度,并在补偿后将误码率(BER)恢复到可接受的水平。
{"title":"A Novel Residual Carrier Frequency Offset Estimation Approach for LoRa Systems","authors":"Pengxin Guan, Hongkang Yu, Hongfei Zhu, Yuping Zhao","doi":"10.1109/ICCCS49078.2020.9118416","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118416","url":null,"abstract":"Long Range (LoRa) technology is gaining considerable academic and commercial traction because of its potential for low power consumption, long transmission distance and wide coverage. In this paper, we focus on the effect of residual carrier frequency offset (RCFO) on LoRa systems, and fill in the blank of efficient estimation and compensation algorithm. We first provide mathematically description of the LoRa signal with RCFO and derive the modulus of the correlation function between the RCFO precompensated upchirp in preamble and the local upchirp. Then, we propose an efficient RCFO estimation algorithm based on the Golden Section Search. The simulation results show that compared with the traditional method, our method achieves higher accuracy of the RCFO estimation and restore the Bit Error Rate (BER) to an acceptable level after compensation.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks 无线传感器网络中Sybil攻击检测的三层方案
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118478
Hui Wang, Li Ma, Hongying Bai
Wireless sensor network (WSN) is a wireless self-organizing multi-hop network that can sense and collect the information of the monitored environment through a certain number of sensor nodes which deployed in a certain area and transmit the collected information to the client. Due to the limited power and data capacity stored by the micro sensor, it is weak in communication with other nodes, data storage and calculation, and is very vulnerable to attack and harm to the entire network. The Sybil attack is a classic example. Sybil attack refers to the attack in which malicious nodes forge multiple node identities to participate in network operation. Malicious attackers can forge multiple node identities to participate in data forwarding. So that the data obtained by the end user without any use value. In this paper, we propose a three-tier detection scheme for the Sybil node in the severe environment. Every sensor node will determine whether they are Sybil nodes through the first-level and second-level high-energy node detection. Finally, the base station determines whether the Sybil node detected by the first two stages is true Sybil node. The simulation results show that our proposed scheme significantly improves network lifetime, and effectively improves the accuracy of Sybil node detection.
无线传感器网络(WSN)是一种无线自组织多跳网络,它通过部署在一定区域内的一定数量的传感器节点来感知和采集被监测环境的信息,并将采集到的信息传输给客户端。由于微传感器的功率和存储的数据容量有限,其与其他节点的通信、数据存储和计算能力较弱,对整个网络都非常容易受到攻击和伤害。西比尔的袭击就是一个典型的例子。Sybil攻击是指恶意节点伪造多个节点身份参与网络操作的攻击。恶意攻击者可以伪造多个节点身份参与数据转发。从而使最终用户获得的数据没有任何使用价值。本文提出了一种恶劣环境下Sybil节点的三层检测方案。每个传感器节点将通过一级和二级高能节点检测来确定自己是否是Sybil节点。最后,基站判断前两个阶段检测到的Sybil节点是否为真Sybil节点。仿真结果表明,该方案显著提高了网络生存期,有效提高了Sybil节点检测的准确性。
{"title":"A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks","authors":"Hui Wang, Li Ma, Hongying Bai","doi":"10.1109/ICCCS49078.2020.9118478","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118478","url":null,"abstract":"Wireless sensor network (WSN) is a wireless self-organizing multi-hop network that can sense and collect the information of the monitored environment through a certain number of sensor nodes which deployed in a certain area and transmit the collected information to the client. Due to the limited power and data capacity stored by the micro sensor, it is weak in communication with other nodes, data storage and calculation, and is very vulnerable to attack and harm to the entire network. The Sybil attack is a classic example. Sybil attack refers to the attack in which malicious nodes forge multiple node identities to participate in network operation. Malicious attackers can forge multiple node identities to participate in data forwarding. So that the data obtained by the end user without any use value. In this paper, we propose a three-tier detection scheme for the Sybil node in the severe environment. Every sensor node will determine whether they are Sybil nodes through the first-level and second-level high-energy node detection. Finally, the base station determines whether the Sybil node detected by the first two stages is true Sybil node. The simulation results show that our proposed scheme significantly improves network lifetime, and effectively improves the accuracy of Sybil node detection.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133852172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-feature Counting of Dense Crowd Image Based on Multi-column Convolutional Neural Network 基于多列卷积神经网络的密集人群图像多特征计数
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118564
Songchenchen Gong, E. Bourennane, Junyu Gao
The crowd counting task is an important research problem. Now more and more people are concerned about safety issues. When the population density reaches a very high peak, the population density counts, the alarm is sent out, and the crowds are diverted. The trampling of the Shanghai New Year’s stampede will not happen again. The final density map is produced by two steps: at first, extract feature maps from multiple layers, and then adjust their output so that they are all the same size, all these resized layers are combined into the final density map. We also used texture features and target edge detection to reduce the loss of density map detail to better integrate with our convolutional neural network. We tested on several commonly used datasets. Our model achieved good results in crowd counting.
人群计数任务是一个重要的研究问题。现在越来越多的人关心安全问题。当人口密度达到一个非常高的峰值时,进行人口密度计数,发出警报,疏导人群。踩踏上海新年踩踏事件不会再发生。最终的密度图由两个步骤生成:首先,从多个图层中提取特征图,然后调整它们的输出,使它们的大小相同,所有这些调整大小的图层组合成最终的密度图。我们还使用纹理特征和目标边缘检测来减少密度图细节的损失,从而更好地与我们的卷积神经网络相结合。我们在几个常用数据集上进行了测试。我们的模型在人群计数方面取得了很好的效果。
{"title":"Multi-feature Counting of Dense Crowd Image Based on Multi-column Convolutional Neural Network","authors":"Songchenchen Gong, E. Bourennane, Junyu Gao","doi":"10.1109/ICCCS49078.2020.9118564","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118564","url":null,"abstract":"The crowd counting task is an important research problem. Now more and more people are concerned about safety issues. When the population density reaches a very high peak, the population density counts, the alarm is sent out, and the crowds are diverted. The trampling of the Shanghai New Year’s stampede will not happen again. The final density map is produced by two steps: at first, extract feature maps from multiple layers, and then adjust their output so that they are all the same size, all these resized layers are combined into the final density map. We also used texture features and target edge detection to reduce the loss of density map detail to better integrate with our convolutional neural network. We tested on several commonly used datasets. Our model achieved good results in crowd counting.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"25 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact on Anti-jamming Performance of GNSS Signal Bandwidth under Channel Mismatch Used Antenna Arrays 信道不匹配条件下GNSS信号带宽对天线阵列抗干扰性能的影响
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118566
Zukun Lu, Feiqiang Chen, Yuchen Xie, Zhe Liu
The performance of anti-jamming is limited by channel mismatch in antenna arrays navigation receivers. Under the same radio frequency (RF) channel characteristic, this paper has analyzed the influence on anti-jamming performance in different global navigation satellite system (GNSS) signal bandwidth. Increasing the bandwidth of signal is an effective way to improve the positioning accuracy in satellite navigation. According to the simulation and experiment in the case of channel mismatch, increasing the signal bandwidth would lead to anti-jamming performance degradation, which is seriously lack of theoretical support. In this paper, we derive the weight value of space-time adaptive processor (STAP) and the transfer function, and the influence of signal bandwidth to anti-jamming performance is analyzed. The theoretical analysis shows that increasing signal bandwidth would lead to anti-jamming performance degradation under the condition of channel mismatch.
天线阵列导航接收机的抗干扰性能受到信道失配的限制。在相同射频信道特性下,分析了不同全球导航卫星系统(GNSS)信号带宽对抗干扰性能的影响。提高信号带宽是提高卫星导航定位精度的有效途径。在信道失配情况下的仿真和实验表明,增大信号带宽会导致抗干扰性能下降,严重缺乏理论支持。本文推导了空时自适应处理器(STAP)的权值和传递函数,并分析了信号带宽对抗干扰性能的影响。理论分析表明,在信道不匹配的情况下,增大信号带宽会导致抗干扰性能下降。
{"title":"Impact on Anti-jamming Performance of GNSS Signal Bandwidth under Channel Mismatch Used Antenna Arrays","authors":"Zukun Lu, Feiqiang Chen, Yuchen Xie, Zhe Liu","doi":"10.1109/ICCCS49078.2020.9118566","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118566","url":null,"abstract":"The performance of anti-jamming is limited by channel mismatch in antenna arrays navigation receivers. Under the same radio frequency (RF) channel characteristic, this paper has analyzed the influence on anti-jamming performance in different global navigation satellite system (GNSS) signal bandwidth. Increasing the bandwidth of signal is an effective way to improve the positioning accuracy in satellite navigation. According to the simulation and experiment in the case of channel mismatch, increasing the signal bandwidth would lead to anti-jamming performance degradation, which is seriously lack of theoretical support. In this paper, we derive the weight value of space-time adaptive processor (STAP) and the transfer function, and the influence of signal bandwidth to anti-jamming performance is analyzed. The theoretical analysis shows that increasing signal bandwidth would lead to anti-jamming performance degradation under the condition of channel mismatch.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monetary Punishment Promotes Cooperation in Complex Networks 货币惩罚促进复杂网络中的合作
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118505
Huayan Pei, Guanghui Yan, Huanmin Wang
In cooperation dilemmas, for cooperation to emerge, a mechanism for the evolution of cooperation is needed. We propose a costly monetary punishment model based on the spatial prisoner’s dilemma game and complex networks, specifically, cooperators sanction defective behaviors by applying a punishment fine to defectors directly, and all cooperators share the punishment cost. We mainly focus on how the monetary punishment mechanism affects the evolution of individuals’ strategy behaviors under different network structures. Results show that cooperation is significantly promoted even for quite small initial fractions of cooperators in square lattice and small-world network. Furthermore, we find out that when the mechanism is turned off, cooperation drops to a comparatively lower level in small-world network, while there is no change in square lattice. Additionally, the mechanism promotes the average payoff of the population.
在合作困境中,合作要产生,就需要有合作的演化机制。基于空间囚徒困境博弈和复杂网络,提出了一种代价昂贵的货币惩罚模型,即合作者直接对叛逃者处以罚金来惩罚有缺陷的行为,所有合作者共同承担惩罚成本。本文主要研究货币惩罚机制对不同网络结构下个体策略行为演化的影响。结果表明,在方格子和小世界网络中,即使合作方的初始分数很小,合作方也能显著提高合作性。进一步,我们发现当机制被关闭时,小世界网络中的合作下降到一个相对较低的水平,而正方形晶格没有变化。此外,该机制促进了人口的平均收益。
{"title":"Monetary Punishment Promotes Cooperation in Complex Networks","authors":"Huayan Pei, Guanghui Yan, Huanmin Wang","doi":"10.1109/ICCCS49078.2020.9118505","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118505","url":null,"abstract":"In cooperation dilemmas, for cooperation to emerge, a mechanism for the evolution of cooperation is needed. We propose a costly monetary punishment model based on the spatial prisoner’s dilemma game and complex networks, specifically, cooperators sanction defective behaviors by applying a punishment fine to defectors directly, and all cooperators share the punishment cost. We mainly focus on how the monetary punishment mechanism affects the evolution of individuals’ strategy behaviors under different network structures. Results show that cooperation is significantly promoted even for quite small initial fractions of cooperators in square lattice and small-world network. Furthermore, we find out that when the mechanism is turned off, cooperation drops to a comparatively lower level in small-world network, while there is no change in square lattice. Additionally, the mechanism promotes the average payoff of the population.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Security Framework for Smart Cities: A Case Study from UAE 构建智慧城市的安全框架:以阿联酋为例
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118517
Abdallah Tubaishat, Mariam Al Jouhi
Smart cities have evolved in the last years, leading the cities to implement initiatives related to technical aspects to improve quality of life. City-rankings have become a central tool for assessing the attractiveness of urban regions. The development of smart cities, however, is not without risk. Cities and citizens are putting more and more responsibilities in urban systems. Hence, all key stakeholders should provide an effective safety and security response to any situation affecting their citizens or organizations. Special attention should be paid with respect to development of services aimed at reducing cybercrime. To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed. The paper provides an overview of security aspects of a cyber security in smart cities. It starts with exploration of various definitions, threats, and risks in cyber security as well as threats from environments both internal and external and how these threats are currently mitigated with tools, processes and technologies as smart cities utilizes IoT with big data. Presently, most of the data is transmitted and collected online. Hackers usually try to exploit the vulnerabilities using various tools in order to know more about the customers and then misuse the customer’s information. Enterprises, on the other hand, continue to collect more information in order to improve services, infrastructure, and security. They collect tons of data from customers in order to complete their requirements for the different services they provide. The main concern with the collected data is that it can be vulnerable to misuse by hackers. Building a security framework based on concepts and repositories of big data and leveraging on the intelligence of predictive analytics can help build a security system that can counter these threats and help to guard from these risk and threats to a large extent. Various concepts, applications, and technologies interact to cover every aspect of the digital citizen’s life. Understanding this privacy-challenging environment is the basic requirement for the development of effective protection mechanisms. Thus, the paper aims to address sentiments on cyber security technologies and cybercrime awareness in order to come up with recommendations for innovative solutions. A survey has been conducted and the findings have been analyzed of a case study to come up with recommendations for building a conceptualizing security framework for smart cities. The survey is conducted in the United Arab Emirates (UAE), one of the most advanced countries in the MENA region, who is applying smart city concepts.
智慧城市在过去几年中不断发展,导致城市实施与技术方面相关的举措,以提高生活质量。城市排名已经成为评估城市地区吸引力的核心工具。然而,智慧城市的发展并非没有风险。城市和市民将越来越多的责任赋予城市系统。因此,所有关键利益相关者都应该对影响其公民或组织的任何情况提供有效的安全和安保响应。应特别注意发展旨在减少网络犯罪的服务。为了防止这种情况发生,我们认为有必要更好地了解智能城市及其隐私影响。本文概述了智慧城市网络安全的安全方面。它首先探索网络安全中的各种定义、威胁和风险,以及来自内部和外部环境的威胁,以及随着智慧城市利用物联网和大数据,这些威胁目前如何通过工具、流程和技术来缓解。目前,大多数数据都是在线传输和收集的。黑客通常试图利用各种工具来利用漏洞,以便更多地了解客户,然后滥用客户的信息。另一方面,企业继续收集更多信息,以改进服务、基础设施和安全性。他们从客户那里收集了大量的数据,以满足客户对他们提供的不同服务的需求。对收集到的数据的主要担忧是,它很容易被黑客滥用。构建基于大数据概念和存储库的安全框架,并利用预测分析的智能,可以帮助构建一个能够应对这些威胁的安全系统,并在很大程度上帮助防范这些风险和威胁。各种概念、应用程序和技术相互作用,覆盖数字公民生活的各个方面。了解这种具有隐私挑战性的环境是开发有效保护机制的基本要求。因此,本文旨在解决对网络安全技术和网络犯罪意识的看法,以便提出创新解决方案的建议。为了构建智慧城市概念化的安全框架,进行了调查,并对调查结果进行了案例分析。该调查是在阿拉伯联合酋长国(UAE)进行的,阿联酋是中东和北非地区最先进的国家之一,正在应用智慧城市概念。
{"title":"Building a Security Framework for Smart Cities: A Case Study from UAE","authors":"Abdallah Tubaishat, Mariam Al Jouhi","doi":"10.1109/ICCCS49078.2020.9118517","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118517","url":null,"abstract":"Smart cities have evolved in the last years, leading the cities to implement initiatives related to technical aspects to improve quality of life. City-rankings have become a central tool for assessing the attractiveness of urban regions. The development of smart cities, however, is not without risk. Cities and citizens are putting more and more responsibilities in urban systems. Hence, all key stakeholders should provide an effective safety and security response to any situation affecting their citizens or organizations. Special attention should be paid with respect to development of services aimed at reducing cybercrime. To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed. The paper provides an overview of security aspects of a cyber security in smart cities. It starts with exploration of various definitions, threats, and risks in cyber security as well as threats from environments both internal and external and how these threats are currently mitigated with tools, processes and technologies as smart cities utilizes IoT with big data. Presently, most of the data is transmitted and collected online. Hackers usually try to exploit the vulnerabilities using various tools in order to know more about the customers and then misuse the customer’s information. Enterprises, on the other hand, continue to collect more information in order to improve services, infrastructure, and security. They collect tons of data from customers in order to complete their requirements for the different services they provide. The main concern with the collected data is that it can be vulnerable to misuse by hackers. Building a security framework based on concepts and repositories of big data and leveraging on the intelligence of predictive analytics can help build a security system that can counter these threats and help to guard from these risk and threats to a large extent. Various concepts, applications, and technologies interact to cover every aspect of the digital citizen’s life. Understanding this privacy-challenging environment is the basic requirement for the development of effective protection mechanisms. Thus, the paper aims to address sentiments on cyber security technologies and cybercrime awareness in order to come up with recommendations for innovative solutions. A survey has been conducted and the findings have been analyzed of a case study to come up with recommendations for building a conceptualizing security framework for smart cities. The survey is conducted in the United Arab Emirates (UAE), one of the most advanced countries in the MENA region, who is applying smart city concepts.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fault Analysis Method Based on Text Clustering 基于文本聚类的故障分析方法
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118528
Guodong Li, Qiuyi Zhang, Rongrong Zheng, Chenhui Wang
A large number of typical fault cases accumulated in the informatization work of State Grid Corporation of China are mostly descriptive text data, which is difficult to understand and analyze by means of automation. In view of this problem, text mining technology is used to extract fault problems and causes from fault cases to form the causal relationship of faults, so as to provide necessary conditions for the next step of fault text mining. This system uses the method of text clustering for fault location and auxiliary research. First of all,do the segmentation of fault information and processing scheme, in this step, the Chinese word segmentation is carried out by using the Jieba word segmentation tool. Secondly, it is necessary to clean the segmentation results and build a corpus. Thirdly, in order to represent the corpus as the type that the computer can calculate the similarity, we need to transform the corpus into frequency matrix. And then instead of using traditional k-means clustering algorithm to cluster, we use the calinski_harabaz score to evaluate the best value of K. Finally, we put this model into application in actual production, build the fault information and solution mapping table.
中国国家电网公司在信息化工作中积累的大量典型故障案例多为描述性文本数据,难以通过自动化手段理解和分析。针对这一问题,采用文本挖掘技术从故障案例中提取故障问题和原因,形成故障的因果关系,为下一步的故障文本挖掘提供必要条件。该系统采用文本聚类的方法进行故障定位和辅助研究。首先,做故障信息的分词和处理方案,在这一步中,使用Jieba分词工具进行中文分词。其次,对分割结果进行清理,建立语料库。第三,为了将语料库表示为计算机可以计算相似度的类型,我们需要将语料库转换为频率矩阵。然后用calinski_harabaz分数来评价k的最优值,代替传统的k-means聚类算法进行聚类,最后将该模型应用到实际生产中,构建故障信息和解映射表。
{"title":"A Fault Analysis Method Based on Text Clustering","authors":"Guodong Li, Qiuyi Zhang, Rongrong Zheng, Chenhui Wang","doi":"10.1109/ICCCS49078.2020.9118528","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118528","url":null,"abstract":"A large number of typical fault cases accumulated in the informatization work of State Grid Corporation of China are mostly descriptive text data, which is difficult to understand and analyze by means of automation. In view of this problem, text mining technology is used to extract fault problems and causes from fault cases to form the causal relationship of faults, so as to provide necessary conditions for the next step of fault text mining. This system uses the method of text clustering for fault location and auxiliary research. First of all,do the segmentation of fault information and processing scheme, in this step, the Chinese word segmentation is carried out by using the Jieba word segmentation tool. Secondly, it is necessary to clean the segmentation results and build a corpus. Thirdly, in order to represent the corpus as the type that the computer can calculate the similarity, we need to transform the corpus into frequency matrix. And then instead of using traditional k-means clustering algorithm to cluster, we use the calinski_harabaz score to evaluate the best value of K. Finally, we put this model into application in actual production, build the fault information and solution mapping table.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"2017 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mm-Wave 60 GHz Channel Fading Effects Analysis Based on RBF Neural Network 基于RBF神经网络的毫米波60ghz信道衰落效应分析
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118409
Wei Hu, S. Geng, Xiongwen Zhao
In this paper, based on mm-wave 60 GHz channel measurements performed in large hall and corridor for both LoS and NLoS scenarios, channel fading effects like received power, path loss and shadowing are investigated based on radial basis function (RBF) neural network model. Results show that RBF model can fit measurement data better than traditional back propagation (BP) machine learning (ML) method with larger coefficient of determination and smaller root mean square error (RMSE). Neural network models can accurately predict channel parameters, indicates the advances of ML in channel modeling. The presented results are useful in design of 5G wireless communication systems and system development.
本文基于大型大厅和走廊的60 GHz毫米波通道测量,基于径向基函数(RBF)神经网络模型,研究了接收功率、路径损耗和阴影等信道衰落效应。结果表明,与传统的BP机器学习方法相比,RBF模型具有更大的决定系数和更小的均方根误差(RMSE),可以更好地拟合测量数据。神经网络模型可以准确地预测通道参数,表明机器学习在通道建模方面的进步。所得结果对5G无线通信系统的设计和系统开发具有一定的参考价值。
{"title":"Mm-Wave 60 GHz Channel Fading Effects Analysis Based on RBF Neural Network","authors":"Wei Hu, S. Geng, Xiongwen Zhao","doi":"10.1109/ICCCS49078.2020.9118409","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118409","url":null,"abstract":"In this paper, based on mm-wave 60 GHz channel measurements performed in large hall and corridor for both LoS and NLoS scenarios, channel fading effects like received power, path loss and shadowing are investigated based on radial basis function (RBF) neural network model. Results show that RBF model can fit measurement data better than traditional back propagation (BP) machine learning (ML) method with larger coefficient of determination and smaller root mean square error (RMSE). Neural network models can accurately predict channel parameters, indicates the advances of ML in channel modeling. The presented results are useful in design of 5G wireless communication systems and system development.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114319721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Soft Decision Signal Detection of MIMO System Based on Deep Neural Network 基于深度神经网络的MIMO系统软决策信号检测
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118425
Qi Li, Aihua Zhang, Jianjun Li, Bing Ning
This paper proposes a multiple-input multiple-output (MIMO) soft decision signal detection method for a timevarying communication system. In this algorithm, the training samples, including system channel state information and received data, are input to a deep neural network (DNN), and then we employ cross-entropy loss function and root mean square propagation (RMSProp) descent algorithm to offline train and optimize the parameters of the DNN. Besides, the output layer of the DNN uses the sigmoid function as the activation function, and the negative value of the input value of the sigmoid function is the log-likelihood ratio (LLR). In this way, we can obtain the LLR value via removing the sigmoid function during the online testing without the complicated process of calculating the LLR value. Combining the DNN with the soft decision technology improves signal detection performance. Simulation results show that the proposed algorithm is better than the MMSE algorithm and similar to ML algorithm.
针对时变通信系统,提出了一种多输入多输出(MIMO)软判决信号检测方法。该算法将训练样本(包括系统信道状态信息和接收到的数据)输入到深度神经网络(DNN)中,然后采用交叉熵损失函数和均方根传播(RMSProp)下降算法对深度神经网络进行离线训练和参数优化。此外,DNN的输出层使用sigmoid函数作为激活函数,sigmoid函数输入值的负值为对数似然比(LLR)。这样,我们就可以在在线测试时通过去除sigmoid函数来获得LLR值,而不需要计算LLR值的复杂过程。将深度神经网络与软决策技术相结合,提高了信号检测性能。仿真结果表明,该算法优于MMSE算法,与ML算法相似。
{"title":"Soft Decision Signal Detection of MIMO System Based on Deep Neural Network","authors":"Qi Li, Aihua Zhang, Jianjun Li, Bing Ning","doi":"10.1109/ICCCS49078.2020.9118425","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118425","url":null,"abstract":"This paper proposes a multiple-input multiple-output (MIMO) soft decision signal detection method for a timevarying communication system. In this algorithm, the training samples, including system channel state information and received data, are input to a deep neural network (DNN), and then we employ cross-entropy loss function and root mean square propagation (RMSProp) descent algorithm to offline train and optimize the parameters of the DNN. Besides, the output layer of the DNN uses the sigmoid function as the activation function, and the negative value of the input value of the sigmoid function is the log-likelihood ratio (LLR). In this way, we can obtain the LLR value via removing the sigmoid function during the online testing without the complicated process of calculating the LLR value. Combining the DNN with the soft decision technology improves signal detection performance. Simulation results show that the proposed algorithm is better than the MMSE algorithm and similar to ML algorithm.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Model of Missing Information Completion of Telecom Customers Based on Factor Analysis and Data Mining 基于因子分析和数据挖掘的电信客户缺失信息补全模型研究
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118490
Zeng Rui, H. Yin, Jinyan Cai
The key problem that must be solved in the analysis and prediction of customer churn in telecom companies is the data completion of customer missing. In this paper, a model based on factor analysis and data mining is proposed to complete customer missing data. This model first completes the factors generated by the missing data, and then completes the missing data. In factor completion, the improved k-mean algorithm is used to effectively solve the problem of initial value and K value selection, and the Euclidean distance is improved to achieve effective clustering of factors and factor completion. The missing data value is obtained by factor reverse reasoning. The model is trained with real historical data and tested to verify that the model is effective.
电信企业客户流失分析与预测必须解决的关键问题是客户流失数据的补全。本文提出了一种基于因子分析和数据挖掘的客户缺失数据补全模型。该模型首先对缺失数据生成的因子进行补全,然后对缺失数据进行补全。在因子补全方面,采用改进的K -mean算法有效地解决了初始值和K值的选择问题,并改进了欧几里得距离,实现了因子的有效聚类和因子补全。缺失数据值通过因子逆向推理得到。用真实历史数据对模型进行了训练,并对模型进行了测试,验证了模型的有效性。
{"title":"Research on the Model of Missing Information Completion of Telecom Customers Based on Factor Analysis and Data Mining","authors":"Zeng Rui, H. Yin, Jinyan Cai","doi":"10.1109/ICCCS49078.2020.9118490","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118490","url":null,"abstract":"The key problem that must be solved in the analysis and prediction of customer churn in telecom companies is the data completion of customer missing. In this paper, a model based on factor analysis and data mining is proposed to complete customer missing data. This model first completes the factors generated by the missing data, and then completes the missing data. In factor completion, the improved k-mean algorithm is used to effectively solve the problem of initial value and K value selection, and the Euclidean distance is improved to achieve effective clustering of factors and factor completion. The missing data value is obtained by factor reverse reasoning. The model is trained with real historical data and tested to verify that the model is effective.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 5th International Conference on Computer and Communication Systems (ICCCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1