首页 > 最新文献

2019 26th International Conference on Telecommunications (ICT)最新文献

英文 中文
A Novel Directional MAC in Restricted Access Window for IEEE 802.11ah Networks IEEE 802.11ah网络限制访问窗口中的一种新型定向MAC
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798775
Q. Ngo, Duc Ngoc Minh Dang, Q. Trung, D. Lam
The IEEE 802.11ah standard has been released with extended communication range and improved energy efficiency used for the Internet of Things (IoT), Supporting massive number of IoT connections, the IEEE 802.11ah uses group-based contention and restricted access window for the medium access control. To leverage the reuse of resources in the IEEE 802.11ah, this paper proposed a novel directional medium access mechanism inside the restricted access window with geographical sectorized grouping. The proposed mechanism results in significant higher packet delivery ratio and system throughput than the original IEEE 802.11ah standard.
IEEE 802.11ah标准已经发布,扩展了物联网(IoT)的通信范围和提高了能源效率,支持大量的物联网连接,IEEE 802.11ah使用基于组的争用和限制访问窗口来进行介质访问控制。为了充分利用IEEE 802.11ah中资源的重用性,本文提出了一种基于地理扇区分组的受限访问窗口内定向介质访问机制。与原来的IEEE 802.11ah标准相比,所提出的机制显著提高了分组传送率和系统吞吐量。
{"title":"A Novel Directional MAC in Restricted Access Window for IEEE 802.11ah Networks","authors":"Q. Ngo, Duc Ngoc Minh Dang, Q. Trung, D. Lam","doi":"10.1109/ICT.2019.8798775","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798775","url":null,"abstract":"The IEEE 802.11ah standard has been released with extended communication range and improved energy efficiency used for the Internet of Things (IoT), Supporting massive number of IoT connections, the IEEE 802.11ah uses group-based contention and restricted access window for the medium access control. To leverage the reuse of resources in the IEEE 802.11ah, this paper proposed a novel directional medium access mechanism inside the restricted access window with geographical sectorized grouping. The proposed mechanism results in significant higher packet delivery ratio and system throughput than the original IEEE 802.11ah standard.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
QoS-Aware Resource Allocation of Two-tier HetNet: A Q-learning Approach 基于qos感知的两层HetNet资源分配:一种q学习方法
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798829
Waleed Al Sobhi, H. Aghvami
Data applications account for the magnitude of traffic generated in the Cellular Networks. To meet the ever-increasing traffic demand, advancement in resource allocation is crucial. Dense Heterogeneous Networks (HetNets) aim at meeting the high data rate requirements of the future 5G communications. The paper's main contribution is to maximize the capacity of 5G dense networks via machine learning type Q-learning control algorithms in the Downlink. For broader comparison, we proposed two Power Allocation Q-learning algorithms, namely Distributed and Formulated. To investigate the impact of femto user equipment (FUE) in the network, the location of macro user equipment (MUE) is considered in the reward function. Furthermore, a cooperative approach is utilized to decrease the time search complexity. This approach is complex and requires further improvement. The obtained simulation results showed that the proposed Distributed algorithm outperformed the Formulated and Cooperative approaches. Accordingly, in the latter approaches the number of served FUEs increased however, at the expenses of the MUE Quality of Service (QoS).
数据应用占蜂窝网络中产生的流量的规模。为了满足日益增长的交通需求,资源配置的进步是至关重要的。高密度异构网络(HetNets)旨在满足未来5G通信的高数据速率要求。该论文的主要贡献是通过下行链路中的机器学习型q -学习控制算法,最大限度地提高5G密集网络的容量。为了进行更广泛的比较,我们提出了两种Power Allocation Q-learning算法,即Distributed和Formulated。为了研究微用户设备(FUE)在网络中的影响,在奖励函数中考虑了宏用户设备的位置。此外,还采用了一种协作的方法来降低时间搜索复杂度。这种方法很复杂,需要进一步改进。仿真结果表明,所提出的分布式算法优于公式化算法和协同算法。因此,在后一种方法中,服务的fue数量增加,但以牺牲MUE的服务质量(QoS)为代价。
{"title":"QoS-Aware Resource Allocation of Two-tier HetNet: A Q-learning Approach","authors":"Waleed Al Sobhi, H. Aghvami","doi":"10.1109/ICT.2019.8798829","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798829","url":null,"abstract":"Data applications account for the magnitude of traffic generated in the Cellular Networks. To meet the ever-increasing traffic demand, advancement in resource allocation is crucial. Dense Heterogeneous Networks (HetNets) aim at meeting the high data rate requirements of the future 5G communications. The paper's main contribution is to maximize the capacity of 5G dense networks via machine learning type Q-learning control algorithms in the Downlink. For broader comparison, we proposed two Power Allocation Q-learning algorithms, namely Distributed and Formulated. To investigate the impact of femto user equipment (FUE) in the network, the location of macro user equipment (MUE) is considered in the reward function. Furthermore, a cooperative approach is utilized to decrease the time search complexity. This approach is complex and requires further improvement. The obtained simulation results showed that the proposed Distributed algorithm outperformed the Formulated and Cooperative approaches. Accordingly, in the latter approaches the number of served FUEs increased however, at the expenses of the MUE Quality of Service (QoS).","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-linear Compensation based on Polynomial Function Linked ANN in Multi-band CAP VLC System 基于多项式函数链接神经网络的多波段CAP VLC系统非线性补偿
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798825
Fangchen Hu, Yiheng Zhao, Peng Zou, Yuanfan Liu, N. Chi
We proposed an extension of FlANN filter to compensate nonlinear effects in multi-bands CAP64 VLC system. The excellent performance of nonlinearity compensation and 9-sub-bands CAP64 transmission has been verified through experimental demonstration.
提出了一种扩展的FlANN滤波器来补偿多波段CAP64 VLC系统中的非线性效应。通过实验验证了CAP64的非线性补偿和9子带传输的优异性能。
{"title":"Non-linear Compensation based on Polynomial Function Linked ANN in Multi-band CAP VLC System","authors":"Fangchen Hu, Yiheng Zhao, Peng Zou, Yuanfan Liu, N. Chi","doi":"10.1109/ICT.2019.8798825","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798825","url":null,"abstract":"We proposed an extension of FlANN filter to compensate nonlinear effects in multi-bands CAP64 VLC system. The excellent performance of nonlinearity compensation and 9-sub-bands CAP64 transmission has been verified through experimental demonstration.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of Relay-Assisted D2D Network Offloading in Ultra-Dense Networks 超密集网络中中继辅助D2D网络卸载的性能分析
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798812
Kai Sun, Ge-Fan Li, W. Huang
Intensive users equipments (UEs) often make small base station (SBSs) work under full load so that subsequent access requests of UEs will be difficult to get real-time services in hot spots such as campus, dense office area or large business district. To solve this problem, device-to-device (D2D) offloading has been advocated in recent small cell architecture design. In this paper, we propose a relay-assisted D2D network offloading method without extra spectrum for ultra-dense small cell network. UEs who have new communication request in full load SBS are offloaded to the adjacent light load SBS by exploiting D2D receiver as a relay. We formulated the problem with three sub-problems: firstly, how to select the relay destination SBS; secondly, how to select the D2D relay UE; finally, how to allocate resources and control D2D UE transmitting power. Toward this end, a relay-assisted D2D communication network offloading algorithm is proposed to allocate channel resource and transmit power of D2D UE under the condition of satisfying the signal to interference plus noise ratio (SINR) of cellular UEs. The proposed scheme is evaluated through computer simulation and the results show that it can enable a significant increase in the number of accessible UEs of the network.
在校园、密集办公区或大型商务区等热点地区,密集用户设备往往使小型基站满负荷工作,导致后续接入请求难以获得实时服务。为了解决这个问题,设备到设备(device-to-device, D2D)卸载在最近的小蜂窝架构设计中被提倡。本文提出了一种不需要额外频谱的中继辅助的超密集小蜂窝网络D2D网络卸载方法。利用D2D接收机作为中继,将在满负载SBS中有新通信请求的终端卸载到相邻的轻负载SBS上。该问题分为三个子问题:第一,如何选择中继目的地SBS;其次,如何选择D2D继电器终端;最后,如何分配资源和控制D2D终端发射功率。为此,提出了一种中继辅助D2D通信网络卸载算法,在满足蜂窝终端信噪比(SINR)的情况下,分配D2D终端的信道资源和发射功率。通过计算机仿真对该方案进行了评估,结果表明该方案能够显著提高网络的可访问终端数量。
{"title":"Performance Analysis of Relay-Assisted D2D Network Offloading in Ultra-Dense Networks","authors":"Kai Sun, Ge-Fan Li, W. Huang","doi":"10.1109/ICT.2019.8798812","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798812","url":null,"abstract":"Intensive users equipments (UEs) often make small base station (SBSs) work under full load so that subsequent access requests of UEs will be difficult to get real-time services in hot spots such as campus, dense office area or large business district. To solve this problem, device-to-device (D2D) offloading has been advocated in recent small cell architecture design. In this paper, we propose a relay-assisted D2D network offloading method without extra spectrum for ultra-dense small cell network. UEs who have new communication request in full load SBS are offloaded to the adjacent light load SBS by exploiting D2D receiver as a relay. We formulated the problem with three sub-problems: firstly, how to select the relay destination SBS; secondly, how to select the D2D relay UE; finally, how to allocate resources and control D2D UE transmitting power. Toward this end, a relay-assisted D2D communication network offloading algorithm is proposed to allocate channel resource and transmit power of D2D UE under the condition of satisfying the signal to interference plus noise ratio (SINR) of cellular UEs. The proposed scheme is evaluated through computer simulation and the results show that it can enable a significant increase in the number of accessible UEs of the network.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical Layer Security in Cellular Network in the Presence of Terrains 地形存在下蜂窝网络物理层安全
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798842
Fenghe Hu, Ayda Babaei, H. Aghvami
Physical layer security (PHYLS) has become an important factor to consider with the deployment of 5G small-cell network and the application of massive multiple-input-multiple-output (MIMO). In a real small-cell network, the environment contains various objects which may affect a propagating signal. Accordingly, this work investigates the performance of different strategies by building a propagation model for PHYLS in the presence of random terrains. The Monte Carlo simulation is used to perform the simulation for the affect of terrains under different scenarios. Furthermore, two different approaches for improving PHYLS in the outlined environment and their influence is discussed. This includes separate antenna selection (SAS) and strategical artificial noise (SAN). The performance of each approach is simulated and the results are analysed. Our findings indicate that the existence of terrain may negatively affect the PHYLS performance. However, by implementing the aforementioned techniques we can compensate for degrading PHYLS with the cost of radio frequency (RF) resources.
随着5G小蜂窝网络的部署和大规模多输入多输出(MIMO)的应用,物理层安全性(PHYLS)已成为需要考虑的重要因素。在真实的小蜂窝网络中,环境包含各种可能影响信号传播的对象。因此,本研究通过建立PHYLS在随机地形下的传播模型来研究不同策略的性能。采用蒙特卡罗模拟方法对不同场景下地形的影响进行了模拟。此外,本文还讨论了在上述环境下改善phls的两种不同方法及其影响。这包括单独的天线选择(SAS)和战略人工噪声(SAN)。对每种方法的性能进行了仿真,并对结果进行了分析。我们的研究结果表明,地形的存在可能会对PHYLS的性能产生负面影响。然而,通过实现上述技术,我们可以用射频(RF)资源的成本来补偿PHYLS的退化。
{"title":"Physical Layer Security in Cellular Network in the Presence of Terrains","authors":"Fenghe Hu, Ayda Babaei, H. Aghvami","doi":"10.1109/ICT.2019.8798842","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798842","url":null,"abstract":"Physical layer security (PHYLS) has become an important factor to consider with the deployment of 5G small-cell network and the application of massive multiple-input-multiple-output (MIMO). In a real small-cell network, the environment contains various objects which may affect a propagating signal. Accordingly, this work investigates the performance of different strategies by building a propagation model for PHYLS in the presence of random terrains. The Monte Carlo simulation is used to perform the simulation for the affect of terrains under different scenarios. Furthermore, two different approaches for improving PHYLS in the outlined environment and their influence is discussed. This includes separate antenna selection (SAS) and strategical artificial noise (SAN). The performance of each approach is simulated and the results are analysed. Our findings indicate that the existence of terrain may negatively affect the PHYLS performance. However, by implementing the aforementioned techniques we can compensate for degrading PHYLS with the cost of radio frequency (RF) resources.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Kinship Verification based on Local Binary Pattern features coding in different color space 基于不同颜色空间局部二值模式特征编码的亲缘关系验证
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798781
Tien Nguyen Van, Vinh Truong Hoang
Kinship verification is one of the interesting and challenging topics which is related to face analysis. Most of existing methods have been trying to find out the relevant information between two persons (edge nose, lip, eyes) to increase the verification rate. In this paper, we propose to apply the Local Binary Pattern for Kinship on different color space. Then the features are computed by $chi^{2}$ distance and apply feature selection to reduce the noisy and irrelevant features. The Support Vector Machine is used to train and predict the model. We analyze the effectiveness of our method by carrying out experiments on two popular databases such as KinFaceW-I and KinFaceW-II.
亲属关系验证是与人脸分析相关的有趣而富有挑战性的课题之一。现有的方法大多是试图找出两个人之间的相关信息(边缘、鼻子、嘴唇、眼睛),以提高验证率。本文提出将局部二值模式应用于不同色彩空间的亲属关系。然后按$chi^{2}$距离计算特征,并应用特征选择去除噪声和不相关特征。使用支持向量机对模型进行训练和预测。我们通过在两个流行的数据库(如KinFaceW-I和KinFaceW-II)上进行实验来分析我们的方法的有效性。
{"title":"Kinship Verification based on Local Binary Pattern features coding in different color space","authors":"Tien Nguyen Van, Vinh Truong Hoang","doi":"10.1109/ICT.2019.8798781","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798781","url":null,"abstract":"Kinship verification is one of the interesting and challenging topics which is related to face analysis. Most of existing methods have been trying to find out the relevant information between two persons (edge nose, lip, eyes) to increase the verification rate. In this paper, we propose to apply the Local Binary Pattern for Kinship on different color space. Then the features are computed by $chi^{2}$ distance and apply feature selection to reduce the noisy and irrelevant features. The Support Vector Machine is used to train and predict the model. We analyze the effectiveness of our method by carrying out experiments on two popular databases such as KinFaceW-I and KinFaceW-II.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Dual-polarized Antennas Based Directional Modulation Scheme 一种基于双极化天线的定向调制方案
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798807
Qiaoyu Zhang, Zhaoyang Yang, Wen Wang, Junxing Ren, Wei-qing Huang, Ning Zhang
In this paper, we proposed a novel directional polarization modulation (DPM) scheme based on dual-polarized antennas. This scheme can be applied in physical layer secure communication. By utilizing the direction-dependent characteristic of DPM, our scheme can protect signals in the legitimate direction, and simultaneously distort the constellation in other directions. Firstly, we discover the direction-dependent characteristic of DPM. Secondly, a dual-polarized dipole array design method is proposed to enhance the DPM's direction-dependent characteristic. Moreover, a method to precisely control the DPM's secure transmission direction is proposed. Finally, the simulations are carried out to verify the secure transmission performance.
本文提出了一种基于双极化天线的定向极化调制(DPM)方案。该方案可应用于物理层安全通信。利用DPM的方向依赖特性,可以在合法方向上保护信号,同时在其他方向上扭曲星座。首先,我们发现了DPM的方向依赖特性。其次,提出了一种双极化偶极子阵列设计方法来增强DPM的方向依赖特性。此外,还提出了一种精确控制DPM安全传输方向的方法。最后通过仿真验证了该算法的安全传输性能。
{"title":"A Dual-polarized Antennas Based Directional Modulation Scheme","authors":"Qiaoyu Zhang, Zhaoyang Yang, Wen Wang, Junxing Ren, Wei-qing Huang, Ning Zhang","doi":"10.1109/ICT.2019.8798807","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798807","url":null,"abstract":"In this paper, we proposed a novel directional polarization modulation (DPM) scheme based on dual-polarized antennas. This scheme can be applied in physical layer secure communication. By utilizing the direction-dependent characteristic of DPM, our scheme can protect signals in the legitimate direction, and simultaneously distort the constellation in other directions. Firstly, we discover the direction-dependent characteristic of DPM. Secondly, a dual-polarized dipole array design method is proposed to enhance the DPM's direction-dependent characteristic. Moreover, a method to precisely control the DPM's secure transmission direction is proposed. Finally, the simulations are carried out to verify the secure transmission performance.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"6 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114096012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Concurrent Optimization Consensus System Based on Blockchain 基于区块链的并发优化共识系统
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798836
Weiqi Dai, Deshan Xiao, Hai Jin, Xia Xie
The blockchain technology is more and more important in computer security. The core of the blockchain system is consensus. However, many consensus mechanisms reward those groups that own the majority of the resources. In addition, the performance of these consensus mechanisms is poor. In this paper we first present Proof of Value (POV), an incentive mechanism that rewards the value creators. With the help of POV, we reward the user who creates value and control the number of coins through the incentive coefficient adjustment algorithm. To improve the performance of POV in permissioned blockchain, we designed Hypernet, an off-chain transaction system. By designing the transaction system Hy-pernet, the transaction can be handled without blockchain. Finally, we evaluate our system by generating random parameters to invoke the contract. Then we record the real time for issuing the rewards. The test results show that the loss of the system is about 2% when the POV is added. The performance of the Hypernet is four times higher than the traditional permissioned blockchain transaction system.
区块链技术在计算机安全中发挥着越来越重要的作用。区块链系统的核心是共识。然而,许多共识机制奖励那些拥有大部分资源的群体。此外,这些共识机制的性能较差。在本文中,我们首先提出了价值证明(POV),一种奖励价值创造者的激励机制。我们借助POV对创造价值的用户进行奖励,并通过激励系数调整算法控制币数。为了提高POV在许可区块链中的性能,我们设计了一个链下交易系统Hypernet。通过设计交易系统hyper -pernet,可以在没有区块链的情况下处理交易。最后,我们通过生成随机参数来调用合约来评估我们的系统。然后我们记录发放奖励的实时时间。试验结果表明,加入POV后,系统损耗约为2%。Hypernet的性能是传统许可区块链交易系统的四倍。
{"title":"A Concurrent Optimization Consensus System Based on Blockchain","authors":"Weiqi Dai, Deshan Xiao, Hai Jin, Xia Xie","doi":"10.1109/ICT.2019.8798836","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798836","url":null,"abstract":"The blockchain technology is more and more important in computer security. The core of the blockchain system is consensus. However, many consensus mechanisms reward those groups that own the majority of the resources. In addition, the performance of these consensus mechanisms is poor. In this paper we first present Proof of Value (POV), an incentive mechanism that rewards the value creators. With the help of POV, we reward the user who creates value and control the number of coins through the incentive coefficient adjustment algorithm. To improve the performance of POV in permissioned blockchain, we designed Hypernet, an off-chain transaction system. By designing the transaction system Hy-pernet, the transaction can be handled without blockchain. Finally, we evaluate our system by generating random parameters to invoke the contract. Then we record the real time for issuing the rewards. The test results show that the loss of the system is about 2% when the POV is added. The performance of the Hypernet is four times higher than the traditional permissioned blockchain transaction system.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features 基于多视图特征的HTTPS流量移动应用识别
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798799
Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li
The expanding volume of HTTPS traffic (both legitimate and malicious) creates even more challenges for mobile network security and management. In this work, we propose AIBMF(Application Identification Based on Multi-view Features), a fine-grained approach to classify HTTPS traffic by their application type. The key idea of AIBMF is to combine three kinds of features—payload convolution features, packet size sequence and packet content type sequence. Based on these different view features, a deep learning model (using CNN, embedding and RNN) is constructed for HTTPS traffic identification task. To evaluate the effectiveness of AIBMF, we run a comprehensive set of experiments on a real-world dataset (about 100,000+ flows), which shows that our approach achieves 96.06% accuracy and outperforms the state-of-the-art method (3.6% on F1 score).
HTTPS流量(包括合法流量和恶意流量)的不断增长给移动网络安全和管理带来了更多挑战。在这项工作中,我们提出了AIBMF(基于多视图特征的应用识别),这是一种根据应用类型对HTTPS流量进行分类的细粒度方法。AIBMF的核心思想是将载荷卷积特征、数据包大小序列和数据包内容类型序列三种特征相结合。基于这些不同的视图特征,构建了基于CNN、嵌入和RNN的HTTPS流量识别深度学习模型。为了评估AIBMF的有效性,我们在真实数据集(大约100,000+流)上运行了一组全面的实验,结果表明我们的方法达到了96.06%的准确率,并且优于最先进的方法(F1分数为3.6%)。
{"title":"Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features","authors":"Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li","doi":"10.1109/ICT.2019.8798799","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798799","url":null,"abstract":"The expanding volume of HTTPS traffic (both legitimate and malicious) creates even more challenges for mobile network security and management. In this work, we propose AIBMF(Application Identification Based on Multi-view Features), a fine-grained approach to classify HTTPS traffic by their application type. The key idea of AIBMF is to combine three kinds of features—payload convolution features, packet size sequence and packet content type sequence. Based on these different view features, a deep learning model (using CNN, embedding and RNN) is constructed for HTTPS traffic identification task. To evaluate the effectiveness of AIBMF, we run a comprehensive set of experiments on a real-world dataset (about 100,000+ flows), which shows that our approach achieves 96.06% accuracy and outperforms the state-of-the-art method (3.6% on F1 score).","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Network Selection Approach in 5G Heterogeneous Networks Using Q-Learning 基于q -学习的5G异构网络网络选择新方法
Pub Date : 2019-04-08 DOI: 10.1109/ICT.2019.8798797
Xiaoqian Wang, Xin Su, Bei Liu
With the development of heterogeneous wireless networks, it is particularly important to build a reasonable network selection mechanism of user in the 5G heterogeneous networks. In this paper, we improve the reward function in Q-Learning using the AHP (Analytic Hierarchy Process) method and make a simple analysis about network resources competition in the case of multi-agent scenario. Then we propose two network selection algorithms: SANSA (single agent network selection algorithm) and MANSA (multi-agent network selection algorithm) which are based on Q-Learning and Nash Q-Learning respectively to deal with the network selection problem. Simulations show that our proposed algorithms have a better performance of network load balancing than the contrast scheme. In addition, the MANSA can effectively reduce the system total power consumption.
随着异构无线网络的发展,在5G异构网络中建立合理的用户网络选择机制显得尤为重要。本文采用层次分析法对Q-Learning中的奖励函数进行了改进,并对多智能体场景下的网络资源竞争进行了简单分析。然后提出了基于Q-Learning和Nash Q-Learning的单智能体网络选择算法SANSA和多智能体网络选择算法MANSA来处理网络选择问题。仿真结果表明,本文提出的算法比对比方案具有更好的网络负载均衡性能。此外,MANSA还能有效降低系统总功耗。
{"title":"A Novel Network Selection Approach in 5G Heterogeneous Networks Using Q-Learning","authors":"Xiaoqian Wang, Xin Su, Bei Liu","doi":"10.1109/ICT.2019.8798797","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798797","url":null,"abstract":"With the development of heterogeneous wireless networks, it is particularly important to build a reasonable network selection mechanism of user in the 5G heterogeneous networks. In this paper, we improve the reward function in Q-Learning using the AHP (Analytic Hierarchy Process) method and make a simple analysis about network resources competition in the case of multi-agent scenario. Then we propose two network selection algorithms: SANSA (single agent network selection algorithm) and MANSA (multi-agent network selection algorithm) which are based on Q-Learning and Nash Q-Learning respectively to deal with the network selection problem. Simulations show that our proposed algorithms have a better performance of network load balancing than the contrast scheme. In addition, the MANSA can effectively reduce the system total power consumption.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 26th International Conference on Telecommunications (ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1