首页 > 最新文献

2019 UK/ China Emerging Technologies (UCET)最新文献

英文 中文
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network 基于多因素特征滤波和递归神经网络的Android勒索软件检测
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881884
I. Bibi, Adnan Akhunzada, Jahanzaib Malik, Ghufran Ahmed, M. Raza
with the increasing diversity of Android malware, the effectiveness of conventional defense mechanisms are at risk. This situation has endorsed a notable interest in the improvement of the exactitude and scalability of malware detection for smart devices. In this study, we have proposed an effective deep learning-based malware detection model for competent and improved ransomware detection in Android environment by looking at the algorithm of Long Short-Term Memory (LSTM). The feature selection has been done using 8 different feature selection algorithms. The 19 important features are selected through simple majority voting process by comparing results of all feature filtration techniques. The proposed algorithm is evaluated using android malware dataset (CI-CAndMal2017) and standard performance parameters. The proposed model outperforms with 97.08% detection accuracy. Based on outstanding performance, we endorse our proposed algorithm to be efficient in malware and forensic analysis.
随着Android恶意软件的日益多样化,传统防御机制的有效性面临风险。这种情况使得人们对提高智能设备恶意软件检测的准确性和可扩展性产生了极大的兴趣。在这项研究中,我们提出了一种有效的基于深度学习的恶意软件检测模型,通过观察长短期记忆(LSTM)算法,在Android环境下进行有效和改进的勒索软件检测。特征选择使用了8种不同的特征选择算法。通过比较各种特征过滤技术的结果,通过简单多数投票选出19个重要特征。使用android恶意软件数据集(CI-CAndMal2017)和标准性能参数对该算法进行了评估。该模型的检测准确率为97.08%。基于出色的性能,我们认可我们的算法在恶意软件和取证分析中是有效的。
{"title":"An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network","authors":"I. Bibi, Adnan Akhunzada, Jahanzaib Malik, Ghufran Ahmed, M. Raza","doi":"10.1109/UCET.2019.8881884","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881884","url":null,"abstract":"with the increasing diversity of Android malware, the effectiveness of conventional defense mechanisms are at risk. This situation has endorsed a notable interest in the improvement of the exactitude and scalability of malware detection for smart devices. In this study, we have proposed an effective deep learning-based malware detection model for competent and improved ransomware detection in Android environment by looking at the algorithm of Long Short-Term Memory (LSTM). The feature selection has been done using 8 different feature selection algorithms. The 19 important features are selected through simple majority voting process by comparing results of all feature filtration techniques. The proposed algorithm is evaluated using android malware dataset (CI-CAndMal2017) and standard performance parameters. The proposed model outperforms with 97.08% detection accuracy. Based on outstanding performance, we endorse our proposed algorithm to be efficient in malware and forensic analysis.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Active Constellation Extension for Peak Power Reduction Based on Positive and Negative Iterations in OFDM Systems 基于正负迭代的OFDM系统峰功率降低主动星座扩展
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881859
Yong Xiao, Lei Zhang, M. Imran
Traditional active constellation extension (ACE) techniques iterate under a further and further away from decision boundary constraint to find distortions for peak-to-average power ratio (PAPR) reduction, which may stop the solution on suboptimal points because it's not permitted to go back when running into a suboptimum direction. In this paper, we present a novel ACE technique by iterating in both positive and negative directions, referring to distortions found in the last iteration. During iterations, optimization variations are changed from normally used extra distortions on the last estimates to the primitive OFDM signal, which can eliminate correlations between magnitudes and phases of complex distortions and finally give an analytic solution based on orthogonal projection. By making iterations run in positive and negative directions, this algorithm can find distortions to reduce PAPR more, compared with existing methods. Simulation results show that significant improvement can be achieved either for pure ACE or TR assisted ACE method, especially under higher-order modulation schemes.
传统的主动星座扩展(ACE)技术在越来越远离决策边界约束的情况下进行迭代,以寻找峰均功率比(PAPR)降低的畸变,由于在运行到次优方向时不允许返回,可能会使解停止在次优点上。在本文中,我们提出了一种新的ACE技术,通过在正负方向上迭代,参考上次迭代中发现的扭曲。在迭代过程中,优化变量由通常在最后估计中使用的额外畸变变为原始OFDM信号,从而消除复杂畸变的幅度和相位之间的相关性,最后给出基于正交投影的解析解。与现有方法相比,该算法通过在正负方向上进行迭代,可以更好地发现畸变,从而降低PAPR。仿真结果表明,无论是纯ACE方法还是TR辅助ACE方法,在高阶调制方案下都能取得显著的改进。
{"title":"Active Constellation Extension for Peak Power Reduction Based on Positive and Negative Iterations in OFDM Systems","authors":"Yong Xiao, Lei Zhang, M. Imran","doi":"10.1109/UCET.2019.8881859","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881859","url":null,"abstract":"Traditional active constellation extension (ACE) techniques iterate under a further and further away from decision boundary constraint to find distortions for peak-to-average power ratio (PAPR) reduction, which may stop the solution on suboptimal points because it's not permitted to go back when running into a suboptimum direction. In this paper, we present a novel ACE technique by iterating in both positive and negative directions, referring to distortions found in the last iteration. During iterations, optimization variations are changed from normally used extra distortions on the last estimates to the primitive OFDM signal, which can eliminate correlations between magnitudes and phases of complex distortions and finally give an analytic solution based on orthogonal projection. By making iterations run in positive and negative directions, this algorithm can find distortions to reduce PAPR more, compared with existing methods. Simulation results show that significant improvement can be achieved either for pure ACE or TR assisted ACE method, especially under higher-order modulation schemes.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Blockchain-based Secure Internet of Vehicles Management Framework 基于区块链的安全车联网管理框架
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881874
Mohamed Abdur Rahman, Md Mamunur Rashid, S. Barnes, Syed Maruf Abdullah
In this paper, we propose a secure internet of vehicles (IoV) framework that can handle the transportation ecosystem of a very large and dynamic crowd. The framework will allow personalized and location-aware vehicle IoT data to store in blockchain and off-chain repositories for secure sharing with one's community of interest. As a test case of our proposed application, we have developed distributed smartphone applications that can be interfaced with the OBD-II interface to collect in-vehicle data from the CAN bus of a vehicle and an ambient intelligent environment consisting of IoT devices. The in-vehicle environment can collect vehicle sensory information, process the sensory data within the mobile edge network and store the transactions and the raw sensory data to blockchain and off-chain repositories through secure digital wallets. Finally, we will present our implemented framework and initial test results.
在本文中,我们提出了一个安全的车联网(IoV)框架,可以处理非常庞大和动态人群的交通生态系统。该框架将允许个性化和位置感知的车辆物联网数据存储在区块链和链下存储库中,以便与感兴趣的社区安全共享。作为我们提出的应用程序的测试用例,我们开发了分布式智能手机应用程序,可以与OBD-II接口接口,从车辆的can总线和由物联网设备组成的环境智能环境中收集车载数据。车载环境可以收集车辆感知信息,在移动边缘网络中处理感知数据,并通过安全的数字钱包将交易和原始感知数据存储到区块链和链下存储库中。最后,我们将展示我们实现的框架和初步测试结果。
{"title":"A Blockchain-based Secure Internet of Vehicles Management Framework","authors":"Mohamed Abdur Rahman, Md Mamunur Rashid, S. Barnes, Syed Maruf Abdullah","doi":"10.1109/UCET.2019.8881874","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881874","url":null,"abstract":"In this paper, we propose a secure internet of vehicles (IoV) framework that can handle the transportation ecosystem of a very large and dynamic crowd. The framework will allow personalized and location-aware vehicle IoT data to store in blockchain and off-chain repositories for secure sharing with one's community of interest. As a test case of our proposed application, we have developed distributed smartphone applications that can be interfaced with the OBD-II interface to collect in-vehicle data from the CAN bus of a vehicle and an ambient intelligent environment consisting of IoT devices. The in-vehicle environment can collect vehicle sensory information, process the sensory data within the mobile edge network and store the transactions and the raw sensory data to blockchain and off-chain repositories through secure digital wallets. Finally, we will present our implemented framework and initial test results.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123946796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adversarial ML Attack on Self Organizing Cellular Networks 自组织蜂窝网络的对抗性ML攻击
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881842
Salah-ud-din Farooq, M. Usama, Junaid Qadir, M. Imran
Deep Neural Networks (DNN) have been widely adopted in self-organizing networks (SON) for automating different networking tasks. Recently, it has been shown that DNN lack robustness against adversarial examples where an adversary can fool the DNN model into incorrect classification by introducing a small imperceptible perturbation to the original example. SON is expected to use DNN for multiple fundamental cellular tasks and many DNN-based solutions for performing SON tasks have been proposed in the literature have not been tested against adversarial examples. In this paper, we have tested and explained the robustness of SON against adversarial example and investigated the performance of an important SON use case in the face of adversarial attacks. We have also generated explanations of incorrect classifications by utilizing an explainable artificial intelligence (AI) technique.
深度神经网络(Deep Neural Networks, DNN)被广泛应用于自组织网络(self-organizing Networks, SON)中,以实现各种网络任务的自动化。最近,有研究表明,DNN对对抗性示例缺乏鲁棒性,在对抗性示例中,对手可以通过向原始示例引入微小的难以察觉的扰动来欺骗DNN模型进入错误的分类。预计SON将使用DNN完成多个基本细胞任务,并且文献中提出的许多基于DNN的解决方案用于执行SON任务,但尚未针对对抗性示例进行测试。在本文中,我们测试并解释了SON对对抗性示例的鲁棒性,并研究了一个重要的SON用例在面对对抗性攻击时的性能。我们还利用可解释的人工智能(AI)技术生成了对错误分类的解释。
{"title":"Adversarial ML Attack on Self Organizing Cellular Networks","authors":"Salah-ud-din Farooq, M. Usama, Junaid Qadir, M. Imran","doi":"10.1109/UCET.2019.8881842","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881842","url":null,"abstract":"Deep Neural Networks (DNN) have been widely adopted in self-organizing networks (SON) for automating different networking tasks. Recently, it has been shown that DNN lack robustness against adversarial examples where an adversary can fool the DNN model into incorrect classification by introducing a small imperceptible perturbation to the original example. SON is expected to use DNN for multiple fundamental cellular tasks and many DNN-based solutions for performing SON tasks have been proposed in the literature have not been tested against adversarial examples. In this paper, we have tested and explained the robustness of SON against adversarial example and investigated the performance of an important SON use case in the face of adversarial attacks. We have also generated explanations of incorrect classifications by utilizing an explainable artificial intelligence (AI) technique.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Texture Classification using a Hybrid Deep and Handcrafted Features 使用混合深度和手工特征的纹理分类
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881836
Fawad, Muhammad Adeel Asghar, A. Saeed, Muhammad Jamil Khan, Muhammad Zahid, M. Rehman
In this paper, we have proposed a hybrid descriptor for the texture classification task. The feature variables are extracted from the approximation coefficients of the image, through a combination of deep neural network and handcrafted feature. The AlexNet along with completed joint scale local binary pattern (CJLBP) is used for illumination, scaling, and orientation invariance description. The wavelet decomposition layer provides robustness against additive white Gaussian noise. The feature dimensionality is reduced by using Principal Component Analysis. We have evaluated our proposed descriptor on the images of Outex texture databases. The experimental results presented in the paper in term of classification accuracy show that our proposed descriptor outperforms state-of-the-art feature extraction scheme.
本文提出了一种用于纹理分类任务的混合描述符。采用深度神经网络和手工特征相结合的方法,从图像的近似系数中提取特征变量。AlexNet与完成联合尺度局部二进制模式(CJLBP)一起用于照明,缩放和方向不变性描述。小波分解层对加性高斯白噪声具有鲁棒性。采用主成分分析法对特征维数进行降维。我们已经在Outex纹理数据库的图像上对我们提出的描述符进行了评估。在分类精度方面的实验结果表明,本文提出的描述符优于目前最先进的特征提取方案。
{"title":"Texture Classification using a Hybrid Deep and Handcrafted Features","authors":"Fawad, Muhammad Adeel Asghar, A. Saeed, Muhammad Jamil Khan, Muhammad Zahid, M. Rehman","doi":"10.1109/UCET.2019.8881836","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881836","url":null,"abstract":"In this paper, we have proposed a hybrid descriptor for the texture classification task. The feature variables are extracted from the approximation coefficients of the image, through a combination of deep neural network and handcrafted feature. The AlexNet along with completed joint scale local binary pattern (CJLBP) is used for illumination, scaling, and orientation invariance description. The wavelet decomposition layer provides robustness against additive white Gaussian noise. The feature dimensionality is reduced by using Principal Component Analysis. We have evaluated our proposed descriptor on the images of Outex texture databases. The experimental results presented in the paper in term of classification accuracy show that our proposed descriptor outperforms state-of-the-art feature extraction scheme.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Discriminative Feature Learning for Person Re-Identification Using Additive Angular Margin Softmax Loss 基于加性角边缘软最大损失的人再识别新判别特征学习
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881838
Jie Su, Xiaohai He, L. Qing, Yanmei Yu, Shengyu Xu, Yonghong Peng
In this paper, a new end-to-end framework is proposed for person re-identification (re-ID) by combining metric learning and classification. In this new framework, the Additive Angular Margin Softmax is used which imposes an additive angular margin constraint to the target logit on hypersphere manifold. This is aimed to improve the similarity of the intra-class features and the dissimilarity of the inter-class features simultaneously. Compard with the three popular used softmax-based-loss methods, the experiments show that the proposed approach has achieved improved performance on Market1501 and DukeMTMC-reID datasets for person re-ID.
本文将度量学习与分类相结合,提出了一种新的端到端人物再识别框架。在该框架中,采用了可加性角余量软最大值,对超球流形上的目标对数施加可加性角余量约束。这是为了同时提高类内特征的相似性和类间特征的不相似性。实验结果表明,与常用的三种基于softmax的损失方法相比,该方法在Market1501和DukeMTMC-reID数据集上取得了较好的性能。
{"title":"A New Discriminative Feature Learning for Person Re-Identification Using Additive Angular Margin Softmax Loss","authors":"Jie Su, Xiaohai He, L. Qing, Yanmei Yu, Shengyu Xu, Yonghong Peng","doi":"10.1109/UCET.2019.8881838","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881838","url":null,"abstract":"In this paper, a new end-to-end framework is proposed for person re-identification (re-ID) by combining metric learning and classification. In this new framework, the Additive Angular Margin Softmax is used which imposes an additive angular margin constraint to the target logit on hypersphere manifold. This is aimed to improve the similarity of the intra-class features and the dissimilarity of the inter-class features simultaneously. Compard with the three popular used softmax-based-loss methods, the experiments show that the proposed approach has achieved improved performance on Market1501 and DukeMTMC-reID datasets for person re-ID.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128503008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study on Beamforming for Coverage of Emergency Areas from UAVs 无人机覆盖应急区域的波束形成研究
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881862
Stefano Bolis, Davide Scazzoli, L. Reggiani, M. Magarini, M. Alam
In this paper we present a study on the use of beamforming (BF) for devices discovery from flying platforms, typically Unmanned Aerial Vehicles (UAVs). This type of application is meant to be exploited in emergency scenarios characterized by the absence of a network infrastructure; the purpose is to search and identify the devices (and consequently the persons) spread in a limited area without the possibility of connecting to a mobile network. The use of an antenna array from the UAV is supposed to increase the sensitivity towards devices with weak signals and/or difficult propagation conditions. Our preliminary results indicate the effectiveness of a scanning method based on BF techniques for discovering and detecting terminals on the ground. The numerical results provide an insight on the capability level of BF solutions in these conditions w.r.t. to the size of the area to be covered.
在本文中,我们提出了使用波束成形(BF)从飞行平台,特别是无人机(uav)的设备发现的研究。这种类型的应用程序旨在在缺乏网络基础设施的紧急情况下使用;目的是搜索和识别在有限区域内传播的设备(以及人员),而不可能连接到移动网络。使用来自UAV的天线阵列应该增加对具有弱信号和/或困难传播条件的设备的灵敏度。我们的初步结果表明,基于BF技术的扫描方法在地面发现和检测终端是有效的。数值结果提供了在这些条件下高炉解决方案的能力水平,而不是要覆盖的面积的大小。
{"title":"A Study on Beamforming for Coverage of Emergency Areas from UAVs","authors":"Stefano Bolis, Davide Scazzoli, L. Reggiani, M. Magarini, M. Alam","doi":"10.1109/UCET.2019.8881862","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881862","url":null,"abstract":"In this paper we present a study on the use of beamforming (BF) for devices discovery from flying platforms, typically Unmanned Aerial Vehicles (UAVs). This type of application is meant to be exploited in emergency scenarios characterized by the absence of a network infrastructure; the purpose is to search and identify the devices (and consequently the persons) spread in a limited area without the possibility of connecting to a mobile network. The use of an antenna array from the UAV is supposed to increase the sensitivity towards devices with weak signals and/or difficult propagation conditions. Our preliminary results indicate the effectiveness of a scanning method based on BF techniques for discovering and detecting terminals on the ground. The numerical results provide an insight on the capability level of BF solutions in these conditions w.r.t. to the size of the area to be covered.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130032825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Deep Learning for the Routing Layer of Computer Network 计算机网络路由层深度学习研究综述
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881852
Fengling Jiang, K. Dashtipour, A. Hussain
With recent achievements in deep learning over the past year, many computer and network applications actively used deep learning architectures including convolution neural network and long short-term memory to improve the performance of their approach through them. The computer network used a complex and dynamic system. For example, routing is the main networking tasks in the fields of the communication network and it is widely used to optimize the optimal routing from the original host to the destination host. However, most of the traditional routing protocol is based on the experience of experts. In this paper, we present an overview of deep learning methods for the routing layer in the computer network. Furthermore, this paper discusses reinforcement learning methods about network routing. Finally, we outline a summary of the current state-of-the-art approaches along with some future research directions.
随着过去一年深度学习领域的最新成就,许多计算机和网络应用积极使用深度学习架构,包括卷积神经网络和长短期记忆,以通过它们来提高其方法的性能。计算机网络是一个复杂的动态系统。例如,路由是通信网络领域的主要组网任务,它被广泛用于优化从原始主机到目的主机的最优路由。然而,传统的路由协议大多是基于专家的经验。本文概述了计算机网络中路由层的深度学习方法。此外,本文还讨论了网络路由的强化学习方法。最后,我们概述了当前最先进的方法以及一些未来的研究方向。
{"title":"A Survey on Deep Learning for the Routing Layer of Computer Network","authors":"Fengling Jiang, K. Dashtipour, A. Hussain","doi":"10.1109/UCET.2019.8881852","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881852","url":null,"abstract":"With recent achievements in deep learning over the past year, many computer and network applications actively used deep learning architectures including convolution neural network and long short-term memory to improve the performance of their approach through them. The computer network used a complex and dynamic system. For example, routing is the main networking tasks in the fields of the communication network and it is widely used to optimize the optimal routing from the original host to the destination host. However, most of the traditional routing protocol is based on the experience of experts. In this paper, we present an overview of deep learning methods for the routing layer in the computer network. Furthermore, this paper discusses reinforcement learning methods about network routing. Finally, we outline a summary of the current state-of-the-art approaches along with some future research directions.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
UAV Aided Data Dissemination for Multi-hop Backhauling in RAN 无人机辅助下RAN多跳回程数据传播
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881868
Xiaoyan Shi, J. Thompson, M. Safari, Shenjie Huang, Rongke Liu
Emerging applications in the radio access network (RAN), such as proactive caching and the massive machine type communications, will generate traffic with a Large Volume of data but can tolerate long Transmission Delay (LVTD). Together with a rapid growth of overall traffic demand, traffic with LVTD features brings lots of challenges to the backhaul in RANs. In this paper, we study how to schedule traffic in multi-hop backhaul networks with the help of unmanned aerial vehicles (UAVs), In the proposed system, the UAVs are employed to establish broadband connections with the ground terminals through free-space optical links and serve as data collectors between terrestrial access points so as to alleviate the communication burden on the terrestrial network. Through numerical simulations, it is demonstrated that the novel network scheduling scheme combined with dynamic UAV path planning can provide significant performance gain.
无线接入网(RAN)中的新兴应用,如主动缓存和大规模机器类型通信,将产生具有大量数据的流量,但可以容忍长传输延迟(LVTD)。随着整体流量需求的快速增长,具有LVTD特性的流量给局域网回程带来了许多挑战。本文研究了如何利用无人机在多跳回程网络中进行流量调度,在该系统中,无人机通过自由空间光链路与地面终端建立宽带连接,并作为地面接入点之间的数据采集器,以减轻地面网络的通信负担。数值仿真结果表明,结合无人机动态路径规划的网络调度方案具有显著的性能增益。
{"title":"UAV Aided Data Dissemination for Multi-hop Backhauling in RAN","authors":"Xiaoyan Shi, J. Thompson, M. Safari, Shenjie Huang, Rongke Liu","doi":"10.1109/UCET.2019.8881868","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881868","url":null,"abstract":"Emerging applications in the radio access network (RAN), such as proactive caching and the massive machine type communications, will generate traffic with a Large Volume of data but can tolerate long Transmission Delay (LVTD). Together with a rapid growth of overall traffic demand, traffic with LVTD features brings lots of challenges to the backhaul in RANs. In this paper, we study how to schedule traffic in multi-hop backhaul networks with the help of unmanned aerial vehicles (UAVs), In the proposed system, the UAVs are employed to establish broadband connections with the ground terminals through free-space optical links and serve as data collectors between terrestrial access points so as to alleviate the communication burden on the terrestrial network. Through numerical simulations, it is demonstrated that the novel network scheduling scheme combined with dynamic UAV path planning can provide significant performance gain.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An free of iteration array-error estimation method for multi-channel SAR systems* 多通道SAR系统的无迭代阵列误差估计方法*
Pub Date : 2019-08-01 DOI: 10.1109/UCET.2019.8881869
Lun Ma
This paper considers the problem of estimating gain-phase and position errors for multi-channel synthetic aperture radar (SAR) systems. In multi-channel SAR systems, the clutter spectrum components within a Doppler bin can be used as calibration sources with known directions. Conventional eigen-structure methods, which iterates alternatively between the self-calibration method for gain-phase error estimation and the least squares method for estimating position errors, may converge to a local optimal solution. In this paper, it is observed that the steering vectors corresponding to a pair of Doppler bins within the same range bin have a rotational relationship. We obtain a new array-error estimation method based on this observation. The method, which obtain the position errors in terms of extracting the rotational matrix in a least square's framework, is proposed via combining the projection matrices corresponding to the paired Doppler bins. The validity of the proposed method is verified by the experimental results of measured four-channel SAR data.
研究了多通道合成孔径雷达系统的增益相位和位置误差估计问题。在多通道SAR系统中,多普勒波束内的杂波分量可以作为已知方向的定标源。传统的特征结构方法在增益相位误差估计的自校准方法和位置误差估计的最小二乘法之间交替迭代,可能收敛到局部最优解。本文观察到,同一距离内一对多普勒箱对应的转向矢量具有旋转关系。在此基础上,我们得到了一种新的阵列误差估计方法。该方法通过组合成对多普勒箱对应的投影矩阵,在最小二乘框架下提取旋转矩阵来获取位置误差。四通道SAR实测数据的实验结果验证了该方法的有效性。
{"title":"An free of iteration array-error estimation method for multi-channel SAR systems*","authors":"Lun Ma","doi":"10.1109/UCET.2019.8881869","DOIUrl":"https://doi.org/10.1109/UCET.2019.8881869","url":null,"abstract":"This paper considers the problem of estimating gain-phase and position errors for multi-channel synthetic aperture radar (SAR) systems. In multi-channel SAR systems, the clutter spectrum components within a Doppler bin can be used as calibration sources with known directions. Conventional eigen-structure methods, which iterates alternatively between the self-calibration method for gain-phase error estimation and the least squares method for estimating position errors, may converge to a local optimal solution. In this paper, it is observed that the steering vectors corresponding to a pair of Doppler bins within the same range bin have a rotational relationship. We obtain a new array-error estimation method based on this observation. The method, which obtain the position errors in terms of extracting the rotational matrix in a least square's framework, is proposed via combining the projection matrices corresponding to the paired Doppler bins. The validity of the proposed method is verified by the experimental results of measured four-channel SAR data.","PeriodicalId":169373,"journal":{"name":"2019 UK/ China Emerging Technologies (UCET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 UK/ China Emerging Technologies (UCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1