Pub Date : 2017-10-01DOI: 10.1109/icct.2017.8359983
Gang Lu, Jing Du, Ronghua Guo, Ying Zhou, Haipeng Fu
While application feature extraction is popular in recent researches of traffic classification, only a few studies have extracted application features by synthetically analyzing packet payloads, port allocation and flow-level statistics. In this paper, we apply the techniques of both dynamic binary tracking and statistical learning in application feature extraction. Specifically, we first accurately capture the payload contents by reversely debugging an application in an automatic way, and then recursively cluster those contents to generate protocol signatures. Afterwards, we perform port statistical analysis to generate a port association rule. To identify the encrypted applications, we present a feature selection algorithm for selecting the optimal features from the time series statistics of the first ten packet sizes of each TCP flow. Compared with three typical feature selection algorithms, we validate that our proposed feature selection algorithm is more effectiveness. Additionally, we propose a scheme to synthetically apply protocol signatures, port association and flow statistics in traffic classification. By evaluating our method on the identification of Thunder flows, we show that the combination of protocol signatures, port association and flow statistics is promising in traffic classification.
{"title":"Application feature extraction by using both dynamic binary tracking and statistical learning","authors":"Gang Lu, Jing Du, Ronghua Guo, Ying Zhou, Haipeng Fu","doi":"10.1109/icct.2017.8359983","DOIUrl":"https://doi.org/10.1109/icct.2017.8359983","url":null,"abstract":"While application feature extraction is popular in recent researches of traffic classification, only a few studies have extracted application features by synthetically analyzing packet payloads, port allocation and flow-level statistics. In this paper, we apply the techniques of both dynamic binary tracking and statistical learning in application feature extraction. Specifically, we first accurately capture the payload contents by reversely debugging an application in an automatic way, and then recursively cluster those contents to generate protocol signatures. Afterwards, we perform port statistical analysis to generate a port association rule. To identify the encrypted applications, we present a feature selection algorithm for selecting the optimal features from the time series statistics of the first ten packet sizes of each TCP flow. Compared with three typical feature selection algorithms, we validate that our proposed feature selection algorithm is more effectiveness. Additionally, we propose a scheme to synthetically apply protocol signatures, port association and flow statistics in traffic classification. By evaluating our method on the identification of Thunder flows, we show that the combination of protocol signatures, port association and flow statistics is promising in traffic classification.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"89 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359685
Yun Gao, D. Ma, Jie Sheng, Canyan Zhu, M. Ma
This paper proposes a joint subchannel and power allocation scheme for the downlink of orthogonal frequency division multiple access (OFDMA)-based heterogeneous networks (HetNets), where the coordinated multipoint (CoMP) joint transmission is supported. We formulate the scheme as a network throughput maximization problem subject to transmit power budgets. An iterative algorithm is first developed to find the optimal solution, which decomposes the subchannel assignment and power allocation in each iteration to reduce computational complexity. Then a greedy-based and an iterative waterfilling-based algorithm are designed, respectively, to solve the subchannel assignment and power allocation subproblems. Simulation results demonstrate that the proposed scheme outperforms other existing works and the iterative algorithms converge within a few iterations.
{"title":"Resource allocation scheme for HetNets with CoMP joint transmission","authors":"Yun Gao, D. Ma, Jie Sheng, Canyan Zhu, M. Ma","doi":"10.1109/ICCT.2017.8359685","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359685","url":null,"abstract":"This paper proposes a joint subchannel and power allocation scheme for the downlink of orthogonal frequency division multiple access (OFDMA)-based heterogeneous networks (HetNets), where the coordinated multipoint (CoMP) joint transmission is supported. We formulate the scheme as a network throughput maximization problem subject to transmit power budgets. An iterative algorithm is first developed to find the optimal solution, which decomposes the subchannel assignment and power allocation in each iteration to reduce computational complexity. Then a greedy-based and an iterative waterfilling-based algorithm are designed, respectively, to solve the subchannel assignment and power allocation subproblems. Simulation results demonstrate that the proposed scheme outperforms other existing works and the iterative algorithms converge within a few iterations.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124075984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359922
Jun Zhu, Jingjing Zhang, Qiang Chen
Due to the large error of LMS algorithm and the slow convergence rate, the recursive least squares (RLS) algorithm is proposed. Although the recursive estimation error is greatly reduced, the convergence rate is one order of magnitude higher than that of the general LMS filter. When the order N increases, the amount of calculation for a single iteration of the RLS algorithm is increased significantly. Aiming at these problems, this paper proposes an improved FTRLS filtering algorithm, which is to find out the amount of large error and accumulate the error, and then make the error feedback to make the algorithm more stable. The analysis of MATLAB simulation results show that the improved algorithm can improve the convergence speed and stability of the algorithm, and effectively reduce the convergence of the noise.
{"title":"An improved FTRLS filtering algorithm and its simulation analysis","authors":"Jun Zhu, Jingjing Zhang, Qiang Chen","doi":"10.1109/ICCT.2017.8359922","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359922","url":null,"abstract":"Due to the large error of LMS algorithm and the slow convergence rate, the recursive least squares (RLS) algorithm is proposed. Although the recursive estimation error is greatly reduced, the convergence rate is one order of magnitude higher than that of the general LMS filter. When the order N increases, the amount of calculation for a single iteration of the RLS algorithm is increased significantly. Aiming at these problems, this paper proposes an improved FTRLS filtering algorithm, which is to find out the amount of large error and accumulate the error, and then make the error feedback to make the algorithm more stable. The analysis of MATLAB simulation results show that the improved algorithm can improve the convergence speed and stability of the algorithm, and effectively reduce the convergence of the noise.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359754
Zipeng Zhang, Yubai Li
In this paper, the detection performance of the energy detection algorithm in frequency domain based on overlap-Fast Fourier Transform (overlap-FFT) architecture are analyzed through theoretical derivation and simulation. Firstly, the Monte Carlo method is used to verify the effectiveness of the theoretical analysis of the detection performance under the overlap-FFT scheme when the overlap ratio γ ∊ [0,0.5]. Then, a method of estimating the probability of detection when the overlap ratio γ > 0.5 is proposed according to the simulation of detection performance in the case of different overlap ratios. Finally, the simulation based on OFDM signals verifies that overlap-FFT technology can effectively improve the frequency domain energy detection performance, and its detection probability is higher than the FSM(frequency smoothed method) algorithm based on cyclic stationary feature detection.
{"title":"An efficient spectrum sensing algorithm based on overlap-FFT architecture","authors":"Zipeng Zhang, Yubai Li","doi":"10.1109/ICCT.2017.8359754","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359754","url":null,"abstract":"In this paper, the detection performance of the energy detection algorithm in frequency domain based on overlap-Fast Fourier Transform (overlap-FFT) architecture are analyzed through theoretical derivation and simulation. Firstly, the Monte Carlo method is used to verify the effectiveness of the theoretical analysis of the detection performance under the overlap-FFT scheme when the overlap ratio γ ∊ [0,0.5]. Then, a method of estimating the probability of detection when the overlap ratio γ > 0.5 is proposed according to the simulation of detection performance in the case of different overlap ratios. Finally, the simulation based on OFDM signals verifies that overlap-FFT technology can effectively improve the frequency domain energy detection performance, and its detection probability is higher than the FSM(frequency smoothed method) algorithm based on cyclic stationary feature detection.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359623
Yannan Shi, Jiangong Liu, Zhonghua Liu, Shenyue Li
To study the high speed data communication and fault diagnosis of the leaky coaxial cable (leaky cable) network in underground coal mine, a method based on multipath propagation for establishing the leaky cable network channel model is proposed. The multipath propagation of the leaky cable network and the transfer characteristic of the leaky cable are analyzed. The transfer function between the network terminals is solved based on the multipath propagation, and the channel model of the leaky cable network is established. The results have been verified successfully by comparing the measurement results with simulations based on the model, which is obvious that simulation and measurement differ only in minor details.
{"title":"Study on modeling method of leaky coaxial cable network channel in underground coal mine","authors":"Yannan Shi, Jiangong Liu, Zhonghua Liu, Shenyue Li","doi":"10.1109/ICCT.2017.8359623","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359623","url":null,"abstract":"To study the high speed data communication and fault diagnosis of the leaky coaxial cable (leaky cable) network in underground coal mine, a method based on multipath propagation for establishing the leaky cable network channel model is proposed. The multipath propagation of the leaky cable network and the transfer characteristic of the leaky cable are analyzed. The transfer function between the network terminals is solved based on the multipath propagation, and the channel model of the leaky cable network is established. The results have been verified successfully by comparing the measurement results with simulations based on the model, which is obvious that simulation and measurement differ only in minor details.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359669
Wu Pei, Guan Yalin, Luo Wen
A simulation system of single-pass microwave photon filter to generate the ultra-wideband (UWB) signal and transmit the base band signal by unexploited band is proposed. The simultaneous transmission of base band wired signal and UWB wireless signal in wavelength-division multiplexing passive optical network (WDM-PON) is realized. Which would reduce cost greatly while improving significantly the spectrum efficiency of a WDM-PON system. Eye diagrams and electrical spectra measurements show that the interference between the two signals is very small.
{"title":"Simultaneous generation and transmission of ultra-wideband wireless signals and baseband wired signals","authors":"Wu Pei, Guan Yalin, Luo Wen","doi":"10.1109/ICCT.2017.8359669","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359669","url":null,"abstract":"A simulation system of single-pass microwave photon filter to generate the ultra-wideband (UWB) signal and transmit the base band signal by unexploited band is proposed. The simultaneous transmission of base band wired signal and UWB wireless signal in wavelength-division multiplexing passive optical network (WDM-PON) is realized. Which would reduce cost greatly while improving significantly the spectrum efficiency of a WDM-PON system. Eye diagrams and electrical spectra measurements show that the interference between the two signals is very small.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132528869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359817
Kun Zhang, Chong Shen, Qian Gao, Hai-feng Wang
Based on the UWB indoor scale precision firefighter wireless positioning system, the similarity metric distance algorithm based on intuitionistic fuzzy Vague sets is constructed, and a new distance formula is constructed. Combined with the time difference of arrival (TDOA) algorithm, it is helpful to improve the accuracy of the tag location algorithm Degree, to achieve an effective technological breakthrough.
{"title":"Research on similarity metric distance algorithm for indoor and outdoor firefighting personnel precision wireless location system based on vague set on UWB","authors":"Kun Zhang, Chong Shen, Qian Gao, Hai-feng Wang","doi":"10.1109/ICCT.2017.8359817","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359817","url":null,"abstract":"Based on the UWB indoor scale precision firefighter wireless positioning system, the similarity metric distance algorithm based on intuitionistic fuzzy Vague sets is constructed, and a new distance formula is constructed. Combined with the time difference of arrival (TDOA) algorithm, it is helpful to improve the accuracy of the tag location algorithm Degree, to achieve an effective technological breakthrough.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359823
Jinxi Guo, Yang Liu, Xiucao Han, D. Li
In this paper, based on the equivalent circuit diagram of the leaky cable, the impedance and admittance of the leaky cable are calculated, and the mathematical model of the leaky cable is established. In the influence of external mode coupling, weak coupling coefficient is defined, and the transmission attenuation model of the leaky cable is obtained. The relation between attenuation and frequency is obtained by simulation, show that the attenuation increases with frequency. Through the experiment of the leaky cable, the consistency between the measured value of attenuation of cable and the attenuation model is obtained.
{"title":"Research on attenuation model of the communication leaky coaxial cable","authors":"Jinxi Guo, Yang Liu, Xiucao Han, D. Li","doi":"10.1109/ICCT.2017.8359823","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359823","url":null,"abstract":"In this paper, based on the equivalent circuit diagram of the leaky cable, the impedance and admittance of the leaky cable are calculated, and the mathematical model of the leaky cable is established. In the influence of external mode coupling, weak coupling coefficient is defined, and the transmission attenuation model of the leaky cable is obtained. The relation between attenuation and frequency is obtained by simulation, show that the attenuation increases with frequency. Through the experiment of the leaky cable, the consistency between the measured value of attenuation of cable and the attenuation model is obtained.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134149018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359649
Yang Wang, Shilei Zhou
Frequency offset estimation for binary continuous phase modulation (CPM) signals is investigated in this paper and a feedforward non-data-aided (NDA) and non-timing-aided frequency offset estimation algorithm is proposed. In the algorithm a new autocorrelation function is used for frequency estimation. The delay value in the function is carefully selected depending on the parameters of the CPM signal. And then the frequency offset is estimated based on the integration of the autocorrelation function which is independent of the timing delay. Simulation results show that the proposed algorithm performs well for CPM signals with higher modulation index and has better performance than the existing feedforward NDA and non-timing-aided frequency estimation algorithm. Additionally, the performance gain is more significant when the signal-to-noise ratio gets higher.
{"title":"Non-data-aided frequency offset estimation for binary CPM signals","authors":"Yang Wang, Shilei Zhou","doi":"10.1109/ICCT.2017.8359649","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359649","url":null,"abstract":"Frequency offset estimation for binary continuous phase modulation (CPM) signals is investigated in this paper and a feedforward non-data-aided (NDA) and non-timing-aided frequency offset estimation algorithm is proposed. In the algorithm a new autocorrelation function is used for frequency estimation. The delay value in the function is carefully selected depending on the parameters of the CPM signal. And then the frequency offset is estimated based on the integration of the autocorrelation function which is independent of the timing delay. Simulation results show that the proposed algorithm performs well for CPM signals with higher modulation index and has better performance than the existing feedforward NDA and non-timing-aided frequency estimation algorithm. Additionally, the performance gain is more significant when the signal-to-noise ratio gets higher.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCT.2017.8359792
Mian Qin, Shou-yi Yang, Hao Deng
In this paper, we investigate optimal and jammers selection for enhancing security in amplify-and-forwarding (AF) relay networks. A relay is selected to deliver messages to destination working in conventional mode; two nodes are selected to operate as jammers for interfering with eavesdropper. The proposed schemes make use of the channel coefficients as weights of beamforming for jammers, designed to maximize the secrecy rate while not interfere with the destination. It is proven that zero-approaching outage probability is possible when total transmission power is very large. The improvement of the proposed selection schemes are verified by analytical and simulation results.
{"title":"Optimal relay and jammers selection for enhancing security in AF relay networks","authors":"Mian Qin, Shou-yi Yang, Hao Deng","doi":"10.1109/ICCT.2017.8359792","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359792","url":null,"abstract":"In this paper, we investigate optimal and jammers selection for enhancing security in amplify-and-forwarding (AF) relay networks. A relay is selected to deliver messages to destination working in conventional mode; two nodes are selected to operate as jammers for interfering with eavesdropper. The proposed schemes make use of the channel coefficients as weights of beamforming for jammers, designed to maximize the secrecy rate while not interfere with the destination. It is proven that zero-approaching outage probability is possible when total transmission power is very large. The improvement of the proposed selection schemes are verified by analytical and simulation results.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131743559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}