首页 > 最新文献

2016 2nd IEEE International Conference on Computer and Communications (ICCC)最新文献

英文 中文
Study on anti-jamming frequency selection in radar netting 雷达组网中抗干扰频率选择的研究
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925008
Lei Ming, Zhang Jingfeng
Radar anti-jamming, a struggle of radar for electromagnetic spectrum against the jamming equipment, nowadays has been a key factor influencing the overall situation of a modern war. As a radar anti-jamming technology, frequency selection suppresses jamming by taking advantage of the difference between the frequency domain feature of the radar signal and that of the jamming signal. However, most of the studies on the technology are more theoretical than practical. This paper studies the frequency selection technology for anti-jamming in radar netting, focusing on the possibility of avoiding jamming and the frequency bands to be avoided, and thus providing scientific and theoretical foundation for electronic warfare, decision support and radar control. The algorithm proposed features high operational speed and easy implementation, and simulation results have proved its effectiveness.
雷达抗干扰是雷达对电磁波谱与干扰设备的斗争,已成为影响现代战争全局的关键因素。频率选择是一种雷达抗干扰技术,它利用雷达信号与干扰信号频域特征的差异来抑制干扰。然而,大多数关于该技术的研究都是理论性的,而不是实践性的。本文对雷达组网中抗干扰的选频技术进行了研究,重点研究了避免干扰的可能性和避免干扰的频带,从而为电子战、决策支持和雷达控制提供科学理论依据。该算法具有运算速度快、易于实现的特点,仿真结果证明了该算法的有效性。
{"title":"Study on anti-jamming frequency selection in radar netting","authors":"Lei Ming, Zhang Jingfeng","doi":"10.1109/COMPCOMM.2016.7925008","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925008","url":null,"abstract":"Radar anti-jamming, a struggle of radar for electromagnetic spectrum against the jamming equipment, nowadays has been a key factor influencing the overall situation of a modern war. As a radar anti-jamming technology, frequency selection suppresses jamming by taking advantage of the difference between the frequency domain feature of the radar signal and that of the jamming signal. However, most of the studies on the technology are more theoretical than practical. This paper studies the frequency selection technology for anti-jamming in radar netting, focusing on the possibility of avoiding jamming and the frequency bands to be avoided, and thus providing scientific and theoretical foundation for electronic warfare, decision support and radar control. The algorithm proposed features high operational speed and easy implementation, and simulation results have proved its effectiveness.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A high precision carrier tracking scheme based on phase estimation and compensation 一种基于相位估计和补偿的高精度载波跟踪方案
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924711
Ying Li, Ruisong Zhang, Wei Jiang
When phase locked loop (PLL) works in high dynamic environments, the dynamic stress error may be not ignorable, which limits the accuracy of carrier tracking. In this paper, we propose a new carrier tracking scheme to reduce the dynamic stress error of the PLL by concatenating the traditional PLL with a phase estimation and compensation (PEC) module. The PEC module can estimate and compensate the steady state phase error of the PLL's output. We theoretically analyze the phase error performance of this new scheme, namely PLL-PEC. Simulation results show that PLL-PEC reduces the dynamic stress error and increases the carrier tracking accuracy remarkably. Besides, PLL-PEC is very simple and easy to implement.
锁相环在高动态环境下工作时,动态应力误差不可忽略,限制了载波跟踪的精度。本文提出了一种新的载波跟踪方案,通过将传统的锁相环与相位估计和补偿(PEC)模块相连接来减小锁相环的动态应力误差。PEC模块可以估计和补偿锁相环输出的稳态相位误差。从理论上分析了这种新方案的相位误差性能。仿真结果表明,锁相环耦合显著降低了动态应力误差,提高了载波跟踪精度。此外,PLL-PEC非常简单,易于实现。
{"title":"A high precision carrier tracking scheme based on phase estimation and compensation","authors":"Ying Li, Ruisong Zhang, Wei Jiang","doi":"10.1109/COMPCOMM.2016.7924711","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924711","url":null,"abstract":"When phase locked loop (PLL) works in high dynamic environments, the dynamic stress error may be not ignorable, which limits the accuracy of carrier tracking. In this paper, we propose a new carrier tracking scheme to reduce the dynamic stress error of the PLL by concatenating the traditional PLL with a phase estimation and compensation (PEC) module. The PEC module can estimate and compensate the steady state phase error of the PLL's output. We theoretically analyze the phase error performance of this new scheme, namely PLL-PEC. Simulation results show that PLL-PEC reduces the dynamic stress error and increases the carrier tracking accuracy remarkably. Besides, PLL-PEC is very simple and easy to implement.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk assessment approach based on fuzzy 3D risk matrix for network device 基于模糊三维风险矩阵的网络设备风险评估方法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924876
Danlin Zhang, Jihong Han, Jialiang Song, Lin Yuan
The reliability and security of network device is fundamental to network security. Thus risk management of network device is significant. As the crucial process of risk management, risk assessment has attracted major attention of researchers. This paper proposed a novel approach based on fuzzy 3D risk matrix for risk assessment of network device. Typical 2D risk matrix is widely adopted to assess and rank risk with likelihood and consequence, which is not reasonable with only two attributes of risk in practice. An attribute named risk controlling difficulty is added to establish a fuzzy 3D risk matrix, with triangular intuitionistic fuzzy number (TIFN) being used to evaluate it. What's more, fuzzy rules (FR) is used to rank the risk synthesizing the three attributes. The experiment demonstrates the implementation process of the proposed method which is proved to be effective and practical.
网络设备的可靠性和安全性是网络安全的基础。因此,对网络设备进行风险管理具有重要意义。风险评估作为风险管理的关键环节,一直受到研究者的关注。提出了一种基于模糊三维风险矩阵的网络设备风险评估新方法。目前普遍采用典型的二维风险矩阵对风险进行可能性和后果的评估和排序,在实践中仅考虑风险的两个属性是不合理的。加入风险控制难度属性,建立模糊三维风险矩阵,采用三角直觉模糊数(TIFN)对其进行评价。在此基础上,运用模糊规则(FR)对风险进行综合排序。实验验证了该方法的实现过程,证明了该方法的有效性和实用性。
{"title":"A risk assessment approach based on fuzzy 3D risk matrix for network device","authors":"Danlin Zhang, Jihong Han, Jialiang Song, Lin Yuan","doi":"10.1109/COMPCOMM.2016.7924876","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924876","url":null,"abstract":"The reliability and security of network device is fundamental to network security. Thus risk management of network device is significant. As the crucial process of risk management, risk assessment has attracted major attention of researchers. This paper proposed a novel approach based on fuzzy 3D risk matrix for risk assessment of network device. Typical 2D risk matrix is widely adopted to assess and rank risk with likelihood and consequence, which is not reasonable with only two attributes of risk in practice. An attribute named risk controlling difficulty is added to establish a fuzzy 3D risk matrix, with triangular intuitionistic fuzzy number (TIFN) being used to evaluate it. What's more, fuzzy rules (FR) is used to rank the risk synthesizing the three attributes. The experiment demonstrates the implementation process of the proposed method which is proved to be effective and practical.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of VxWorks interrupt affinity based on MPIC 基于MPIC的VxWorks中断关联的应用
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925074
Liu Shirui, G. Haifeng, Qi Yalei
With more and more interrupts of integrated core processor(ICP) in avionics, VxWorks interrupt affinity which is applied to ICP has drawn substantial attention. On the multi-core programmable interrupt controller(MPIC) which is hardware platform of ICP, VxWorks interrupt affinity not only helps dispatch interrupt to specific processor core in multi-core processors but also balance the interrupt loading of multi-core processors1. In this paper VxWorks affinity is applied to MPIC to achieve the purpose of shortening the interrupt response time. Firstly, the model of MPIC and its working principle have been studied in detail. And then, further research on the implement of VxWorks interrupt affinity based on the MPIC is made. Finally, a new interrupt dynamic routing method using VxWorks interrupt affinity is proposed to enhance the performance of MPIC. The experimental results demonstrate that the method is effective in dispatching the coming intrerrupts across multi-core and response to interrupt more quickly.
随着航空电子系统中集成核心处理器(ICP)的中断越来越多,VxWorks中断亲和技术在集成核心处理器(ICP)中的应用受到了广泛关注。在ICP的硬件平台——多核可编程中断控制器(MPIC)上,VxWorks的中断亲和性不仅可以帮助多核处理器将中断分配到特定的处理器核上,还可以平衡多核处理器的中断负载1。本文将VxWorks亲和技术应用于MPIC,以达到缩短中断响应时间的目的。首先,详细研究了MPIC的模型及其工作原理。然后,对基于MPIC的VxWorks中断关联的实现进行了进一步的研究。最后,为了提高MPIC的性能,提出了一种利用VxWorks中断关联的中断动态路由方法。实验结果表明,该方法能有效地跨多核调度即将到来的中断,并能更快地响应中断。
{"title":"Application of VxWorks interrupt affinity based on MPIC","authors":"Liu Shirui, G. Haifeng, Qi Yalei","doi":"10.1109/COMPCOMM.2016.7925074","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925074","url":null,"abstract":"With more and more interrupts of integrated core processor(ICP) in avionics, VxWorks interrupt affinity which is applied to ICP has drawn substantial attention. On the multi-core programmable interrupt controller(MPIC) which is hardware platform of ICP, VxWorks interrupt affinity not only helps dispatch interrupt to specific processor core in multi-core processors but also balance the interrupt loading of multi-core processors1. In this paper VxWorks affinity is applied to MPIC to achieve the purpose of shortening the interrupt response time. Firstly, the model of MPIC and its working principle have been studied in detail. And then, further research on the implement of VxWorks interrupt affinity based on the MPIC is made. Finally, a new interrupt dynamic routing method using VxWorks interrupt affinity is proposed to enhance the performance of MPIC. The experimental results demonstrate that the method is effective in dispatching the coming intrerrupts across multi-core and response to interrupt more quickly.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of visualization system based on network mass data 基于网络海量数据的可视化系统设计与实现
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924683
Zihan Zhuo, Jianwu Dong, Yueying He, Lixuan Guo, Bin Peng
With the extensive applications of Internet, the Internet data have grown at full speed. To directly reveal the relationship among mass data and the latent characteristics in information with visualization techniques has become an important research topic. Concerning small resource storage capacity and low data exchange efficiency of the traditionally visualization C/S system, this paper adopts the computer distributed framework and the efficient network transmission technique to finish overall framework design of the network data visualization system, and realizes it based on the Web full-stack technique. Experimental results suggest that the system can provide comprehensive visualization services for mass data and contribute to extraction of hidden information efficiently and directly from data, thus facilitating decision formulation.
随着互联网的广泛应用,互联网数据也在飞速增长。利用可视化技术直接揭示海量数据与信息潜在特征之间的关系已成为一个重要的研究课题。针对传统可视化C/S系统资源存储容量小、数据交换效率低的问题,本文采用计算机分布式框架和高效的网络传输技术,完成了网络数据可视化系统的总体框架设计,并基于Web全栈技术实现。实验结果表明,该系统可以为海量数据提供全面的可视化服务,并有助于高效、直接地从数据中提取隐藏信息,从而便于决策制定。
{"title":"Design and implementation of visualization system based on network mass data","authors":"Zihan Zhuo, Jianwu Dong, Yueying He, Lixuan Guo, Bin Peng","doi":"10.1109/COMPCOMM.2016.7924683","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924683","url":null,"abstract":"With the extensive applications of Internet, the Internet data have grown at full speed. To directly reveal the relationship among mass data and the latent characteristics in information with visualization techniques has become an important research topic. Concerning small resource storage capacity and low data exchange efficiency of the traditionally visualization C/S system, this paper adopts the computer distributed framework and the efficient network transmission technique to finish overall framework design of the network data visualization system, and realizes it based on the Web full-stack technique. Experimental results suggest that the system can provide comprehensive visualization services for mass data and contribute to extraction of hidden information efficiently and directly from data, thus facilitating decision formulation.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reputation-based method against combinations of internal attacks in WSNs 基于声誉的wsn内部攻击组合防御方法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925100
Sun Boyuan, Li Donghui
The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.
近年来,无线传感器网络的安全问题已经在国际上引起了广泛的关注。在所有的安全威胁中,针对wsn的一系列有害攻击被称为内部攻击,攻击者捕获传感器节点并将其转化为恶意节点。此外,检测所有这些攻击仍然不容易,特别是当内部攻击试图相互结合时。本文提出了一种基于信誉的防御内部攻击组合的方法,如开关攻击、伪装攻击和持续攻击。最后通过仿真验证了该方法的实用性,并证明了该方法提高了网络的可靠性和安全性。
{"title":"A reputation-based method against combinations of internal attacks in WSNs","authors":"Sun Boyuan, Li Donghui","doi":"10.1109/COMPCOMM.2016.7925100","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925100","url":null,"abstract":"The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121359931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data synchronization algorithm for IoT gateway and platform 物联网网关与平台数据同步算法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924676
Zhijie Lin, Lei Zhang
Data synchronization is widely used in many fields such as database, cloud computing and distributed system. However, for Internet of Things (IoT) system, the existing synchronization algorithms are not very efficient because the data in IoT system have different characteristic like real-time and mutability. To resolve the problem, this paper proposes a new data synchronization algorithm for IoT system using timestamp and bitmap, which can improve the efficiency of network transmission in data synchronization and apply to IoT system better.
数据同步在数据库、云计算、分布式系统等领域有着广泛的应用。然而,对于物联网系统,由于物联网系统中数据具有实时性和可变性等特点,现有的同步算法效率不高。针对这一问题,本文提出了一种基于时间戳和位图的物联网系统数据同步新算法,该算法可以提高数据同步中的网络传输效率,更好地应用于物联网系统。
{"title":"Data synchronization algorithm for IoT gateway and platform","authors":"Zhijie Lin, Lei Zhang","doi":"10.1109/COMPCOMM.2016.7924676","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924676","url":null,"abstract":"Data synchronization is widely used in many fields such as database, cloud computing and distributed system. However, for Internet of Things (IoT) system, the existing synchronization algorithms are not very efficient because the data in IoT system have different characteristic like real-time and mutability. To resolve the problem, this paper proposes a new data synchronization algorithm for IoT system using timestamp and bitmap, which can improve the efficiency of network transmission in data synchronization and apply to IoT system better.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research of DBA schemes and QoS in PON system PON系统中DBA方案与QoS的研究
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925080
Li Li, Xin Shouting, Duan De-gong
With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.
随着智慧城市、光接入取代铜接入和三网融合的深入推进,PON以其带宽高、成本低、兼容性好等优点被广泛认为是下一代高速接入网的最佳选择。但其点到多点的拓扑结构生来就存在带宽分配调度问题,其下行广播传输方式存在严重的安全隐患,限制了该技术的广泛应用。在对现有带宽分配算法进行详细分析和比较后,指出了轻负载恶化、带宽利用率低、公平性差、不能保证QoS等问题,提出了原有的双时钟DBA算法。同时,提出了注册过程中的OLT/ONU双向认证,并引入了Diffie-Hellman密钥交换协议。将可以进行密钥交换的信息嵌入到鉴权信息中,后续数据加密不再需要传递另一个初始密钥,严格保证了鉴权步骤中的系统安全性。实验结果表明,该方案在降低系统平均延迟、队列延迟和吞吐量以及提高系统安全性方面具有很大的优势。
{"title":"Research of DBA schemes and QoS in PON system","authors":"Li Li, Xin Shouting, Duan De-gong","doi":"10.1109/COMPCOMM.2016.7925080","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925080","url":null,"abstract":"With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127512724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method for improving the effective quantizer bits of the A/D converter based on the fractional Fourier Transform 一种基于分数阶傅里叶变换提高A/D转换器有效量化位的方法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925178
Zi-xuan Yu, Ming-feng Lu, Feng Zhang, Xiao-Wei Jin
To improve the Analog to Digital Converter's (ADC's) effective quantizer bits of wideband signals as linear frequency modulation (LFM) signal, a method based on the fractional Fourier transform (FRFT) is proposed. The expression of the signal-to-quantization-noise ratio (SQNR) in the FRFT domain is obtained. In comparison to the traditional methods in the Fourier domain, about 1.5 bits of improvement in effective quantizer bits are obtained. Simulation results validate the correctness of the theory and show the effectiveness of the proposed method in the fractional Fourier domain.
为了提高模数转换器(ADC)作为线性调频(LFM)信号的有效量化位,提出了一种基于分数阶傅立叶变换(FRFT)的方法。得到了信噪比(SQNR)在频域内的表达式。与传统的傅立叶域方法相比,有效量化位提高了1.5位。仿真结果验证了理论的正确性,并表明了该方法在分数阶傅里叶域中的有效性。
{"title":"A method for improving the effective quantizer bits of the A/D converter based on the fractional Fourier Transform","authors":"Zi-xuan Yu, Ming-feng Lu, Feng Zhang, Xiao-Wei Jin","doi":"10.1109/COMPCOMM.2016.7925178","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925178","url":null,"abstract":"To improve the Analog to Digital Converter's (ADC's) effective quantizer bits of wideband signals as linear frequency modulation (LFM) signal, a method based on the fractional Fourier transform (FRFT) is proposed. The expression of the signal-to-quantization-noise ratio (SQNR) in the FRFT domain is obtained. In comparison to the traditional methods in the Fourier domain, about 1.5 bits of improvement in effective quantizer bits are obtained. Simulation results validate the correctness of the theory and show the effectiveness of the proposed method in the fractional Fourier domain.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of mass emergency events based on molecular thermal motion algorithm 基于分子热运动算法的大规模突发事件预测
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924707
Man Liu, Yuan Jiang, Yueping Peng
Because of the occurrence of mass incidents in public places in China, the society has put forward higher requirements for the monitoring of the group anomaly. In this paper, from the point of view of molecular thermal motion, the crowd pixel is modeled as a moving molecule to predict the mass emergencies. In order to improve the efficiency of the pre judge, classify the population density on the basis of the linear relationship between the number of people and the number of molecules, and in view of the high population density and the very high population density, through molecular thermal motion algorithm to extract the rate of population distribution law and thus build speed distribution function, using SVM to determine groups of abnormal behavior, completing the anticipation of group incidents finally.
由于中国公共场所群体性事件的不断发生,社会对群体异常的监测提出了更高的要求。本文从分子热运动的角度出发,将人群像元建模为运动的分子来预测群体突发事件。为了提高预判的效率,根据人数与分子数量的线性关系对人口密度进行分类,针对人口密度高和人口密度甚高的情况,通过分子热运动算法提取人口分布规律的速率,从而构建速度分布函数,利用支持向量机确定异常行为群体;最终完成对群体事件的预测。
{"title":"Prediction of mass emergency events based on molecular thermal motion algorithm","authors":"Man Liu, Yuan Jiang, Yueping Peng","doi":"10.1109/COMPCOMM.2016.7924707","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924707","url":null,"abstract":"Because of the occurrence of mass incidents in public places in China, the society has put forward higher requirements for the monitoring of the group anomaly. In this paper, from the point of view of molecular thermal motion, the crowd pixel is modeled as a moving molecule to predict the mass emergencies. In order to improve the efficiency of the pre judge, classify the population density on the basis of the linear relationship between the number of people and the number of molecules, and in view of the high population density and the very high population density, through molecular thermal motion algorithm to extract the rate of population distribution law and thus build speed distribution function, using SVM to determine groups of abnormal behavior, completing the anticipation of group incidents finally.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 2nd IEEE International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1