Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925008
Lei Ming, Zhang Jingfeng
Radar anti-jamming, a struggle of radar for electromagnetic spectrum against the jamming equipment, nowadays has been a key factor influencing the overall situation of a modern war. As a radar anti-jamming technology, frequency selection suppresses jamming by taking advantage of the difference between the frequency domain feature of the radar signal and that of the jamming signal. However, most of the studies on the technology are more theoretical than practical. This paper studies the frequency selection technology for anti-jamming in radar netting, focusing on the possibility of avoiding jamming and the frequency bands to be avoided, and thus providing scientific and theoretical foundation for electronic warfare, decision support and radar control. The algorithm proposed features high operational speed and easy implementation, and simulation results have proved its effectiveness.
{"title":"Study on anti-jamming frequency selection in radar netting","authors":"Lei Ming, Zhang Jingfeng","doi":"10.1109/COMPCOMM.2016.7925008","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925008","url":null,"abstract":"Radar anti-jamming, a struggle of radar for electromagnetic spectrum against the jamming equipment, nowadays has been a key factor influencing the overall situation of a modern war. As a radar anti-jamming technology, frequency selection suppresses jamming by taking advantage of the difference between the frequency domain feature of the radar signal and that of the jamming signal. However, most of the studies on the technology are more theoretical than practical. This paper studies the frequency selection technology for anti-jamming in radar netting, focusing on the possibility of avoiding jamming and the frequency bands to be avoided, and thus providing scientific and theoretical foundation for electronic warfare, decision support and radar control. The algorithm proposed features high operational speed and easy implementation, and simulation results have proved its effectiveness.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924711
Ying Li, Ruisong Zhang, Wei Jiang
When phase locked loop (PLL) works in high dynamic environments, the dynamic stress error may be not ignorable, which limits the accuracy of carrier tracking. In this paper, we propose a new carrier tracking scheme to reduce the dynamic stress error of the PLL by concatenating the traditional PLL with a phase estimation and compensation (PEC) module. The PEC module can estimate and compensate the steady state phase error of the PLL's output. We theoretically analyze the phase error performance of this new scheme, namely PLL-PEC. Simulation results show that PLL-PEC reduces the dynamic stress error and increases the carrier tracking accuracy remarkably. Besides, PLL-PEC is very simple and easy to implement.
{"title":"A high precision carrier tracking scheme based on phase estimation and compensation","authors":"Ying Li, Ruisong Zhang, Wei Jiang","doi":"10.1109/COMPCOMM.2016.7924711","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924711","url":null,"abstract":"When phase locked loop (PLL) works in high dynamic environments, the dynamic stress error may be not ignorable, which limits the accuracy of carrier tracking. In this paper, we propose a new carrier tracking scheme to reduce the dynamic stress error of the PLL by concatenating the traditional PLL with a phase estimation and compensation (PEC) module. The PEC module can estimate and compensate the steady state phase error of the PLL's output. We theoretically analyze the phase error performance of this new scheme, namely PLL-PEC. Simulation results show that PLL-PEC reduces the dynamic stress error and increases the carrier tracking accuracy remarkably. Besides, PLL-PEC is very simple and easy to implement.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924876
Danlin Zhang, Jihong Han, Jialiang Song, Lin Yuan
The reliability and security of network device is fundamental to network security. Thus risk management of network device is significant. As the crucial process of risk management, risk assessment has attracted major attention of researchers. This paper proposed a novel approach based on fuzzy 3D risk matrix for risk assessment of network device. Typical 2D risk matrix is widely adopted to assess and rank risk with likelihood and consequence, which is not reasonable with only two attributes of risk in practice. An attribute named risk controlling difficulty is added to establish a fuzzy 3D risk matrix, with triangular intuitionistic fuzzy number (TIFN) being used to evaluate it. What's more, fuzzy rules (FR) is used to rank the risk synthesizing the three attributes. The experiment demonstrates the implementation process of the proposed method which is proved to be effective and practical.
{"title":"A risk assessment approach based on fuzzy 3D risk matrix for network device","authors":"Danlin Zhang, Jihong Han, Jialiang Song, Lin Yuan","doi":"10.1109/COMPCOMM.2016.7924876","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924876","url":null,"abstract":"The reliability and security of network device is fundamental to network security. Thus risk management of network device is significant. As the crucial process of risk management, risk assessment has attracted major attention of researchers. This paper proposed a novel approach based on fuzzy 3D risk matrix for risk assessment of network device. Typical 2D risk matrix is widely adopted to assess and rank risk with likelihood and consequence, which is not reasonable with only two attributes of risk in practice. An attribute named risk controlling difficulty is added to establish a fuzzy 3D risk matrix, with triangular intuitionistic fuzzy number (TIFN) being used to evaluate it. What's more, fuzzy rules (FR) is used to rank the risk synthesizing the three attributes. The experiment demonstrates the implementation process of the proposed method which is proved to be effective and practical.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925074
Liu Shirui, G. Haifeng, Qi Yalei
With more and more interrupts of integrated core processor(ICP) in avionics, VxWorks interrupt affinity which is applied to ICP has drawn substantial attention. On the multi-core programmable interrupt controller(MPIC) which is hardware platform of ICP, VxWorks interrupt affinity not only helps dispatch interrupt to specific processor core in multi-core processors but also balance the interrupt loading of multi-core processors1. In this paper VxWorks affinity is applied to MPIC to achieve the purpose of shortening the interrupt response time. Firstly, the model of MPIC and its working principle have been studied in detail. And then, further research on the implement of VxWorks interrupt affinity based on the MPIC is made. Finally, a new interrupt dynamic routing method using VxWorks interrupt affinity is proposed to enhance the performance of MPIC. The experimental results demonstrate that the method is effective in dispatching the coming intrerrupts across multi-core and response to interrupt more quickly.
{"title":"Application of VxWorks interrupt affinity based on MPIC","authors":"Liu Shirui, G. Haifeng, Qi Yalei","doi":"10.1109/COMPCOMM.2016.7925074","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925074","url":null,"abstract":"With more and more interrupts of integrated core processor(ICP) in avionics, VxWorks interrupt affinity which is applied to ICP has drawn substantial attention. On the multi-core programmable interrupt controller(MPIC) which is hardware platform of ICP, VxWorks interrupt affinity not only helps dispatch interrupt to specific processor core in multi-core processors but also balance the interrupt loading of multi-core processors1. In this paper VxWorks affinity is applied to MPIC to achieve the purpose of shortening the interrupt response time. Firstly, the model of MPIC and its working principle have been studied in detail. And then, further research on the implement of VxWorks interrupt affinity based on the MPIC is made. Finally, a new interrupt dynamic routing method using VxWorks interrupt affinity is proposed to enhance the performance of MPIC. The experimental results demonstrate that the method is effective in dispatching the coming intrerrupts across multi-core and response to interrupt more quickly.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924683
Zihan Zhuo, Jianwu Dong, Yueying He, Lixuan Guo, Bin Peng
With the extensive applications of Internet, the Internet data have grown at full speed. To directly reveal the relationship among mass data and the latent characteristics in information with visualization techniques has become an important research topic. Concerning small resource storage capacity and low data exchange efficiency of the traditionally visualization C/S system, this paper adopts the computer distributed framework and the efficient network transmission technique to finish overall framework design of the network data visualization system, and realizes it based on the Web full-stack technique. Experimental results suggest that the system can provide comprehensive visualization services for mass data and contribute to extraction of hidden information efficiently and directly from data, thus facilitating decision formulation.
{"title":"Design and implementation of visualization system based on network mass data","authors":"Zihan Zhuo, Jianwu Dong, Yueying He, Lixuan Guo, Bin Peng","doi":"10.1109/COMPCOMM.2016.7924683","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924683","url":null,"abstract":"With the extensive applications of Internet, the Internet data have grown at full speed. To directly reveal the relationship among mass data and the latent characteristics in information with visualization techniques has become an important research topic. Concerning small resource storage capacity and low data exchange efficiency of the traditionally visualization C/S system, this paper adopts the computer distributed framework and the efficient network transmission technique to finish overall framework design of the network data visualization system, and realizes it based on the Web full-stack technique. Experimental results suggest that the system can provide comprehensive visualization services for mass data and contribute to extraction of hidden information efficiently and directly from data, thus facilitating decision formulation.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925100
Sun Boyuan, Li Donghui
The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.
{"title":"A reputation-based method against combinations of internal attacks in WSNs","authors":"Sun Boyuan, Li Donghui","doi":"10.1109/COMPCOMM.2016.7925100","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925100","url":null,"abstract":"The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121359931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924676
Zhijie Lin, Lei Zhang
Data synchronization is widely used in many fields such as database, cloud computing and distributed system. However, for Internet of Things (IoT) system, the existing synchronization algorithms are not very efficient because the data in IoT system have different characteristic like real-time and mutability. To resolve the problem, this paper proposes a new data synchronization algorithm for IoT system using timestamp and bitmap, which can improve the efficiency of network transmission in data synchronization and apply to IoT system better.
{"title":"Data synchronization algorithm for IoT gateway and platform","authors":"Zhijie Lin, Lei Zhang","doi":"10.1109/COMPCOMM.2016.7924676","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924676","url":null,"abstract":"Data synchronization is widely used in many fields such as database, cloud computing and distributed system. However, for Internet of Things (IoT) system, the existing synchronization algorithms are not very efficient because the data in IoT system have different characteristic like real-time and mutability. To resolve the problem, this paper proposes a new data synchronization algorithm for IoT system using timestamp and bitmap, which can improve the efficiency of network transmission in data synchronization and apply to IoT system better.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925080
Li Li, Xin Shouting, Duan De-gong
With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.
{"title":"Research of DBA schemes and QoS in PON system","authors":"Li Li, Xin Shouting, Duan De-gong","doi":"10.1109/COMPCOMM.2016.7925080","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925080","url":null,"abstract":"With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127512724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925178
Zi-xuan Yu, Ming-feng Lu, Feng Zhang, Xiao-Wei Jin
To improve the Analog to Digital Converter's (ADC's) effective quantizer bits of wideband signals as linear frequency modulation (LFM) signal, a method based on the fractional Fourier transform (FRFT) is proposed. The expression of the signal-to-quantization-noise ratio (SQNR) in the FRFT domain is obtained. In comparison to the traditional methods in the Fourier domain, about 1.5 bits of improvement in effective quantizer bits are obtained. Simulation results validate the correctness of the theory and show the effectiveness of the proposed method in the fractional Fourier domain.
{"title":"A method for improving the effective quantizer bits of the A/D converter based on the fractional Fourier Transform","authors":"Zi-xuan Yu, Ming-feng Lu, Feng Zhang, Xiao-Wei Jin","doi":"10.1109/COMPCOMM.2016.7925178","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925178","url":null,"abstract":"To improve the Analog to Digital Converter's (ADC's) effective quantizer bits of wideband signals as linear frequency modulation (LFM) signal, a method based on the fractional Fourier transform (FRFT) is proposed. The expression of the signal-to-quantization-noise ratio (SQNR) in the FRFT domain is obtained. In comparison to the traditional methods in the Fourier domain, about 1.5 bits of improvement in effective quantizer bits are obtained. Simulation results validate the correctness of the theory and show the effectiveness of the proposed method in the fractional Fourier domain.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924707
Man Liu, Yuan Jiang, Yueping Peng
Because of the occurrence of mass incidents in public places in China, the society has put forward higher requirements for the monitoring of the group anomaly. In this paper, from the point of view of molecular thermal motion, the crowd pixel is modeled as a moving molecule to predict the mass emergencies. In order to improve the efficiency of the pre judge, classify the population density on the basis of the linear relationship between the number of people and the number of molecules, and in view of the high population density and the very high population density, through molecular thermal motion algorithm to extract the rate of population distribution law and thus build speed distribution function, using SVM to determine groups of abnormal behavior, completing the anticipation of group incidents finally.
{"title":"Prediction of mass emergency events based on molecular thermal motion algorithm","authors":"Man Liu, Yuan Jiang, Yueping Peng","doi":"10.1109/COMPCOMM.2016.7924707","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924707","url":null,"abstract":"Because of the occurrence of mass incidents in public places in China, the society has put forward higher requirements for the monitoring of the group anomaly. In this paper, from the point of view of molecular thermal motion, the crowd pixel is modeled as a moving molecule to predict the mass emergencies. In order to improve the efficiency of the pre judge, classify the population density on the basis of the linear relationship between the number of people and the number of molecules, and in view of the high population density and the very high population density, through molecular thermal motion algorithm to extract the rate of population distribution law and thus build speed distribution function, using SVM to determine groups of abnormal behavior, completing the anticipation of group incidents finally.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}