Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925069
Andreas Schmidt, T. Lange, T. Herfet
Traditional services like video broadcast and telephony are more and more implemented on general-purpose networks. This is usually the Internet, which has different properties compared to special-purpose infrastructures as the public switched telephone network. This paper highlights three major causes why this migration is currently providing user experiences that are worse than with traditional networks. In particular, challenges caused by changed latency characteristics are addressed. For every cause, approaches are highlighted to tackle them, including novel transport protocols as well as paradigms to optimize transmissions at the network core. A presentation of new network infrastructures following the concept of Software-Defined Networking (SDN) completes the picture and allows to implement flow-oriented forwarding. Finally, the Open Networking Testbed operated by the Telecommunications Chair at Saarland University is presented, including its means to evaluate novel protocols, paradigms, and concepts in a controlled and realistic environment. Having international partners in place, it is possible to test new approaches on a global scale.
{"title":"Low-latency multimedia streaming using Open Networking Environments","authors":"Andreas Schmidt, T. Lange, T. Herfet","doi":"10.1109/COMPCOMM.2016.7925069","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925069","url":null,"abstract":"Traditional services like video broadcast and telephony are more and more implemented on general-purpose networks. This is usually the Internet, which has different properties compared to special-purpose infrastructures as the public switched telephone network. This paper highlights three major causes why this migration is currently providing user experiences that are worse than with traditional networks. In particular, challenges caused by changed latency characteristics are addressed. For every cause, approaches are highlighted to tackle them, including novel transport protocols as well as paradigms to optimize transmissions at the network core. A presentation of new network infrastructures following the concept of Software-Defined Networking (SDN) completes the picture and allows to implement flow-oriented forwarding. Finally, the Open Networking Testbed operated by the Telecommunications Chair at Saarland University is presented, including its means to evaluate novel protocols, paradigms, and concepts in a controlled and realistic environment. Having international partners in place, it is possible to test new approaches on a global scale.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122793657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925033
Yue Guo, Rongke Liu, Yi Hou, Ling Zhao
In this paper, we present a graphics processing unit (GPU)-based architecture of carrier acquisition for high-dynamic weak signal in deep space communications. To achieve high performance, the carrier acquisition procedure is parallelized by exploiting the GPU's parallel operating characteristics. Based on computer unified device architecture (CUDA), different kernels are designed to map the different phases of carrier acquisition procedure. What's more, the kernels' efficiency are improved by optimizing the internal operation parallelism of kernels and lowering the memory access latency for threads. Besides, multiple CUDA streams are designed to hide the data transfer latency between host and device. Experimental results demonstrate that the proposed GPU-based architecture achieves more than 250.3 times speedup compared to CPU-based platform.
{"title":"A fast carrier acquisition architecture for high-dynamic weak signal based on GPU","authors":"Yue Guo, Rongke Liu, Yi Hou, Ling Zhao","doi":"10.1109/COMPCOMM.2016.7925033","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925033","url":null,"abstract":"In this paper, we present a graphics processing unit (GPU)-based architecture of carrier acquisition for high-dynamic weak signal in deep space communications. To achieve high performance, the carrier acquisition procedure is parallelized by exploiting the GPU's parallel operating characteristics. Based on computer unified device architecture (CUDA), different kernels are designed to map the different phases of carrier acquisition procedure. What's more, the kernels' efficiency are improved by optimizing the internal operation parallelism of kernels and lowering the memory access latency for threads. Besides, multiple CUDA streams are designed to hide the data transfer latency between host and device. Experimental results demonstrate that the proposed GPU-based architecture achieves more than 250.3 times speedup compared to CPU-based platform.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131739554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925184
Wan Peng, Wang Feifei, Wang Jian
Since the sixth information revolution, people have entered the era of multimedia information. The transmission of information is no longer in a single way, people's demand for information exchange is more diversified, and the transmission of information environment is also more changeable. Then the collaborative receiving terminal based on fountain codes algorithm can meet all kinds of complex conditions in the current environment to achieve the transmitting and receiving of multimedia. The main work of this paper is a series of analysis and design of the subsequent transmission system of this terminal and to achieve the ultimate function by using the transfer mode that support TCP and UDP protocol.
{"title":"The subsequent transmission system of collaborative receiving terminal that based on fountain codes","authors":"Wan Peng, Wang Feifei, Wang Jian","doi":"10.1109/COMPCOMM.2016.7925184","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925184","url":null,"abstract":"Since the sixth information revolution, people have entered the era of multimedia information. The transmission of information is no longer in a single way, people's demand for information exchange is more diversified, and the transmission of information environment is also more changeable. Then the collaborative receiving terminal based on fountain codes algorithm can meet all kinds of complex conditions in the current environment to achieve the transmitting and receiving of multimedia. The main work of this paper is a series of analysis and design of the subsequent transmission system of this terminal and to achieve the ultimate function by using the transfer mode that support TCP and UDP protocol.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924868
Haiyan Liu, Yifei Huo
SNMP is currently the most widely used network management protocol which can examine the condition of network equipment and control them through visits MIB objects. It makes the network more convenient to manage while brings about new security challenges. Based on the analysis of the security threats brought by SNMP and the ways to attack a network through SNMP protocol, this paper designs several ways to analyze the security of MIB objects defined in a network device. At last it puts forward some corresponding security enhancement measures for management of SNMP, such as password setting, function selecting, software updating and proper SNMP configuring, etc. This article can be the reference of enhancing the security of the network managed by SNMP protocol.
{"title":"Analysis on the security of MIB objects defined in network device","authors":"Haiyan Liu, Yifei Huo","doi":"10.1109/COMPCOMM.2016.7924868","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924868","url":null,"abstract":"SNMP is currently the most widely used network management protocol which can examine the condition of network equipment and control them through visits MIB objects. It makes the network more convenient to manage while brings about new security challenges. Based on the analysis of the security threats brought by SNMP and the ways to attack a network through SNMP protocol, this paper designs several ways to analyze the security of MIB objects defined in a network device. At last it puts forward some corresponding security enhancement measures for management of SNMP, such as password setting, function selecting, software updating and proper SNMP configuring, etc. This article can be the reference of enhancing the security of the network managed by SNMP protocol.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925097
Yan Ge, Zhi Zheng, Bo Yan, Jiao Yang, Yuxuan Yang, Huipeng Meng
A novel least square (LS) localization method for wireless sensor networks (WSNs) using received signal strength indicator (RSSI) is proposed in this paper. Unlike previous LS methods, the proposed method performs location calculation with the aid of the condition number of coordinate matrix to avoid the appearance of outliers. The threshold of condition number is introduced in this paper to avoid outliers while enhance the localization accuracy. Simulation results demonstrate that our approach can suppress outliers more efficiently, and improve the accuracy and stability of localization.
{"title":"An RSSI-based localization method with outlier suppress for wireless sensor networks","authors":"Yan Ge, Zhi Zheng, Bo Yan, Jiao Yang, Yuxuan Yang, Huipeng Meng","doi":"10.1109/COMPCOMM.2016.7925097","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925097","url":null,"abstract":"A novel least square (LS) localization method for wireless sensor networks (WSNs) using received signal strength indicator (RSSI) is proposed in this paper. Unlike previous LS methods, the proposed method performs location calculation with the aid of the condition number of coordinate matrix to avoid the appearance of outliers. The threshold of condition number is introduced in this paper to avoid outliers while enhance the localization accuracy. Simulation results demonstrate that our approach can suppress outliers more efficiently, and improve the accuracy and stability of localization.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924794
Huaping Zhu, Yaoru Sun
In this study, we investigated whether mere observation of ambiguous shadow motions with an anamorphic shape of a real hand would induce the human mirror neuron system (hMNS) activity and which aspects of the observed motion (i.e. the biologic property and the kinematical characteristic) are crucial to the hMNS activity. As an index of hMNS activity, EEG mu rhythm (8–13Hz) suppression at C3, Cz and C4 electrodes was examined during observation of ambiguous shadow motions with pre- and post-familiarisation compared to a flat geometrical shape movement (Baseline). The experimental results showed that no hMNS activity was found in pre-familiarisation condition even the anamorphic shadow was perceived as human hand. While, the hMNS activity was apparently found after a familiarisation process involves learning the kinematics features of the anamorphic shadow. Results reported here suggest that both biologic property and the kinematics features are crucial to the hMNS activity. The findings also may provide a new idea for the development of humanoid robotic system by modeling the human motion as two attribute set: biologic properties and kinematics primaries.
{"title":"EEG evidence for human mirror activity during observation of ambiguous shadow actions: Toward an analysis of humanoid robotic system","authors":"Huaping Zhu, Yaoru Sun","doi":"10.1109/COMPCOMM.2016.7924794","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924794","url":null,"abstract":"In this study, we investigated whether mere observation of ambiguous shadow motions with an anamorphic shape of a real hand would induce the human mirror neuron system (hMNS) activity and which aspects of the observed motion (i.e. the biologic property and the kinematical characteristic) are crucial to the hMNS activity. As an index of hMNS activity, EEG mu rhythm (8–13Hz) suppression at C3, Cz and C4 electrodes was examined during observation of ambiguous shadow motions with pre- and post-familiarisation compared to a flat geometrical shape movement (Baseline). The experimental results showed that no hMNS activity was found in pre-familiarisation condition even the anamorphic shadow was perceived as human hand. While, the hMNS activity was apparently found after a familiarisation process involves learning the kinematics features of the anamorphic shadow. Results reported here suggest that both biologic property and the kinematics features are crucial to the hMNS activity. The findings also may provide a new idea for the development of humanoid robotic system by modeling the human motion as two attribute set: biologic properties and kinematics primaries.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924746
Jia Zhang, Lei Yang, Xiaoyu Wu
The paper summarized 13 classic methods of visual tracking and 9 methods combined with convolutional neural networks including some latest trackers and compared all these trackers in the same benchmark. After analyzing the results, we had some new idea for existing trackers.
{"title":"A survey on visual tracking via convolutional neural networks","authors":"Jia Zhang, Lei Yang, Xiaoyu Wu","doi":"10.1109/COMPCOMM.2016.7924746","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924746","url":null,"abstract":"The paper summarized 13 classic methods of visual tracking and 9 methods combined with convolutional neural networks including some latest trackers and compared all these trackers in the same benchmark. After analyzing the results, we had some new idea for existing trackers.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133417959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925043
Sun Yuhang, L. Shanshan
A audio compressor is an important part of a audio processing system. The compression algorithm designed in this paper will be applied to audio compressor in the digital audio broadcasting transmitter. In this paper, an effective algorithm for dynamic control of the gain by taking mean square value is proposed, and two different audio signal from two channel processing schemes will be compared to get better one on the impact of compression. Then the algorithm is evaluated by the effect of compression of signal amplitude in the MATLAB simulation, and a scheme selected that signal is firstly dealt with to enhance the effect of the dual channel stereo and then is compressed is more suitable for the two channel audio compression from two schemes.
{"title":"Research on algorithm of audio level compressor","authors":"Sun Yuhang, L. Shanshan","doi":"10.1109/COMPCOMM.2016.7925043","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925043","url":null,"abstract":"A audio compressor is an important part of a audio processing system. The compression algorithm designed in this paper will be applied to audio compressor in the digital audio broadcasting transmitter. In this paper, an effective algorithm for dynamic control of the gain by taking mean square value is proposed, and two different audio signal from two channel processing schemes will be compared to get better one on the impact of compression. Then the algorithm is evaluated by the effect of compression of signal amplitude in the MATLAB simulation, and a scheme selected that signal is firstly dealt with to enhance the effect of the dual channel stereo and then is compressed is more suitable for the two channel audio compression from two schemes.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924833
Qi Wei, X. Tan
This paper considers the problem of walking in the street with a mobile robot. The robot starts from a point s to search the target point t. The robot is equipped with a minimal sensing sensor that can only detect the discontinuities in depth information (or gaps), but has no prior knowledge of the street. The performance of our strategy is measured in terms of the competitive ratio, with respect to the length of the optimal path for walking in the street with complete knowledge. We propose a new 9-competitive strategy, and prove that it is optimal by showing a matching lower bound, whereas the previous best approach proposed by Tabatabaei et al. has a competitive ratio of 11.
{"title":"An optimal on-line strategy for walking in streets with minimal sensing","authors":"Qi Wei, X. Tan","doi":"10.1109/COMPCOMM.2016.7924833","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924833","url":null,"abstract":"This paper considers the problem of walking in the street with a mobile robot. The robot starts from a point s to search the target point t. The robot is equipped with a minimal sensing sensor that can only detect the discontinuities in depth information (or gaps), but has no prior knowledge of the street. The performance of our strategy is measured in terms of the competitive ratio, with respect to the length of the optimal path for walking in the street with complete knowledge. We propose a new 9-competitive strategy, and prove that it is optimal by showing a matching lower bound, whereas the previous best approach proposed by Tabatabaei et al. has a competitive ratio of 11.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132215447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925073
Jia-xing Zhu, Yijun Guo, Jianjun Hao, Jianfeng Li, Duo Chen
Nowadays, with the increasing usage of the internet, the movie ratings on the SNS website related to movies influence our choice of movies remarkably. However, a newly released film has insufficient rating counts to reflect the quality of the movie, and it can not avoid the influence of malicious rating by some people. Therefore, this paper proposes a method of rating prediction based on Gaussian Mixture Model (GMM), enabled by imitating rating behavior of audience. Meanwhile, this model can avoid the influence of malicious rating because GMM is not sensitive to exception. In GMM, 4 features of the movies are taken into consideration. In order to verify the validity of our model, data from Douban website is used in the implementation. Experimental results exhibit the effectiveness of the method and an improved performance of rating prediction is achieved compared with the benchmark of linear regression.
{"title":"Gaussian Mixture Model based prediction method of movie rating","authors":"Jia-xing Zhu, Yijun Guo, Jianjun Hao, Jianfeng Li, Duo Chen","doi":"10.1109/COMPCOMM.2016.7925073","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925073","url":null,"abstract":"Nowadays, with the increasing usage of the internet, the movie ratings on the SNS website related to movies influence our choice of movies remarkably. However, a newly released film has insufficient rating counts to reflect the quality of the movie, and it can not avoid the influence of malicious rating by some people. Therefore, this paper proposes a method of rating prediction based on Gaussian Mixture Model (GMM), enabled by imitating rating behavior of audience. Meanwhile, this model can avoid the influence of malicious rating because GMM is not sensitive to exception. In GMM, 4 features of the movies are taken into consideration. In order to verify the validity of our model, data from Douban website is used in the implementation. Experimental results exhibit the effectiveness of the method and an improved performance of rating prediction is achieved compared with the benchmark of linear regression.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}