Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924992
Wang Yongbin, L. Lihua, Zhang Hao, L. Tong
At present, the submarines employ towed antennas to receive super low frequency(SLF) signal, which not only limits the mobility and safety of submarine, but also exists receiving blind zone. On account of the advantages of magnetic antenna, such as small size, high sensitivity and strong anti-jam capacity, it is proposed to receive SLF signals. In accordance with the structure and working principle of the magnetic antenna, simplified equivalent circuit model is established. By means of analyzing parameters of the core and coils, magnetic antenna which works between 30Hz and 200Hz is designed. In order to reduce distributed capacitance, winding method is analyzed and optimized and group winding solution is proposed subsequently. By measuring the sensitivity in the circumstance of uniform magnetic field, the measurement value shows that the method has effectiveness on reducing distributed capacitance and raising resonant frequency.
{"title":"Design and production of super low frequency magnetic receiving antenna","authors":"Wang Yongbin, L. Lihua, Zhang Hao, L. Tong","doi":"10.1109/COMPCOMM.2016.7924992","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924992","url":null,"abstract":"At present, the submarines employ towed antennas to receive super low frequency(SLF) signal, which not only limits the mobility and safety of submarine, but also exists receiving blind zone. On account of the advantages of magnetic antenna, such as small size, high sensitivity and strong anti-jam capacity, it is proposed to receive SLF signals. In accordance with the structure and working principle of the magnetic antenna, simplified equivalent circuit model is established. By means of analyzing parameters of the core and coils, magnetic antenna which works between 30Hz and 200Hz is designed. In order to reduce distributed capacitance, winding method is analyzed and optimized and group winding solution is proposed subsequently. By measuring the sensitivity in the circumstance of uniform magnetic field, the measurement value shows that the method has effectiveness on reducing distributed capacitance and raising resonant frequency.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126252363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925204
Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan
Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.
{"title":"The optimized attribute attack graph based on APT attack stage model","authors":"Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan","doi":"10.1109/COMPCOMM.2016.7925204","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925204","url":null,"abstract":"Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126274050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925189
Aaron Zimba, Chen Hongsong, Wang Zhao-shun
Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized devices. However, this convenience comes at a cost. The framework that is implemented to actualize this adorable functionality leaves much to be desired in that authorization to synchronize with the cloud only requires a synchronization token offered to the user upon his one-time authentication. This entails that whoever presents this synchronization token is able to synchronize with the user's data both locally and on the cloud without the need to provide any login credentials. The task of the attacker therefore is to acquire this synchronization token which is always stored locally on the cloud user's device and this task is actualized via a Man in the Cloud (MITC) attack. This paper employs attack trees to analyze the constituents of a MITC attack process in the synchronization of client devices in cloud computing. We further propose from the analysis, areas of concentration when deploying preventative measures.
{"title":"Attack tree analysis of Man in the Cloud attacks on client device synchronization in cloud computing","authors":"Aaron Zimba, Chen Hongsong, Wang Zhao-shun","doi":"10.1109/COMPCOMM.2016.7925189","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925189","url":null,"abstract":"Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized devices. However, this convenience comes at a cost. The framework that is implemented to actualize this adorable functionality leaves much to be desired in that authorization to synchronize with the cloud only requires a synchronization token offered to the user upon his one-time authentication. This entails that whoever presents this synchronization token is able to synchronize with the user's data both locally and on the cloud without the need to provide any login credentials. The task of the attacker therefore is to acquire this synchronization token which is always stored locally on the cloud user's device and this task is actualized via a Man in the Cloud (MITC) attack. This paper employs attack trees to analyze the constituents of a MITC attack process in the synchronization of client devices in cloud computing. We further propose from the analysis, areas of concentration when deploying preventative measures.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925235
J. Azasoo, K. Boateng
The continuous increase in electricity demand all over the world is putting huge burden on electricity utility providers to effect various types of load shedding in order to avoid total blackout. Load shedding is implemented mostly by turning off affected communities or areas from the main grid thereby depriving them from electricity supply. This paper attempts to propose a solution to this problem by granularly optimizing load levels of each metering units by turning off specific loads from household or and industrial demands in order to reduce the total effective load on the smart meters thereby reducing the overall effect on the generation as well as the distribution systems. The Design Science Methodology was used in the research. The preliminary results from the study shows that implementing this approach to load shedding will drastically reduce the overall effects of this intervention by utilities on their subscribers.
{"title":"Optimizing the effects of load-shedding through micro-load management in generation constrained power system","authors":"J. Azasoo, K. Boateng","doi":"10.1109/COMPCOMM.2016.7925235","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925235","url":null,"abstract":"The continuous increase in electricity demand all over the world is putting huge burden on electricity utility providers to effect various types of load shedding in order to avoid total blackout. Load shedding is implemented mostly by turning off affected communities or areas from the main grid thereby depriving them from electricity supply. This paper attempts to propose a solution to this problem by granularly optimizing load levels of each metering units by turning off specific loads from household or and industrial demands in order to reduce the total effective load on the smart meters thereby reducing the overall effect on the generation as well as the distribution systems. The Design Science Methodology was used in the research. The preliminary results from the study shows that implementing this approach to load shedding will drastically reduce the overall effects of this intervention by utilities on their subscribers.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126458778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7925182
Jian Di, Q. Ma
With great of development Electric power data center network, cause to the rapidly increase a amount of data, the rise of a variety of business and a variety of rapid increase of data exchange. Most existing QoS traffic techniques exist many of problems such as Low network resource utilization, bad reliability, poor extensibility and it is difficult to achieve. For the electric power enterprise data center to realize stable and efficient running a challenge, How to make use of the limited network resource effective control network, to ensure that the business service quality of service (QoS) become a pressing problem. This paper proposed an Openlow based QoS traffic method and QoS-ensure method referring to the new idea of separating controlling layer and data layer provided by SDN, which improved flexibility and reliability for QoS control to achieve effective usage of network resources and fine-grained of flow control. The experimental results validated its effectiveness. Through the deployment in Mininet network simulation platform and simulation implementation. The experimental results validated its effectiveness.
{"title":"Design and implementation of SDN-base QoS traffic control method for Electric power data center network","authors":"Jian Di, Q. Ma","doi":"10.1109/COMPCOMM.2016.7925182","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925182","url":null,"abstract":"With great of development Electric power data center network, cause to the rapidly increase a amount of data, the rise of a variety of business and a variety of rapid increase of data exchange. Most existing QoS traffic techniques exist many of problems such as Low network resource utilization, bad reliability, poor extensibility and it is difficult to achieve. For the electric power enterprise data center to realize stable and efficient running a challenge, How to make use of the limited network resource effective control network, to ensure that the business service quality of service (QoS) become a pressing problem. This paper proposed an Openlow based QoS traffic method and QoS-ensure method referring to the new idea of separating controlling layer and data layer provided by SDN, which improved flexibility and reliability for QoS control to achieve effective usage of network resources and fine-grained of flow control. The experimental results validated its effectiveness. Through the deployment in Mininet network simulation platform and simulation implementation. The experimental results validated its effectiveness.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126556879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924878
Yao Xu, B. Tang
Systematic Network Coding (SNC) has been studied recent years and it got perfect effect on stable satellite link. However, its performance on interfered satellite link is unsatisfactory according to our research. This paper firstly proposes a novel architecture solution named K-SNC on Link Layer (LL) to improve the goodput of the communication on interfered link. In K-SNC, a Variant of Kalman Filter (VKF) is designed to estimate Packet Erase Rate (PER) in real time and a method is introduced to adjust Encoding Window (ECW) adaptively. A mathematical model is developed as the foundation of VKF about PER changing trend with time lapsing. The relationship is analyzed between the appropriate size of ECW in SNC and the PER on satellite link. Simulation works are implemented with NS-2. In comparison with SNC, K-SNC gets impressive improvement on stable satellite link and provides up to more than 30% higher goodput on the satellite link suffering unpredictable interference.
{"title":"An adaptive scheme of Systematic Random Network Coding on interfered satellite link","authors":"Yao Xu, B. Tang","doi":"10.1109/COMPCOMM.2016.7924878","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924878","url":null,"abstract":"Systematic Network Coding (SNC) has been studied recent years and it got perfect effect on stable satellite link. However, its performance on interfered satellite link is unsatisfactory according to our research. This paper firstly proposes a novel architecture solution named K-SNC on Link Layer (LL) to improve the goodput of the communication on interfered link. In K-SNC, a Variant of Kalman Filter (VKF) is designed to estimate Packet Erase Rate (PER) in real time and a method is introduced to adjust Encoding Window (ECW) adaptively. A mathematical model is developed as the foundation of VKF about PER changing trend with time lapsing. The relationship is analyzed between the appropriate size of ECW in SNC and the PER on satellite link. Simulation works are implemented with NS-2. In comparison with SNC, K-SNC gets impressive improvement on stable satellite link and provides up to more than 30% higher goodput on the satellite link suffering unpredictable interference.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924677
Wan Liu, Pengyan Shen, Kai Guo
A naive way for data privacy and security is encrypting data before outsourcing to the cloud. However, encryption triggers a new challenge in a fine-grained access control system, where there are many data owners and membership is dynamically changed. Existing schemes either solve security threats caused by dynamic membership with high cost, such as data re-encryption and/or key re-distribution, or only apply to single-owner scenarios in spite of eliminating the heavy burdens of data owner. This paper presents a multi-owner data sharing scheme with fine-grained access control, which achieves a high efficiency and supports the dynamic scenario. Benefiting from broadcast group key management and group signature techniques, the scheme allows any user to share data with others and it only takes constant time to deal with the change of membership, including user register, revocation and attributes change. Our scheme also achieves data owners' identity privacy preserving. Security analysis and extensive simulating experiments prove the high efficiency and security of proposed scheme.
{"title":"A multi-owner data sharing scheme efficiently supporting dynamic scenario on public clouds","authors":"Wan Liu, Pengyan Shen, Kai Guo","doi":"10.1109/COMPCOMM.2016.7924677","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924677","url":null,"abstract":"A naive way for data privacy and security is encrypting data before outsourcing to the cloud. However, encryption triggers a new challenge in a fine-grained access control system, where there are many data owners and membership is dynamically changed. Existing schemes either solve security threats caused by dynamic membership with high cost, such as data re-encryption and/or key re-distribution, or only apply to single-owner scenarios in spite of eliminating the heavy burdens of data owner. This paper presents a multi-owner data sharing scheme with fine-grained access control, which achieves a high efficiency and supports the dynamic scenario. Benefiting from broadcast group key management and group signature techniques, the scheme allows any user to share data with others and it only takes constant time to deal with the change of membership, including user register, revocation and attributes change. Our scheme also achieves data owners' identity privacy preserving. Security analysis and extensive simulating experiments prove the high efficiency and security of proposed scheme.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924881
Huanlai Xing, Fuhong Song, Zhaoyuan Wang, Tianrui Li, Yan Yang
In network coding, intermediate nodes are allowed to mathematically recombine packets received from different incoming links, which helps increase network throughput and accommodate more traffic flows with limited network resources. Coding operations (i.e. packet recombination), however, could cause significant computational cost and thus introduce heavy burden to the network if they are performed wherever possible. It is hence important to always keep the amount of coding operations minimized in a dynamic network environment. This paper proposes a modified population based incremental learning (PBIL) for solving the above problem, where an environmental adaptation scheme is devised to guide the search tracing the ever-changing optima within the fitness landscape in a dynamic network environment. Experimental results show that the proposed PBIL gains better performance than several state-of-the-art evolutionary algorithms regarding the solution quality.
{"title":"An modified PBIL for network coding resource minimization in dynamic network environment","authors":"Huanlai Xing, Fuhong Song, Zhaoyuan Wang, Tianrui Li, Yan Yang","doi":"10.1109/COMPCOMM.2016.7924881","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924881","url":null,"abstract":"In network coding, intermediate nodes are allowed to mathematically recombine packets received from different incoming links, which helps increase network throughput and accommodate more traffic flows with limited network resources. Coding operations (i.e. packet recombination), however, could cause significant computational cost and thus introduce heavy burden to the network if they are performed wherever possible. It is hence important to always keep the amount of coding operations minimized in a dynamic network environment. This paper proposes a modified population based incremental learning (PBIL) for solving the above problem, where an environmental adaptation scheme is devised to guide the search tracing the ever-changing optima within the fitness landscape in a dynamic network environment. Experimental results show that the proposed PBIL gains better performance than several state-of-the-art evolutionary algorithms regarding the solution quality.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924820
Yan Zhang, Jian Cao, K. Shen, Xiao-song Chen, Siji Zhu
In order to decide a medical treatment plan for a patient, experts from different disciplines should come together to discuss. This process is often time-consuming and organized in an inefficient way. A multi-disciplinary medical treatment decision support system is proposed and developed in order to speed up this process. Specifically, this system can recommend treatment plan according to a patient's clinical information. It is based on k-NN algorithm to learn the appropriate treatment from a patient database. The system structure together with the recommendation approach is introduced. The experimental results are also presented, which show the availability and good performance of this recommendation approach.
{"title":"A Multi-disciplinary Medical Treatment Decision Support System with intelligent treatment recommendation","authors":"Yan Zhang, Jian Cao, K. Shen, Xiao-song Chen, Siji Zhu","doi":"10.1109/COMPCOMM.2016.7924820","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924820","url":null,"abstract":"In order to decide a medical treatment plan for a patient, experts from different disciplines should come together to discuss. This process is often time-consuming and organized in an inefficient way. A multi-disciplinary medical treatment decision support system is proposed and developed in order to speed up this process. Specifically, this system can recommend treatment plan according to a patient's clinical information. It is based on k-NN algorithm to learn the appropriate treatment from a patient database. The system structure together with the recommendation approach is introduced. The experimental results are also presented, which show the availability and good performance of this recommendation approach.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/COMPCOMM.2016.7924807
Dongfang Wang, Baoquan Fang, Shili Liang, Shuangwei Wang
This paper introduced the characteristics of the species, lung of the lung sounds signal, acquisition, processing and identification technology, based on the computer's lung sound signal processing and pattern recognition technology, and the research status at home and abroad and a variety of approaches to the study of the lung sound signals are summarized and reviewed in this paper, through a variety of cases of lung sound classification technology based on machine learning in recent years are summarized and the development situation of list; Finally, the study of lung sound classification technology and computer identification technology application development trend is prospected.
{"title":"The research progress about the intelligent recognition of lung sounds","authors":"Dongfang Wang, Baoquan Fang, Shili Liang, Shuangwei Wang","doi":"10.1109/COMPCOMM.2016.7924807","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924807","url":null,"abstract":"This paper introduced the characteristics of the species, lung of the lung sounds signal, acquisition, processing and identification technology, based on the computer's lung sound signal processing and pattern recognition technology, and the research status at home and abroad and a variety of approaches to the study of the lung sound signals are summarized and reviewed in this paper, through a variety of cases of lung sound classification technology based on machine learning in recent years are summarized and the development situation of list; Finally, the study of lung sound classification technology and computer identification technology application development trend is prospected.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}