Pub Date : 2018-06-27DOI: 10.1109/CATA.2018.8398668
Rohana Ismail, Nurazzah Abd Rahman, Z. Bakar, M. Makhtar
The identification of concepts and relations via automatic or semiautomatic are tasks in Ontology Learning. The Ontology Learning is important in minimizing effort of ontology development. It has been used in many disciplines including development of Quran ontology. In the Quran ontology development, there have been efforts to identify concepts and relations for ontology development using various methods. Among the methods employed to discover concepts is a regex pattern. The pattern is based on NLP which use tagging in their rules. This paper proposed a method that used patterns to extract concepts for Hajj Ontology development. It also has been compared against a prominence Ontology Learning system i.e. Text2Onto. The patterns also have been compared with Qterm pattern which is specifically designed for Solah domain in the Quran. Results indicate that the proposed patterns improve the precision with 82.4% and recall with 85.7% as compared to the both approaches.
{"title":"Concepts extraction in ontology learning using language patterns for better accuracy","authors":"Rohana Ismail, Nurazzah Abd Rahman, Z. Bakar, M. Makhtar","doi":"10.1109/CATA.2018.8398668","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398668","url":null,"abstract":"The identification of concepts and relations via automatic or semiautomatic are tasks in Ontology Learning. The Ontology Learning is important in minimizing effort of ontology development. It has been used in many disciplines including development of Quran ontology. In the Quran ontology development, there have been efforts to identify concepts and relations for ontology development using various methods. Among the methods employed to discover concepts is a regex pattern. The pattern is based on NLP which use tagging in their rules. This paper proposed a method that used patterns to extract concepts for Hajj Ontology development. It also has been compared against a prominence Ontology Learning system i.e. Text2Onto. The patterns also have been compared with Qterm pattern which is specifically designed for Solah domain in the Quran. Results indicate that the proposed patterns improve the precision with 82.4% and recall with 85.7% as compared to the both approaches.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-27DOI: 10.1109/CATA.2018.8398674
N. Izzah, I. Budi, Samuel Louvan
The Internet has many benefits, some of them are to gain knowledge and gain the latest information. The internet can be used by anyone and can contain any information, including negative content such as pornographic content, radicalism, racial intolerance, violence, fraud, gambling, security and drugs. Those contents cause the number of children victims of pornography on social media increasing every year. Based on that, it needs a system that detects pornographic content on social media. This study aims to determine the best model to detect the pornographic content. Model selection is determined based on unigram and bigram features, classification algorithm, k-fold cross validation. The classification algorithm used is Support Vector Machine and Naive Bayes. The highest F1-score is yielded by the model with combination of Support Vector Machine, most common words, and combination of unigram and bigram, which returns F1-Score value of 91.14%.
{"title":"Classification of pornographic content on Twitter using support vector machine and Naive Bayes","authors":"N. Izzah, I. Budi, Samuel Louvan","doi":"10.1109/CATA.2018.8398674","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398674","url":null,"abstract":"The Internet has many benefits, some of them are to gain knowledge and gain the latest information. The internet can be used by anyone and can contain any information, including negative content such as pornographic content, radicalism, racial intolerance, violence, fraud, gambling, security and drugs. Those contents cause the number of children victims of pornography on social media increasing every year. Based on that, it needs a system that detects pornographic content on social media. This study aims to determine the best model to detect the pornographic content. Model selection is determined based on unigram and bigram features, classification algorithm, k-fold cross validation. The classification algorithm used is Support Vector Machine and Naive Bayes. The highest F1-score is yielded by the model with combination of Support Vector Machine, most common words, and combination of unigram and bigram, which returns F1-Score value of 91.14%.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398652
Zhi Zeng, Hui-ke Rao, Ai-ping Liu
Machine learning (ML) is one of the main methods to address the problem of big data mining. ML can enable the e-commerce system upon self-innovate and improvement by accumulating prior knowledge. The big data produced by transaction, interaction and observation from e-commerce enterprises can greatly provide decision-making service for marketing strategy. In this paper we take the e-commerce data of tea-device enterprise as an example, use the FP-grow algorithm to get the frequent item sets, so as to mining and analyze association rule of user behavior to get feature vector as the basis of user classification, then use Naive Bayesian algorithm on the feature vector to implement clustering learning for precision marketing and personalized online referral services. Finally, we evaluate the feasibility of big data mining with ML through the profit produced by the sale of goods. Experimental results show that ML can not only greatly improve the performance in big data mining, can also achieve precise marketing, and can further increasing about 20% marginal profit for each type of goods.
{"title":"Research on personalized referral service and big data mining for e-commerce with machine learning","authors":"Zhi Zeng, Hui-ke Rao, Ai-ping Liu","doi":"10.1109/CATA.2018.8398652","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398652","url":null,"abstract":"Machine learning (ML) is one of the main methods to address the problem of big data mining. ML can enable the e-commerce system upon self-innovate and improvement by accumulating prior knowledge. The big data produced by transaction, interaction and observation from e-commerce enterprises can greatly provide decision-making service for marketing strategy. In this paper we take the e-commerce data of tea-device enterprise as an example, use the FP-grow algorithm to get the frequent item sets, so as to mining and analyze association rule of user behavior to get feature vector as the basis of user classification, then use Naive Bayesian algorithm on the feature vector to implement clustering learning for precision marketing and personalized online referral services. Finally, we evaluate the feasibility of big data mining with ML through the profit produced by the sale of goods. Experimental results show that ML can not only greatly improve the performance in big data mining, can also achieve precise marketing, and can further increasing about 20% marginal profit for each type of goods.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130220622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398659
Xiao Wen-juan, Liu Jian-feng
With the acceleration of urbanization, the increasingly complicated urban traffic conditions and the continuous expansion of the overall scale have posed great challenges to urban traffic management. It is necessary that Intelligent Transport System is introduced for the future development of urban traffic management. Based on this background, the visual sensing technology is applied to the intelligent traffic control system. The CCD camera with 5 million resolution is designed and used to analyze real-time traffic entering at each intersection of urban road and calculate the traffic volume of each lane and queue, such as the vehicles length, average waiting time and other traffic parameters, which could provide real-time data to the signal light control system for dynamic signal parameter configuration to achieve intelligent single-point light signal control, trunk control and regional control. The system can be popularized and applied in the fields of intelligent signal light control and traffic information collection.
{"title":"Application of vision sensing technology in urban intelligent traffic control system","authors":"Xiao Wen-juan, Liu Jian-feng","doi":"10.1109/CATA.2018.8398659","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398659","url":null,"abstract":"With the acceleration of urbanization, the increasingly complicated urban traffic conditions and the continuous expansion of the overall scale have posed great challenges to urban traffic management. It is necessary that Intelligent Transport System is introduced for the future development of urban traffic management. Based on this background, the visual sensing technology is applied to the intelligent traffic control system. The CCD camera with 5 million resolution is designed and used to analyze real-time traffic entering at each intersection of urban road and calculate the traffic volume of each lane and queue, such as the vehicles length, average waiting time and other traffic parameters, which could provide real-time data to the signal light control system for dynamic signal parameter configuration to achieve intelligent single-point light signal control, trunk control and regional control. The system can be popularized and applied in the fields of intelligent signal light control and traffic information collection.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398647
Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri
Reliable and timely detection of cyber attacks become indispensable to protect networks and systems. Internet control message protocol (ICMP) flood attacks are still one of the most challenging threats in both IPv4 and IPv6 networks. This paper proposed an approach based on Kullback-Leibler divergence (KLD) to detect ICMP-based Denial Of service (DOS) and Distributed Denial Of Service (DDOS) flooding attacks. This is motivated by the high capacity of KLD to quantitatively discriminate between two distributions. Here, the three-sigma rule is applied to the KLD distances for anomaly detection. We evaluated the effectiveness of this scheme by using the 1999 DARPA Intrusion Detection Evaluation Datasets.
可靠、及时地发现网络攻击是保护网络和系统的必要条件。ICMP (Internet control message protocol, Internet控制消息协议)泛洪攻击仍然是IPv4和IPv6网络中最具挑战性的威胁之一。本文提出了一种基于Kullback-Leibler散度(KLD)的icmp拒绝服务(DOS)和分布式拒绝服务(DDOS)洪水攻击检测方法。这是由KLD在两个分布之间进行定量区分的高能力所驱动的。在这里,将3 -sigma规则应用于KLD距离进行异常检测。我们使用1999年DARPA入侵检测评估数据集对该方案的有效性进行了评估。
{"title":"Detection of smurf flooding attacks using Kullback-Leibler-based scheme","authors":"Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri","doi":"10.1109/CATA.2018.8398647","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398647","url":null,"abstract":"Reliable and timely detection of cyber attacks become indispensable to protect networks and systems. Internet control message protocol (ICMP) flood attacks are still one of the most challenging threats in both IPv4 and IPv6 networks. This paper proposed an approach based on Kullback-Leibler divergence (KLD) to detect ICMP-based Denial Of service (DOS) and Distributed Denial Of Service (DDOS) flooding attacks. This is motivated by the high capacity of KLD to quantitatively discriminate between two distributions. Here, the three-sigma rule is applied to the KLD distances for anomaly detection. We evaluated the effectiveness of this scheme by using the 1999 DARPA Intrusion Detection Evaluation Datasets.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398663
Rivosoaniaina Alain Nimbol, Mahatody Thomas, R. J. Paul
Today we are forced to collaborate even remotely using collaborative working environment. In such an environment, non-verbal communication is not taken into account. According to Judee K. Burgoon, sixty percent of the communication are non-verbal. To bridge this gap, we suggest the use of virtual reality, namely, telepresence tools that use virtual reality Headsets. In this article we present a state of the art of the telepresence devices for capturing tones, facial expressions and body language, all of which improve the communication and understanding of the message.
今天,我们被迫使用协作工作环境进行远程协作。在这样的环境中,非语言交流是不被考虑的。根据Judee K. Burgoon的说法,60%的交流是非语言的。为了弥补这一差距,我们建议使用虚拟现实,即使用虚拟现实耳机的远程呈现工具。在这篇文章中,我们介绍了一种用于捕捉音调、面部表情和肢体语言的远程呈现设备的最新技术,所有这些都可以提高对信息的沟通和理解。
{"title":"State of the art of telepresence with a virtual reality headset","authors":"Rivosoaniaina Alain Nimbol, Mahatody Thomas, R. J. Paul","doi":"10.1109/CATA.2018.8398663","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398663","url":null,"abstract":"Today we are forced to collaborate even remotely using collaborative working environment. In such an environment, non-verbal communication is not taken into account. According to Judee K. Burgoon, sixty percent of the communication are non-verbal. To bridge this gap, we suggest the use of virtual reality, namely, telepresence tools that use virtual reality Headsets. In this article we present a state of the art of the telepresence devices for capturing tones, facial expressions and body language, all of which improve the communication and understanding of the message.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121555127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398653
Shuaixian Wang, Chenjiao Tan, Zheng Wang, Fuzeng Yang, Zhijie Liu
To realize the navigation and positioning of agricultural robot in closed-type orchard, this paper presented a method of visual measurement based on QR code. Firstly, we constructed a monocular vision measurement model based on the QR code target, then extracted the structural feature points of the QR code target in the orchard by image processing, and combined camera calibration and vision measurement gaining the relative pose between the camera and the QR code target. According to the results of experiments, this method boasts good real-time performance as the longest consuming time of applying this method to process an image for visual measurement is 0.23ms, in addition, the repeatability accuracy tests show that the maximum translation deviation is less than 3.2cm and the maximum rotation deviation is less than 2.9 ° in the range of measurement.
{"title":"A method of visual measurement based on QR code in navigation and positioning of closed-type orchard","authors":"Shuaixian Wang, Chenjiao Tan, Zheng Wang, Fuzeng Yang, Zhijie Liu","doi":"10.1109/CATA.2018.8398653","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398653","url":null,"abstract":"To realize the navigation and positioning of agricultural robot in closed-type orchard, this paper presented a method of visual measurement based on QR code. Firstly, we constructed a monocular vision measurement model based on the QR code target, then extracted the structural feature points of the QR code target in the orchard by image processing, and combined camera calibration and vision measurement gaining the relative pose between the camera and the QR code target. According to the results of experiments, this method boasts good real-time performance as the longest consuming time of applying this method to process an image for visual measurement is 0.23ms, in addition, the repeatability accuracy tests show that the maximum translation deviation is less than 3.2cm and the maximum rotation deviation is less than 2.9 ° in the range of measurement.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398655
Youmna El Hissi, Sara Arezki, A. Haqiq
Faced with many challenges, the concept of the governance of scientific research has emerged to answer questions of organization, structuring and regulation of this important section in higher education in Morocco. On the other hand, the technological revolution offers us several tools to support different fields and different activities, hence the establishment of an information system to ensure good governance of scientific research in the Moroccan university. This information system put in place, should demonstrate efficiency, performance and systematic alignment with the objectives of scientific research. Thus information system governance is a necessary step to ensure the governance of scientific research. The objective of this paper is to design a governance model of scientific research in the Moroccan university through the governance of its information system. This model is based on the use of recognized standards as: Cobit.5, ISO 38500, and ISO 27001, dedicated to the governance of information systems and taking into account the national context of the university.
{"title":"Conceptualization of an information system governance model dedicated to the governance of scientific research in the Moroccan University","authors":"Youmna El Hissi, Sara Arezki, A. Haqiq","doi":"10.1109/CATA.2018.8398655","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398655","url":null,"abstract":"Faced with many challenges, the concept of the governance of scientific research has emerged to answer questions of organization, structuring and regulation of this important section in higher education in Morocco. On the other hand, the technological revolution offers us several tools to support different fields and different activities, hence the establishment of an information system to ensure good governance of scientific research in the Moroccan university. This information system put in place, should demonstrate efficiency, performance and systematic alignment with the objectives of scientific research. Thus information system governance is a necessary step to ensure the governance of scientific research. The objective of this paper is to design a governance model of scientific research in the Moroccan university through the governance of its information system. This model is based on the use of recognized standards as: Cobit.5, ISO 38500, and ISO 27001, dedicated to the governance of information systems and taking into account the national context of the university.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124522262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398657
İsmail Hakkı Parlak, Cem Kösemen
In this paper, we describe a cloud hosted — mobile first system which generates music for Turkish makams, driven by hardware generated true random numbers. Random numbers are fed into system for determining the notes and note lengths of the song in chosen makam and tempo with chosen instruments and percussion. This system can generate completely random or musical compositions according to user preferences, even though its aim is not imitating the past genius composers and compose perfectly musical pieces. The experimental results show that this composition model can produce completely random or slightly artistic music having characteristics of Turkish makam music, hence introduce inspiration and entertainment to Turkish makam music enthusiasts.
{"title":"Automatic music generation by true random numbers for Turkish makams","authors":"İsmail Hakkı Parlak, Cem Kösemen","doi":"10.1109/CATA.2018.8398657","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398657","url":null,"abstract":"In this paper, we describe a cloud hosted — mobile first system which generates music for Turkish makams, driven by hardware generated true random numbers. Random numbers are fed into system for determining the notes and note lengths of the song in chosen makam and tempo with chosen instruments and percussion. This system can generate completely random or musical compositions according to user preferences, even though its aim is not imitating the past genius composers and compose perfectly musical pieces. The experimental results show that this composition model can produce completely random or slightly artistic music having characteristics of Turkish makam music, hence introduce inspiration and entertainment to Turkish makam music enthusiasts.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123478189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398654
Shulin Yan, S. Zhou, Yuguo Zhang
The modern signals of the Chinese Beidou III navigation system bring new features compared to the previous civilian signals, such as longer spreading code, involving secondary code, new modulation technique (i.e. Binary Offset Carrier BOC), data/pilot channels and so on. These innovations are able to enhance the signal acquisition robustness, but they also require specific acquisition techniques to handle the large data stream, deal with the problem of sign transition and side peaks caused by the secondary code and the BOC modulation respectively. This paper proposes a novel two-stage acquisition technique for realizing efficient acquisition of the B1C signal in the engineering implementation of the modern receiver. The first stage employs an extended parallelized Averaging Correlation (AC) search structure, which can cope with the sign transition problem, to coarsely capture the signal with high efficiency. At the second stage, a fine-search process is completed within a reduced searching range to provide high precision result. The involving of the later stage aims to avoid the side peaks effect in the tracking stage that can easily cause a false lock. In addition, both of the single and channel combining acquisition techniques are introduced, which give designers an option of implementing the acquisition with higher sensitivity but more resources. The experiment results demonstrate that the proposed method allows to use much cheaper FFT blocks and enables fast acquisition by parallel process. The proposed method can reduce the number of multiplications by at least 61% when the sampling frequency is over 50MHz while providing quite similar acquisition precisions with the conventional method.
{"title":"An efficient two-stage B1C signal acquisition technique for engineering implementation of the modern beidou receiver","authors":"Shulin Yan, S. Zhou, Yuguo Zhang","doi":"10.1109/CATA.2018.8398654","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398654","url":null,"abstract":"The modern signals of the Chinese Beidou III navigation system bring new features compared to the previous civilian signals, such as longer spreading code, involving secondary code, new modulation technique (i.e. Binary Offset Carrier BOC), data/pilot channels and so on. These innovations are able to enhance the signal acquisition robustness, but they also require specific acquisition techniques to handle the large data stream, deal with the problem of sign transition and side peaks caused by the secondary code and the BOC modulation respectively. This paper proposes a novel two-stage acquisition technique for realizing efficient acquisition of the B1C signal in the engineering implementation of the modern receiver. The first stage employs an extended parallelized Averaging Correlation (AC) search structure, which can cope with the sign transition problem, to coarsely capture the signal with high efficiency. At the second stage, a fine-search process is completed within a reduced searching range to provide high precision result. The involving of the later stage aims to avoid the side peaks effect in the tracking stage that can easily cause a false lock. In addition, both of the single and channel combining acquisition techniques are introduced, which give designers an option of implementing the acquisition with higher sensitivity but more resources. The experiment results demonstrate that the proposed method allows to use much cheaper FFT blocks and enables fast acquisition by parallel process. The proposed method can reduce the number of multiplications by at least 61% when the sampling frequency is over 50MHz while providing quite similar acquisition precisions with the conventional method.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125856641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}