首页 > 最新文献

2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)最新文献

英文 中文
A New Temporal and Spectral Evolution Polarization Mode Dispersion Model in Broadband Fiber Channel 宽带光纤信道中一种新的时谱演化极化模色散模型
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9674007
Bin Zhang, Nan Cui, Zhihao Li, C. Cao, Xiuwei Mao, Xianfeng Tang, Xiaoguang Zhang
We propose a new polarization mode dispersion (PMD) model for broadband channel optical fiber transmission system, which can reflect the statistical characteristics of time and frequency variations of PMD in the optical fiber. Then we analyze the influence of PMD on broadband channel communication system based on the proposed model.
提出了一种新的宽带信道光纤传输系统偏振模色散(PMD)模型,该模型能够反映光纤中偏振模色散的时间和频率变化的统计特性。在此基础上分析了PMD对宽带信道通信系统的影响。
{"title":"A New Temporal and Spectral Evolution Polarization Mode Dispersion Model in Broadband Fiber Channel","authors":"Bin Zhang, Nan Cui, Zhihao Li, C. Cao, Xiuwei Mao, Xianfeng Tang, Xiaoguang Zhang","doi":"10.1109/icicn52636.2021.9674007","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9674007","url":null,"abstract":"We propose a new polarization mode dispersion (PMD) model for broadband channel optical fiber transmission system, which can reflect the statistical characteristics of time and frequency variations of PMD in the optical fiber. Then we analyze the influence of PMD on broadband channel communication system based on the proposed model.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning Based Autonomous Exploration under Uncertainty with Hybrid Network on Graph 基于深度强化学习的图上混合网络不确定自主探索
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673941
Zhiwen Zhang, Chenghao Shi, Zhiwen Zeng, Hui Zhang
This paper mainly focuses on the autonomous exploration of unknown environments for mobile robots with deep reinforcement learning (DRL). To accurately model the environment, an exploration graph is constructed. Then, we propose a novel S-GRU network combing graph convolutional network (GCN) and gated recurrent units (GRU) based on the exploration graph to extract hybrid features. Both the spatial information and the historical information can be extracted by using S-GRU, which could help the optimal action selection by employing DRL. Specifically, In S-GRU, one GRU is performed to extract the inner information related to the historical trajectory, and another is used to combine the current and historical inner information as the current state feature. Simulation experimental results show that our approach is better than GCN-based and information entropy-based approaches on effectiveness, accuracy, and generalization.
本文主要研究基于深度强化学习(DRL)的移动机器人对未知环境的自主探索。为了准确地对环境建模,构造了一个勘探图。然后,我们提出了一种结合图卷积网络(GCN)和门控循环单元(GRU)的基于探索图的混合特征提取S-GRU网络。S-GRU可以同时提取空间信息和历史信息,为DRL的最优动作选择提供帮助。具体来说,在S-GRU中,一个GRU用于提取与历史轨迹相关的内部信息,另一个GRU用于将当前和历史内部信息结合起来作为当前状态特征。仿真实验结果表明,该方法在有效性、准确性和泛化性方面优于基于gcn和基于信息熵的方法。
{"title":"Deep Reinforcement Learning Based Autonomous Exploration under Uncertainty with Hybrid Network on Graph","authors":"Zhiwen Zhang, Chenghao Shi, Zhiwen Zeng, Hui Zhang","doi":"10.1109/icicn52636.2021.9673941","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673941","url":null,"abstract":"This paper mainly focuses on the autonomous exploration of unknown environments for mobile robots with deep reinforcement learning (DRL). To accurately model the environment, an exploration graph is constructed. Then, we propose a novel S-GRU network combing graph convolutional network (GCN) and gated recurrent units (GRU) based on the exploration graph to extract hybrid features. Both the spatial information and the historical information can be extracted by using S-GRU, which could help the optimal action selection by employing DRL. Specifically, In S-GRU, one GRU is performed to extract the inner information related to the historical trajectory, and another is used to combine the current and historical inner information as the current state feature. Simulation experimental results show that our approach is better than GCN-based and information entropy-based approaches on effectiveness, accuracy, and generalization.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Malicious URL Detection Technology Based on BERT Model 基于BERT模型的恶意URL检测技术研究
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673860
Wei-hwa Chang, Fei Du, Yijing Wang
In network security, as malicious URLs increase and change, their detection has gradually become more important. The existing malicious URL detection methods lack the description of location and context semantics. This paper proposes a malicious URL based on the BERT model. The URL detection method first uses the preprocessing method to solve the problem of a large number of random characters forming words in the URL, uses special symbols as a separator to segment the URL, and then trains the BERT model to extract the short string characteristics of the URL and classify it. The experimental results show that the method’s accuracy is 98.30%, the recall rate is 95.21%, and the F1 value is 94.33%.
在网络安全中,随着恶意url的增加和变化,其检测也逐渐变得更加重要。现有的恶意URL检测方法缺乏对位置和上下文语义的描述。本文提出了一种基于BERT模型的恶意URL。URL检测方法首先使用预处理方法解决URL中大量随机字符构成单词的问题,使用特殊符号作为分隔符对URL进行分割,然后训练BERT模型提取URL的短串特征并进行分类。实验结果表明,该方法的准确率为98.30%,召回率为95.21%,F1值为94.33%。
{"title":"Research on Malicious URL Detection Technology Based on BERT Model","authors":"Wei-hwa Chang, Fei Du, Yijing Wang","doi":"10.1109/icicn52636.2021.9673860","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673860","url":null,"abstract":"In network security, as malicious URLs increase and change, their detection has gradually become more important. The existing malicious URL detection methods lack the description of location and context semantics. This paper proposes a malicious URL based on the BERT model. The URL detection method first uses the preprocessing method to solve the problem of a large number of random characters forming words in the URL, uses special symbols as a separator to segment the URL, and then trains the BERT model to extract the short string characteristics of the URL and classify it. The experimental results show that the method’s accuracy is 98.30%, the recall rate is 95.21%, and the F1 value is 94.33%.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-priority Queueing Mechanism for Channel Threshold based Multiple Access in FANETs 基于信道门限的fanet多址多优先级排队机制
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673909
B. Zheng, K. Zhuo, Huaxin Wu, Tiecheng Xie
In order to achieve the parallel transmission of multiple service types in flying ad hoc networks (FANET) with the limited wireless channel resource, and meet the requirement of high-reliability and ultra-low-delay for the highest priority service, a novel multi-priority queueing mechanism is proposed for channel threshold based multiple access (CTMA) protocol. Firstly, according to the principle of CTMA protocol, we model the mechanism as a multi-priority M/G/1 queueing system with server’s probabilistic vacations in terms of queueing theory. Then we propose two priority queueing schemes for different priority types in detail, and derive some performance metrics, such as packet’s average sojourn time, etc., for both schemes theoretically. Results are compared and verified through simulations finally. Results show that the preemptive-resume mechanism for the highest priority service in Scheme 2 gains a large improvement in the performance of the highest priority service at the expense of a little performance of other priority services.
为了在无线信道资源有限的情况下实现飞自组网(FANET)中多种业务类型的并行传输,满足高优先级业务的高可靠性和超低延迟要求,提出了一种基于信道门限的多址(CTMA)协议的多优先级排队机制。首先,根据CTMA协议的原理,利用排队理论将该机制建模为具有服务器概率休假的多优先级M/G/1排队系统。然后,我们针对不同的优先级类型提出了两种优先级队列方案,并从理论上推导了两种方案的一些性能指标,如数据包的平均停留时间等。最后通过仿真对结果进行了比较和验证。结果表明,方案2中最高优先级服务的抢占恢复机制在牺牲其他优先级服务性能的前提下,对最高优先级服务的性能有较大的提高。
{"title":"Multi-priority Queueing Mechanism for Channel Threshold based Multiple Access in FANETs","authors":"B. Zheng, K. Zhuo, Huaxin Wu, Tiecheng Xie","doi":"10.1109/icicn52636.2021.9673909","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673909","url":null,"abstract":"In order to achieve the parallel transmission of multiple service types in flying ad hoc networks (FANET) with the limited wireless channel resource, and meet the requirement of high-reliability and ultra-low-delay for the highest priority service, a novel multi-priority queueing mechanism is proposed for channel threshold based multiple access (CTMA) protocol. Firstly, according to the principle of CTMA protocol, we model the mechanism as a multi-priority M/G/1 queueing system with server’s probabilistic vacations in terms of queueing theory. Then we propose two priority queueing schemes for different priority types in detail, and derive some performance metrics, such as packet’s average sojourn time, etc., for both schemes theoretically. Results are compared and verified through simulations finally. Results show that the preemptive-resume mechanism for the highest priority service in Scheme 2 gains a large improvement in the performance of the highest priority service at the expense of a little performance of other priority services.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Authentication Based on Keystroke and Mouse Dynamics in Video Private Network 视频专网中基于击键和鼠标动态的连续认证
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673832
Shuyu Wang, Huixiang Zhang, Quanjun Pei, Pengfei Wang, Xiaohui Li
As a typical internal network, the video private network carries various video image resources and involves a large amount of citizen privacy. To prevent potential internal security threats, it is necessary to carry out continuous identity authentication for operators in the video private network. In this paper, a continuous authentication system based on keystroke and mouse dynamics is proposed. The keystroke and mouse operations of users are collected to extract their operating behavior characteristics. An artificial neural network model for each user is constructed for identity authentication. To achieve continuous identity authentication, a novel trust model is present to evaluate users’ identities dynamically. The experimental results show that the proposed method can identify impostors after an average of 115 actions and classify genuine users as impostors only after an average of more than 1,000 actions.
视频专网作为一种典型的内部网络,承载着各种视频图像资源,涉及到大量的公民隐私。为了防止潜在的内部安全威胁,有必要对视频专网中的运营商进行连续身份认证。本文提出了一种基于击键和鼠标动力学的连续认证系统。收集用户的键盘和鼠标操作,提取用户的操作行为特征。对每个用户构建人工神经网络模型进行身份认证。为了实现连续身份认证,提出了一种新的动态评估用户身份的信任模型。实验结果表明,所提出的方法可以在平均115个动作后识别出冒名顶替者,而只有在平均超过1000个动作后才能将真正的用户分类为冒名顶替者。
{"title":"Continuous Authentication Based on Keystroke and Mouse Dynamics in Video Private Network","authors":"Shuyu Wang, Huixiang Zhang, Quanjun Pei, Pengfei Wang, Xiaohui Li","doi":"10.1109/icicn52636.2021.9673832","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673832","url":null,"abstract":"As a typical internal network, the video private network carries various video image resources and involves a large amount of citizen privacy. To prevent potential internal security threats, it is necessary to carry out continuous identity authentication for operators in the video private network. In this paper, a continuous authentication system based on keystroke and mouse dynamics is proposed. The keystroke and mouse operations of users are collected to extract their operating behavior characteristics. An artificial neural network model for each user is constructed for identity authentication. To achieve continuous identity authentication, a novel trust model is present to evaluate users’ identities dynamically. The experimental results show that the proposed method can identify impostors after an average of 115 actions and classify genuine users as impostors only after an average of more than 1,000 actions.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Theory based Resource Allocation Algorithm in Terahertz Communication Networks 基于图论的太赫兹通信网络资源分配算法
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673829
Chaoyang Wang, Feng Yan
Terahertz (THz) communication is considered to be a promising technology in B5G communication systems. Efficient resource allocation algorithms play an important role in THz communication systems. In this paper, a graph theory based resource allocation algorithm is proposed for THz communication networks. The resource allocation is formulated into an optimization problem, which is a Mixed-Integer Nonlinear Programming (MINLP) problem. We thus divide it into subchannel allocation and power allocation problems. In the subchannel allocation problem, we transform it into a bipartite graph optimal matching problem, and propose a network flow algorithm to solve it. In the power allocation problem, we optimize the power allocation of each subchannel by penalty function method on the basis of subchannel allocation. Simulation results show that the proposed scheme has better performance than that based on long-user-central-window (LUCW) principle.
太赫兹(THz)通信被认为是B5G通信系统中有前途的技术。有效的资源分配算法在太赫兹通信系统中起着重要的作用。本文提出了一种基于图论的太赫兹通信网络资源分配算法。将资源分配转化为一个优化问题,即混合整数非线性规划问题。因此,我们将其分为子信道分配和功率分配问题。在子信道分配问题中,我们将其转化为二部图最优匹配问题,并提出了一种网络流算法来求解。在功率分配问题中,我们在子信道分配的基础上,采用罚函数法对各子信道的功率分配进行优化。仿真结果表明,该方案比基于长用户中心窗口(LUCW)原理的方案具有更好的性能。
{"title":"Graph Theory based Resource Allocation Algorithm in Terahertz Communication Networks","authors":"Chaoyang Wang, Feng Yan","doi":"10.1109/icicn52636.2021.9673829","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673829","url":null,"abstract":"Terahertz (THz) communication is considered to be a promising technology in B5G communication systems. Efficient resource allocation algorithms play an important role in THz communication systems. In this paper, a graph theory based resource allocation algorithm is proposed for THz communication networks. The resource allocation is formulated into an optimization problem, which is a Mixed-Integer Nonlinear Programming (MINLP) problem. We thus divide it into subchannel allocation and power allocation problems. In the subchannel allocation problem, we transform it into a bipartite graph optimal matching problem, and propose a network flow algorithm to solve it. In the power allocation problem, we optimize the power allocation of each subchannel by penalty function method on the basis of subchannel allocation. Simulation results show that the proposed scheme has better performance than that based on long-user-central-window (LUCW) principle.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reinforcement Learning for Suppressing Eavesdroppers in Wireless Communication System 无线通信系统中抑制窃听者的强化学习
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673999
Jia-chao Wang, Xiao Ma, Dan Li, Weijia Han
The development of wireless communication technology requires higher security of wireless channel transmission. In wireless communication systems, active eavesdropping is a common method. Eavesdroppers send signals while eavesdropping, which provides the possibility for detection. Aiming at the problem of how to find the target position, this paper proposes a cooperative method to suppress eavesdropping nodes by using multi-agent method (SECM) in reinforcement learning. In our work, we introduce a UAV agent with a ranger of vision, which can find eavesdropping nodes through electromagnetic information and track their positions in real time. The UAV shares the eavesdropper’s position with the mobile jammer. Furthermore, fixed jammers are added in the scene to cooperate with the mobile jammer to pursue and form a cooperative strategy. The strategy can optimize the suppression efficiency. The simulation results show that the cooperative suppression eavesdropping algorithm proposed in this paper has better performance in detection than traditional Q-learning algorithm.
无线通信技术的发展对无线信道传输的安全性提出了更高的要求。在无线通信系统中,主动窃听是一种常用的方法。窃听者在窃听的同时会发送信号,这就提供了被发现的可能性。针对如何找到目标位置的问题,本文提出了一种利用多智能体方法(SECM)在强化学习中协同抑制窃听节点的方法。在我们的工作中,我们引入了一种具有视觉游侠的无人机agent,它可以通过电磁信息找到窃听节点并实时跟踪其位置。无人机与移动干扰机共享窃听者的位置。此外,在场景中加入固定干扰机,与移动干扰机合作,追求并形成合作策略。该策略可以优化抑制效率。仿真结果表明,本文提出的协同抑制窃听算法比传统的q -学习算法具有更好的检测性能。
{"title":"Reinforcement Learning for Suppressing Eavesdroppers in Wireless Communication System","authors":"Jia-chao Wang, Xiao Ma, Dan Li, Weijia Han","doi":"10.1109/icicn52636.2021.9673999","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673999","url":null,"abstract":"The development of wireless communication technology requires higher security of wireless channel transmission. In wireless communication systems, active eavesdropping is a common method. Eavesdroppers send signals while eavesdropping, which provides the possibility for detection. Aiming at the problem of how to find the target position, this paper proposes a cooperative method to suppress eavesdropping nodes by using multi-agent method (SECM) in reinforcement learning. In our work, we introduce a UAV agent with a ranger of vision, which can find eavesdropping nodes through electromagnetic information and track their positions in real time. The UAV shares the eavesdropper’s position with the mobile jammer. Furthermore, fixed jammers are added in the scene to cooperate with the mobile jammer to pursue and form a cooperative strategy. The strategy can optimize the suppression efficiency. The simulation results show that the cooperative suppression eavesdropping algorithm proposed in this paper has better performance in detection than traditional Q-learning algorithm.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123815889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New DOA Estimation Algorithm Based on PSO-Gauss-Newton 一种新的基于PSO-Gauss-Newton的DOA估计算法
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673931
Xuerong Cui, Rongrong Zhou, Haihua Chen, Yucheng Zhang, Shibao Li, Jingyao Zhang
Direction-of-Arrival (DOA) estimation is a basic and important problem in sensor array signal processing. In order to solve this problem, many algorithms have been proposed. Among them, the Stochastic Maximum Likelihood (SML) algorithm has become one of the most concerned algorithms because of its high DOA accuracy. However, the computational complexity of SML algorithm is very high, so Gauss-Newton algorithm is used as the analytical algorithm of SML in this paper. The traditional Gauss-Newton algorithm used in DOA estimation has some defects: (1) over reliance on the choice of initial values (2) fall into local optimum easily. In order to solve these defects and further reduce the computational complexity, this paper proposes a new DOA estimation algorithm based on PSO-Gauss-Newton. First of all, a limited solution space is proposed based on the precondition that the estimated signal must be non-negative definite. Then, according to the idea of PSO(Particle Swarm Optimization) algorithm, multiple scattering points are randomly distributed in the limited solution space. Each initial particle performs Gauss-Newton algorithm iteration separately. Finally, the global optimal solution is determined by comparison of all the convergence values. Simulation results the computational complexity of this algorithm is almost comparable to that of MUSIC algorithm.
到达方向估计是传感器阵列信号处理中的一个基本而重要的问题。为了解决这个问题,已经提出了许多算法。其中,随机极大似然(SML)算法因其较高的DOA精度而成为人们最关注的算法之一。然而,SML算法的计算复杂度很高,因此本文采用高斯-牛顿算法作为SML的解析算法。用于DOA估计的传统高斯-牛顿算法存在以下缺陷:(1)过于依赖初始值的选择;(2)容易陷入局部最优。为了解决这些缺陷,进一步降低计算复杂度,本文提出了一种新的基于PSO-Gauss-Newton的DOA估计算法。首先,在估计信号必须是非负确定的前提下,提出了有限解空间;然后,根据粒子群算法(PSO)的思想,在有限的解空间中随机分布多个散射点;每个初始粒子分别进行高斯-牛顿算法迭代。最后,通过比较各收敛值确定全局最优解。仿真结果表明,该算法的计算复杂度与MUSIC算法基本相当。
{"title":"A New DOA Estimation Algorithm Based on PSO-Gauss-Newton","authors":"Xuerong Cui, Rongrong Zhou, Haihua Chen, Yucheng Zhang, Shibao Li, Jingyao Zhang","doi":"10.1109/icicn52636.2021.9673931","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673931","url":null,"abstract":"Direction-of-Arrival (DOA) estimation is a basic and important problem in sensor array signal processing. In order to solve this problem, many algorithms have been proposed. Among them, the Stochastic Maximum Likelihood (SML) algorithm has become one of the most concerned algorithms because of its high DOA accuracy. However, the computational complexity of SML algorithm is very high, so Gauss-Newton algorithm is used as the analytical algorithm of SML in this paper. The traditional Gauss-Newton algorithm used in DOA estimation has some defects: (1) over reliance on the choice of initial values (2) fall into local optimum easily. In order to solve these defects and further reduce the computational complexity, this paper proposes a new DOA estimation algorithm based on PSO-Gauss-Newton. First of all, a limited solution space is proposed based on the precondition that the estimated signal must be non-negative definite. Then, according to the idea of PSO(Particle Swarm Optimization) algorithm, multiple scattering points are randomly distributed in the limited solution space. Each initial particle performs Gauss-Newton algorithm iteration separately. Finally, the global optimal solution is determined by comparison of all the convergence values. Simulation results the computational complexity of this algorithm is almost comparable to that of MUSIC algorithm.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Scalable Hybrid Network for Agriculture Environment Monitoring 一种可扩展的农业环境监测混合网络
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9674009
Susheng Ding, Junbao Zheng, Lurong Jiang, Wei Li, Meng Li, Fengcheng Mei
Nowadays, agricultural production needs to improve the quality and yield of crops by monitoring their growth environment. The monitoring locations have the characteristics of wide distribution, high density, and large quantity. Thus, a networking method suitable for agricultural environmental monitoring is required. LoRa wireless communication technology has the advantages of long range and strong diffraction ability, while its date rate is low. NRF24L01P is a single-chip wireless transceiver working in the 2.4 to 2.5 GHz ISM band. It has the advantages of high data rate, low energy consumption and cost effectiveness, but the communication range is short. By the combination of the two technologies, this article proposes a scalable hybrid networking method based on the needs of agricultural environment monitoring. This method takes the advantage of LoRa and NRF24L01P networking and is suitable for agricultural environmental data collection. The collected data is finally uploaded to the cloud via WiFi so that end users can remotely access the agricultural data. The experimental results show that the proposed hybrid network can improve the data collection efficiency and data transmission distance.
如今,农业生产需要通过监测作物生长环境来提高作物的质量和产量。监测点具有分布广、密度大、数量大的特点。因此,需要一种适合农业环境监测的网络化方法。LoRa无线通信技术具有距离远、衍射能力强的优点,但数据速率较低。NRF24L01P是一款工作在2.4 ~ 2.5 GHz ISM频段的单片无线收发器。它具有数据速率高、能耗低、性价比高等优点,但通信范围较短。本文结合这两种技术,提出了一种基于农业环境监测需求的可扩展混合组网方法。该方法利用LoRa和NRF24L01P组网优势,适用于农业环境数据采集。收集到的数据最后通过WiFi上传到云端,这样终端用户就可以远程访问农业数据。实验结果表明,该混合网络可以提高数据采集效率和数据传输距离。
{"title":"A Scalable Hybrid Network for Agriculture Environment Monitoring","authors":"Susheng Ding, Junbao Zheng, Lurong Jiang, Wei Li, Meng Li, Fengcheng Mei","doi":"10.1109/icicn52636.2021.9674009","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9674009","url":null,"abstract":"Nowadays, agricultural production needs to improve the quality and yield of crops by monitoring their growth environment. The monitoring locations have the characteristics of wide distribution, high density, and large quantity. Thus, a networking method suitable for agricultural environmental monitoring is required. LoRa wireless communication technology has the advantages of long range and strong diffraction ability, while its date rate is low. NRF24L01P is a single-chip wireless transceiver working in the 2.4 to 2.5 GHz ISM band. It has the advantages of high data rate, low energy consumption and cost effectiveness, but the communication range is short. By the combination of the two technologies, this article proposes a scalable hybrid networking method based on the needs of agricultural environment monitoring. This method takes the advantage of LoRa and NRF24L01P networking and is suitable for agricultural environmental data collection. The collected data is finally uploaded to the cloud via WiFi so that end users can remotely access the agricultural data. The experimental results show that the proposed hybrid network can improve the data collection efficiency and data transmission distance.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128740281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mode-Locked Vortex Fiber Laser Based on High-Order Mode Conversion 基于高阶模转换的锁模涡旋光纤激光器
Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673885
Haocun Wu, Jiangtao Xu, Longtao Wang, Linping Teng, Si Lv, F. Pang, Xianglong Zeng
We summarize two kinds of mode-locked fiber lasers (MLFLs) that generate intra-cavity optical vortex beams (OVBs) based on long period fiber gratings (LPFGs) and implement extra-cavity hybrid mode control with another kind of all-fiber mode converter called acoustically-induced fiber grating (AIFG). Firstly, the LPFG we used works at the turn-around point (TAP). Since mode conversion through TAP-LPFG can produce the complete set of eigenmodes of LP11 mode, OVBs are then generated by inducing a phase difference of $pi/2$ to the eigenmodes. Secondly, the 1.94 W average-power mode-locked pulses come from a MLFL in the dissipative soliton resonance (DSR) regime. The linear cavity is formed by two fiber loop mirrors (FLMs) whose splitting ratios are 50/50 and 5/95. The 5/95 FLM operates as a nonlinear optical loop mirror (NOLM) which aims at initiating stable DSR. The output fundamental mode is then fully or partially converted to high-order mode (HOM) through AIFG. Mode patterns are captured through an optical imaging system. Taking the advantage of all-fiber mode converters, our approach may expand the diversity of mode control under high-power condition and other researches in high-power fiber lasers.
本文总结了两种基于长周期光纤光栅(LPFGs)产生腔内光涡旋光束的锁模光纤激光器(MLFLs),并利用另一种全光纤模式转换器声致光纤光栅(AIFG)实现腔外混合模式控制。首先,我们使用的LPFG在转弯点(TAP)工作。由于通过TAP-LPFG进行模式转换可以产生LP11模式的完整本征模集,因此通过对本征模诱导$pi/2$的相位差来产生ovb。其次,平均功率1.94 W的锁模脉冲来自耗散孤子共振(DSR)状态下的MLFL。线性腔由两个分裂比分别为50/50和5/95的光纤环形反射镜组成。5/95 FLM作为一个非线性光学环镜(NOLM)工作,旨在启动稳定的DSR。然后通过AIFG将输出基模全部或部分转换为高阶模(HOM)。模式模式通过光学成像系统捕获。利用全光纤模式变换器的优势,我们的方法可以扩展高功率条件下模式控制的多样性和高功率光纤激光器的其他研究。
{"title":"Mode-Locked Vortex Fiber Laser Based on High-Order Mode Conversion","authors":"Haocun Wu, Jiangtao Xu, Longtao Wang, Linping Teng, Si Lv, F. Pang, Xianglong Zeng","doi":"10.1109/icicn52636.2021.9673885","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673885","url":null,"abstract":"We summarize two kinds of mode-locked fiber lasers (MLFLs) that generate intra-cavity optical vortex beams (OVBs) based on long period fiber gratings (LPFGs) and implement extra-cavity hybrid mode control with another kind of all-fiber mode converter called acoustically-induced fiber grating (AIFG). Firstly, the LPFG we used works at the turn-around point (TAP). Since mode conversion through TAP-LPFG can produce the complete set of eigenmodes of LP11 mode, OVBs are then generated by inducing a phase difference of $pi/2$ to the eigenmodes. Secondly, the 1.94 W average-power mode-locked pulses come from a MLFL in the dissipative soliton resonance (DSR) regime. The linear cavity is formed by two fiber loop mirrors (FLMs) whose splitting ratios are 50/50 and 5/95. The 5/95 FLM operates as a nonlinear optical loop mirror (NOLM) which aims at initiating stable DSR. The output fundamental mode is then fully or partially converted to high-order mode (HOM) through AIFG. Mode patterns are captured through an optical imaging system. Taking the advantage of all-fiber mode converters, our approach may expand the diversity of mode control under high-power condition and other researches in high-power fiber lasers.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1