首页 > 最新文献

2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)最新文献

英文 中文
Research on an Improved DSR Protocol Based on the MarKov Model 基于MarKov模型的改进DSR协议研究
Ting-dong Hu
Wireless Mesh Network (WMN) requires end-to-end performance of data transmission while reducing routing overhead. Therefore, an improved DSR (Dynamic Source Routing) protocol based on the MarKov model is designed. First, WCETT (Weighted Cumulative Expected Transmission Time) is applied to the DSR protocol as a routing parameter to select the link quality optimal path with the smallest bottleneck channel for data transmission, and locally optimize the traditional DSR protocol into an improved DSR (IDSR) protocol. Then, the MarKov model is used in the IDSR protocol to predict the geographic location of the node at the next moment, and determine if the original route is invalid base on this location, reroute to the next best route of WCETT if the original route is no longer valid and so on, until the optimal route available is selected. The performance is evaluated using NS2 simulation software, and the simulation results show that under the same wireless transmission and network size conditions, the IDSR protocol based on the MarKov model results in higher packet delivery rate, significantly reduced end-to-end average delay, route initiation frequency and routing overhead, when the node movement speed is accelerated, the IDSR protocol improves the network performance more significantly as the nodes move faster.
无线网状网络(Wireless Mesh Network, WMN)要求端到端的数据传输性能,同时减少路由开销。为此,设计了一种改进的基于马尔可夫模型的动态源路由协议。首先,将WCETT (Weighted Cumulative Expected Transmission Time)作为路由参数应用于DSR协议,选择具有最小瓶颈通道的链路质量最优路径进行数据传输,将传统DSR协议局部优化为改进的DSR (IDSR)协议。然后,在IDSR协议中使用MarKov模型预测节点下一时刻的地理位置,并根据该位置确定原路由是否无效,如果原路由不再有效,则重新路由到WCETT的下一个最佳路由,以此类推,直到选出可用的最优路由。利用NS2仿真软件对性能进行了评估,仿真结果表明,在相同的无线传输和网络规模条件下,基于MarKov模型的IDSR协议具有更高的分组传输速率,显著降低了端到端平均延迟、路由发起频率和路由开销,当节点移动速度加快时,随着节点移动速度的加快,IDSR协议对网络性能的改善更为显著。
{"title":"Research on an Improved DSR Protocol Based on the MarKov Model","authors":"Ting-dong Hu","doi":"10.1109/CCPQT56151.2022.00009","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00009","url":null,"abstract":"Wireless Mesh Network (WMN) requires end-to-end performance of data transmission while reducing routing overhead. Therefore, an improved DSR (Dynamic Source Routing) protocol based on the MarKov model is designed. First, WCETT (Weighted Cumulative Expected Transmission Time) is applied to the DSR protocol as a routing parameter to select the link quality optimal path with the smallest bottleneck channel for data transmission, and locally optimize the traditional DSR protocol into an improved DSR (IDSR) protocol. Then, the MarKov model is used in the IDSR protocol to predict the geographic location of the node at the next moment, and determine if the original route is invalid base on this location, reroute to the next best route of WCETT if the original route is no longer valid and so on, until the optimal route available is selected. The performance is evaluated using NS2 simulation software, and the simulation results show that under the same wireless transmission and network size conditions, the IDSR protocol based on the MarKov model results in higher packet delivery rate, significantly reduced end-to-end average delay, route initiation frequency and routing overhead, when the node movement speed is accelerated, the IDSR protocol improves the network performance more significantly as the nodes move faster.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cashmere and Wool Classification with Large Kernel Attention and Deep Learning 基于大核关注和深度学习的羊绒和羊毛分类
Can Zeng, Qiao Kang, Pcngfei Hu, Mintao Dong, F. Dong, Kewei Chen
Aiming at the problems of low manual detection efficiency and low automatic detection accuracy of cashmere and wool, a method is proposed to realize the image detection of cashmere and wool single fiber by using large kernel attention(LKA) mechanism and deep convolutional neural network. Based on the ConvNeXt network structure paradigm with simple structure, good scalability and high accuracy on ImageNet large datasets, the inverted residual structure improvement avoids information loss, and large kernel attention mechanism is added to make the model more accurate to pay attention to differentiated regions on the feature map space and channel, while considering the sparse amount of fiber image information, in order to avoid redundant training parameters and overfitting, the network is lightweight while maintaining the proportion of the ConvNeXt network hierarchy, and the LKA-RConvNeXt model is established. Finally, after training on 15,000 cashmere and wool datasets, the highest classification accuracy can reach 96.1%. Through ablation experiments and model comparison analysis, it is verified that the improved method used is beneficial to the accuracy of the model. The model can be used for cashmere and wool in automatic classification tasks, and contributes to backbone network for the subsequent fiber object detection task.
针对羊绒和羊毛手工检测效率低、自动检测精度低的问题,提出了一种利用大核注意(LKA)机制和深度卷积神经网络实现羊绒和羊毛单纤维图像检测的方法。基于ImageNet大数据集上结构简单、可扩展性好、精度高的ConvNeXt网络结构范式,对反向残差结构进行改进,避免了信息丢失,并加入大核关注机制,使模型更加准确地关注特征映射空间和通道上的差异化区域,同时考虑光纤图像信息的稀疏量,避免训练参数冗余和过拟合;在保持ConvNeXt网络层次比例的同时,实现了网络的轻量化,建立了LKA-RConvNeXt模型。最后,在15000个羊绒和羊毛数据集上训练后,分类准确率最高可达96.1%。通过烧蚀实验和模型对比分析,验证了所采用的改进方法有利于提高模型的精度。该模型可用于羊绒和羊毛的自动分类任务,并为后续的纤维目标检测任务提供骨干网络。
{"title":"Cashmere and Wool Classification with Large Kernel Attention and Deep Learning","authors":"Can Zeng, Qiao Kang, Pcngfei Hu, Mintao Dong, F. Dong, Kewei Chen","doi":"10.1109/CCPQT56151.2022.00058","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00058","url":null,"abstract":"Aiming at the problems of low manual detection efficiency and low automatic detection accuracy of cashmere and wool, a method is proposed to realize the image detection of cashmere and wool single fiber by using large kernel attention(LKA) mechanism and deep convolutional neural network. Based on the ConvNeXt network structure paradigm with simple structure, good scalability and high accuracy on ImageNet large datasets, the inverted residual structure improvement avoids information loss, and large kernel attention mechanism is added to make the model more accurate to pay attention to differentiated regions on the feature map space and channel, while considering the sparse amount of fiber image information, in order to avoid redundant training parameters and overfitting, the network is lightweight while maintaining the proportion of the ConvNeXt network hierarchy, and the LKA-RConvNeXt model is established. Finally, after training on 15,000 cashmere and wool datasets, the highest classification accuracy can reach 96.1%. Through ablation experiments and model comparison analysis, it is verified that the improved method used is beneficial to the accuracy of the model. The model can be used for cashmere and wool in automatic classification tasks, and contributes to backbone network for the subsequent fiber object detection task.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theoretical Analysis of an In-line Thin-core Fiber Based Refractometer 直列薄芯光纤折光计的理论分析
Lu Cai, Jun Liu, Fu-cheng Xiang, Shan Li
A highly sensitive liquid refractive index (RI) sensor with a single-mode fiber-multimode fiber-tapered thin-core fiber-single-mode fiber (SMTTS) structure can be simulated and the method is the beam propagation method (BPM). The modal perturbation between core and cladding mode happened because of modal mismatch and the transmission spectrum is calculated by BPM. Liquid RI and spectral dip wavelength shift for demodulating RI values is obtained and their relationship is approximately linear. To make a comparison, transmissions of single mode fiber-thin-core fiber-single mode fiber (STS) as well as single mode fiber-multimode fiber-thin-core fiber-single mode fiber (SMTS) are also calculated. It is significantly shown that the interference is improved by the segment of multimode fiber (MMF). And the tapered thin-core fiber (TCF) has the functions not only further enhance the fringe visibility, but also increase the RI sensitivity, which is higher with the thinner thin-core taper diameter. The average RI sensitivity would reach up to −116.7nm/RIU within the RI range of 1.33 to 1.39 if the taper diameter is $53.5 mumathrm{m}$. This is much higher than the value of SMTS structure. And in the practice application, it could be a slimmer taper in the SMTTS structure to improve the sensitivity just achieving by a simple fabrication process. All process could be finished using fusion splicer, cutter and hydrogen flame.
对单模光纤-多模光纤-锥形薄芯光纤-单模光纤(SMTTS)结构的高灵敏度液体折射率(RI)传感器进行了仿真,其方法为光束传播法(BPM)。模态失配导致芯模与包层模之间产生模态扰动,利用BPM计算透射谱。得到了解调RI值的液体RI和光谱倾角波长移,两者近似线性关系。为了进行比较,还计算了单模光纤-薄芯光纤-单模光纤(STS)以及单模光纤-多模光纤-薄芯光纤-单模光纤(SMTS)的传输量。结果表明,多模光纤的分段可以明显地改善干扰。锥形薄芯光纤(TCF)不仅具有进一步提高条纹可见度的功能,而且还具有提高RI灵敏度的功能,并且随着薄芯锥度直径的增加,RI灵敏度更高。在1.33 ~ 1.39的RI范围内,当锥径为53.5 mu mathm {m}$时,平均RI灵敏度可达- 116.7nm/RIU。这远远高于SMTS结构的值。在实际应用中,可以在SMTTS结构中采用更细的锥度,通过简单的制作工艺来提高灵敏度。所有工序均可通过熔接机、切割机和氢火焰完成。
{"title":"Theoretical Analysis of an In-line Thin-core Fiber Based Refractometer","authors":"Lu Cai, Jun Liu, Fu-cheng Xiang, Shan Li","doi":"10.1109/CCPQT56151.2022.00072","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00072","url":null,"abstract":"A highly sensitive liquid refractive index (RI) sensor with a single-mode fiber-multimode fiber-tapered thin-core fiber-single-mode fiber (SMTTS) structure can be simulated and the method is the beam propagation method (BPM). The modal perturbation between core and cladding mode happened because of modal mismatch and the transmission spectrum is calculated by BPM. Liquid RI and spectral dip wavelength shift for demodulating RI values is obtained and their relationship is approximately linear. To make a comparison, transmissions of single mode fiber-thin-core fiber-single mode fiber (STS) as well as single mode fiber-multimode fiber-thin-core fiber-single mode fiber (SMTS) are also calculated. It is significantly shown that the interference is improved by the segment of multimode fiber (MMF). And the tapered thin-core fiber (TCF) has the functions not only further enhance the fringe visibility, but also increase the RI sensitivity, which is higher with the thinner thin-core taper diameter. The average RI sensitivity would reach up to −116.7nm/RIU within the RI range of 1.33 to 1.39 if the taper diameter is $53.5 mumathrm{m}$. This is much higher than the value of SMTS structure. And in the practice application, it could be a slimmer taper in the SMTTS structure to improve the sensitivity just achieving by a simple fabrication process. All process could be finished using fusion splicer, cutter and hydrogen flame.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Modulation Mode Recognition of Communication Signals Based on Complex-Valued Neural Network 基于复值神经网络的通信信号调制模式自动识别
Xiaobo Yang, Ruonan Zhang, Hongmei Xie, Huakui Sun, Huanling Li
Intelligent transportation systems (ITS) are designed to provide efficient and comfortable transportation. The development of ITS has brought new communication challenges, which require faster and more reliable transmission of information. In this paper, we investigate the modulation mode recognition method of communication signals based on a complex-valued neural network (CVNN). By combining a complex-valued convolutional neural network (CVCNN) with complex-valued long short-term memory (CVLSTM) and adding a residual learning unit, a modulation recognition model is established. The model can automatically learn from complex-valued signals without manual feature extraction and can recognize 11 modulation modes (3 analog modulation modes and 8 digital modulation modes) with a signal-to-noise ratio (SNR) between −20 dB and 18 dB. We design a Gaussian filter, and divide the signal to be identified into high SNR signal and low SNR signal through SNR estimation. The low SNR signal is Gaussian filtered before modulation recognition, so as to improve its modulation recognition accuracy. The algorithm proposed in this paper directly recognizes the modulation mode of the complex-valued signal without any preprocessing, and the recognition accuracy is better than the existing algorithms. This work is of great significance to the improvement of information transmission speed and the construction of ITS.
智能交通系统(ITS)旨在提供高效和舒适的交通。智能交通系统的发展给通信带来了新的挑战,需要更快、更可靠地传输信息。本文研究了基于复值神经网络(CVNN)的通信信号调制模式识别方法。将复值卷积神经网络(CVCNN)与复值长短期记忆(CVLSTM)相结合,加入残差学习单元,建立了调制识别模型。该模型能够自动学习复值信号,无需人工特征提取,能够识别11种调制模式(3种模拟调制模式和8种数字调制模式),信噪比(SNR)在−20 ~ 18 dB之间。设计高斯滤波器,通过信噪比估计将待识别信号分为高信噪比信号和低信噪比信号。在调制识别前对低信噪比信号进行高斯滤波,提高其调制识别精度。本文提出的算法无需任何预处理,直接识别复值信号的调制方式,识别精度优于现有算法。该工作对提高信息传输速度,建设智能交通系统具有重要意义。
{"title":"Automatic Modulation Mode Recognition of Communication Signals Based on Complex-Valued Neural Network","authors":"Xiaobo Yang, Ruonan Zhang, Hongmei Xie, Huakui Sun, Huanling Li","doi":"10.1109/CCPQT56151.2022.00012","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00012","url":null,"abstract":"Intelligent transportation systems (ITS) are designed to provide efficient and comfortable transportation. The development of ITS has brought new communication challenges, which require faster and more reliable transmission of information. In this paper, we investigate the modulation mode recognition method of communication signals based on a complex-valued neural network (CVNN). By combining a complex-valued convolutional neural network (CVCNN) with complex-valued long short-term memory (CVLSTM) and adding a residual learning unit, a modulation recognition model is established. The model can automatically learn from complex-valued signals without manual feature extraction and can recognize 11 modulation modes (3 analog modulation modes and 8 digital modulation modes) with a signal-to-noise ratio (SNR) between −20 dB and 18 dB. We design a Gaussian filter, and divide the signal to be identified into high SNR signal and low SNR signal through SNR estimation. The low SNR signal is Gaussian filtered before modulation recognition, so as to improve its modulation recognition accuracy. The algorithm proposed in this paper directly recognizes the modulation mode of the complex-valued signal without any preprocessing, and the recognition accuracy is better than the existing algorithms. This work is of great significance to the improvement of information transmission speed and the construction of ITS.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Analysis of Wind Farm Industrial Control System Based on Hierarchical Threat Analysis Model Framework 基于层次威胁分析模型框架的风电场工业控制系统网络安全分析
Baihua Yang, Yue Zhang
Cybersecurity threat identification and analysis of wind farm industrial control systems (ICS-WF) is an important part of security work. The article innovatively proposes the STRIDE threat model as the basic structure to establish a framework of information system cybersecurity hierarchical threat analysis model for identifying and analyzing cyber security threats to ICS-WF. The framework model system covers three levels and six dimensions. The three levels refer to the Data Stream Layer, Context Layer, and Component Layer, which correspond to three parts of System Devices, Trust Boundary, and Application Process respectively; the six dimensions refer to six dimensions of Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege. Through this model framework for system analysis in a typical wind farm industrial control network environment, not only can we accurately identify and analyze cybersecurity threats, but also provide an effective basis for threat abatement and system design through the visualization of threats.
风电场工业控制系统的网络安全威胁识别与分析是安全工作的重要组成部分。本文创新性地提出了STRIDE威胁模型作为基本结构,建立了信息系统网络安全分层威胁分析模型框架,用于识别和分析ICS-WF面临的网络安全威胁。框架模型系统包括三个层次和六个维度。三层分别是数据流层、上下文层和组件层,分别对应系统设备、信任边界和应用过程三个部分;六个维度是指欺骗、篡改、拒绝、信息泄露、拒绝服务和提升特权六个维度。通过该模型框架对典型风电场工控网络环境进行系统分析,不仅可以准确识别和分析网络安全威胁,还可以通过威胁的可视化为威胁缓解和系统设计提供有效依据。
{"title":"Cybersecurity Analysis of Wind Farm Industrial Control System Based on Hierarchical Threat Analysis Model Framework","authors":"Baihua Yang, Yue Zhang","doi":"10.1109/CCPQT56151.2022.00008","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00008","url":null,"abstract":"Cybersecurity threat identification and analysis of wind farm industrial control systems (ICS-WF) is an important part of security work. The article innovatively proposes the STRIDE threat model as the basic structure to establish a framework of information system cybersecurity hierarchical threat analysis model for identifying and analyzing cyber security threats to ICS-WF. The framework model system covers three levels and six dimensions. The three levels refer to the Data Stream Layer, Context Layer, and Component Layer, which correspond to three parts of System Devices, Trust Boundary, and Application Process respectively; the six dimensions refer to six dimensions of Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege. Through this model framework for system analysis in a typical wind farm industrial control network environment, not only can we accurately identify and analyze cybersecurity threats, but also provide an effective basis for threat abatement and system design through the visualization of threats.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125626799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Phase Noise on Secrecy Performance of Cell-Free Massive MIMO Networks with Multi-Antenna Users 相位噪声对多天线无小区大规模MIMO网络保密性能的影响
Xianyu Zhang, Tao Liang, K. An, Xiaoqiang Qiao, Xiaoyu Wang, Xiaoli Sun
This paper studied the effect of phase noise on secrecy performance of the cell-free massive MIMO network with multi-antenna user terminals, where a multi-antenna eavesdropper will actively contaminate the uplink training. Specifically, using discrete-time Wiener model and random matrix theory, tractable expression for the achievable secrecy rate is derived, which can provide precise evaluation of key factors including phase noise, multi-antenna and arbitrary system configuration. Analytical results illustrate that strong phase noise and high wiretapping power would lead to performance degradation while the network can acquire multiplexing gain by equipping multiple antennas. Also, it indicates that phase noise at the user terminals imposes more rigorous influence than that on access points (APs). Simulations are presented to corroborate the derived results.
本文研究了相位噪声对多天线用户终端无小区大规模MIMO网络保密性能的影响,多天线窃听者会主动污染上行训练。具体而言,利用离散时间维纳模型和随机矩阵理论,导出了可实现保密率的可处理表达式,可以对相位噪声、多天线和任意系统配置等关键因素进行精确评估。分析结果表明,强相位噪声和高窃听功率会导致网络性能下降,而通过配置多天线可以获得复用增益。此外,还表明用户终端的相位噪声比接入点(ap)的相位噪声影响更大。通过仿真验证了所得结果。
{"title":"Impact of Phase Noise on Secrecy Performance of Cell-Free Massive MIMO Networks with Multi-Antenna Users","authors":"Xianyu Zhang, Tao Liang, K. An, Xiaoqiang Qiao, Xiaoyu Wang, Xiaoli Sun","doi":"10.1109/CCPQT56151.2022.00043","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00043","url":null,"abstract":"This paper studied the effect of phase noise on secrecy performance of the cell-free massive MIMO network with multi-antenna user terminals, where a multi-antenna eavesdropper will actively contaminate the uplink training. Specifically, using discrete-time Wiener model and random matrix theory, tractable expression for the achievable secrecy rate is derived, which can provide precise evaluation of key factors including phase noise, multi-antenna and arbitrary system configuration. Analytical results illustrate that strong phase noise and high wiretapping power would lead to performance degradation while the network can acquire multiplexing gain by equipping multiple antennas. Also, it indicates that phase noise at the user terminals imposes more rigorous influence than that on access points (APs). Simulations are presented to corroborate the derived results.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132015345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outlier Detection and Trust based Distributed Cooperative Spectrum Sensing in Internet of Vehicles 车联网中基于离群点检测和信任的分布式协同频谱感知
Haoshuang Zhao, Wen-hui Zhang, Xiuqiang Wu, Hongning Li, Liu He
With the expansion of the market of new energy vehicles and the requirement of low carbon emission, the resource reuse of the Internet of Vehicles (IoV) has attracted much attention. Cognitive radio technology is used to solve the problem of spectrum shortage of IoV. As a classic attack, spectrum sensing data falsification attack can mislead others to make wrong decisions. Traditional solutions mainly consider fixed network, which is difficult to apply to the fast moving IoV. This paper proposes a distributed collaboration method based on outlier detection, which uses outlier detection, trust management and block chain to defense spectrum sensing data falsification attack. Simulation results show that compared with traditional distributed cooperative spectrum sensing schemes, this method has certain performance advantages and can effectively defend against spectrum sensing data falsification attack launched by malicious users in IoV
随着新能源汽车市场的扩大和低碳排放的要求,车联网(IoV)的资源再利用备受关注。采用认知无线电技术解决车联网频谱不足的问题。频谱感知数据伪造攻击是一种典型的攻击,会误导他人做出错误的决策。传统的解决方案主要考虑固定网络,难以适用于快速发展的车联网。本文提出了一种基于离群点检测的分布式协作方法,利用离群点检测、信任管理和区块链技术抵御频谱感知数据伪造攻击。仿真结果表明,与传统的分布式协同频谱感知方案相比,该方法具有一定的性能优势,能够有效防御车联网中恶意用户发起的频谱感知数据伪造攻击
{"title":"Outlier Detection and Trust based Distributed Cooperative Spectrum Sensing in Internet of Vehicles","authors":"Haoshuang Zhao, Wen-hui Zhang, Xiuqiang Wu, Hongning Li, Liu He","doi":"10.1109/CCPQT56151.2022.00027","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00027","url":null,"abstract":"With the expansion of the market of new energy vehicles and the requirement of low carbon emission, the resource reuse of the Internet of Vehicles (IoV) has attracted much attention. Cognitive radio technology is used to solve the problem of spectrum shortage of IoV. As a classic attack, spectrum sensing data falsification attack can mislead others to make wrong decisions. Traditional solutions mainly consider fixed network, which is difficult to apply to the fast moving IoV. This paper proposes a distributed collaboration method based on outlier detection, which uses outlier detection, trust management and block chain to defense spectrum sensing data falsification attack. Simulation results show that compared with traditional distributed cooperative spectrum sensing schemes, this method has certain performance advantages and can effectively defend against spectrum sensing data falsification attack launched by malicious users in IoV","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved A* Algorithm for Roadless Networks Based on Triangular Mesh 基于三角网格的无路网络改进A*算法
L. Wang, Bo Jiang, Zhe Sun
In the path search problem under the roadless environmen such as the wild or remote areas, the existing path planning algorithms still have shortcomings such as slow speed and long planning path; The A* algorithm is efficient and optimal when dealing with node search problems, so it is widely used, but if you want to use the A* algorithm in a roadless environment, you need to divide the environment into a series of square grids or triangular grids. Compared with square grids, triangular grids can better adapt to various terrains and make full use of obstacle data; therefore, this paper proposes an improved A* algorithm based on triangular grids (referred to as TIA* algorithm), hope it can solve the dilemma of the current roadless algorithm. The experimental results show that the TIA* algorithm can realize the path planning under the roadless environmen, and compared with the traditional square grid-based A* algorithm and the RRT algorithm, it can shorten the planning time and the length of path under the premise of ensuring a high success rate.
在野外或偏远地区等无路环境下的路径搜索问题中,现有的路径规划算法仍然存在速度慢、规划路径长等缺点;A*算法在处理节点搜索问题时效率高、最优,因此得到了广泛的应用,但如果要在无路环境中使用A*算法,则需要将环境划分为一系列的正方形网格或三角形网格。与正方形网格相比,三角形网格能更好地适应各种地形,充分利用障碍物数据;因此,本文提出了一种改进的基于三角形网格的A*算法(简称TIA*算法),希望能解决目前无路算法的困境。实验结果表明,TIA*算法可以实现无路环境下的路径规划,与传统的基于方形网格的A*算法和RRT算法相比,可以在保证高成功率的前提下缩短规划时间和路径长度。
{"title":"An Improved A* Algorithm for Roadless Networks Based on Triangular Mesh","authors":"L. Wang, Bo Jiang, Zhe Sun","doi":"10.1109/CCPQT56151.2022.00030","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00030","url":null,"abstract":"In the path search problem under the roadless environmen such as the wild or remote areas, the existing path planning algorithms still have shortcomings such as slow speed and long planning path; The A* algorithm is efficient and optimal when dealing with node search problems, so it is widely used, but if you want to use the A* algorithm in a roadless environment, you need to divide the environment into a series of square grids or triangular grids. Compared with square grids, triangular grids can better adapt to various terrains and make full use of obstacle data; therefore, this paper proposes an improved A* algorithm based on triangular grids (referred to as TIA* algorithm), hope it can solve the dilemma of the current roadless algorithm. The experimental results show that the TIA* algorithm can realize the path planning under the roadless environmen, and compared with the traditional square grid-based A* algorithm and the RRT algorithm, it can shorten the planning time and the length of path under the premise of ensuring a high success rate.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"551 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multitask Semantic Segmentation Network Using Adaptive Multiscale Feature Fusion 基于自适应多尺度特征融合的多任务语义分割网络
Huilin Chen, Shengsong Yang, Ting Lyu
A multi-task semantic segmentation network architecture based on adaptive multi-scale feature fusion is proposed, which improves segmentation target edge details and small-scale target segmentation accuracy by combining boundary detection tasks and semantic segmentation tasks. The critical component of the architecture is the adaptive multi-scale feature fusion module, which can adaptively fuse the semantic feature information and boundary feature information of different scales, extract semantic features that contain more spatial data, and reduce the loss of spatial information of small-scale targets, thereby enhancing the network's ability to learn small-scale target features and boundary features. Experiments show that our designed network architecture can improve the segmentation accuracy of small-scale objects and optimize the edge details of segmented objects.
提出了一种基于自适应多尺度特征融合的多任务语义分割网络架构,将边界检测任务与语义分割任务相结合,提高了分割目标边缘细节和小尺度目标分割精度。该体系结构的关键组成部分是自适应多尺度特征融合模块,该模块可以自适应融合不同尺度的语义特征信息和边界特征信息,提取包含更多空间数据的语义特征,减少小尺度目标空间信息的丢失,从而增强网络学习小尺度目标特征和边界特征的能力。实验表明,所设计的网络结构可以提高小尺度目标的分割精度,并优化分割目标的边缘细节。
{"title":"Multitask Semantic Segmentation Network Using Adaptive Multiscale Feature Fusion","authors":"Huilin Chen, Shengsong Yang, Ting Lyu","doi":"10.1109/CCPQT56151.2022.00018","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00018","url":null,"abstract":"A multi-task semantic segmentation network architecture based on adaptive multi-scale feature fusion is proposed, which improves segmentation target edge details and small-scale target segmentation accuracy by combining boundary detection tasks and semantic segmentation tasks. The critical component of the architecture is the adaptive multi-scale feature fusion module, which can adaptively fuse the semantic feature information and boundary feature information of different scales, extract semantic features that contain more spatial data, and reduce the loss of spatial information of small-scale targets, thereby enhancing the network's ability to learn small-scale target features and boundary features. Experiments show that our designed network architecture can improve the segmentation accuracy of small-scale objects and optimize the edge details of segmented objects.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128853456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TD3-based Algorithm for Node Selection on Multi-tier Federated Learning 基于td3的多层联邦学习节点选择算法
Haojie Lin, Hong Wen, Wenjing Hou, Wenxin Lei
Federated learning enables distributed devices to conduct cooperative training models while protecting data privacy, so it is widely promoted in big data scenario and the scope of the Internet of Things. Federated learning in multi-tier computing can integrate the resources of the device-edge-fog-cloud layer to interact and cooperate. For example, in addition to offloading training locally, the tasks of the device layer can also be uploaded to the edge layer or the fog layer for training, while the global aggregation node can be selected at the edge or fog or cloud. However, due to the uncertainty of network bandwidth, computing resources and terminal training tasks at each layer, it brings challenges to resource allocation and task offloading under federated learning in multi-tier computing. Therefore, we propose a TD3-based algorithm which aims to solve how to select training nodes and aggregation nodes during joint training on multi-tier federated learning to minimize the average task delay. Numerical experiments show that our method has better performance in terms of energy consumption and delay compared with edge federated learning and traditional federated learning.
联邦学习使分布式设备能够在保护数据隐私的同时进行协同训练模型,因此在大数据场景和物联网范围内得到广泛推广。多层计算中的联邦学习可以整合设备-边缘-雾云层的资源进行交互和协作。例如,除了局部卸载训练外,还可以将设备层的任务上传到边缘层或雾层进行训练,同时可以在边缘或雾或云处选择全局聚合节点。然而,由于各层网络带宽、计算资源和终端训练任务的不确定性,给多层计算中联邦学习下的资源分配和任务卸载带来了挑战。因此,我们提出了一种基于td3的算法,旨在解决多层联邦学习联合训练时如何选择训练节点和聚合节点以最小化平均任务延迟的问题。数值实验表明,与边缘联邦学习和传统联邦学习相比,该方法在能量消耗和延迟方面具有更好的性能。
{"title":"TD3-based Algorithm for Node Selection on Multi-tier Federated Learning","authors":"Haojie Lin, Hong Wen, Wenjing Hou, Wenxin Lei","doi":"10.1109/CCPQT56151.2022.00034","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00034","url":null,"abstract":"Federated learning enables distributed devices to conduct cooperative training models while protecting data privacy, so it is widely promoted in big data scenario and the scope of the Internet of Things. Federated learning in multi-tier computing can integrate the resources of the device-edge-fog-cloud layer to interact and cooperate. For example, in addition to offloading training locally, the tasks of the device layer can also be uploaded to the edge layer or the fog layer for training, while the global aggregation node can be selected at the edge or fog or cloud. However, due to the uncertainty of network bandwidth, computing resources and terminal training tasks at each layer, it brings challenges to resource allocation and task offloading under federated learning in multi-tier computing. Therefore, we propose a TD3-based algorithm which aims to solve how to select training nodes and aggregation nodes during joint training on multi-tier federated learning to minimize the average task delay. Numerical experiments show that our method has better performance in terms of energy consumption and delay compared with edge federated learning and traditional federated learning.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1