首页 > 最新文献

2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)最新文献

英文 中文
A Voice Encryption Method Based on Complex Bao Chaos System 基于复杂包混沌系统的语音加密方法
Huan Ye, Pengfei Chen, Shaobin Zhu, Yue Wang, Z. Yu, C. Jiang
Based on the Bao chaotic system, a new type system is constructed, which is called complex Bao chaotic system. This proposed system is chaotic by investigating dynamic characteristics. The chaotic sequence generated by audio is numerically simulated by scrambling and diffusion, and encryption and decryption are realized. The analysis results show that the encryption algorithm has good performance.
在包氏混沌系统的基础上,构造了一种新型的复杂包氏混沌系统。通过对系统动态特性的研究,该系统是混沌的。对音频产生的混沌序列进行了置乱和扩散的数值模拟,并实现了加密和解密。分析结果表明,该加密算法具有良好的性能。
{"title":"A Voice Encryption Method Based on Complex Bao Chaos System","authors":"Huan Ye, Pengfei Chen, Shaobin Zhu, Yue Wang, Z. Yu, C. Jiang","doi":"10.1109/CCPQT56151.2022.00053","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00053","url":null,"abstract":"Based on the Bao chaotic system, a new type system is constructed, which is called complex Bao chaotic system. This proposed system is chaotic by investigating dynamic characteristics. The chaotic sequence generated by audio is numerically simulated by scrambling and diffusion, and encryption and decryption are realized. The analysis results show that the encryption algorithm has good performance.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Deep Learning-based Demand Forecasting in Network Slicing 基于多模态深度学习的网络切片需求预测
B. Mareri, Ruijie Ou, Yu Pang
One of the critical benefits of emerging wireless networks is the provision of accurate demand predictions. Resource availability is one of the essential factors ensuring such connectivity in heterogeneous networks. Despite extensive research interest in this domain, the fundamental issues are to ensure efficient allocation and exploitation of network resources. This paper proposes a multi-model-based model to forecast demand requirements utilizing deep learning techniques in network slicing. We present a framework that employs multiple forecasting models to perform forecasting by using historical information and cognitively selecting the most accurate forecasting model. Furthermore, we conduct a detailed analysis of several forecasting models from various papers. According to the findings, the proposed forecasting framework favors deep learning models and enhances fairness and guarantees experience quality. Moreover, we have demonstrated that the suggested approach can account for forecasting variations.
新兴无线网络的一个关键好处是提供准确的需求预测。资源可用性是保证异构网络中这种连通性的基本因素之一。尽管在这一领域有广泛的研究兴趣,但基本问题是如何保证网络资源的有效分配和利用。本文提出了一种基于多模型的模型,利用深度学习技术在网络切片中预测需求需求。我们提出了一个框架,通过使用历史信息和认知选择最准确的预测模型,采用多个预测模型进行预测。此外,我们还对不同文献中的几种预测模型进行了详细的分析。根据研究结果,所提出的预测框架有利于深度学习模型,提高公平性并保证体验质量。此外,我们已经证明,建议的方法可以解释预测变化。
{"title":"Multimodal Deep Learning-based Demand Forecasting in Network Slicing","authors":"B. Mareri, Ruijie Ou, Yu Pang","doi":"10.1109/CCPQT56151.2022.00049","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00049","url":null,"abstract":"One of the critical benefits of emerging wireless networks is the provision of accurate demand predictions. Resource availability is one of the essential factors ensuring such connectivity in heterogeneous networks. Despite extensive research interest in this domain, the fundamental issues are to ensure efficient allocation and exploitation of network resources. This paper proposes a multi-model-based model to forecast demand requirements utilizing deep learning techniques in network slicing. We present a framework that employs multiple forecasting models to perform forecasting by using historical information and cognitively selecting the most accurate forecasting model. Furthermore, we conduct a detailed analysis of several forecasting models from various papers. According to the findings, the proposed forecasting framework favors deep learning models and enhances fairness and guarantees experience quality. Moreover, we have demonstrated that the suggested approach can account for forecasting variations.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Image Encryption Algorithm Based on Artificial Images and Complex Logistics Mapping 基于人工图像和复杂物流映射的图像加密算法
Jinbo Wu, Zhe Huang, Fangfang Zhang, Lei Kou, Chang Chun Pan, Huan Ye, Dong Wang, Peikun Zhang
Due to the intuitiveness of image transmission information, the application of images can be ubiquitous, correspondingly, the security of image information has become more significant. As chaos is compatible with cryptography due to some of its characteristics such as sensitivity of initial values, randomness, etc., it is extensively used in image encryption. In this paper, based on artificial images and 2D lagging complex Logistics mapping (2D-LCLM), a novel image encryption algorithm was proposed. Firstly, the pseudorandom sequences generated by 2D-LCLM is used to construct an artificial image. Artificial images can replace the traditional iterative encryption mechanism. Secondly, adopt chaotic sequences to position the original and artificial images. Finally, DNA XOR manipulation is used to merge the two images. Experimental simulation of the standard test graph, through the analysis we can know the encryption algorithm based on artificial image has good encryption effect and security performance.
由于图像传输信息的直观性,图像的应用可以无处不在,相应地,图像信息的安全性也变得更加重要。混沌由于其初始值的敏感性、随机性等特点与密码学兼容,在图像加密中得到了广泛的应用。本文基于人工图像和二维滞后复杂物流映射(2D- lclm),提出了一种新的图像加密算法。首先,利用2D-LCLM生成的伪随机序列构建人工图像;人工图像可以代替传统的迭代加密机制。其次,采用混沌序列对原始图像和人工图像进行定位。最后,使用DNA异或操作将两幅图像合并。实验模拟了标准测试图,通过分析可知基于人工图像的加密算法具有良好的加密效果和安全性能。
{"title":"The Image Encryption Algorithm Based on Artificial Images and Complex Logistics Mapping","authors":"Jinbo Wu, Zhe Huang, Fangfang Zhang, Lei Kou, Chang Chun Pan, Huan Ye, Dong Wang, Peikun Zhang","doi":"10.1109/CCPQT56151.2022.00054","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00054","url":null,"abstract":"Due to the intuitiveness of image transmission information, the application of images can be ubiquitous, correspondingly, the security of image information has become more significant. As chaos is compatible with cryptography due to some of its characteristics such as sensitivity of initial values, randomness, etc., it is extensively used in image encryption. In this paper, based on artificial images and 2D lagging complex Logistics mapping (2D-LCLM), a novel image encryption algorithm was proposed. Firstly, the pseudorandom sequences generated by 2D-LCLM is used to construct an artificial image. Artificial images can replace the traditional iterative encryption mechanism. Secondly, adopt chaotic sequences to position the original and artificial images. Finally, DNA XOR manipulation is used to merge the two images. Experimental simulation of the standard test graph, through the analysis we can know the encryption algorithm based on artificial image has good encryption effect and security performance.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122709190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient for Multi-UAV Cognitive Radio Network with Normalized Spectrum Algorithm 基于归一化频谱算法的多无人机认知无线网络节能
Jiu Xiong, Zhiyong Luo
Unmanned aerial vehicle(UAV) combined with cognitive radio(CR) is a practical application scenario due to its portability and high maneuverability. Aiming at the low energy efficiency of cognitive UAV networks, this paper introduces the normalized spectrum (NS) sensing algorithm into multi-UAV cognitive radio networks to explore the energy efficiency based on cooperative spectrum sensing. Then with a fixed false alarm probability of a single decision, we compare the energy efficiency of the multi-UAV cognitive radio network using the NS algorithm with the energy detection (ED) algorithm. It shows that the NS detection algorithm can achieve a higher energy efficiency than the ED detection algorithm due to the introduction of an additional tunable parameter “the number of segments”. The further simulation indicates that the NS algorithm performs better than the ED algorithm in dynamic noise scenarios with time-varying noise power. Finally, we obtain the optimal sensing time of the NS algorithm to maximize energy efficiency. It shows that a matched pair of sensing time and the number of segments will achieve better performance.
无人机与认知无线电相结合,具有便携性和高机动性,是一种实际应用场景。针对认知无人机网络能量效率低的问题,将归一化频谱感知算法引入多无人机认知无线电网络,探索基于协同频谱感知的能量效率。然后在单个决策的虚警概率固定的情况下,比较了基于NS算法和能量检测(ED)算法的多无人机认知无线网络的能量效率。结果表明,NS检测算法由于引入了一个额外的可调参数“段数”,可以实现比ED检测算法更高的能量效率。进一步的仿真表明,在噪声功率随时间变化的动态噪声场景下,NS算法的性能优于ED算法。最后,我们得到了NS算法的最优感知时间,使能量效率最大化。结果表明,对感知时间和片段数量进行匹配可以获得更好的性能。
{"title":"Energy-efficient for Multi-UAV Cognitive Radio Network with Normalized Spectrum Algorithm","authors":"Jiu Xiong, Zhiyong Luo","doi":"10.1109/CCPQT56151.2022.00064","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00064","url":null,"abstract":"Unmanned aerial vehicle(UAV) combined with cognitive radio(CR) is a practical application scenario due to its portability and high maneuverability. Aiming at the low energy efficiency of cognitive UAV networks, this paper introduces the normalized spectrum (NS) sensing algorithm into multi-UAV cognitive radio networks to explore the energy efficiency based on cooperative spectrum sensing. Then with a fixed false alarm probability of a single decision, we compare the energy efficiency of the multi-UAV cognitive radio network using the NS algorithm with the energy detection (ED) algorithm. It shows that the NS detection algorithm can achieve a higher energy efficiency than the ED detection algorithm due to the introduction of an additional tunable parameter “the number of segments”. The further simulation indicates that the NS algorithm performs better than the ED algorithm in dynamic noise scenarios with time-varying noise power. Finally, we obtain the optimal sensing time of the NS algorithm to maximize energy efficiency. It shows that a matched pair of sensing time and the number of segments will achieve better performance.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128380553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Integrated System of Photon-Counting Underwater Wireless Optical Ranging and Communication 光子计数水下无线光测距与通信集成系统仿真
Hao Yang, Qiurong Yan, Shanglin Wang, Xiancheng Xiong, Peng Li, Wei Wang
Although many researchers have achieved wireless optical ranging and communication based on Avalanche Photon Diode (APD) detectors and PIN detectors. However, due to the low sensitivity of APD and PIN detectors, their working distances are limited. In order to achieve long-distance underwater wireless optical communication, a Single-Photon Avalanche Diode (SPAD) with photon-limited sensitivity is used to detect optical signals. In addition, most literatures do not specially design the data frames of ranging and communication, which makes it difficult to perform ranging and communication at the same time. In view of the fact that there is currently no systematic solution for simultaneous communication and high-precision ranging under underwater photon counting, this paper sorts out the relevant technical details, proposes an integrated ranging and communication scheme applied to photon counting, designs a special data frame that integrates ranging and communication, and proposes an extraction and recovery scheme for ranging and communication signals. Simulation shows that this scheme can achieve underwater photon counting wireless optical communication with a communication distance of 160m and an SER of 9.75×10-6, and the ranging accuracy is better than 1.59cm.
尽管许多研究者已经在雪崩光子二极管(APD)探测器和PIN探测器的基础上实现了无线光学测距和通信。然而,由于APD和PIN探测器的灵敏度较低,它们的工作距离受到限制。为了实现远距离水下无线光通信,采用了光子受限灵敏度的单光子雪崩二极管(SPAD)来检测光信号。此外,大多数文献没有专门设计测距和通信的数据帧,这给同时进行测距和通信带来了困难。针对水下光子计数下同时通信和高精度测距目前还没有系统的解决方案,本文对相关技术细节进行了梳理,提出了一种应用于光子计数的测距与通信一体化方案,设计了一种测距与通信一体化的专用数据帧,提出了测距与通信信号的提取与恢复方案。仿真结果表明,该方案可实现水下光子计数无线光通信,通信距离为160m, SER为9.75×10-6,测距精度优于1.59cm。
{"title":"Simulation of Integrated System of Photon-Counting Underwater Wireless Optical Ranging and Communication","authors":"Hao Yang, Qiurong Yan, Shanglin Wang, Xiancheng Xiong, Peng Li, Wei Wang","doi":"10.1109/CCPQT56151.2022.00024","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00024","url":null,"abstract":"Although many researchers have achieved wireless optical ranging and communication based on Avalanche Photon Diode (APD) detectors and PIN detectors. However, due to the low sensitivity of APD and PIN detectors, their working distances are limited. In order to achieve long-distance underwater wireless optical communication, a Single-Photon Avalanche Diode (SPAD) with photon-limited sensitivity is used to detect optical signals. In addition, most literatures do not specially design the data frames of ranging and communication, which makes it difficult to perform ranging and communication at the same time. In view of the fact that there is currently no systematic solution for simultaneous communication and high-precision ranging under underwater photon counting, this paper sorts out the relevant technical details, proposes an integrated ranging and communication scheme applied to photon counting, designs a special data frame that integrates ranging and communication, and proposes an extraction and recovery scheme for ranging and communication signals. Simulation shows that this scheme can achieve underwater photon counting wireless optical communication with a communication distance of 160m and an SER of 9.75×10-6, and the ranging accuracy is better than 1.59cm.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Photon-Counting Wireless Communication System Based on QAM Modulation 基于QAM调制的光子计数无线通信系统仿真
Shanglin Wang, Qiurong Yan, Hao Yang, Min Tu, Wenjiang Zhu, Hua Du
In order to study the application of high order modulation in single photon counting communication, a 16 QAM modulation communication system based on MATLAB platform was established by modeling the characteristics of single photon detector. We represent the transmitted signal as a single photon and perform equal interval counting at the receiving end to recover the signal and demodulate it. The influence of different illumination intensity, different sampling rate, different dark counting rate and different equal time interval partition on system bit error rate is studied. The experimental results show that BER decreases with increasing light intensity. When 1250 photons are used for per symbol, the BER reaches 5 × 10 ^-4, which can meet the requirements of communication system. In addition, counting at different equal time intervals is actually a process of resampling the signal. Therefore, the higher the sampling rate of the transmitter is, if the receiver needs to recover the signal with the same sampling rate, it will be easier to reach the photon saturation state when counting at equal time intervals, and more likely to cause a large bit error rate. The dark counting rate has great influence at low light intensity, but decreases with the increase of light intensity.
为了研究高阶调制在单光子计数通信中的应用,通过对单光子探测器的特性进行建模,建立了基于MATLAB平台的16 QAM调制通信系统。我们将传输的信号表示为单个光子,并在接收端执行等间隔计数以恢复信号并解调它。研究了不同光照强度、不同采样率、不同暗计数率和不同等时间间隔划分对系统误码率的影响。实验结果表明,随着光强的增加,误码率降低。当每个符号使用1250个光子时,误码率达到5 × 10 ^-4,可以满足通信系统的要求。此外,以不同的等时间间隔进行计数实际上是对信号进行重采样的过程。因此,发射机的采样率越高,如果接收机需要以相同的采样率恢复信号,则在等时间间隔计数时,更容易达到光子饱和状态,更容易造成较大的误码率。暗计数率在低光强下影响较大,但随光强的增大而减小。
{"title":"Simulation of Photon-Counting Wireless Communication System Based on QAM Modulation","authors":"Shanglin Wang, Qiurong Yan, Hao Yang, Min Tu, Wenjiang Zhu, Hua Du","doi":"10.1109/CCPQT56151.2022.00026","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00026","url":null,"abstract":"In order to study the application of high order modulation in single photon counting communication, a 16 QAM modulation communication system based on MATLAB platform was established by modeling the characteristics of single photon detector. We represent the transmitted signal as a single photon and perform equal interval counting at the receiving end to recover the signal and demodulate it. The influence of different illumination intensity, different sampling rate, different dark counting rate and different equal time interval partition on system bit error rate is studied. The experimental results show that BER decreases with increasing light intensity. When 1250 photons are used for per symbol, the BER reaches 5 × 10 ^-4, which can meet the requirements of communication system. In addition, counting at different equal time intervals is actually a process of resampling the signal. Therefore, the higher the sampling rate of the transmitter is, if the receiver needs to recover the signal with the same sampling rate, it will be easier to reach the photon saturation state when counting at equal time intervals, and more likely to cause a large bit error rate. The dark counting rate has great influence at low light intensity, but decreases with the increase of light intensity.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF Fingerprint Identification of Commercial UAV in Outdoor Environment 商用无人机在室外环境下的射频指纹识别
Ruifei Wang, Zeguang Li, Jie Tang, H. Wen
In recent years, commercial UAVs (unmanned aerial vehicles) have been widely used in various scenarios, and at the same time, they are also facing serious security threats. The traditional cryptography-based authentication mechanism can hardly meet the needs of new scenarios and applications, so RF fingerprint recognition technology with low complexity and high security has gradually become a research hotspot. There is a large literature on this aspect of research and experimentation. However, most of the data used in experiments are from laboratories or open outdoor environments with LoS (Line of Sight) signals. In practical application scenarios, commercial UAVs may work in some outdoor environments with complex interference factors. Therefore, this work proposes the verification of the RF fingerprint recognition capability of commercial UAVs in complex outdoor scenarios.
近年来,商用无人机在广泛应用于各种场景的同时,也面临着严重的安全威胁。传统的基于密码学的认证机制难以满足新场景和新应用的需求,低复杂度、高安全性的射频指纹识别技术逐渐成为研究热点。关于这方面的研究和实验有大量的文献。然而,实验中使用的大多数数据来自实验室或具有LoS(视线)信号的开放室外环境。在实际应用场景中,商用无人机可能会在一些干扰因素复杂的室外环境中工作。因此,本工作提出了商用无人机在复杂户外场景下射频指纹识别能力的验证。
{"title":"RF Fingerprint Identification of Commercial UAV in Outdoor Environment","authors":"Ruifei Wang, Zeguang Li, Jie Tang, H. Wen","doi":"10.1109/CCPQT56151.2022.00070","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00070","url":null,"abstract":"In recent years, commercial UAVs (unmanned aerial vehicles) have been widely used in various scenarios, and at the same time, they are also facing serious security threats. The traditional cryptography-based authentication mechanism can hardly meet the needs of new scenarios and applications, so RF fingerprint recognition technology with low complexity and high security has gradually become a research hotspot. There is a large literature on this aspect of research and experimentation. However, most of the data used in experiments are from laboratories or open outdoor environments with LoS (Line of Sight) signals. In practical application scenarios, commercial UAVs may work in some outdoor environments with complex interference factors. Therefore, this work proposes the verification of the RF fingerprint recognition capability of commercial UAVs in complex outdoor scenarios.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Portable EEG Acquisition System and Sleep Staging Method Based on Multi-scale Entropy Feature 便携式脑电采集系统设计及基于多尺度熵特征的睡眠分期方法
Qing Li, Zhuang He, Bo Deng, L. Zhang, Yonghong Li, Bo Yang, Huashan Ye
In this paper, we try to design of portable EEG acquisition system and sleep staging method based on multi-scale entropy feature. Portable EEG signal acquisition equipment adopts $mathbf{ARM}+mathbf{ADS}mathbf{1299}$ scheme, ARM processor adopts the STM32F103 series single-chip microcomputer, and TI ADS1299 as the signal acquisition front-end analog chip. We collected EEG signals by a neighborhood comparison digital filtering algorithm and a band-pass filter, which removes the pulse interference of the EEG signals, the artifacts of EMG and OMG. The pure EEG signal eas extracted by time domain, time-frequency domain, and nonlinear feature, and 10 features of the EEG signal segment every 30s are obtained, including 5-time domain features and 4 energy features based on wavelet packet transform. Multi-scale entropy MSE, sleep EEG dataset was expanded through Sleep-EDF, and feature extraction was performed. Random forest and SVM were used to classify and extracted features. Staging results show that the classification accuracy of random forest is higher than that of SVM, which accuracy rate can reach 92.5%, and the Kappa value above 0.85. To verify the reliability of our system, we take some clinical experiments in Jinniu Hospital of Sichuan Provincial People's Hospital.
本文尝试设计便携式脑电信号采集系统和基于多尺度熵特征的睡眠分期方法。便携式脑电信号采集设备采用$mathbf{ARM}+mathbf{ADS}mathbf{1299}$方案,ARM处理器采用STM32F103系列单片机,TI ADS1299作为信号采集前端模拟芯片。采用邻域比较数字滤波和带通滤波相结合的方法采集脑电信号,去除脑电信号的脉冲干扰、肌电信号和OMG伪影。通过时域、时频域和非线性特征提取纯脑电信号,每30s提取10个脑电信号片段特征,包括5个时域特征和4个基于小波包变换的能量特征。通过sleep - edf对多尺度熵MSE、睡眠脑电数据集进行扩展,并进行特征提取。使用随机森林和支持向量机对特征进行分类和提取。分期结果表明,随机森林的分类准确率高于SVM,准确率可达92.5%,Kappa值在0.85以上。为了验证系统的可靠性,我们在四川省人民医院金牛医院进行了一些临床实验。
{"title":"Design of Portable EEG Acquisition System and Sleep Staging Method Based on Multi-scale Entropy Feature","authors":"Qing Li, Zhuang He, Bo Deng, L. Zhang, Yonghong Li, Bo Yang, Huashan Ye","doi":"10.1109/CCPQT56151.2022.00071","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00071","url":null,"abstract":"In this paper, we try to design of portable EEG acquisition system and sleep staging method based on multi-scale entropy feature. Portable EEG signal acquisition equipment adopts $mathbf{ARM}+mathbf{ADS}mathbf{1299}$ scheme, ARM processor adopts the STM32F103 series single-chip microcomputer, and TI ADS1299 as the signal acquisition front-end analog chip. We collected EEG signals by a neighborhood comparison digital filtering algorithm and a band-pass filter, which removes the pulse interference of the EEG signals, the artifacts of EMG and OMG. The pure EEG signal eas extracted by time domain, time-frequency domain, and nonlinear feature, and 10 features of the EEG signal segment every 30s are obtained, including 5-time domain features and 4 energy features based on wavelet packet transform. Multi-scale entropy MSE, sleep EEG dataset was expanded through Sleep-EDF, and feature extraction was performed. Random forest and SVM were used to classify and extracted features. Staging results show that the classification accuracy of random forest is higher than that of SVM, which accuracy rate can reach 92.5%, and the Kappa value above 0.85. To verify the reliability of our system, we take some clinical experiments in Jinniu Hospital of Sichuan Provincial People's Hospital.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Model of Cross-Tenant Information Access Control in SAAS Cloud SAAS云中的跨租户信息访问控制模型
Chaojun Zhao, Can Yang, Ran Zhao
With the development of cloud computing and the application of multi-tenant technology, multi-tenant application platforms need to ensure the isolation and security of data when providing cloud services through resource sharing and on-demand customization, and also need to prohibit users from illegally accessing unauthorized resources. In addition, when users access relevant tenant information content across tenants, it is necessary to ensure the security in the cross-tenant collaboration scenario. Based on this, this paper proposes a cross-tenant user access control model, including its components, deployment mechanism and specific implementation process, and then we comprehensively analyzed the characteristics and performance of the model. This model not only ensures the security of data within each tenant, but also facilitates distributed cross-domain access among multiple tenants.
随着云计算的发展和多租户技术的应用,多租户应用平台在通过资源共享、按需定制等方式提供云服务时,需要保证数据的隔离和安全,同时也需要禁止用户非法访问未经授权的资源。此外,当用户跨租户访问相关租户信息内容时,需要确保跨租户协作场景的安全性。在此基础上,本文提出了一种跨租户用户访问控制模型,包括其组成、部署机制和具体实现过程,并综合分析了该模型的特点和性能。该模型不仅保证了每个租户内数据的安全性,而且便于多个租户之间的分布式跨域访问。
{"title":"The Model of Cross-Tenant Information Access Control in SAAS Cloud","authors":"Chaojun Zhao, Can Yang, Ran Zhao","doi":"10.1109/CCPQT56151.2022.00038","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00038","url":null,"abstract":"With the development of cloud computing and the application of multi-tenant technology, multi-tenant application platforms need to ensure the isolation and security of data when providing cloud services through resource sharing and on-demand customization, and also need to prohibit users from illegally accessing unauthorized resources. In addition, when users access relevant tenant information content across tenants, it is necessary to ensure the security in the cross-tenant collaboration scenario. Based on this, this paper proposes a cross-tenant user access control model, including its components, deployment mechanism and specific implementation process, and then we comprehensively analyzed the characteristics and performance of the model. This model not only ensures the security of data within each tenant, but also facilitates distributed cross-domain access among multiple tenants.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory 基于图论的RFID标签识别多读写器防碰撞算法
Chen Zhao, Xiaolin Jia
In a large-scale multiple RFID readers system, the signal between the readers will interfere with each other during the tags identification, which is called reader collision. Such that, this paper proposes a Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory (MRGT) to deal with the interference. The algorithm establishes an interference graph for the RFID readers network used to select the independent set of the RFID readers and avoid the collision among multiple readers by arranging different communication slots and frequencies for different reader sets. Simulation results show that the proposed algorithm increases the number of active readers per second by 6.4% and 11.56% respectively on average, and the tag recognition rate is also increased by 6 and 11 times respectively compared with the classic algorithm Neighbor Friendly Reader Anti-Collision Protocol (NFRA) and distributed color selection (DCS) algorithm, and so the system efficiency and tag recognition rate of MRGT are better than that of NFRA and DCS.
在大规模的多个RFID读写器系统中,在标签识别过程中,读写器之间的信号会相互干扰,称为读写器碰撞。为此,本文提出了一种基于图论(MRGT)的RFID标签识别多读写器防碰撞算法来处理干扰。该算法建立了RFID读写器网络的干扰图,用于选择RFID读写器的独立集,并通过为不同的读写器集安排不同的通信时隙和频率来避免多个读写器之间的冲突。仿真结果表明,与经典算法邻居友好阅读器防碰撞协议(NFRA)和分布式颜色选择(DCS)算法相比,该算法每秒平均增加了6.4%和11.56%的活跃阅读器数,标签识别率也分别提高了6倍和11倍,因此MRGT的系统效率和标签识别率都优于NFRA和DCS。
{"title":"A Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory","authors":"Chen Zhao, Xiaolin Jia","doi":"10.1109/CCPQT56151.2022.00067","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00067","url":null,"abstract":"In a large-scale multiple RFID readers system, the signal between the readers will interfere with each other during the tags identification, which is called reader collision. Such that, this paper proposes a Multiple RFID Readers Anti-collision Algorithm for RFID Tags Identification based on Graph Theory (MRGT) to deal with the interference. The algorithm establishes an interference graph for the RFID readers network used to select the independent set of the RFID readers and avoid the collision among multiple readers by arranging different communication slots and frequencies for different reader sets. Simulation results show that the proposed algorithm increases the number of active readers per second by 6.4% and 11.56% respectively on average, and the tag recognition rate is also increased by 6 and 11 times respectively compared with the classic algorithm Neighbor Friendly Reader Anti-Collision Protocol (NFRA) and distributed color selection (DCS) algorithm, and so the system efficiency and tag recognition rate of MRGT are better than that of NFRA and DCS.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126291312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1