首页 > 最新文献

2022 IEEE 22nd International Conference on Communication Technology (ICCT)最新文献

英文 中文
Stationary and Small Target Detection for Millimeter-Wave Radar 毫米波雷达的静止和小目标探测
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10072644
Shengjun Ren, Siyang Han, Baoshuai Wang
Using millimeter-wave radar to scan and detect stationary and small foreign object debris (FOD) on an airport runway surface is a popular solution in civil aviation safety. In this paper, we proposed a novel FOD detection method based on pattern classification theory using bi-spectral features. Firstly, a non-parameter weighted generalized matched filtering (WGMF) is utilized to accomplish clutter suppression with low false alarm rate. Then low dimensional bi-spectral features are extracted from radar returns which are utilized to form the feature vector. Finally, support vector data description (SVDD) is used to accomplish FOD detection. Real airport data measured by 77GHz radar are used to validate the proposed method. Experimental results using a golf ball with a diameter of 43mm show that the proposed method can effectively detect the target with low false alarm rate.
利用毫米波雷达对机场跑道表面的静止和微小异物碎片(FOD)进行扫描和检测是民航安全领域的热门解决方案。本文提出了一种基于双光谱特征的模式分类理论的FOD检测方法。首先,利用非参数加权广义匹配滤波(WGMF)实现低虚警率的杂波抑制;然后从雷达回波中提取低维双光谱特征,利用这些特征向量构成特征向量。最后,利用支持向量数据描述(SVDD)完成FOD检测。利用77GHz雷达实测的机场数据对该方法进行了验证。以直径为43mm的高尔夫球为实验对象,实验结果表明,该方法能有效检测目标,虚警率低。
{"title":"Stationary and Small Target Detection for Millimeter-Wave Radar","authors":"Shengjun Ren, Siyang Han, Baoshuai Wang","doi":"10.1109/ICCT56141.2022.10072644","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072644","url":null,"abstract":"Using millimeter-wave radar to scan and detect stationary and small foreign object debris (FOD) on an airport runway surface is a popular solution in civil aviation safety. In this paper, we proposed a novel FOD detection method based on pattern classification theory using bi-spectral features. Firstly, a non-parameter weighted generalized matched filtering (WGMF) is utilized to accomplish clutter suppression with low false alarm rate. Then low dimensional bi-spectral features are extracted from radar returns which are utilized to form the feature vector. Finally, support vector data description (SVDD) is used to accomplish FOD detection. Real airport data measured by 77GHz radar are used to validate the proposed method. Experimental results using a golf ball with a diameter of 43mm show that the proposed method can effectively detect the target with low false alarm rate.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Mobile IoT Security Protection Method Based on CPK and Zero Trust 基于CPK和零信任的增强移动物联网安全防护方法
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10073095
Zi-Xiao Jia, Wei Wu, Zhe Jia, Xiaopeng Yang, Qiang Wang, Hao Li
The security protection of mobile Internet of Things (IoT) is becoming increasingly important. In the traditional Single Package Authorization (SPA) protocol, the authenticity of the terminal cannot be proved. This paper propose a Combined Public Key (CPK) and zero-trust based architecture to protect mobile IoT from identity forgery attacks. Specifically, we adopt an enhanced SPA protocol based on CPK, where the CPK matrix merges of multi-dimensional information about users, devices, events and time. In this way, every event is encrypted. Besides, through adopting CPK, the deficiency of subject authenticity proof in SPA can be compensated. Experiments verify the efficiency and validity of the proposed CPK-based SPA authentication method in comparison with the state-of-the-art SPA protocol.
移动物联网(IoT)的安全防护变得越来越重要。在传统的SPA (Single Package Authorization)协议中,终端的真实性无法得到验证。本文提出了一种基于组合公钥(CPK)和零信任的架构来保护移动物联网免受身份伪造攻击。具体来说,我们采用了基于CPK的增强型SPA协议,其中CPK矩阵合并了用户、设备、事件和时间等多维信息。这样,每个事件都被加密了。此外,通过采用CPK,可以弥补SPA主体真实性证明的不足。实验验证了该方法的有效性和有效性,并与现有的SPA协议进行了比较。
{"title":"Enhanced Mobile IoT Security Protection Method Based on CPK and Zero Trust","authors":"Zi-Xiao Jia, Wei Wu, Zhe Jia, Xiaopeng Yang, Qiang Wang, Hao Li","doi":"10.1109/ICCT56141.2022.10073095","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073095","url":null,"abstract":"The security protection of mobile Internet of Things (IoT) is becoming increasingly important. In the traditional Single Package Authorization (SPA) protocol, the authenticity of the terminal cannot be proved. This paper propose a Combined Public Key (CPK) and zero-trust based architecture to protect mobile IoT from identity forgery attacks. Specifically, we adopt an enhanced SPA protocol based on CPK, where the CPK matrix merges of multi-dimensional information about users, devices, events and time. In this way, every event is encrypted. Besides, through adopting CPK, the deficiency of subject authenticity proof in SPA can be compensated. Experiments verify the efficiency and validity of the proposed CPK-based SPA authentication method in comparison with the state-of-the-art SPA protocol.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131126860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Trajectory Smoothing Optimization Algorithm of Underwater Long Baseline Positioning System 水下长基线定位系统轨迹平滑优化算法研究
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10072913
Kun Zhang, Shengrong Zhang, Jun‐ming Huang, Chong Shen
With the development of economy and military in today's era, more and more fields have higher and higher requirements for the positioning accuracy of underwater vehicles. However, so far, the main way of underwater positioning still depends on the underwater acoustic positioning method under the background of geometric principle. At the same time, according to the size of different receiving acoustic array, it can be divided into the following three categories: long baseline positioning technology (LBL), short baseline positioning technology (SBL) and ultra short baseline positioning technology (USBL). The positioning system used in this paper is based on the long baseline positioning system.
随着当今时代经济和军事的发展,越来越多的领域对水下航行器的定位精度提出了越来越高的要求。然而,到目前为止,水下定位的主要方式仍然依赖于几何原理背景下的水声定位方法。同时,根据接收声阵的大小不同,可分为以下三类:长基线定位技术(LBL)、短基线定位技术(SBL)和超短基线定位技术(USBL)。本文采用的定位系统是基于长基线定位系统。
{"title":"Research on Trajectory Smoothing Optimization Algorithm of Underwater Long Baseline Positioning System","authors":"Kun Zhang, Shengrong Zhang, Jun‐ming Huang, Chong Shen","doi":"10.1109/ICCT56141.2022.10072913","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072913","url":null,"abstract":"With the development of economy and military in today's era, more and more fields have higher and higher requirements for the positioning accuracy of underwater vehicles. However, so far, the main way of underwater positioning still depends on the underwater acoustic positioning method under the background of geometric principle. At the same time, according to the size of different receiving acoustic array, it can be divided into the following three categories: long baseline positioning technology (LBL), short baseline positioning technology (SBL) and ultra short baseline positioning technology (USBL). The positioning system used in this paper is based on the long baseline positioning system.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Geometry of the Locally Most Powerful Test 局部最强大测试的信息几何
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10073185
Yongqiang Cheng, Xiaoqiang Hua, Hao Wu, Hongqiang Wang
The locally most powerful (LMP) test for weak signal detection is studied from a information-geometric perspective. In such a framework, the LMP test is identified as the norm of natural whitened gradient on the statistical manifold consisting of a family of parametric probability distributions, which indicates that the LMP test pursues the steepest learning directions from the null hypothesis to the empirical distribution of the observed data on the manifold. A concrete geometrical interpretation of the LMP test in the theory of information geometry is presented, which leads to an immediate extension of the LMP test to a vector valued parameter case. Example of multi-component sinusoidal signal detection under low SNR conditions confirms a practical importance of the extended test.
从信息几何的角度研究了微弱信号检测的局部最强检验。在该框架中,LMP检验被识别为由一组参数概率分布组成的统计流形上的自然白化梯度的范数,这表明LMP检验从零假设到流形上观测数据的经验分布的学习方向是最陡峭的。给出了信息几何理论中LMP检验的具体几何解释,从而将LMP检验推广到向量值参数情况。低信噪比条件下的多分量正弦信号检测实例验证了扩展测试的实际重要性。
{"title":"Information Geometry of the Locally Most Powerful Test","authors":"Yongqiang Cheng, Xiaoqiang Hua, Hao Wu, Hongqiang Wang","doi":"10.1109/ICCT56141.2022.10073185","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073185","url":null,"abstract":"The locally most powerful (LMP) test for weak signal detection is studied from a information-geometric perspective. In such a framework, the LMP test is identified as the norm of natural whitened gradient on the statistical manifold consisting of a family of parametric probability distributions, which indicates that the LMP test pursues the steepest learning directions from the null hypothesis to the empirical distribution of the observed data on the manifold. A concrete geometrical interpretation of the LMP test in the theory of information geometry is presented, which leads to an immediate extension of the LMP test to a vector valued parameter case. Example of multi-component sinusoidal signal detection under low SNR conditions confirms a practical importance of the extended test.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing of Decision Criterion on FCrSK in Time-Frequency Dual Selective Channel 时频双选择信道中FCrSK的判定准则设计
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10073375
Xiaohong Nie, Chao Yang, Lina Wang, Jing Zhang, Lin Zheng
With the increasement of frequency band and platform mobility, communication system faces more severe time-frequency double dispersion influence. Folded chirp-rate shift keying (FCrSK) modulation technique has been proposed to solve communication transmission problem in high dynamic doppler channel owe to its time-frequency shift invariance. However, it dose not consider some influence of time-frequency dual selective channel (TDSC). In this paper, spectrum structure of FCrSK after dechirp will be deduced in TDSC and a decision criterion for FCrSK is designed from spectral energy concentration to utilize multipath energy. And this decision criterion is more suitable for FCrSK in TDSC than frequency domain peak to average ratio (FPAR). Besides, the system has no rely on channel state information and has better performance at high SNR in TDSC than Lora. Furthermore, it is superior to Lora in and time-varing doppler channel. So FCrSK with this criterion can provide a good way for high reliability and low latency communication in future.
随着频带的增加和平台移动性的提高,通信系统面临更严重的时频双频频散影响。折叠啁啾速率移键控(FCrSK)调制技术由于其时频不变性而被提出用于解决高动态多普勒信道下的通信传输问题。然而,它没有考虑时频双选择信道(TDSC)的影响。本文在TDSC中推导了FCrSK解码后的频谱结构,并从频谱能量集中出发设计了FCrSK的决策准则,利用多径能量。该判定准则比频域峰均比(FPAR)判定准则更适用于TDSC中的FCrSK。此外,该系统不依赖于信道状态信息,在TDSC中具有比Lora更好的高信噪比性能。此外,在时变多普勒信道中,它优于Lora。因此,基于该准则的FCrSK可以为未来的高可靠性、低时延通信提供良好的途径。
{"title":"Designing of Decision Criterion on FCrSK in Time-Frequency Dual Selective Channel","authors":"Xiaohong Nie, Chao Yang, Lina Wang, Jing Zhang, Lin Zheng","doi":"10.1109/ICCT56141.2022.10073375","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073375","url":null,"abstract":"With the increasement of frequency band and platform mobility, communication system faces more severe time-frequency double dispersion influence. Folded chirp-rate shift keying (FCrSK) modulation technique has been proposed to solve communication transmission problem in high dynamic doppler channel owe to its time-frequency shift invariance. However, it dose not consider some influence of time-frequency dual selective channel (TDSC). In this paper, spectrum structure of FCrSK after dechirp will be deduced in TDSC and a decision criterion for FCrSK is designed from spectral energy concentration to utilize multipath energy. And this decision criterion is more suitable for FCrSK in TDSC than frequency domain peak to average ratio (FPAR). Besides, the system has no rely on channel state information and has better performance at high SNR in TDSC than Lora. Furthermore, it is superior to Lora in and time-varing doppler channel. So FCrSK with this criterion can provide a good way for high reliability and low latency communication in future.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131328499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Defense Method Against Persistent Fault Attack 一种针对持续故障攻击的防御方法
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10072854
Zhixiang Xu, Ning Wu, Fang Zhou, Fen Ge
Persistent fault attack is a powerful attack technology to recover key information by using persistent fault and statistical methods. It can be applied to the key recovery realized by block cipher look-up table. Its biggest advantage is that the key information can be recovered only by one failure injection, and persistent fault attack can be applied to the classic block cipher protection implementation such as detection technology and mask technology. Nevertheless, the classic fault attack protection technology still improves the difficulty of persistent fault attack. The detection and infection technologies increase the number of ciphertext required to extract the correct key by a constant multiple, which will hinder the attack in the actual scene. Real time health detection of S-box is an effective means to prevent persistent fault attacks. Once the injected fault of S-box is detected, reset, restart or refuse to continue encryption. However, this defense strategy is not effective against multiple persistent fault attacks without changing the secret key. Persistent fault attack makes full use of the double mapping property of S-box, so health detection based on the double mapping property of S-box is an efficient protection method. Compared with the traditional detection method, the 255 times XOR method proposed in this paper has low cost and high efficiency, and the single byte modification of S-box after inspection can effectively mislead the encrypted data obtained by the attacker, even if this data is extremely useful to attackers. The research results of this paper show that the proposed defense scheme can effectively resist three secret key analysis strategies of persistent fault attack.
持续故障攻击是一种利用持续故障和统计方法恢复关键信息的强大攻击技术。该方法可应用于分组密码查找表实现的密钥恢复。其最大的优点是只需一次故障注入即可恢复密钥信息,并且可以将持续故障攻击应用于检测技术和掩码技术等经典分组密码保护实现中。尽管如此,经典的故障攻击防护技术仍然提高了持续故障攻击的难度。检测和感染技术将提取正确密钥所需的密文数量增加了一个常数倍,这将阻碍实际场景中的攻击。S-box实时健康检测是防止持续故障攻击的有效手段。一旦检测到S-box注入故障,复位、重启或拒绝继续加密。然而,这种防御策略在不更改密钥的情况下,对多个持久错误攻击无效。持续故障攻击充分利用了S-box的双映射特性,基于S-box双映射特性的健康检测是一种有效的防护方法。与传统的检测方法相比,本文提出的255倍异或方法成本低、效率高,且检测后对S-box进行单字节修改,可以有效误导攻击者获得的加密数据,即使这些数据对攻击者极为有用。研究结果表明,所提出的防御方案能够有效抵御三种持续故障攻击的密钥分析策略。
{"title":"A Defense Method Against Persistent Fault Attack","authors":"Zhixiang Xu, Ning Wu, Fang Zhou, Fen Ge","doi":"10.1109/ICCT56141.2022.10072854","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072854","url":null,"abstract":"Persistent fault attack is a powerful attack technology to recover key information by using persistent fault and statistical methods. It can be applied to the key recovery realized by block cipher look-up table. Its biggest advantage is that the key information can be recovered only by one failure injection, and persistent fault attack can be applied to the classic block cipher protection implementation such as detection technology and mask technology. Nevertheless, the classic fault attack protection technology still improves the difficulty of persistent fault attack. The detection and infection technologies increase the number of ciphertext required to extract the correct key by a constant multiple, which will hinder the attack in the actual scene. Real time health detection of S-box is an effective means to prevent persistent fault attacks. Once the injected fault of S-box is detected, reset, restart or refuse to continue encryption. However, this defense strategy is not effective against multiple persistent fault attacks without changing the secret key. Persistent fault attack makes full use of the double mapping property of S-box, so health detection based on the double mapping property of S-box is an efficient protection method. Compared with the traditional detection method, the 255 times XOR method proposed in this paper has low cost and high efficiency, and the single byte modification of S-box after inspection can effectively mislead the encrypted data obtained by the attacker, even if this data is extremely useful to attackers. The research results of this paper show that the proposed defense scheme can effectively resist three secret key analysis strategies of persistent fault attack.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Individual Recognition Method of Radiation Source Based on Deep Subdomain Adaptation Network 基于深度子域自适应网络的辐射源个体识别方法
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10072617
Zhenyu Tang, Zhang Tao, Xiaomeng Yang, Lei Qian
Aiming at the problem of the recognition accuracy degradation caused by the channel noise inconsistency between the signal of the radiation source to be identified and the trained radiation source dataset, this paper proposes an individual identification method of radiation sources based on subdomain adaptation. First, the radiation source signal is spliced into IQ images to generate a feature data set. Then the improved Resnet-50 network which has been pre-trained on the image set is utilised to extract the common characteristics of the source and target domains. Finally, the local maximum mean difference adaptive layer is added. By calculating the pseudo-labels in the target domain to match the conditional distribution distance, the difference in the characteristic distribution of sub-type radiation sources under different signal-to-noise ratio (SNR) can be reduced, and the model recognition accuracy can be improved. The experimental findings reveal that the proposed method greatly increases the accuracy of the individual radiation source identification technique based on the deep neural network. Under the condition that the SNR of the signal to be detected increases or falls by 4 dB compared to the training dataset, the identification accuracy of the approach suggested in this study improves by 11.4 percent and 12.7 percent respectively compared with the model Resnet-50.
针对待识别辐射源信号与训练后的辐射源数据集存在信道噪声不一致导致识别精度下降的问题,提出了一种基于子域自适应的辐射源个体识别方法。首先,将辐射源信号拼接到IQ图像中,生成特征数据集;然后利用在图像集上进行预训练的改进的Resnet-50网络提取源域和目标域的共同特征。最后,加入局部最大均值差自适应层。通过计算目标域中的伪标签来匹配条件分布距离,可以减小不同信噪比(SNR)下子型辐射源特征分布的差异,提高模型识别精度。实验结果表明,该方法大大提高了基于深度神经网络的单个辐射源识别技术的精度。在待检测信号的信噪比比训练数据集增加或下降4 dB的条件下,本文提出的方法的识别精度比Resnet-50模型分别提高了11.4%和12.7%。
{"title":"Individual Recognition Method of Radiation Source Based on Deep Subdomain Adaptation Network","authors":"Zhenyu Tang, Zhang Tao, Xiaomeng Yang, Lei Qian","doi":"10.1109/ICCT56141.2022.10072617","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072617","url":null,"abstract":"Aiming at the problem of the recognition accuracy degradation caused by the channel noise inconsistency between the signal of the radiation source to be identified and the trained radiation source dataset, this paper proposes an individual identification method of radiation sources based on subdomain adaptation. First, the radiation source signal is spliced into IQ images to generate a feature data set. Then the improved Resnet-50 network which has been pre-trained on the image set is utilised to extract the common characteristics of the source and target domains. Finally, the local maximum mean difference adaptive layer is added. By calculating the pseudo-labels in the target domain to match the conditional distribution distance, the difference in the characteristic distribution of sub-type radiation sources under different signal-to-noise ratio (SNR) can be reduced, and the model recognition accuracy can be improved. The experimental findings reveal that the proposed method greatly increases the accuracy of the individual radiation source identification technique based on the deep neural network. Under the condition that the SNR of the signal to be detected increases or falls by 4 dB compared to the training dataset, the identification accuracy of the approach suggested in this study improves by 11.4 percent and 12.7 percent respectively compared with the model Resnet-50.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise Prediction Based on Machine Learning in Quantum Secured SWDM B5G Fronthaul Networks 量子安全SWDM B5G前传网络中基于机器学习的噪声预测
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10073419
ChengLong Wang, Yongmei Sun, Weiwen Kong, Yaoxian Gao
The fronthaul network is an essential way to improve the comprehensive performance of beyond fifth generation (B5G) communication network. Space-wavelength division multiplexing (SWDM) can effectively improve its capacity, and quantum key distribution technique can provide unconditional information security for it. In quantum secured SWDM B5G fronthaul network, quantum signals are affected by noises generated by classical signals, such as spontaneous Raman scattering, four-wave mixing and inter-core crosstalk. Evaluating these noises in real-time will increase the time delay of the whole network. In this paper, we propose two machine learning (ML) models (XGBoost and LightGBM) to predict these noises. Simulation results show that the ML models can reduce the noise evaluation time by up to 98.8%. Besides, the available channel predicting accuracy rate is close to 100%. The minimum noise predicting accuracy rate increases with the increasement of the channel occupancy rate and can reach 100% when channel occupancy is higher than 80%.
前传网络是提高超五代(B5G)通信网络综合性能的重要途径。空间波分复用(SWDM)可以有效地提高其容量,量子密钥分发技术可以为其提供无条件的信息安全。在量子安全SWDM B5G前传网络中,量子信号受到经典信号产生的自发拉曼散射、四波混频和核间串扰等噪声的影响。实时评估这些噪声会增加整个网络的时延。在本文中,我们提出了两个机器学习(ML)模型(XGBoost和LightGBM)来预测这些噪声。仿真结果表明,该模型可将噪声评估时间缩短98.8%。有效信道预测准确率接近100%。最小噪声预测准确率随信道占用率的增加而增加,当信道占用率大于80%时,最小噪声预测准确率可达到100%。
{"title":"Noise Prediction Based on Machine Learning in Quantum Secured SWDM B5G Fronthaul Networks","authors":"ChengLong Wang, Yongmei Sun, Weiwen Kong, Yaoxian Gao","doi":"10.1109/ICCT56141.2022.10073419","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073419","url":null,"abstract":"The fronthaul network is an essential way to improve the comprehensive performance of beyond fifth generation (B5G) communication network. Space-wavelength division multiplexing (SWDM) can effectively improve its capacity, and quantum key distribution technique can provide unconditional information security for it. In quantum secured SWDM B5G fronthaul network, quantum signals are affected by noises generated by classical signals, such as spontaneous Raman scattering, four-wave mixing and inter-core crosstalk. Evaluating these noises in real-time will increase the time delay of the whole network. In this paper, we propose two machine learning (ML) models (XGBoost and LightGBM) to predict these noises. Simulation results show that the ML models can reduce the noise evaluation time by up to 98.8%. Besides, the available channel predicting accuracy rate is close to 100%. The minimum noise predicting accuracy rate increases with the increasement of the channel occupancy rate and can reach 100% when channel occupancy is higher than 80%.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent DDPG Enpowered UAV Trajectory Optimization for Computation Task Offloading 基于DDPG的多智能体无人机弹道优化计算任务卸载
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10073166
ZhiJiang Chen, Lei Lei, Xiaoqin Song
In order to solve the problems of high cost, poor mobility and difficulty in coping with emergency in large-scale deployment of fixed edge computing nodes in mobile edge computing(MEC), an unmanned aerial vehicle(UAV)-assist task offloading algorithm is proposed to meet the need of computing-intensive and delay-sensitive mobile services. Considering constraints such as the flight range, flight speed of multiple UAVs and system fairness among users, the method aims to minimize the weighted sum of the average computing delay of users and the UAV's energy consumption. This non-convex and NP-hard problem is transformed into a partially observed Markov decision process, and we propose a multi-agent deep deterministic policy gradient algorithm to get optimal offloading decision and UAV flight trajectory. Simulation results show that the proposed algorithm outperforms the baseline algorithm in terms of fairness of mobile service terminals, average system delay and total energy consumption of multiple UAVs.
针对移动边缘计算(MEC)中固定边缘计算节点大规模部署成本高、移动性差、应急难等问题,提出了一种无人机辅助任务卸载算法,以满足计算密集型、延迟敏感的移动业务需求。该方法考虑了多架无人机的飞行距离、飞行速度和用户间系统公平性等约束条件,以最小化用户平均计算时延与无人机能耗的加权和为目标。将该非凸np困难问题转化为部分观察马尔可夫决策过程,提出了一种多智能体深度确定性策略梯度算法,以获得最优卸载决策和无人机飞行轨迹。仿真结果表明,该算法在移动业务终端公平性、系统平均时延和多无人机总能耗方面均优于基线算法。
{"title":"Multi-agent DDPG Enpowered UAV Trajectory Optimization for Computation Task Offloading","authors":"ZhiJiang Chen, Lei Lei, Xiaoqin Song","doi":"10.1109/ICCT56141.2022.10073166","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073166","url":null,"abstract":"In order to solve the problems of high cost, poor mobility and difficulty in coping with emergency in large-scale deployment of fixed edge computing nodes in mobile edge computing(MEC), an unmanned aerial vehicle(UAV)-assist task offloading algorithm is proposed to meet the need of computing-intensive and delay-sensitive mobile services. Considering constraints such as the flight range, flight speed of multiple UAVs and system fairness among users, the method aims to minimize the weighted sum of the average computing delay of users and the UAV's energy consumption. This non-convex and NP-hard problem is transformed into a partially observed Markov decision process, and we propose a multi-agent deep deterministic policy gradient algorithm to get optimal offloading decision and UAV flight trajectory. Simulation results show that the proposed algorithm outperforms the baseline algorithm in terms of fairness of mobile service terminals, average system delay and total energy consumption of multiple UAVs.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-source Heterogeneous Data Processing Technology for Digital Twin Network 数字孪生网络的多源异构数据处理技术
Pub Date : 2022-11-11 DOI: 10.1109/ICCT56141.2022.10073059
Hongwei Yang, Pin Lü, Tao Sun, Lu Lu, Cheng Zhou
Digital Twin Network (DTN) is a fusion technology of digital twin and information communication, and the processing of multi-source heterogeneous physical network data is the key to building a DTN system. This paper firstly proposes the classification of physical network data and the collection requirements for different types of data; secondly, the physical network data processing process is divided into three steps: ©Data collection and transmission, propose “3 criteria” for selecting data collection protocol, and data transmission method to meet the “3 consistent” requirements of twin traffic and physical traffic; ©Data storage and cleaning, clarify the basis for selecting databases for different physical network data, and propose a data cleaning process; ©Data open service, propose, a set of complete data open service architecture is proposed. Finally, this paper is summarized and the future research directions are prospected.
数字孪生网络(Digital Twin Network, DTN)是数字孪生与信息通信的融合技术,多源异构物理网络数据的处理是构建DTN系统的关键。本文首先提出了物理网络数据的分类和不同类型数据的采集要求;其次,将物理网络数据处理过程分为三个步骤:©数据采集与传输,提出了选择数据采集协议的“3个标准”,并且数据传输方式要满足双流量与物理流量的“3个一致”要求;©数据存储与清洗,明确不同物理网络数据选择数据库的依据,并提出数据清洗流程;©数据开放服务,提出了一套完整的数据开放服务体系结构。最后,对本文进行了总结,并对未来的研究方向进行了展望。
{"title":"Multi-source Heterogeneous Data Processing Technology for Digital Twin Network","authors":"Hongwei Yang, Pin Lü, Tao Sun, Lu Lu, Cheng Zhou","doi":"10.1109/ICCT56141.2022.10073059","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073059","url":null,"abstract":"Digital Twin Network (DTN) is a fusion technology of digital twin and information communication, and the processing of multi-source heterogeneous physical network data is the key to building a DTN system. This paper firstly proposes the classification of physical network data and the collection requirements for different types of data; secondly, the physical network data processing process is divided into three steps: ©Data collection and transmission, propose “3 criteria” for selecting data collection protocol, and data transmission method to meet the “3 consistent” requirements of twin traffic and physical traffic; ©Data storage and cleaning, clarify the basis for selecting databases for different physical network data, and propose a data cleaning process; ©Data open service, propose, a set of complete data open service architecture is proposed. Finally, this paper is summarized and the future research directions are prospected.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122251430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 22nd International Conference on Communication Technology (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1