Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072840
Chenghong Yang, Kai Yu, Xiangbin Yu
This paper optimizes the energy efficiency of distributed RIS-assisted communication system. Considering no channel estimation capability at Reconfigurable Intelligent Surface (RIS), an optimization scheme based on Statistical Channel State Information (SCSI) is given first. The traditional SCSI scheme cannot utilize the channel estimation capability of the Base Station (BS), so a scheme based on Two-Timescale (TTS) is further proposed. For the optimization, the triangular inequality and the successive convex approximation (SCA) method are employed in this paper to solve for the RIS elements phase shift. The singular value decomposition (SVD) and maximum ratio transmission (MRT) principle are adopted to solve the BS transmit beamforming in two schemes, respectively. By using partial derivatives, a closed-form equation for the optimal transmit power can be obtained. The system energy efficiency is maximized by optimizing the RIS element phase shift, BS transmit beam-forming and BS transmit power, jointly. The simulation results indicate that after the joint optimization, the energy efficiency has been significantly enhanced. The performance improvement is 10.3% (SCSI) / 10.8% (TTS) after optimization.
{"title":"Energy Efficiency Optimization for Distributed RIS-Assisted MISO System Based on Statistical CSI","authors":"Chenghong Yang, Kai Yu, Xiangbin Yu","doi":"10.1109/ICCT56141.2022.10072840","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072840","url":null,"abstract":"This paper optimizes the energy efficiency of distributed RIS-assisted communication system. Considering no channel estimation capability at Reconfigurable Intelligent Surface (RIS), an optimization scheme based on Statistical Channel State Information (SCSI) is given first. The traditional SCSI scheme cannot utilize the channel estimation capability of the Base Station (BS), so a scheme based on Two-Timescale (TTS) is further proposed. For the optimization, the triangular inequality and the successive convex approximation (SCA) method are employed in this paper to solve for the RIS elements phase shift. The singular value decomposition (SVD) and maximum ratio transmission (MRT) principle are adopted to solve the BS transmit beamforming in two schemes, respectively. By using partial derivatives, a closed-form equation for the optimal transmit power can be obtained. The system energy efficiency is maximized by optimizing the RIS element phase shift, BS transmit beam-forming and BS transmit power, jointly. The simulation results indicate that after the joint optimization, the energy efficiency has been significantly enhanced. The performance improvement is 10.3% (SCSI) / 10.8% (TTS) after optimization.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073118
Hong Shen, Yukai Ye, Tiankui Zhang
The slicing admission control in fifth generation (5G) radio access networks (RAN) should be considering for the service level agreement (SLA) guarantees. In this paper, we present constraints on user transmission rate quality of service (QoS) for different kinds of slice SLAs in dynamic heterogeneous RAN scenario with differentially covered RAN slicing. We model the RAN slicing admission control problem as two parts: slice-level admission control and base station (BS)-level admission control. Then, we design a user-and-slice based service request queue and propose an optimal admission control problem for RAN slicing. The problem is divided into two sub-problems. We solve the slice-level admission control sub-problem and the BS-level admission control sub-problem within each frame by using Lyapunov's optimization theory and greedy strategy respectively, and finally obtain the approximate optimal solution. The simulation results show that the proposed algorithm can obtain the best time average profit and the best admission control decision compared with the benchmark algorithms.
{"title":"Joint Slice Level and Base Station Level Admission Control in RAN Slicing","authors":"Hong Shen, Yukai Ye, Tiankui Zhang","doi":"10.1109/ICCT56141.2022.10073118","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073118","url":null,"abstract":"The slicing admission control in fifth generation (5G) radio access networks (RAN) should be considering for the service level agreement (SLA) guarantees. In this paper, we present constraints on user transmission rate quality of service (QoS) for different kinds of slice SLAs in dynamic heterogeneous RAN scenario with differentially covered RAN slicing. We model the RAN slicing admission control problem as two parts: slice-level admission control and base station (BS)-level admission control. Then, we design a user-and-slice based service request queue and propose an optimal admission control problem for RAN slicing. The problem is divided into two sub-problems. We solve the slice-level admission control sub-problem and the BS-level admission control sub-problem within each frame by using Lyapunov's optimization theory and greedy strategy respectively, and finally obtain the approximate optimal solution. The simulation results show that the proposed algorithm can obtain the best time average profit and the best admission control decision compared with the benchmark algorithms.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073153
Wantao Huang, Changfeng Chen, D. Hou
In this paper, we report an outdoor free space optical two-way time transfer technique with dual optical frequency comb (OFC). Using the transfer method, we transmitted the pulse time signal on the kilometer-level free space link. In the time transfer experiment, the time drift and time deviation of 1 km and 20 km links are measured and simulated respectively. The experimental results show that the total root mean square (RMS) time drift of 1-km link is about 2.2 ps within 5000 seconds, the time deviation is 2 ps when the average time is 1 second, and the time deviation is 0.32 ps when the average time is 100 s. The emulation estimates that the RMS time drift of a 20 km link is about 232 ps within 5000 seconds, the time deviation is 115 ps when the average time is 1 second, and the time deviation is 36 ps when the average time above 100 s.
{"title":"Atmospheric Two-Way Time Transfer over Kilometers Free-Space Link with Dual Optical Frequency Comb","authors":"Wantao Huang, Changfeng Chen, D. Hou","doi":"10.1109/ICCT56141.2022.10073153","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073153","url":null,"abstract":"In this paper, we report an outdoor free space optical two-way time transfer technique with dual optical frequency comb (OFC). Using the transfer method, we transmitted the pulse time signal on the kilometer-level free space link. In the time transfer experiment, the time drift and time deviation of 1 km and 20 km links are measured and simulated respectively. The experimental results show that the total root mean square (RMS) time drift of 1-km link is about 2.2 ps within 5000 seconds, the time deviation is 2 ps when the average time is 1 second, and the time deviation is 0.32 ps when the average time is 100 s. The emulation estimates that the RMS time drift of a 20 km link is about 232 ps within 5000 seconds, the time deviation is 115 ps when the average time is 1 second, and the time deviation is 36 ps when the average time above 100 s.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072977
Yao Rong, Lewen Zhang, Mengjiao Tang, Zeqiong Zan
This paper focuses on estimating the number of source signals embedded in Gaussian white noise. We address this problem via a sequence of nested hypothesis tests, and construct variance statistics based on eigenvalues of the sample covariance for each candidate hypothesis. Then, a detailed statistical analysis of these statistics is carried out in both the large-sample and high-dimensional regimes. According to this analysis, we propose a new scheme for determining the number of source signals in both the sample-rich and sample-starved cases. Finally, numerical examples are presented to show its superiority compared to some existing estimation methods.
{"title":"Estimation of the Number of Signals in White Noise via Large-Sample and High-Dimensional Asymptotic Theory","authors":"Yao Rong, Lewen Zhang, Mengjiao Tang, Zeqiong Zan","doi":"10.1109/ICCT56141.2022.10072977","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072977","url":null,"abstract":"This paper focuses on estimating the number of source signals embedded in Gaussian white noise. We address this problem via a sequence of nested hypothesis tests, and construct variance statistics based on eigenvalues of the sample covariance for each candidate hypothesis. Then, a detailed statistical analysis of these statistics is carried out in both the large-sample and high-dimensional regimes. According to this analysis, we propose a new scheme for determining the number of source signals in both the sample-rich and sample-starved cases. Finally, numerical examples are presented to show its superiority compared to some existing estimation methods.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073208
Xingrui Wang, Lei Sun, Anhao Wen, Yucong Leng, Xiang Lu
The appearance of J waves in electrocardiogram (ECG) may cause malignant arrhythmia, ventricular tachycardia and other diseases, and even bring the risk of sudden death. However, the data on J waves in the current public databases are sparse, and the hospital lacks relevant data due to the urgency of pathological J waves. To address the lack of J wave data, two methods for simulating J wave signal are proposed in this paper. First, by studying the parameter information of the ECG signal, the J wave signal is generated by the superposition of sine wave, triangle wave and sawtooth wave; Second, the inflection point position of the normal ECG signal in the public database is determined by the local transformation method, and the J waves are added to form the J wave signal. The simulation results show that both methods can realize the free adjustment of the occurrence time, duration and amplitude of J waves, which can simulate various common J wave signals. The simulated J wave signals are trained by the UNet++ model and the feasibility of the simulation method is verified, which is helpful to promote the detection of J wave by portable devices.
{"title":"Two Simulation Methods of J Wave Signal in ECG","authors":"Xingrui Wang, Lei Sun, Anhao Wen, Yucong Leng, Xiang Lu","doi":"10.1109/ICCT56141.2022.10073208","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073208","url":null,"abstract":"The appearance of J waves in electrocardiogram (ECG) may cause malignant arrhythmia, ventricular tachycardia and other diseases, and even bring the risk of sudden death. However, the data on J waves in the current public databases are sparse, and the hospital lacks relevant data due to the urgency of pathological J waves. To address the lack of J wave data, two methods for simulating J wave signal are proposed in this paper. First, by studying the parameter information of the ECG signal, the J wave signal is generated by the superposition of sine wave, triangle wave and sawtooth wave; Second, the inflection point position of the normal ECG signal in the public database is determined by the local transformation method, and the J waves are added to form the J wave signal. The simulation results show that both methods can realize the free adjustment of the occurrence time, duration and amplitude of J waves, which can simulate various common J wave signals. The simulated J wave signals are trained by the UNet++ model and the feasibility of the simulation method is verified, which is helpful to promote the detection of J wave by portable devices.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072773
Xi Wu, Tianhui Fu, Longfei Wang, Yao Kong, Xuebo Zhang, Menglei Xiu
At present, in the field of communication, there is little research on the bit error rate of mechanical antenna transmission based on frequency modulation. However, the study of BER under specific conditions is of great significance to enhance the performance of communication systems and improve the quality of data transmission. In the process of frequency modulation of mechanical antenna, the continuity of motor speed regulation will affect the continuity of signal frequency and amplitude generated by the system, which will eventually lead to high bit error rate of the system. In this paper, a mechanical antenna communication system is established to generate symbol signals of different periods. By observing the eye diagram of the baseband signal after demodulation and the relationship between SNR and BER of the mechanical antenna and the electrical antenna, the reasons for the high bit error rate of the communication system are analyzed, and the corresponding solutions are proposed.
{"title":"Bit Error Rate Analysis of Mechanical Antenna Based on Frequency Modulation","authors":"Xi Wu, Tianhui Fu, Longfei Wang, Yao Kong, Xuebo Zhang, Menglei Xiu","doi":"10.1109/ICCT56141.2022.10072773","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072773","url":null,"abstract":"At present, in the field of communication, there is little research on the bit error rate of mechanical antenna transmission based on frequency modulation. However, the study of BER under specific conditions is of great significance to enhance the performance of communication systems and improve the quality of data transmission. In the process of frequency modulation of mechanical antenna, the continuity of motor speed regulation will affect the continuity of signal frequency and amplitude generated by the system, which will eventually lead to high bit error rate of the system. In this paper, a mechanical antenna communication system is established to generate symbol signals of different periods. By observing the eye diagram of the baseband signal after demodulation and the relationship between SNR and BER of the mechanical antenna and the electrical antenna, the reasons for the high bit error rate of the communication system are analyzed, and the corresponding solutions are proposed.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131720828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
System logs are widely used by engineers to record runtime status in the information technology (IT) field. The sequential anomaly detection of logs is crucial for building a secure and stable system and is beneficial for the discovery, location, and analysis of system failures. Conventional manual log anomaly detection suffers high costs and unsustainable development. Thus, automatic methods based on Natural Language Processing (NLP) technology are proposed to improve the accuracy and efficiency of log anomaly detection. In this paper, we propose a new log anomaly detection model, named LogPS. LogPS utilizes the Part-of-Speech (PoS) technique to extract semantic information from log messages. By allocating the learned PoS-based weights to different tokens in a log template, LogPS can improve the representation quality of the log template vector. In the final anomaly detection stage, we treat a system log as a natural language sequence and build a Bidirectional Long Short-Term Memory (BiLSTM) neural network as the LogPS detection model. Therefore, LogPS can capture sufficient and contextual information from input log sequences from the forward pass and the backward pass. And LogPS can automatically learn log patterns and detect anomalies. The effectiveness of our model is tested on three datasets and is compared with other state-of-the-art models. The experimental results show that, compared with other log anomaly detection methods, the proposed LogPS performs well.
{"title":"LogPS: A Robust Log Sequential Anomaly Detection Approach Based on Natural Language Processing","authors":"Dongjiang Li, Jing Zhang, Xianbo Zhang, Feng Lin, Chao Wang, Liang Chang","doi":"10.1109/ICCT56141.2022.10072770","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072770","url":null,"abstract":"System logs are widely used by engineers to record runtime status in the information technology (IT) field. The sequential anomaly detection of logs is crucial for building a secure and stable system and is beneficial for the discovery, location, and analysis of system failures. Conventional manual log anomaly detection suffers high costs and unsustainable development. Thus, automatic methods based on Natural Language Processing (NLP) technology are proposed to improve the accuracy and efficiency of log anomaly detection. In this paper, we propose a new log anomaly detection model, named LogPS. LogPS utilizes the Part-of-Speech (PoS) technique to extract semantic information from log messages. By allocating the learned PoS-based weights to different tokens in a log template, LogPS can improve the representation quality of the log template vector. In the final anomaly detection stage, we treat a system log as a natural language sequence and build a Bidirectional Long Short-Term Memory (BiLSTM) neural network as the LogPS detection model. Therefore, LogPS can capture sufficient and contextual information from input log sequences from the forward pass and the backward pass. And LogPS can automatically learn log patterns and detect anomalies. The effectiveness of our model is tested on three datasets and is compared with other state-of-the-art models. The experimental results show that, compared with other log anomaly detection methods, the proposed LogPS performs well.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129233179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072458
Fangzhou Zhao, Yao Sun, Runze Cheng, M. Imran
Semantic communication is deemed to break Shannon channel capacity by transmitting extracted semantics rather than all binary bits. One critical challenge in semantic communication system is how to select a matching semantic coding model (SCM) in light of complicated source information, diversified user background knowledge (BK) and dynamic wireless channel. In this paper, we mathematically model the relationship among different BKs by using graph theory, and introduce a metric to evaluate SCMs performance as per BK relationships. Then, we propose a Background knowledge Aware SCM SElection (BASE) scheme, where a deep learning algorithm is exploited to accurately predict SCM performance in context of the modeled BK, guiding the SCM selection. Numerical simulation results show that the BASE has superiorities in information recovery accuracy along with the probability of selecting the optimal SCM when compared with other benchmarks.
{"title":"Background Knowledge Aware Semantic Coding Model Selection","authors":"Fangzhou Zhao, Yao Sun, Runze Cheng, M. Imran","doi":"10.1109/ICCT56141.2022.10072458","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072458","url":null,"abstract":"Semantic communication is deemed to break Shannon channel capacity by transmitting extracted semantics rather than all binary bits. One critical challenge in semantic communication system is how to select a matching semantic coding model (SCM) in light of complicated source information, diversified user background knowledge (BK) and dynamic wireless channel. In this paper, we mathematically model the relationship among different BKs by using graph theory, and introduce a metric to evaluate SCMs performance as per BK relationships. Then, we propose a Background knowledge Aware SCM SElection (BASE) scheme, where a deep learning algorithm is exploited to accurately predict SCM performance in context of the modeled BK, guiding the SCM selection. Numerical simulation results show that the BASE has superiorities in information recovery accuracy along with the probability of selecting the optimal SCM when compared with other benchmarks.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072638
Xiaoting Huang, Liping Nong, Wenhui Zhang
3D shape retrieval is an important research topic in the field of modern multimedia information retrieval. Point cloud and mesh modalities are commonly used representations of 3D data and have strong shape description capabilities. However, existing multimodal 3D shape retrieval methods lack the fusion learning of these two irregular data. In this paper, we design a depthwise separable hypergraph convolution and build a multimodal fusion network base on it, which use hypergraph to model higher-order relationships between data and improve 3D shape retrieval capabily through the effective fusion of point cloud and mesh data. First, the initial feature descriptors of the point cloud and mesh modalities are extracted using a pretrained network, respectively. Next, perform channel shuffle on the initial feature descriptors to mix the multimadal data and then use the k-Nearest Neighbour(kNN) algorithm to construct corresponding hypergraphs. Finally, depthwise separable hypergraph convolution is proposed to extract discriminative shape representations and fuse the multimodal information. During the process of network training, the fusion network is jointly constrained by the mean square error loss function and the cross entropy loss function. The proposed network is applied to the 3D shape retrieval task, and the experimental results demonstrate that the proposed method can greatly improve the retrieval accuracy.
{"title":"A Multimodal Fusion Network Based on Hypergraph for 3D Shape Retrieval","authors":"Xiaoting Huang, Liping Nong, Wenhui Zhang","doi":"10.1109/ICCT56141.2022.10072638","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072638","url":null,"abstract":"3D shape retrieval is an important research topic in the field of modern multimedia information retrieval. Point cloud and mesh modalities are commonly used representations of 3D data and have strong shape description capabilities. However, existing multimodal 3D shape retrieval methods lack the fusion learning of these two irregular data. In this paper, we design a depthwise separable hypergraph convolution and build a multimodal fusion network base on it, which use hypergraph to model higher-order relationships between data and improve 3D shape retrieval capabily through the effective fusion of point cloud and mesh data. First, the initial feature descriptors of the point cloud and mesh modalities are extracted using a pretrained network, respectively. Next, perform channel shuffle on the initial feature descriptors to mix the multimadal data and then use the k-Nearest Neighbour(kNN) algorithm to construct corresponding hypergraphs. Finally, depthwise separable hypergraph convolution is proposed to extract discriminative shape representations and fuse the multimodal information. During the process of network training, the fusion network is jointly constrained by the mean square error loss function and the cross entropy loss function. The proposed network is applied to the 3D shape retrieval task, and the experimental results demonstrate that the proposed method can greatly improve the retrieval accuracy.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072711
Lingfeng Lu, Yongmei Sun, Yaoxian Gao, Weiwen Kong
To ensure the security of optical networks in the future, integrating quantum key distribution (QKD) with optical networks is one of the solutions. Moreover, the optical network based on multi-core fiber (MCF) is also one of the ways to improve the transmission capacity. Therefore, we study the integration of QKD into MCF-enabled optical networks. Aiming at the resource allocation problem of MCF-enabled wavelength division multiplexing optical networks, this paper proposes a resource allocation scheme which is suitable for independent-core-transmission of classical signals and quantum signals. For core resource, we propose the alternate core allocation algorithm. For wavelength resource, we propose the iteration-based wavelength allocation algorithm. The overall scheme uses the proposed two algorithms to first allocate the core and then allocate the wavelength. The simulation results show that the proposed scheme has a great improvement in secret key rate (SKR) compared with the benchmark scheme on the regular hexagonal 7-core fiber and 19-core fiber. And the proposed scheme still has good performance under long transmission distance and high classical signal power.
{"title":"A Resource Allocation Scheme for Independent Core Transmission of Quantum Key Distribution","authors":"Lingfeng Lu, Yongmei Sun, Yaoxian Gao, Weiwen Kong","doi":"10.1109/ICCT56141.2022.10072711","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072711","url":null,"abstract":"To ensure the security of optical networks in the future, integrating quantum key distribution (QKD) with optical networks is one of the solutions. Moreover, the optical network based on multi-core fiber (MCF) is also one of the ways to improve the transmission capacity. Therefore, we study the integration of QKD into MCF-enabled optical networks. Aiming at the resource allocation problem of MCF-enabled wavelength division multiplexing optical networks, this paper proposes a resource allocation scheme which is suitable for independent-core-transmission of classical signals and quantum signals. For core resource, we propose the alternate core allocation algorithm. For wavelength resource, we propose the iteration-based wavelength allocation algorithm. The overall scheme uses the proposed two algorithms to first allocate the core and then allocate the wavelength. The simulation results show that the proposed scheme has a great improvement in secret key rate (SKR) compared with the benchmark scheme on the regular hexagonal 7-core fiber and 19-core fiber. And the proposed scheme still has good performance under long transmission distance and high classical signal power.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121479675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}