Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947055
Yihong Wang
A new similarity algorithm based on image difference and template matching is proposed to solve the problem of real-time matching between the printing image and the template image based on the similarity algorithm in online printing detection. According to this similarity, besides judging whether the printing image matches with the template, whether the printing image is defective or not, it can also judge whether the printing image is offset or deflected relative to the template. If there is a deflection, Hough transform based on mathematical morphology is used to calculate the deflection angle of the printing image relative to the template image, and then the printing image is corrected according to the deflection angle. If there is an offset, the offset of the printing image relative to the template image is calculated according to the principle of phase consistency, and then the printing image is corrected according to the offset. At the end of this paper, the comparative experiments with the similarity-based image matching method are carried out. The experimental results have verified the superiority of the image matching based on the similarity which is proposed in this paper. In addition, the experiments on the offset and deflection of the printing image relative to template image have been respectively carried out. The results verify the feasibility and validity of the proposed method in the paper.
{"title":"Research on Image Matching in Printing Defects Detection Based on Machine Vision","authors":"Yihong Wang","doi":"10.1109/ICCT46805.2019.8947055","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947055","url":null,"abstract":"A new similarity algorithm based on image difference and template matching is proposed to solve the problem of real-time matching between the printing image and the template image based on the similarity algorithm in online printing detection. According to this similarity, besides judging whether the printing image matches with the template, whether the printing image is defective or not, it can also judge whether the printing image is offset or deflected relative to the template. If there is a deflection, Hough transform based on mathematical morphology is used to calculate the deflection angle of the printing image relative to the template image, and then the printing image is corrected according to the deflection angle. If there is an offset, the offset of the printing image relative to the template image is calculated according to the principle of phase consistency, and then the printing image is corrected according to the offset. At the end of this paper, the comparative experiments with the similarity-based image matching method are carried out. The experimental results have verified the superiority of the image matching based on the similarity which is proposed in this paper. In addition, the experiments on the offset and deflection of the printing image relative to template image have been respectively carried out. The results verify the feasibility and validity of the proposed method in the paper.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131720455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947175
Shi Wang, A. Alfa, B. T. Maharaj, Filip Palunčić
In order to optimize the efficiency of radio resource utilization in the cognitive radio network (CRN), the channel allocation protocol plays a crucial role. However, how to build a general and adaptable framework for the design and evaluation of the protocol, especially in a complex context, such as multiuser multi-channel CRN, is still a open issue. A channel allocation framework based on queueing theory is introduced in this paper. A mechanism with flexible and configurable features, namely distribution probability matrix, is applied to implement and evaluate channel allocation protocols. This framework can provide various comprehensive performance evaluations, such as average queue length, throughput and delay, to carry out protocol evaluation. Moreover, the performance metrics of all the users are obtained independently and simultaneously. Using this framework, a modified maximum rate protocol, namely maximum throughput protocol, is implemented and comprehensive performance evaluation compared to the maximum rate protocol is carried out. The convenience and effectiveness of this channel allocation framework is revealed by the modeling process and numerical results.
{"title":"A Queueing Framework for Channel Allocation Protocol in Multi-user Multi-channel Cognitive Radio Network","authors":"Shi Wang, A. Alfa, B. T. Maharaj, Filip Palunčić","doi":"10.1109/ICCT46805.2019.8947175","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947175","url":null,"abstract":"In order to optimize the efficiency of radio resource utilization in the cognitive radio network (CRN), the channel allocation protocol plays a crucial role. However, how to build a general and adaptable framework for the design and evaluation of the protocol, especially in a complex context, such as multiuser multi-channel CRN, is still a open issue. A channel allocation framework based on queueing theory is introduced in this paper. A mechanism with flexible and configurable features, namely distribution probability matrix, is applied to implement and evaluate channel allocation protocols. This framework can provide various comprehensive performance evaluations, such as average queue length, throughput and delay, to carry out protocol evaluation. Moreover, the performance metrics of all the users are obtained independently and simultaneously. Using this framework, a modified maximum rate protocol, namely maximum throughput protocol, is implemented and comprehensive performance evaluation compared to the maximum rate protocol is carried out. The convenience and effectiveness of this channel allocation framework is revealed by the modeling process and numerical results.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131728521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/icct46805.2019.8947233
{"title":"ICCT 2019 Preface","authors":"","doi":"10.1109/icct46805.2019.8947233","DOIUrl":"https://doi.org/10.1109/icct46805.2019.8947233","url":null,"abstract":"","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud storage service makes people easily to maintain and manage amounts of data with lower cost. In order to ensure the cloud server honestly keeps the client’s data, some remote data integrity checking (RDIC) schemes have been presented. However, in many schemes the original data is not protected at all so that public verifier is able to obtain the data through the integrity checking. To address this issue, we propose an efficient RDIC scheme with data privacy-preserving. In our scheme, we utilize the data masking technique to randomize the original data before generating the final proof which makes the verifier can not get any knowledge about the stored data. Furthermore, experiment result exhibits that our scheme is very efficient and feasible for real applications.
{"title":"Public Data Integrity Checking for Cloud Storage with Privacy Preserving","authors":"Hao Yan, Zheng Zhang, Shuo Qiu, Haizhong Qian, Zhiguo Bian, Yanan Liu","doi":"10.1109/ICCT46805.2019.8947275","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947275","url":null,"abstract":"Cloud storage service makes people easily to maintain and manage amounts of data with lower cost. In order to ensure the cloud server honestly keeps the client’s data, some remote data integrity checking (RDIC) schemes have been presented. However, in many schemes the original data is not protected at all so that public verifier is able to obtain the data through the integrity checking. To address this issue, we propose an efficient RDIC scheme with data privacy-preserving. In our scheme, we utilize the data masking technique to randomize the original data before generating the final proof which makes the verifier can not get any knowledge about the stored data. Furthermore, experiment result exhibits that our scheme is very efficient and feasible for real applications.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122558768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8946999
Dai Jia, Junli Jia
In this paper, we propose a novel approach to enhance the performance of irregular repetition slotted ALOHA (IRSA) protocol, which is called information coupled IRSA (ICIRSA). If transmission error happens, NACK is feedback and user chooses one of its replicas in the next frame and network coded it with the previous packet. As a result, the information from two independent frames are coupled and can be recovered together. Then, we employ density evolution analysis to evaluate the threshold of channel traffic load. After that, the performance of throughput and error probability are simulated. Simulation results show that the proposed IC-IRSA protocol outperforms conventional IRSA protocol significantly.
{"title":"Information Coupled Irregular Repetition Slotted ALOHA","authors":"Dai Jia, Junli Jia","doi":"10.1109/ICCT46805.2019.8946999","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8946999","url":null,"abstract":"In this paper, we propose a novel approach to enhance the performance of irregular repetition slotted ALOHA (IRSA) protocol, which is called information coupled IRSA (ICIRSA). If transmission error happens, NACK is feedback and user chooses one of its replicas in the next frame and network coded it with the previous packet. As a result, the information from two independent frames are coupled and can be recovered together. Then, we employ density evolution analysis to evaluate the threshold of channel traffic load. After that, the performance of throughput and error probability are simulated. Simulation results show that the proposed IC-IRSA protocol outperforms conventional IRSA protocol significantly.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947177
Xiaoming Yang, Jian Jiao, Yunmei Shi, Yong Liu
As the core of quantum communication, the security analysis of Quantum Key Distribution (QKD) has always been a hot and difficult issue in the field of quantum communication. Aiming at the complicated and cumbersome problems existing in the current QKD protocol security analysis method, this paper proposes a formal analysis method based on colored Petri nets, and the Petri net model of BB84 protocol and B92 protocol is established by using this method. Man-in-the-middle attack is a common attack mode in quantum communication at present. We also use this method to model and analyze the man-in-the-middle attack. The experimental results show that BB84 and B92 protocols are as vulnerable to man-in-the-middle attack as any classical protocol without authentication.
{"title":"Modeling and Security Analysis Method of Quantum Key Distribution Protocol Based on Colored Petri Nets","authors":"Xiaoming Yang, Jian Jiao, Yunmei Shi, Yong Liu","doi":"10.1109/ICCT46805.2019.8947177","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947177","url":null,"abstract":"As the core of quantum communication, the security analysis of Quantum Key Distribution (QKD) has always been a hot and difficult issue in the field of quantum communication. Aiming at the complicated and cumbersome problems existing in the current QKD protocol security analysis method, this paper proposes a formal analysis method based on colored Petri nets, and the Petri net model of BB84 protocol and B92 protocol is established by using this method. Man-in-the-middle attack is a common attack mode in quantum communication at present. We also use this method to model and analyze the man-in-the-middle attack. The experimental results show that BB84 and B92 protocols are as vulnerable to man-in-the-middle attack as any classical protocol without authentication.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123830372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947194
Min Hui, Jian Chen, Long Yang
NOMA based small cell network is a promising framework to support massive connection and high throughput. In this paper, massive connection requirement is taken into account in a downlink NOMA based small cell network, where the locations of small cell base stations and UEs are modeled by stochastic geometry. To evaluate the performance of the network, we adopt effective rate as a novel metric for overhead as well as validation reasons. In addition, an effective rate maximization problem by jointly optimize power allocation (PA) and QoS requirements is formulated. We propose to decouple the original problem into power allocation random initialization subproblem and effective rate enhancement subproblem, in order to develop a suboptimal resource allocation algorithm. Finally, the effectiveness and convergence of the proposed algorithm are confirmed by numerical results. We show that: 1) optimal solutions prefer to assign higher target SINR requirements to some UEs with worse channel condition from a perspective of whole UE cluster; 2) the random PA initialization has significant effect on the performance of the algorithm.
{"title":"Massive Connection Aware Effective Rate Optimization in NOMA Based Small Cell Networks","authors":"Min Hui, Jian Chen, Long Yang","doi":"10.1109/ICCT46805.2019.8947194","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947194","url":null,"abstract":"NOMA based small cell network is a promising framework to support massive connection and high throughput. In this paper, massive connection requirement is taken into account in a downlink NOMA based small cell network, where the locations of small cell base stations and UEs are modeled by stochastic geometry. To evaluate the performance of the network, we adopt effective rate as a novel metric for overhead as well as validation reasons. In addition, an effective rate maximization problem by jointly optimize power allocation (PA) and QoS requirements is formulated. We propose to decouple the original problem into power allocation random initialization subproblem and effective rate enhancement subproblem, in order to develop a suboptimal resource allocation algorithm. Finally, the effectiveness and convergence of the proposed algorithm are confirmed by numerical results. We show that: 1) optimal solutions prefer to assign higher target SINR requirements to some UEs with worse channel condition from a perspective of whole UE cluster; 2) the random PA initialization has significant effect on the performance of the algorithm.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122441997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947241
Yuzhuo Liu, Yong Wang
The high broadband Orthogonal Frequency Division Multiplexing (OFDM) system is characterized by high-order constellation and a large of sub-carriers. In order to overcome the major drawback of high Peak-to-Average Power Ratio (PAPR) of OFDM signal, traditional Active Constellation Extension (ACE) techniques maybe pay more price, such as increasing the iteration numbers, thus, costing the more system resources. To address this challenge, a novel Pre-distortion ACE (PD-ACE) scheme is proposed in this paper. By defining a special expandable region for internal constellation and extending the original constellation points, PD-ACE can significantly reduce the PAPR level with only one iteration, thereby, not only increasing the convergence speed, but also decreasing the complexity of system implementation. Simulation results show that, at the expense of acceptable BER performance, the proposed scheme exhibits a better performance for PAPR reduction with low computation complexity compared with traditional methods.
{"title":"Novel ACE Scheme for PAPR Reduction of High Broadband OFDM Systems","authors":"Yuzhuo Liu, Yong Wang","doi":"10.1109/ICCT46805.2019.8947241","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947241","url":null,"abstract":"The high broadband Orthogonal Frequency Division Multiplexing (OFDM) system is characterized by high-order constellation and a large of sub-carriers. In order to overcome the major drawback of high Peak-to-Average Power Ratio (PAPR) of OFDM signal, traditional Active Constellation Extension (ACE) techniques maybe pay more price, such as increasing the iteration numbers, thus, costing the more system resources. To address this challenge, a novel Pre-distortion ACE (PD-ACE) scheme is proposed in this paper. By defining a special expandable region for internal constellation and extending the original constellation points, PD-ACE can significantly reduce the PAPR level with only one iteration, thereby, not only increasing the convergence speed, but also decreasing the complexity of system implementation. Simulation results show that, at the expense of acceptable BER performance, the proposed scheme exhibits a better performance for PAPR reduction with low computation complexity compared with traditional methods.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947283
Liangxian Zhang, Fumin Lin
This paper discusses the design of an electrically small normal-mode helical antenna (NMHA) with a capacitive loading and an innovative coupling feed structure. With this structure, the height of the helical antenna can be effectively reduced (0.064λ totally) while ensuring the mode of the antenna and high realized gain (2.02dBi). The electromagnetic analysis of a compact electrically small normal-mode helical antenna are presented. To understand the working mechanism, an equivalent circuit model of the helical antenna is proposed and analyzed. This innovative structure makes the antenna compact enough to be widely used in short-range communication devices. The simulated results of the antenna show that the proposed structure has a pretty high radiation efficiency, good impedance matching and high gain.
{"title":"Miniaturization Design of Normal-Mode Helical Antenna Based on Capacitive Loading","authors":"Liangxian Zhang, Fumin Lin","doi":"10.1109/ICCT46805.2019.8947283","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947283","url":null,"abstract":"This paper discusses the design of an electrically small normal-mode helical antenna (NMHA) with a capacitive loading and an innovative coupling feed structure. With this structure, the height of the helical antenna can be effectively reduced (0.064λ totally) while ensuring the mode of the antenna and high realized gain (2.02dBi). The electromagnetic analysis of a compact electrically small normal-mode helical antenna are presented. To understand the working mechanism, an equivalent circuit model of the helical antenna is proposed and analyzed. This innovative structure makes the antenna compact enough to be widely used in short-range communication devices. The simulated results of the antenna show that the proposed structure has a pretty high radiation efficiency, good impedance matching and high gain.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947101
Kecan Kou, L. Lei, Lijuan Zhang, Shengsuo Cai, Gaoqing Shen
In wireless ad hoc networks, a suitable MAC protocol can provide better QoS (Quality of Service) guarantees. However, in modern warfare environment, the combat missions change rapidly. A fixed MAC protocol may be not suitable for the highly changeable environments and combat missions. To solve this problem, we propose a neural network-based MAC protocol-selection mechanism to select the optimal MAC protocol for new missions based on the real-time environment information of the battlefield, i.e., the intelligent selection (IS) algorithm. In IS, we prepare the empirical data set with massive mission data, and construct the learning model through making use of the neural network. Experimental results demonstrate that the prediction accuracy of the proposed IS algorithm is over 0.93.
{"title":"Intelligent Selection: A Neural Network-Based MAC Protocol-Selection Mechanism for Wireless Ad hoc Networks","authors":"Kecan Kou, L. Lei, Lijuan Zhang, Shengsuo Cai, Gaoqing Shen","doi":"10.1109/ICCT46805.2019.8947101","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947101","url":null,"abstract":"In wireless ad hoc networks, a suitable MAC protocol can provide better QoS (Quality of Service) guarantees. However, in modern warfare environment, the combat missions change rapidly. A fixed MAC protocol may be not suitable for the highly changeable environments and combat missions. To solve this problem, we propose a neural network-based MAC protocol-selection mechanism to select the optimal MAC protocol for new missions based on the real-time environment information of the battlefield, i.e., the intelligent selection (IS) algorithm. In IS, we prepare the empirical data set with massive mission data, and construct the learning model through making use of the neural network. Experimental results demonstrate that the prediction accuracy of the proposed IS algorithm is over 0.93.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134233028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}