首页 > 最新文献

2019 IEEE 19th International Conference on Communication Technology (ICCT)最新文献

英文 中文
CANDECOMP&PARAFAC-based Near-Field Source Localization by Passive Sensor Arrays 基于candecomp&parafac的无源传感器阵列近场源定位
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947311
Haoyue Xiao, Yubai Li
This paper discusses the singular source’s Direction-Of-Arrival (DOA) and Direction-Of-Distance (DOD) estimation method based on a tensor decomposition algorithm in the near-field situation. With the assistance of the uniqueness of tensor decomposition, the proposed method achieves a high-accuracy performance in both DOA and DOD estimations. For Uniform Linear Arrays (ULA), the steering vector of near-field sources is determined by both angle and distance parameters. Two modified models are built for DOA and DOD estimations respectively and each of them contains only one parameter. These two models are furtherly turned to tensor models by cutting to slices. Rank-l tensor approximation Alternating Least Squares (ALS) algorithms are then used to estimate DOA and DOD for its general global convergence property. The results are used for localization and numerical simulations have verified the effectiveness of the proposed method.
本文讨论了基于张量分解算法的近场奇异源到达方向(DOA)和距离方向(DOD)估计方法。利用张量分解的唯一性,该方法在DOA和DOD估计中都具有较高的精度。对于均匀线性阵列(ULA),近场光源的导向矢量由角度和距离参数共同决定。分别建立了DOA和DOD估计的修正模型,每个模型只包含一个参数。这两个模型通过切分进一步转化为张量模型。利用秩- 1张量近似交替最小二乘(ALS)算法的一般全局收敛性,对DOA和DOD进行估计。结果用于定位,数值模拟验证了该方法的有效性。
{"title":"CANDECOMP&PARAFAC-based Near-Field Source Localization by Passive Sensor Arrays","authors":"Haoyue Xiao, Yubai Li","doi":"10.1109/ICCT46805.2019.8947311","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947311","url":null,"abstract":"This paper discusses the singular source’s Direction-Of-Arrival (DOA) and Direction-Of-Distance (DOD) estimation method based on a tensor decomposition algorithm in the near-field situation. With the assistance of the uniqueness of tensor decomposition, the proposed method achieves a high-accuracy performance in both DOA and DOD estimations. For Uniform Linear Arrays (ULA), the steering vector of near-field sources is determined by both angle and distance parameters. Two modified models are built for DOA and DOD estimations respectively and each of them contains only one parameter. These two models are furtherly turned to tensor models by cutting to slices. Rank-l tensor approximation Alternating Least Squares (ALS) algorithms are then used to estimate DOA and DOD for its general global convergence property. The results are used for localization and numerical simulations have verified the effectiveness of the proposed method.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134603733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Architecture for Broadband DOA Estimation 宽带DOA估计的深度学习体系结构
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947053
Wenli Zhu, Min Zhang
An efficient neural network-based approach for broadband direction of arrival (DOA) estimation is presented in this paper. The received data of the uniform circle array (UCA) is transformed into direction image, which is used as the input of the neural network. The phase component of the spatial covariance matrix of the received signal is extracted to form the direction image. We establish a convolutional neural network (CNN) with five hidden layers to learn the inverse mapping from the space of possible antenna element excitations to the space of possible angular directions to the signal source. DOA estimation is formulated as a regression problem, where the each DOA label to the direction image is consisted of the sine and cosine values of the angle of arrival. Simulation results show that the trained CNN network can be successfully used for broadband DOA estimation. The performance of the developed CNN model is comparable to the performance of the conventional algorithms at the lower signal-to-noise ratio. Importantly, the proposed CNN estimator further reduces the computation time which makes it successful to apply to real-time applications.
提出了一种基于神经网络的宽带到达方向估计方法。将接收到的均匀圆阵列(UCA)数据转换成方向图像,作为神经网络的输入。提取接收信号空间协方差矩阵的相位分量形成方向图像。我们建立了一个具有5个隐藏层的卷积神经网络(CNN)来学习从可能的天线单元激励空间到可能的角方向空间到信号源的逆映射。DOA估计是一个回归问题,其中方向图像的每个DOA标签由到达角的正弦和余弦值组成。仿真结果表明,训练后的CNN网络可以成功地用于宽带DOA估计。所开发的CNN模型在较低信噪比下的性能与传统算法相当。重要的是,所提出的CNN估计器进一步减少了计算时间,使其成功应用于实时应用。
{"title":"A Deep Learning Architecture for Broadband DOA Estimation","authors":"Wenli Zhu, Min Zhang","doi":"10.1109/ICCT46805.2019.8947053","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947053","url":null,"abstract":"An efficient neural network-based approach for broadband direction of arrival (DOA) estimation is presented in this paper. The received data of the uniform circle array (UCA) is transformed into direction image, which is used as the input of the neural network. The phase component of the spatial covariance matrix of the received signal is extracted to form the direction image. We establish a convolutional neural network (CNN) with five hidden layers to learn the inverse mapping from the space of possible antenna element excitations to the space of possible angular directions to the signal source. DOA estimation is formulated as a regression problem, where the each DOA label to the direction image is consisted of the sine and cosine values of the angle of arrival. Simulation results show that the trained CNN network can be successfully used for broadband DOA estimation. The performance of the developed CNN model is comparable to the performance of the conventional algorithms at the lower signal-to-noise ratio. Importantly, the proposed CNN estimator further reduces the computation time which makes it successful to apply to real-time applications.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124484179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Computation Offloading and Resource Allocation for MEC in C-RAN: A Deep Reinforcement Learning Approach C-RAN中MEC的计算卸载和资源分配:一种深度强化学习方法
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947070
Xiaoyan Jin, Jun Zhang, Xinghua Sun, Ping Zhang, Shu Cai
Mobile edge computing (MEC) technology has become a promising example for cloud radio access networks (CRAN) to provide close-range services, thereby reducing service delays and saving energy consumption. In this paper, we consider a multi-user MEC system and solve the problem of the computation offloading strategies and resource allocation policies. We set the total cost of delays and energy consumption as our optimization goal. However, getting an optimal strategy in a dynamic environment is challenging. Reinforcement learning (RL) aims at long-term cumulative rewards, which are essential for time-varying dynamic systems. Therefore, we propose an optimization framework based on deep RL to solve these problems. The deep neural network (DNN) is used to estimate the value function of the critics, thereby reducing the state space complexity of the optimization target. The actor part uses another DNN to represent a parametritis stochastic strategy and improve the strategy with the help of critics. Compared with other schemes, the simulation results show that the scheme significantly reduces the total cost.
移动边缘计算(MEC)技术已经成为云无线接入网(CRAN)提供近距离服务,从而减少服务延迟和节约能源消耗的一个有前途的例子。本文考虑了一个多用户MEC系统,解决了计算卸载策略和资源分配策略问题。我们将延迟和能耗的总成本作为优化目标。然而,在动态环境中获得最优策略是具有挑战性的。强化学习(RL)的目标是长期累积奖励,这是时变动态系统所必需的。因此,我们提出了一个基于深度强化学习的优化框架来解决这些问题。利用深度神经网络(deep neural network, DNN)来估计批评家的值函数,从而降低优化目标的状态空间复杂度。参与者部分使用另一个DNN来表示参数随机策略,并在评论家的帮助下改进策略。仿真结果表明,与其他方案相比,该方案显著降低了总成本。
{"title":"Computation Offloading and Resource Allocation for MEC in C-RAN: A Deep Reinforcement Learning Approach","authors":"Xiaoyan Jin, Jun Zhang, Xinghua Sun, Ping Zhang, Shu Cai","doi":"10.1109/ICCT46805.2019.8947070","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947070","url":null,"abstract":"Mobile edge computing (MEC) technology has become a promising example for cloud radio access networks (CRAN) to provide close-range services, thereby reducing service delays and saving energy consumption. In this paper, we consider a multi-user MEC system and solve the problem of the computation offloading strategies and resource allocation policies. We set the total cost of delays and energy consumption as our optimization goal. However, getting an optimal strategy in a dynamic environment is challenging. Reinforcement learning (RL) aims at long-term cumulative rewards, which are essential for time-varying dynamic systems. Therefore, we propose an optimization framework based on deep RL to solve these problems. The deep neural network (DNN) is used to estimate the value function of the critics, thereby reducing the state space complexity of the optimization target. The actor part uses another DNN to represent a parametritis stochastic strategy and improve the strategy with the help of critics. Compared with other schemes, the simulation results show that the scheme significantly reduces the total cost.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation of CBMeMber Multi-target Tracking Algorithm Based on Gauss Mixture 基于高斯混合的CBMeMber多目标跟踪算法仿真
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947076
Linxi Wang, Xiaoxi Hu, Xun Han, Yin Kuang, Xinquan Yang
Multi-target tracking technologies have important research value in many fields. Algorithms based on random finite set theory can achieve a better tracking effect without data association, which have attracted wide attentions. In this paper, after establishing a real multi-target motion scenario, CBMeMBer filtering algorithm is simulated and implemented on the linear Gauss condition, and is compared with PHD, CPHD and MeMBer filtering algorithm. The simulation results show that CBMeMBer filtering algorithm is correct and effective. Under the same simulation conditions, its tracking performance is obviously improved, and it has good application prospects in multi-target tracking field.
多目标跟踪技术在许多领域具有重要的研究价值。基于随机有限集理论的算法可以在不关联数据的情况下获得较好的跟踪效果,受到了广泛的关注。本文在建立真实的多目标运动场景后,在线性高斯条件下对CBMeMBer滤波算法进行了仿真和实现,并与PHD、CPHD和MeMBer滤波算法进行了比较。仿真结果表明,CBMeMBer滤波算法是正确有效的。在相同的仿真条件下,其跟踪性能明显提高,在多目标跟踪领域具有良好的应用前景。
{"title":"Simulation of CBMeMber Multi-target Tracking Algorithm Based on Gauss Mixture","authors":"Linxi Wang, Xiaoxi Hu, Xun Han, Yin Kuang, Xinquan Yang","doi":"10.1109/ICCT46805.2019.8947076","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947076","url":null,"abstract":"Multi-target tracking technologies have important research value in many fields. Algorithms based on random finite set theory can achieve a better tracking effect without data association, which have attracted wide attentions. In this paper, after establishing a real multi-target motion scenario, CBMeMBer filtering algorithm is simulated and implemented on the linear Gauss condition, and is compared with PHD, CPHD and MeMBer filtering algorithm. The simulation results show that CBMeMBer filtering algorithm is correct and effective. Under the same simulation conditions, its tracking performance is obviously improved, and it has good application prospects in multi-target tracking field.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Incremental Identification Method for Fraud Phone Calls Based on Broad Learning System 基于广义学习系统的诈骗电话增量识别方法
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947271
Rui Zhong, Xiaocen Dong, Rongheng Lin, Hua Zou
With the continuous development of the communication industry, more and more fraud calls appear in the user’s daily life and the crime of telecom fraud is growing rapidly, causing huge losses every year. Traditional fraud detection methods are less flexible and they all belong to passive interception and rely on intelligent terminals. At present, a more accurate and timely method is needed to deal with the evolving fraud. Therefore, this paper proposes an identification method for fraud phone calls based on Broad Learning System (BLS). We processed the text data of fraud phone calls through the first 15s of the call content identification monitoring, constructed the TF-IDF model, then converted it into a neural network based on the BLS and identified the fraud phone calls on this model. At the same time, the model can be updated quickly by corresponding incremental learning algorithm without retraining based on the BLS, which is suitable for fraud identification systems with few data features but high real-time prediction requirements. The method mentioned above is experimented and analyzed in detail. The results show that this method has higher accuracy and excellent training speed on fraud data. Compared with the original fraud identification methods, it can actively intercept and has higher accuracy. Compared with other neural network algorithms used in fraud system, the method has better training speed, can ensure the accuracy and timeliness of online fraud identification and help quickly identify fraud phone calls.
随着通信行业的不断发展,越来越多的诈骗电话出现在用户的日常生活中,电信诈骗犯罪增长迅速,每年造成的损失巨大。传统的欺诈检测方法灵活性较差,都属于被动拦截,依赖于智能终端。目前,需要一种更准确、更及时的方法来应对不断演变的欺诈行为。为此,本文提出了一种基于广义学习系统(BLS)的诈骗电话识别方法。我们通过呼叫内容识别监控的前15s对诈骗电话文本数据进行处理,构建TF-IDF模型,然后将其转换为基于BLS的神经网络,并在该模型上对诈骗电话进行识别。同时,通过相应的基于BLS的增量学习算法无需再训练即可快速更新模型,适用于数据特征较少但对实时预测要求较高的欺诈识别系统。对上述方法进行了详细的实验和分析。结果表明,该方法对欺诈数据具有较高的准确率和较快的训练速度。与原有的欺诈识别方法相比,该方法能够主动拦截,准确率更高。与欺诈系统中使用的其他神经网络算法相比,该方法具有更好的训练速度,可以保证在线欺诈识别的准确性和及时性,有助于快速识别欺诈电话。
{"title":"An Incremental Identification Method for Fraud Phone Calls Based on Broad Learning System","authors":"Rui Zhong, Xiaocen Dong, Rongheng Lin, Hua Zou","doi":"10.1109/ICCT46805.2019.8947271","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947271","url":null,"abstract":"With the continuous development of the communication industry, more and more fraud calls appear in the user’s daily life and the crime of telecom fraud is growing rapidly, causing huge losses every year. Traditional fraud detection methods are less flexible and they all belong to passive interception and rely on intelligent terminals. At present, a more accurate and timely method is needed to deal with the evolving fraud. Therefore, this paper proposes an identification method for fraud phone calls based on Broad Learning System (BLS). We processed the text data of fraud phone calls through the first 15s of the call content identification monitoring, constructed the TF-IDF model, then converted it into a neural network based on the BLS and identified the fraud phone calls on this model. At the same time, the model can be updated quickly by corresponding incremental learning algorithm without retraining based on the BLS, which is suitable for fraud identification systems with few data features but high real-time prediction requirements. The method mentioned above is experimented and analyzed in detail. The results show that this method has higher accuracy and excellent training speed on fraud data. Compared with the original fraud identification methods, it can actively intercept and has higher accuracy. Compared with other neural network algorithms used in fraud system, the method has better training speed, can ensure the accuracy and timeliness of online fraud identification and help quickly identify fraud phone calls.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132994265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Belief Propagation Decoding of BATS Codes 一种改进的BATS码信念传播译码方法
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947132
Juan Yang, Zhiping Shi, Dandi Yang, Chen-Xi Wang
In this paper, we propose an improved belief propagation (BP) decoding algorithm for decoding BATS codes. In the traditional BP decoding, the BP decoder decodes the input packets only when the rank equals to the degree of the efficient matrix for a batch. For improving the decoding performance, our proposed scheme exploits the fact that some packets can be decoded even when the rank is smaller than the degree. We decode these packets in the process of calculating the rank of batch, which will not induce extra computational cost. The simulation results show that the decoding performance of our proposed method is better than the traditional BATS codes.
本文提出了一种改进的信念传播(BP)译码算法,用于BATS码的译码。在传统的BP解码中,BP解码器只有在秩等于批量有效矩阵的度时才对输入数据包进行解码。为了提高解码性能,我们提出的方案利用了一些数据包即使在秩小于度时也可以被解码的事实。我们在计算批排序的过程中对这些数据包进行解码,这样不会产生额外的计算开销。仿真结果表明,该方法的译码性能优于传统的BATS码。
{"title":"An Improved Belief Propagation Decoding of BATS Codes","authors":"Juan Yang, Zhiping Shi, Dandi Yang, Chen-Xi Wang","doi":"10.1109/ICCT46805.2019.8947132","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947132","url":null,"abstract":"In this paper, we propose an improved belief propagation (BP) decoding algorithm for decoding BATS codes. In the traditional BP decoding, the BP decoder decodes the input packets only when the rank equals to the degree of the efficient matrix for a batch. For improving the decoding performance, our proposed scheme exploits the fact that some packets can be decoded even when the rank is smaller than the degree. We decode these packets in the process of calculating the rank of batch, which will not induce extra computational cost. The simulation results show that the decoding performance of our proposed method is better than the traditional BATS codes.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical Analysis of Electric Field Distribution at the Terminal of VLF Antenna VLF天线终端电场分布的数值分析
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947227
K. Mao, Xianqiang Li, Chen Wei, Zhiyuan Ma, Xixiu Wu
When the high-power VLF (Very Low Frequency) communication system is in operation, dielectric loss and corresponding temperature rising will occur at the terminal of the antenna due to the alternating high electric field intensity environment. Based on the theoretical analysis of dielectric loss and temperature rise, the distribution of electric field intensity at the terminal of antenna and its influencing factors are numerically analyzed by establishing a three-dimensional simulation model. The results show that the electric field intensity varies linearly with the increase of the voltage of the antenna terminal; however, the working frequency has little effect on the electric field intensity. Finally, the reduction effect of a corona ring on the electric field intensity at the antenna terminal is analyzed.
大功率甚低频(VLF)通信系统在工作时,由于交变的高电场强度环境,会在天线的末端产生介电损耗和相应的温升。在对介质损耗和温升进行理论分析的基础上,通过建立三维仿真模型,对天线端面电场强度分布及其影响因素进行了数值分析。结果表明:电场强度随天线端电压的增加呈线性变化;而工作频率对电场强度的影响较小。最后,分析了电晕环对天线终端电场强度的抑制作用。
{"title":"Numerical Analysis of Electric Field Distribution at the Terminal of VLF Antenna","authors":"K. Mao, Xianqiang Li, Chen Wei, Zhiyuan Ma, Xixiu Wu","doi":"10.1109/ICCT46805.2019.8947227","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947227","url":null,"abstract":"When the high-power VLF (Very Low Frequency) communication system is in operation, dielectric loss and corresponding temperature rising will occur at the terminal of the antenna due to the alternating high electric field intensity environment. Based on the theoretical analysis of dielectric loss and temperature rise, the distribution of electric field intensity at the terminal of antenna and its influencing factors are numerically analyzed by establishing a three-dimensional simulation model. The results show that the electric field intensity varies linearly with the increase of the voltage of the antenna terminal; however, the working frequency has little effect on the electric field intensity. Finally, the reduction effect of a corona ring on the electric field intensity at the antenna terminal is analyzed.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"46 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Research on Phase Spectrum Decomposition Mechanism Based on Spectral Component Companding 基于谱元压缩的相谱分解机理研究
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947273
Yan Xu, Yi Zheng, Hao Cui, Yifan Hu, Xiaodong Gong, Hui Liu
Aiming at the problem of One-Side EMD on non-equal modulus composite signal processing, this paper proposes the mechanism and method for phase spectrum decomposition based on spectral component companding. This mechanism proposes the conception of “Hypothesis Equimodular Vector”, designs the phase deflection model to calculate equalmodulus resultant vector through spectral component companding method, constructs equal modulus phase spectrum and its One-Side superposition. The equal modulus phase spectrum has features forOne-Side EMD and could be decomposed. This mechanism and method extend One-Side EMD use field from equal modulus to non-equal, which could gain higher generality and wider application prospect. The simulation testing proves that it could be used in the instantaneous time-frequency analysis for any two frequency components with higher reliability and accuracy.
针对非等模量复合信号处理中的单边EMD问题,提出了基于谱元压缩的相谱分解机理和方法。该机制提出了“假设等模矢量”的概念,设计了相位偏转模型,通过谱分量压缩法计算等模合成矢量,构造了等模相位谱及其单边叠加。等模相谱具有单边EMD的特点,可以分解。该机制和方法将单边EMD的应用领域从等模扩展到非等模,具有更高的通用性和更广阔的应用前景。仿真试验证明,该方法可用于任意两个频率分量的瞬时时频分析,具有较高的可靠性和准确性。
{"title":"The Research on Phase Spectrum Decomposition Mechanism Based on Spectral Component Companding","authors":"Yan Xu, Yi Zheng, Hao Cui, Yifan Hu, Xiaodong Gong, Hui Liu","doi":"10.1109/ICCT46805.2019.8947273","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947273","url":null,"abstract":"Aiming at the problem of One-Side EMD on non-equal modulus composite signal processing, this paper proposes the mechanism and method for phase spectrum decomposition based on spectral component companding. This mechanism proposes the conception of “Hypothesis Equimodular Vector”, designs the phase deflection model to calculate equalmodulus resultant vector through spectral component companding method, constructs equal modulus phase spectrum and its One-Side superposition. The equal modulus phase spectrum has features forOne-Side EMD and could be decomposed. This mechanism and method extend One-Side EMD use field from equal modulus to non-equal, which could gain higher generality and wider application prospect. The simulation testing proves that it could be used in the instantaneous time-frequency analysis for any two frequency components with higher reliability and accuracy.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deity: Finding Deep Rooted Bugs in JavaScript Engines 神:在JavaScript引擎中发现根深蒂固的bug
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947153
Hongyang Lin, Junhu Zhu, Jianshan Peng, Dixia Zhu
Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both syntactically correct and uncommonly randomized for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. In this work, we introduced system Deity which managed to resolve the conflict with innovative AST(Abstract Syntax Tree) [2] based tree mutation and generating methods. It leverages a high-level structural representation of intermediate process JavaScript code. Our evaluation demonstrates the effectiveness of Deity. For large-scale JavaScript engines (njs, mjs, Javascript-Core, ChakraCore, Espruino, Jerryscript) fuzzing, our results significantly show that Deity can improve code coverage and finding more deep rooted bugs (i.e., 35 new bugs, among which we discovered 21 new vulnerabilities with 3 CVEs assigned) over Superion and CodeAlchemist.
Fuzzing[1]是一种众所周知的技术,它被用来向JavaScript引擎提供意外或随机数据作为输入,以期发现安全漏洞。为了有效地进行模糊测试,输入必须在语法上正确,并且针对崩溃、失败的内置代码断言或潜在的内存泄漏等异常进行随机化。在这项工作中,我们引入了系统神,它设法解决了与创新的AST(抽象语法树)[2]基于树的突变和生成方法的冲突。它利用了中间过程JavaScript代码的高级结构表示。我们的评估证明了神的有效性。对于大型JavaScript引擎(njs, mjs, JavaScript - core, ChakraCore, Espruino, Jerryscript)的模糊测试,我们的结果显著表明,与Superion和CodeAlchemist相比,神可以提高代码覆盖率,发现更多根深蒂固的bug(即35个新bug,其中我们发现了21个新漏洞,分配了3个cve)。
{"title":"Deity: Finding Deep Rooted Bugs in JavaScript Engines","authors":"Hongyang Lin, Junhu Zhu, Jianshan Peng, Dixia Zhu","doi":"10.1109/ICCT46805.2019.8947153","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947153","url":null,"abstract":"Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both syntactically correct and uncommonly randomized for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. In this work, we introduced system Deity which managed to resolve the conflict with innovative AST(Abstract Syntax Tree) [2] based tree mutation and generating methods. It leverages a high-level structural representation of intermediate process JavaScript code. Our evaluation demonstrates the effectiveness of Deity. For large-scale JavaScript engines (njs, mjs, Javascript-Core, ChakraCore, Espruino, Jerryscript) fuzzing, our results significantly show that Deity can improve code coverage and finding more deep rooted bugs (i.e., 35 new bugs, among which we discovered 21 new vulnerabilities with 3 CVEs assigned) over Superion and CodeAlchemist.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Delay CoMP of LoRa Modulation in Wireless Tree Topology Network 无线树状拓扑网络中LoRa调制的时延比较
Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947128
Hongqiang Li, Yubing Zhang, Xu Zhao, Xiaoke Tang
The rapid development of Internet of Things (IoT) puts forward much requirements for wireless communication technology. Low Power Wide Area Networks (LPWAN) are designed for low bandwidth, low power, long range and large number of connected IoT applications. As one of the LPWAN, Low Power Long Range Transceiver (LoRa) described as a Frequency Shift Chirp Modulation (FSCM), is widely concerned and studied. In this paper, the signal reception of LoRa modulation in the wireless tree topology is analyzed, and the multi-user interference analysis proves that the multi-user interference has a great impact on the system performance. At the same time, we proposed Delay Coordinated Multiple Points Transmission (DCoMP). Multiple nodes close to each other send the same data to the target node. Due to the inaccuracy of synchronization between nodes, there will be a certain timing offset when sending signals to the same target node. After combining signals of multiple nodes according to different timing offset, the receiver performance of signals can be improved. The coordinated nodes can also actively adjust the signal sending timing according to the path time delay and processing delay, so as to improve the receiving performance of the signal merging algorithm of the receiver node. LoRa modulation improves the signal reception performance by adopting DCoMP transmission, thus improving the overall throughput of the system.
物联网的快速发展对无线通信技术提出了更高的要求。低功耗广域网(LPWAN)专为低带宽,低功耗,长距离和大量连接的物联网应用而设计。低功率远程收发器(LoRa)作为低功率广域网(LPWAN)的一种,作为频移啁啾调制(FSCM)的一种,受到了广泛的关注和研究。本文对无线树拓扑下LoRa调制的信号接收进行了分析,并通过多用户干扰分析证明了多用户干扰对系统性能的影响很大。同时,我们提出了延迟协调多点传输(DCoMP)。相互靠近的多个节点将相同的数据发送到目标节点。由于节点间同步不准确,向同一目标节点发送信号时,会产生一定的定时偏移。将多个节点的信号根据不同的时序偏移进行组合,可以提高信号的接收性能。协调节点还可以根据路径时延和处理时延主动调整信号发送定时,从而提高接收节点信号合并算法的接收性能。LoRa调制通过采用DCoMP传输提高了信号接收性能,从而提高了系统的整体吞吐量。
{"title":"Delay CoMP of LoRa Modulation in Wireless Tree Topology Network","authors":"Hongqiang Li, Yubing Zhang, Xu Zhao, Xiaoke Tang","doi":"10.1109/ICCT46805.2019.8947128","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947128","url":null,"abstract":"The rapid development of Internet of Things (IoT) puts forward much requirements for wireless communication technology. Low Power Wide Area Networks (LPWAN) are designed for low bandwidth, low power, long range and large number of connected IoT applications. As one of the LPWAN, Low Power Long Range Transceiver (LoRa) described as a Frequency Shift Chirp Modulation (FSCM), is widely concerned and studied. In this paper, the signal reception of LoRa modulation in the wireless tree topology is analyzed, and the multi-user interference analysis proves that the multi-user interference has a great impact on the system performance. At the same time, we proposed Delay Coordinated Multiple Points Transmission (DCoMP). Multiple nodes close to each other send the same data to the target node. Due to the inaccuracy of synchronization between nodes, there will be a certain timing offset when sending signals to the same target node. After combining signals of multiple nodes according to different timing offset, the receiver performance of signals can be improved. The coordinated nodes can also actively adjust the signal sending timing according to the path time delay and processing delay, so as to improve the receiving performance of the signal merging algorithm of the receiver node. LoRa modulation improves the signal reception performance by adopting DCoMP transmission, thus improving the overall throughput of the system.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123552931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 IEEE 19th International Conference on Communication Technology (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1