In order to realize the construction of satellite communication system simulation platform, this paper introduces the architecture of satellite mobile communication system, analyzes the wireless transmission characteristics of satellite channel, studies the typical satellite channel model, and discusses the basic design of the system simulation platform. This research not only provides the construction method of satellite communication system simulation platform, but also provides reference for satellite communication system beam management and frequency planning design.
{"title":"Research on the construction of satellite communication system simulation platform","authors":"Zhipeng Qian, Zhixin Liu, Zhiqiang Wu, Xiao Han","doi":"10.1117/12.2639654","DOIUrl":"https://doi.org/10.1117/12.2639654","url":null,"abstract":"In order to realize the construction of satellite communication system simulation platform, this paper introduces the architecture of satellite mobile communication system, analyzes the wireless transmission characteristics of satellite channel, studies the typical satellite channel model, and discusses the basic design of the system simulation platform. This research not only provides the construction method of satellite communication system simulation platform, but also provides reference for satellite communication system beam management and frequency planning design.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Sun, Guangzhao Lu, Di Wang, Shaopan Zhang, W. Yang, Ji-rong Xue
Ammunition damage effect is an important basis for system simulation and ammunition power analysis. To solve the problem of ammunition damage effect analysis, it is necessary to collect relevant data, model, simulate and analyze ammunition. Based on the theoretical formula and test data, this paper proposes a typical ammunition modeling, power field analysis and damage effect analysis method, and constructs the corresponding typical ammunition damage effect analysis software, which includes database, parametric modeling module, power field analysis module, three dimensional visualization module. Compared with the corresponding test data, the credibility of the method and the availability of the software are verified.
{"title":"A typical ammunition damage effect analysis method and software","authors":"Yong Sun, Guangzhao Lu, Di Wang, Shaopan Zhang, W. Yang, Ji-rong Xue","doi":"10.1117/12.2639292","DOIUrl":"https://doi.org/10.1117/12.2639292","url":null,"abstract":"Ammunition damage effect is an important basis for system simulation and ammunition power analysis. To solve the problem of ammunition damage effect analysis, it is necessary to collect relevant data, model, simulate and analyze ammunition. Based on the theoretical formula and test data, this paper proposes a typical ammunition modeling, power field analysis and damage effect analysis method, and constructs the corresponding typical ammunition damage effect analysis software, which includes database, parametric modeling module, power field analysis module, three dimensional visualization module. Compared with the corresponding test data, the credibility of the method and the availability of the software are verified.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhongxing Wu, Xuan Liu, Wen Zhan, Guoshu Lai, Yina Du, Qiuyang Li
The smart measuring switch is mainly used to realize the normal connection and disconnection of the distribution line, provide short-circuit, overload and disconnection protection functions, and effectively control the accuracy of the electric energy meter in the electric energy metering box. Because the communication protocol and test method of smart measuring switch are not released, the interconnection and exchange effect of products is poor. In view of the above problems, this paper first analyzes the problems existing in the protocol extension based on DL/T 645, then puts forward the protocol extension design based on DL/T 698.45, and designs the protocol consistency and interoperability test cases, which provides a feasible technical reference for realizing the interconnection and exchange of smart measuring switches.
{"title":"Research on communication protocol design and testing technology of smart measuring switch","authors":"Zhongxing Wu, Xuan Liu, Wen Zhan, Guoshu Lai, Yina Du, Qiuyang Li","doi":"10.1117/12.2640448","DOIUrl":"https://doi.org/10.1117/12.2640448","url":null,"abstract":"The smart measuring switch is mainly used to realize the normal connection and disconnection of the distribution line, provide short-circuit, overload and disconnection protection functions, and effectively control the accuracy of the electric energy meter in the electric energy metering box. Because the communication protocol and test method of smart measuring switch are not released, the interconnection and exchange effect of products is poor. In view of the above problems, this paper first analyzes the problems existing in the protocol extension based on DL/T 645, then puts forward the protocol extension design based on DL/T 698.45, and designs the protocol consistency and interoperability test cases, which provides a feasible technical reference for realizing the interconnection and exchange of smart measuring switches.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The end-to-end speaker recognition model has made a great breakthrough in the research field and practical application scenarios. However, in practical application, we often suffer the diversity of noise, and the interference of noise will affect the performance of speaker recognition and classification model, and the model usually degrades in unseen scenes with noise. In this paper, a speaker recognition model combined with front-end enhancement is proposed. The front-end enhancement model (DTLN or CRNN) is combined with the back-end speaker recognition model (Res2Net-GhostVLAD) to improve the robustness of the model against noisy scenes, and the generalization capability of the model is increased by the data augmentation method (SpecAugment). Our proposed method was trained on VoxCeleb and AISHELL datasets and tested on VoxCeleb datasets. The test results show that the proposed method significantly improves the performance of the speaker recognition model in noisy scenarios, and the relative improvement of different front-end models is 9% and 13%, respectively.
{"title":"Speaker recognition model with robust front-end processing algorithm","authors":"Yingzi Lian, Jing Pang","doi":"10.1117/12.2639261","DOIUrl":"https://doi.org/10.1117/12.2639261","url":null,"abstract":"The end-to-end speaker recognition model has made a great breakthrough in the research field and practical application scenarios. However, in practical application, we often suffer the diversity of noise, and the interference of noise will affect the performance of speaker recognition and classification model, and the model usually degrades in unseen scenes with noise. In this paper, a speaker recognition model combined with front-end enhancement is proposed. The front-end enhancement model (DTLN or CRNN) is combined with the back-end speaker recognition model (Res2Net-GhostVLAD) to improve the robustness of the model against noisy scenes, and the generalization capability of the model is increased by the data augmentation method (SpecAugment). Our proposed method was trained on VoxCeleb and AISHELL datasets and tested on VoxCeleb datasets. The test results show that the proposed method significantly improves the performance of the speaker recognition model in noisy scenarios, and the relative improvement of different front-end models is 9% and 13%, respectively.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gait recognition is widely used due to its advantages of long-distance recognition, unnecessity of active participation of the recognized person, etc. In recent years, many gait recognition models based on deep neural networks have achieved relatively high accuracy. However, many studies have shown that deep neural networks are vulnerable to adversarial attacks, and the recognition of deep neural networks can be made wrong by the addition of small perturbance to the input samples. Therefore, it is very important to explore the robustness of neural networks for gait recognition. Since the structure and parameters of the gait recognition model are often difficult to obtain in practical applications, a half-white-box adversarial attack method based on GAN was proposed in thesis. The difference between the adversarial examples generated by using this method and the original examples is difficult to be distinguished by the naked eye. Through experiments, it is found that the input of adversarial examples has a large impact on the output of the gait recognition model. To make sure that the generated adversarial perturbance can be easily implemented in the physical environment, we changed the model structure and increased the input data based on the above method, and proposed a new method. In this method, the generator of GAN can generate adversarial perturbance in specific shapes. The experimental results show that even without knowing the network structure and parameters of the target model, the accuracy of the gait recognition model in the face of adversarial examples will decrease, indicating that there are problems with the robustness of even very advanced gait recognition models.
{"title":"An adversarial example generation scheme for gait recognition","authors":"Changbao Li, Wenmin Li, J. Ding","doi":"10.1117/12.2639315","DOIUrl":"https://doi.org/10.1117/12.2639315","url":null,"abstract":"Gait recognition is widely used due to its advantages of long-distance recognition, unnecessity of active participation of the recognized person, etc. In recent years, many gait recognition models based on deep neural networks have achieved relatively high accuracy. However, many studies have shown that deep neural networks are vulnerable to adversarial attacks, and the recognition of deep neural networks can be made wrong by the addition of small perturbance to the input samples. Therefore, it is very important to explore the robustness of neural networks for gait recognition. Since the structure and parameters of the gait recognition model are often difficult to obtain in practical applications, a half-white-box adversarial attack method based on GAN was proposed in thesis. The difference between the adversarial examples generated by using this method and the original examples is difficult to be distinguished by the naked eye. Through experiments, it is found that the input of adversarial examples has a large impact on the output of the gait recognition model. To make sure that the generated adversarial perturbance can be easily implemented in the physical environment, we changed the model structure and increased the input data based on the above method, and proposed a new method. In this method, the generator of GAN can generate adversarial perturbance in specific shapes. The experimental results show that even without knowing the network structure and parameters of the target model, the accuracy of the gait recognition model in the face of adversarial examples will decrease, indicating that there are problems with the robustness of even very advanced gait recognition models.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132925685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pulse-position modulation (PPM) is a form of signal modulation in which M message bits are encoded by transmitting a single pulse in one of 2M possible required time shifts. It is primarily useful for optical communications systems, which tend to have little or no multipath interference. PPM is currently being used in fiber-optic communications, deep-space communications, and continues to be used in R/C systems. In this paper, we simulate a relatively complete process of PPM transmission. We generate the basic form of PPM using random sequences and then we visualize the impact of AWGN on the signal on the PPM real plain. Then we use the minimum distance discrimination method to demodulate the signal. Details about errors are collected as well to illustrate the point. At last, we imitate the PAM system to calculate the BER.
{"title":"Design of digital pulse-position modulation system based on minimum distance method","authors":"Bowen Li","doi":"10.1117/12.2640765","DOIUrl":"https://doi.org/10.1117/12.2640765","url":null,"abstract":"Pulse-position modulation (PPM) is a form of signal modulation in which M message bits are encoded by transmitting a single pulse in one of 2M possible required time shifts. It is primarily useful for optical communications systems, which tend to have little or no multipath interference. PPM is currently being used in fiber-optic communications, deep-space communications, and continues to be used in R/C systems. In this paper, we simulate a relatively complete process of PPM transmission. We generate the basic form of PPM using random sequences and then we visualize the impact of AWGN on the signal on the PPM real plain. Then we use the minimum distance discrimination method to demodulate the signal. Details about errors are collected as well to illustrate the point. At last, we imitate the PAM system to calculate the BER.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the problem of storage and management efficiency of massive urban monitoring data, HDFS distributed file system is used to store video unstructured data, HBase attribute information table is researched and designed, HBase distributed database is used to store attribute information, HBase global retrieval information row key and MapReduce workflow are studied, retrieval is constructed, and video monitoring data retrieval is realized. Finally, based on the research of unstructured data retrieval technology and distributed data processing framework, we get the massive urban monitoring data storage and retrieval scheme.
{"title":"Research on storage and retrieval of massive GPS and video surveillance data in cloud environment","authors":"Shan Wu, Jian Zhao, Yong Li, Poyu You, Sirui Wu","doi":"10.1117/12.2640449","DOIUrl":"https://doi.org/10.1117/12.2640449","url":null,"abstract":"In order to solve the problem of storage and management efficiency of massive urban monitoring data, HDFS distributed file system is used to store video unstructured data, HBase attribute information table is researched and designed, HBase distributed database is used to store attribute information, HBase global retrieval information row key and MapReduce workflow are studied, retrieval is constructed, and video monitoring data retrieval is realized. Finally, based on the research of unstructured data retrieval technology and distributed data processing framework, we get the massive urban monitoring data storage and retrieval scheme.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaqi Mei, Q. Lu, Yang Chen, Cheng Che, Zhifeng Wang, Jinghan Guo
At present, there is no effective monitoring method for drop insurance. Temperature is an essential indicator for the operation status of drop insurance. Therefore, this paper designs a temperature monitoring system for drop insurance based on the advantages of infrared temperature sensors and wireless communication technology. The system takes infrared temperature sensors based on thermopile technology, LPC824 processor, and ZigBee technology as the core and solar panel and lithium battery as the system power supply. Furthermore, the system has the advantages of real-time monitoring, stable performance, and low power consumption. It provides a practical and effective solution for online monitoring of the temperature of drop insurance and the alarm when the temperature is abnormal.
{"title":"Temperature monitoring system for drop insurance in wind farms","authors":"Jiaqi Mei, Q. Lu, Yang Chen, Cheng Che, Zhifeng Wang, Jinghan Guo","doi":"10.1117/12.2639167","DOIUrl":"https://doi.org/10.1117/12.2639167","url":null,"abstract":"At present, there is no effective monitoring method for drop insurance. Temperature is an essential indicator for the operation status of drop insurance. Therefore, this paper designs a temperature monitoring system for drop insurance based on the advantages of infrared temperature sensors and wireless communication technology. The system takes infrared temperature sensors based on thermopile technology, LPC824 processor, and ZigBee technology as the core and solar panel and lithium battery as the system power supply. Furthermore, the system has the advantages of real-time monitoring, stable performance, and low power consumption. It provides a practical and effective solution for online monitoring of the temperature of drop insurance and the alarm when the temperature is abnormal.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128120230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wensheng Chi, Wen-jun Xie, Peng Zhang, Wenxuan Lin, L. Ru
One of the urgent problems to be solved in UAV cluster warfare is to find a suitable routing algorithm to adapt to the characteristics of UAV Ad Hoc network topology. Based on the further development of cellular network, the wireless Ad Hoc network does not need preset infrastructure, no control center, and can be temporary networked, which is more in line with the needs of unmanned aerial vehicle Ad Hoc network. In consideration of the premise of distributed deployment of unmanned aerial vehicle (UAV), matlab is used for simulation of opportunistic routing algorithm. As for multiple constraints Qos routing problem, tabu search algorithm is adopted to optimize the opportunistic routing algorithm. The experimental results show that, after intelligent algorithm is optimized, along with the increase of the time consumed for algorithm, other constraints impose effective impact on the algorithm, enabling the opportunistic routing algorithm make the optimal choice according to multiple constraints. Then genetic algorithm is used for comparison, and the conclusion that genetic algorithm can get faster convergence is drawn.
{"title":"Research on UAV Ad Hoc network routing based on optimization algorithm","authors":"Wensheng Chi, Wen-jun Xie, Peng Zhang, Wenxuan Lin, L. Ru","doi":"10.1117/12.2639642","DOIUrl":"https://doi.org/10.1117/12.2639642","url":null,"abstract":"One of the urgent problems to be solved in UAV cluster warfare is to find a suitable routing algorithm to adapt to the characteristics of UAV Ad Hoc network topology. Based on the further development of cellular network, the wireless Ad Hoc network does not need preset infrastructure, no control center, and can be temporary networked, which is more in line with the needs of unmanned aerial vehicle Ad Hoc network. In consideration of the premise of distributed deployment of unmanned aerial vehicle (UAV), matlab is used for simulation of opportunistic routing algorithm. As for multiple constraints Qos routing problem, tabu search algorithm is adopted to optimize the opportunistic routing algorithm. The experimental results show that, after intelligent algorithm is optimized, along with the increase of the time consumed for algorithm, other constraints impose effective impact on the algorithm, enabling the opportunistic routing algorithm make the optimal choice according to multiple constraints. Then genetic algorithm is used for comparison, and the conclusion that genetic algorithm can get faster convergence is drawn.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"12258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the TCP Incast problem in Software Defined Networks (SDN) data center networks, a new congestion control algorithm based on deep reinforcement learning is proposed in this paper. By the way of continuously interacting between the agent and the environment to obtain the optimal strategy, the SDN controller plays the role as agent and many-to-one model of data center networks plays the role as environment. Under the condition that queue length of the buffer of the bottleneck switch does not exceed the preset congestion threshold, data transmission rates of multiple servers are trained using deep reinforcement learning algorithms, and finally the optimal transmission rates which will not cause congestion are acquired. The simulation results show that the algorithm proposed in this paper can effectively avoid congestion in many-to-one scenarios in SDN data center networks and can improve the overall performance of networks.
{"title":"A congestion control algorithm based on deep reinforcement learning in SDN data center networks","authors":"Pengfei Guo, Lixing Liang, Hongxiao Liu, Li Du","doi":"10.1117/12.2639258","DOIUrl":"https://doi.org/10.1117/12.2639258","url":null,"abstract":"Aiming at the TCP Incast problem in Software Defined Networks (SDN) data center networks, a new congestion control algorithm based on deep reinforcement learning is proposed in this paper. By the way of continuously interacting between the agent and the environment to obtain the optimal strategy, the SDN controller plays the role as agent and many-to-one model of data center networks plays the role as environment. Under the condition that queue length of the buffer of the bottleneck switch does not exceed the preset congestion threshold, data transmission rates of multiple servers are trained using deep reinforcement learning algorithms, and finally the optimal transmission rates which will not cause congestion are acquired. The simulation results show that the algorithm proposed in this paper can effectively avoid congestion in many-to-one scenarios in SDN data center networks and can improve the overall performance of networks.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}