首页 > 最新文献

2020 IEEE 6th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
Improved Strategies of LEACH-based Low Energy Consumption and High Reliable Multi-hop Routing Algorithm for Wireless Sensor Network 基于leach的无线传感器网络低能耗高可靠多跳路由算法改进策略
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345136
Lubin Guo, Jiayan Liu, Peng Qin, Xiongwen Zhao, Huiyuan Ma, Zhongjun Chi
LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the pioneer clustering routing algorithm, the idea of clustering proposed by which provides a good reference for the design of routing algorithm for wireless sensor network. In LEACH algorithm, the selection of cluster head ignores the consideration of node energy, which may lead to the death of cluster head and this will case the failure of data transmitted to sink. Besides, cluster head direct communication with the base station limits the expansion of the network scale. In response to these shortcomings, three strategies to improve the performance of LEACH-based algorithm are discussed in this paper, based on which we propose a low energy consumption high reliable multi-hop routing algorithm LEACH-MB. By improving the selection of cluster heads, introducing a mechanism of backup cluster head and adopting the approach of cluster head multi-hop, the performance of this new algorithm has been significantly improved compared to LEACH. Through the simulation analysis of the algorithm, we can find that this algorithm can prolong the network lifetime and improve the reliability of data transmission, and get a result of throughput increase.
LEACH (Low Energy Adaptive Clustering Hierarchy)是最早的聚类路由算法之一,其提出的聚类思想为无线传感器网络路由算法的设计提供了很好的参考。在LEACH算法中,簇头的选择忽略了对节点能量的考虑,这可能导致簇头死亡,从而导致数据传输到sink失败。此外,集群头与基站直接通信限制了网络规模的扩展。针对这些不足,本文讨论了提高基于leach算法性能的三种策略,在此基础上提出了一种低能耗、高可靠的多跳路由算法LEACH-MB。通过改进簇头选择、引入簇头备份机制和采用簇头多跳方法,该算法的性能比LEACH算法有了明显提高。通过对该算法的仿真分析,可以发现该算法可以延长网络寿命,提高数据传输的可靠性,并获得吞吐量增加的结果。
{"title":"Improved Strategies of LEACH-based Low Energy Consumption and High Reliable Multi-hop Routing Algorithm for Wireless Sensor Network","authors":"Lubin Guo, Jiayan Liu, Peng Qin, Xiongwen Zhao, Huiyuan Ma, Zhongjun Chi","doi":"10.1109/ICCC51575.2020.9345136","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345136","url":null,"abstract":"LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the pioneer clustering routing algorithm, the idea of clustering proposed by which provides a good reference for the design of routing algorithm for wireless sensor network. In LEACH algorithm, the selection of cluster head ignores the consideration of node energy, which may lead to the death of cluster head and this will case the failure of data transmitted to sink. Besides, cluster head direct communication with the base station limits the expansion of the network scale. In response to these shortcomings, three strategies to improve the performance of LEACH-based algorithm are discussed in this paper, based on which we propose a low energy consumption high reliable multi-hop routing algorithm LEACH-MB. By improving the selection of cluster heads, introducing a mechanism of backup cluster head and adopting the approach of cluster head multi-hop, the performance of this new algorithm has been significantly improved compared to LEACH. Through the simulation analysis of the algorithm, we can find that this algorithm can prolong the network lifetime and improve the reliability of data transmission, and get a result of throughput increase.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trust Management of Mobile Users P2P Nodes Based on Blockchain 基于区块链的移动用户P2P节点信任管理
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345097
Xiang Wu, Hao Wu
Mobile users need to consider the credibility of nodes to ensure their privacy when building a P2P network. Therefore, how to perform node trust management is an urgent problem to be solved. This paper proposes a trust management method that combines incentive mechanisms and punishment measures, introduces time-sensitive functions, integrates hash chains, and builds a mobile user trust evaluation model.
移动用户在构建P2P网络时,需要考虑节点的可信度,以保证自己的隐私。因此,如何进行节点信任管理是一个亟待解决的问题。本文提出了一种激励机制与惩罚措施相结合的信任管理方法,引入时敏函数,集成哈希链,构建移动用户信任评估模型。
{"title":"Trust Management of Mobile Users P2P Nodes Based on Blockchain","authors":"Xiang Wu, Hao Wu","doi":"10.1109/ICCC51575.2020.9345097","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345097","url":null,"abstract":"Mobile users need to consider the credibility of nodes to ensure their privacy when building a P2P network. Therefore, how to perform node trust management is an urgent problem to be solved. This paper proposes a trust management method that combines incentive mechanisms and punishment measures, introduces time-sensitive functions, integrates hash chains, and builds a mobile user trust evaluation model.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132723089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Self-Organizing Neural Network Based UAV Path Planning 基于竞争自组织神经网络的无人机路径规划
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344904
Mingsheng Gao, Pengfei Wei, Yuxiang Liu
Path planning is the fundamental aspect of applications for autonomous Unmanned Aerial Vehicles (UAVs) system. It allows UAV to find an optimal path relevant to some specific missions within limited time, especially in large sized scenarios. In this paper, a novel competitive self-organizing neural network algorithm is proposed to improve the search ability and speed up the convergence of traditional algorithms. More specifically, in the initialization phase, a new opposition-based learning is adopted to generate better neurons. Next, a secondary competitive layer is added above the hidden layer, thus enhancing accuracy of the algorithm. Simulations validate the proposed algorithm outperforms some intelligence algorithms in terms of optimization ability.
路径规划是自主无人飞行器(uav)系统应用的基础。它允许无人机在有限的时间内找到与某些特定任务相关的最佳路径,特别是在大型场景中。本文提出了一种新的竞争性自组织神经网络算法,以提高传统算法的搜索能力和收敛速度。更具体地说,在初始化阶段,采用一种新的基于对立的学习来生成更好的神经元。其次,在隐藏层之上增加一个二级竞争层,从而提高了算法的准确性。仿真结果表明,该算法在优化能力上优于一些智能算法。
{"title":"Competitive Self-Organizing Neural Network Based UAV Path Planning","authors":"Mingsheng Gao, Pengfei Wei, Yuxiang Liu","doi":"10.1109/ICCC51575.2020.9344904","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344904","url":null,"abstract":"Path planning is the fundamental aspect of applications for autonomous Unmanned Aerial Vehicles (UAVs) system. It allows UAV to find an optimal path relevant to some specific missions within limited time, especially in large sized scenarios. In this paper, a novel competitive self-organizing neural network algorithm is proposed to improve the search ability and speed up the convergence of traditional algorithms. More specifically, in the initialization phase, a new opposition-based learning is adopted to generate better neurons. Next, a secondary competitive layer is added above the hidden layer, thus enhancing accuracy of the algorithm. Simulations validate the proposed algorithm outperforms some intelligence algorithms in terms of optimization ability.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133202294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
VABD: Visual Analysis of Spatio-temporal Trajectory Based on Urban Bus Data 基于城市公交数据的时空轨迹可视化分析
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345182
Liang Liu, Song Wang, Ting Cai, Weixin Zhao
Spatio-temporal trajectory data cover a wide area, have high real-time performance, which can not only reflect the timing change of road traffic but also reflect the travel rules of residents. However, due to the lack of effective methods, it is difficult for analysts to conduct in-depth analysis and extract valuable information. To help users to understand the situation of urban traffic congestion, explore the social behavior pattern, this paper proposed and implemented a novel interactive visual analysis system, Visual Analyzer for Bus Data (VABD). Visual analysis of spatio-temporal trajectory data is introduced into “intelligent transportation” to provide new ideas and data support for solving urban congestion problems. A case study based on urban bus data of Mianyang proves the effectiveness of the system.
时空轨迹数据覆盖范围广,实时性高,既能反映道路交通的时序变化,又能反映居民的出行规律。然而,由于缺乏有效的方法,分析人员很难进行深入的分析,提取有价值的信息。为了帮助用户了解城市交通拥堵状况,探索社会行为模式,本文提出并实现了一种新的交互式可视化分析系统——公交数据可视化分析器(VABD)。将时空轨迹数据可视化分析引入“智能交通”,为解决城市拥堵问题提供新的思路和数据支持。以绵阳市城市公交数据为例,验证了该系统的有效性。
{"title":"VABD: Visual Analysis of Spatio-temporal Trajectory Based on Urban Bus Data","authors":"Liang Liu, Song Wang, Ting Cai, Weixin Zhao","doi":"10.1109/ICCC51575.2020.9345182","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345182","url":null,"abstract":"Spatio-temporal trajectory data cover a wide area, have high real-time performance, which can not only reflect the timing change of road traffic but also reflect the travel rules of residents. However, due to the lack of effective methods, it is difficult for analysts to conduct in-depth analysis and extract valuable information. To help users to understand the situation of urban traffic congestion, explore the social behavior pattern, this paper proposed and implemented a novel interactive visual analysis system, Visual Analyzer for Bus Data (VABD). Visual analysis of spatio-temporal trajectory data is introduced into “intelligent transportation” to provide new ideas and data support for solving urban congestion problems. A case study based on urban bus data of Mianyang proves the effectiveness of the system.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Data Trading Model Based on Blockchain 基于区块链的分布式数据交易模型
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345212
Jingang Yu, Peipei Zhao, Shu Li, Haiting Wang
The current flow and trading of data has been a trend, but the current enthusiasm for data trading is not high. Due to the particularity of data and the current trading pattern of data, the ability of data trading platform to retain trading data has become a potential threat to both sides of the transaction and an obstacle to data trading. Due to the sensitivity of data, how to protect the privacy security of both sides of the transaction is also an important factor hindering the current data transaction. In response to the existing problems, this paper proposes a feasibility plan for data security transactions based on blockchain and in an untrusted environment, and designs a new decentralized transaction platform that will help transform data through online transactions. At the same time, it is technically guaranteed that the platform does not have the possibility of viewing, copying and detaining data, thereby ensuring the secure transaction of data and the privacy of both parties to the transaction.
目前数据的流动和交易已经是一种趋势,但目前对数据交易的热情并不高。由于数据的特殊性和当前数据的交易模式,数据交易平台对交易数据的保留能力已经成为交易双方的潜在威胁和数据交易的障碍。由于数据的敏感性,如何保护交易双方的隐私安全也是阻碍当前数据交易的重要因素。针对存在的问题,本文提出了一种基于区块链、非信任环境下的数据安全交易的可行性方案,并设计了一种新的去中心化交易平台,通过在线交易实现数据的转换。同时,从技术上保证了平台不具备查看、复制和保留数据的可能性,从而保证了数据的安全交易和交易双方的隐私。
{"title":"Distributed Data Trading Model Based on Blockchain","authors":"Jingang Yu, Peipei Zhao, Shu Li, Haiting Wang","doi":"10.1109/ICCC51575.2020.9345212","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345212","url":null,"abstract":"The current flow and trading of data has been a trend, but the current enthusiasm for data trading is not high. Due to the particularity of data and the current trading pattern of data, the ability of data trading platform to retain trading data has become a potential threat to both sides of the transaction and an obstacle to data trading. Due to the sensitivity of data, how to protect the privacy security of both sides of the transaction is also an important factor hindering the current data transaction. In response to the existing problems, this paper proposes a feasibility plan for data security transactions based on blockchain and in an untrusted environment, and designs a new decentralized transaction platform that will help transform data through online transactions. At the same time, it is technically guaranteed that the platform does not have the possibility of viewing, copying and detaining data, thereby ensuring the secure transaction of data and the privacy of both parties to the transaction.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Design and Performance Test for Phased Array Radar Communication 相控阵雷达通信系统设计与性能测试
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345113
Wenge Xing, Yuan Yao, Guang-xin Wu, Xinxin Liu, Jun Zhu
Radar communication integration seems promising to meet multiple mission requirements, reduce the number of antennas, and improve the utilization of spectrum resources. However, proper system design is required to obtain these advantages. In this paper, we propose a radar communication framework which allows radar and communication to share aperture, beamforming, spectrum, and resource scheduling. Moreover, a burst communication waveform is proposed to overcome the impact of saturated power amplifiers and improve performance. Moreover, we develop a radar communication test system. Test results validate the feasibility and effect of our proposed radar communication framework. Besides, in the test radar communication integration system, over-the-horizon scattering communications have been realized.
雷达通信一体化有望满足多种任务需求,减少天线数量,提高频谱资源利用率。然而,要获得这些优势,需要适当的系统设计。在本文中,我们提出了一个雷达通信框架,它允许雷达和通信共享孔径、波束形成、频谱和资源调度。此外,提出了一种突发通信波形,克服了饱和功率放大器的影响,提高了性能。此外,我们还开发了一个雷达通信测试系统。测试结果验证了所提出的雷达通信框架的可行性和有效性。此外,在测试雷达通信集成系统中,实现了超视距散射通信。
{"title":"System Design and Performance Test for Phased Array Radar Communication","authors":"Wenge Xing, Yuan Yao, Guang-xin Wu, Xinxin Liu, Jun Zhu","doi":"10.1109/ICCC51575.2020.9345113","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345113","url":null,"abstract":"Radar communication integration seems promising to meet multiple mission requirements, reduce the number of antennas, and improve the utilization of spectrum resources. However, proper system design is required to obtain these advantages. In this paper, we propose a radar communication framework which allows radar and communication to share aperture, beamforming, spectrum, and resource scheduling. Moreover, a burst communication waveform is proposed to overcome the impact of saturated power amplifiers and improve performance. Moreover, we develop a radar communication test system. Test results validate the feasibility and effect of our proposed radar communication framework. Besides, in the test radar communication integration system, over-the-horizon scattering communications have been realized.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block Halftoning for Size-Invariant Visual Cryptography Based on Two-Dimensional Lattices 基于二维格的大小不变视觉密码的块半调
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344985
Jincheng Zhou, Sian-Jheng Lin
Visual cryptography (VC) encodes a secret image into multiple transparencies. The secret image can be revealed by stacking a subset of these transparencies. However, the pixel expansion problem is a critical issue for VCs as a pixel in the secret image is encoded into multiple pixels. To solve this problem, many size-invariant VCs have been proposed. But there are some drawbacks in the existing size-invariant VCs. i) The input image is a binary image rather than a grayscale image. ii) Some schemes are not a ($k, n$) - VC. iii) The quality of recovered image is poor. Based on two-dimensional lattices, a block halftone technology for a size-invariant VC is proposed. In particular, the proposed block error diffusion takes a grayscale image as the input. It is adaptable to any pixel expansion. The experiments show that the proposed halftone technique has a better visual quality for the stacking results than prior common schemes, such as probabilistic schemes.
视觉密码学(VC)将一个秘密图像编码成多个透明图像。秘密图像可以通过叠加这些透明度的子集来显示。然而,当秘密图像中的一个像素被编码成多个像素时,像素扩展问题是VCs的关键问题。为了解决这个问题,人们提出了许多规模不变的风险投资。但是,现有的规模不变风险投资存在一些缺陷。i)输入图像是二值图像,而不是灰度图像。ii)有些方案不是($k, n$) - VC。iii)恢复的图像质量较差。在二维格的基础上,提出了一种尺寸不变VC的块半色调技术。特别地,提出的块误差扩散以灰度图像作为输入。它适用于任何像素扩展。实验结果表明,所提出的半色调叠加技术比以往常见的概率叠加技术具有更好的视觉效果。
{"title":"Block Halftoning for Size-Invariant Visual Cryptography Based on Two-Dimensional Lattices","authors":"Jincheng Zhou, Sian-Jheng Lin","doi":"10.1109/ICCC51575.2020.9344985","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344985","url":null,"abstract":"Visual cryptography (VC) encodes a secret image into multiple transparencies. The secret image can be revealed by stacking a subset of these transparencies. However, the pixel expansion problem is a critical issue for VCs as a pixel in the secret image is encoded into multiple pixels. To solve this problem, many size-invariant VCs have been proposed. But there are some drawbacks in the existing size-invariant VCs. i) The input image is a binary image rather than a grayscale image. ii) Some schemes are not a ($k, n$) - VC. iii) The quality of recovered image is poor. Based on two-dimensional lattices, a block halftone technology for a size-invariant VC is proposed. In particular, the proposed block error diffusion takes a grayscale image as the input. It is adaptable to any pixel expansion. The experiments show that the proposed halftone technique has a better visual quality for the stacking results than prior common schemes, such as probabilistic schemes.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hierarchical Blockchain Framework for Fog Computing-supported IoT Networks 雾计算支持物联网网络的分层区块链框架
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345159
Yong Zhang, Yong Xiao, Yuna Jiang, Xiaohu Ge
Blockchain has been recently extended into Internet-of-Things (IoT) networks to further improve security and reliability of data communication. Modern IoT networks need to support a wide range of services with various requirements in terms of data delivering security, reliability, and timeliness. In this paper, a fog computing-supported hierarchical blockchain network framework is proposed. In the first layer, the Inter-Planetary File System is used to store the message uploaded by IoT devices. In the second layer, a set of subchains that are referred as channels are designed. Fog nodes subscribed to the same channel maintain the corresponding distributed ledger, and each channel support a specific IoT service. The security, latency, and communication cost of the proposed framework are derived. Besides, tradeoffs among the above three performance metrics are analyzed. Finally, a real deployment scenario based on the actual base station locations in Dublin is considered to evaluate the proposed framework. Numerical results show that it is impossible to optimize all the performance metrics at the same time. By carefully selecting the parameters of different “channels”, the proposed framework can support highly diversified services without sacrificing security.
区块链最近已扩展到物联网(IoT)网络,以进一步提高数据通信的安全性和可靠性。现代物联网网络需要支持广泛的业务,在数据传输的安全性、可靠性和及时性方面有各种要求。本文提出了一种支持雾计算的分层区块链网络框架。在第一层,星际文件系统用于存储物联网设备上传的消息。在第二层,设计了一组称为通道的子链。订阅同一通道的雾节点维护相应的分布式账本,每个通道支持特定的物联网服务。推导了该框架的安全性、延迟和通信开销。此外,还分析了上述三种性能指标之间的权衡。最后,考虑了基于都柏林实际基站位置的真实部署场景,以评估所提议的框架。数值结果表明,同时优化所有性能指标是不可能的。通过仔细选择不同“通道”的参数,所提出的框架可以在不牺牲安全性的情况下支持高度多样化的服务。
{"title":"A Hierarchical Blockchain Framework for Fog Computing-supported IoT Networks","authors":"Yong Zhang, Yong Xiao, Yuna Jiang, Xiaohu Ge","doi":"10.1109/ICCC51575.2020.9345159","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345159","url":null,"abstract":"Blockchain has been recently extended into Internet-of-Things (IoT) networks to further improve security and reliability of data communication. Modern IoT networks need to support a wide range of services with various requirements in terms of data delivering security, reliability, and timeliness. In this paper, a fog computing-supported hierarchical blockchain network framework is proposed. In the first layer, the Inter-Planetary File System is used to store the message uploaded by IoT devices. In the second layer, a set of subchains that are referred as channels are designed. Fog nodes subscribed to the same channel maintain the corresponding distributed ledger, and each channel support a specific IoT service. The security, latency, and communication cost of the proposed framework are derived. Besides, tradeoffs among the above three performance metrics are analyzed. Finally, a real deployment scenario based on the actual base station locations in Dublin is considered to evaluate the proposed framework. Numerical results show that it is impossible to optimize all the performance metrics at the same time. By carefully selecting the parameters of different “channels”, the proposed framework can support highly diversified services without sacrificing security.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Label Prediction of Mammography Based on CC and MLO Views 基于CC和MLO视图的乳腺造影语义标签预测
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345195
Xiaomeng Wang, Jiyun Li, Chen Qian
Mammography image usually contains two views in different orientations-CC and MLO. In current computer-aided mammography label prediction systems, most models either assess information from only a single view which increases the false-positive rate or comprehensively evaluate information from four views of two breasts without distinguishing between the two breasts. In this paper, we propose a semantic label prediction model of mammography based on co-consideration of CC and MLO views. Firstly, a DCN is used to classify and enhance dense images. Secondly, a MLLN is designed to generate semantic labels of mammography by fusing the features of CC view and MLO view. The experiment shows that our model improves the prediction mAP of 7.3% compared to the single view model and 23.3% compared to the four-view model, respectively.
乳房x线摄影图像通常包含两个不同方向的视图- cc和MLO。在目前的计算机辅助乳房x线摄影标签预测系统中,大多数模型要么仅从单一视图评估信息,这增加了假阳性率,要么综合评估两个乳房的四个视图信息,而不区分两个乳房。在本文中,我们提出了一个基于CC和MLO视图共同考虑的乳腺x线摄影语义标签预测模型。首先,利用DCN对密集图像进行分类和增强。其次,通过融合CC视图和MLO视图的特征,设计了一个MLLN来生成乳腺x线图像的语义标签。实验表明,该模型比单视图模型和四视图模型分别提高了7.3%和23.3%的预测mAP。
{"title":"Semantic Label Prediction of Mammography Based on CC and MLO Views","authors":"Xiaomeng Wang, Jiyun Li, Chen Qian","doi":"10.1109/ICCC51575.2020.9345195","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345195","url":null,"abstract":"Mammography image usually contains two views in different orientations-CC and MLO. In current computer-aided mammography label prediction systems, most models either assess information from only a single view which increases the false-positive rate or comprehensively evaluate information from four views of two breasts without distinguishing between the two breasts. In this paper, we propose a semantic label prediction model of mammography based on co-consideration of CC and MLO views. Firstly, a DCN is used to classify and enhance dense images. Secondly, a MLLN is designed to generate semantic labels of mammography by fusing the features of CC view and MLO view. The experiment shows that our model improves the prediction mAP of 7.3% compared to the single view model and 23.3% compared to the four-view model, respectively.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Neighbor Discovery Algorithm with Collision Avoidance in Ad Hoc Network using Directional Antenna 基于定向天线的Ad Hoc网络中具有避免碰撞的邻居发现算法
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344952
Yunliang Liao, Laixian Peng, Renhui Xu, Aijing Li, Lin Ge
At present, most neighbor discovery algorithm mainly uses the 1-way handshake mechanism, which may lead to isolated nodes in the network. In order to solve this problem, an algorithm TSBA is proposed in this article, which uses the 2-way handshake mechanism to make the transmitting and receiving nodes cooperate to ensure the normal operation of subsequent communications. However, while solving the isolated nodes, the algorithm TSBA also caused the conflict and interference among nodes. For this reason, a selective feedback mechanism is added on the basis of the algorithm TSBA, and the algorithm TSBA-PI is pro-posed to reduce the probability of conflict and interference among nodes. By using OPNET 14.5 network simulation software, the performance of the algorithms TSBA, TSBA-PI and the 1-way handshake mechanism algorithm SBA-D (Deterministic Scan based Algorithm) is compared. The results show that the time slots consumed by the nodes in the 2-way handshake mechanism are significantly less than the 1-way handshake. In addition, nodes can quickly complete the neighbor discovery process when using the selective feed-back mechanism.
目前,大多数邻居发现算法主要采用单向握手机制,这可能导致网络中节点隔离。为了解决这一问题,本文提出了TSBA算法,该算法采用双向握手机制,使发送节点和接收节点相互协作,保证后续通信的正常进行。然而,TSBA算法在求解孤立节点的同时,也造成了节点间的冲突和干扰。为此,在TSBA算法的基础上增加了选择性反馈机制,提出了TSBA- pi算法,以降低节点间冲突和干扰的概率。利用OPNET 14.5网络仿真软件,比较了TSBA、TSBA- pi算法和单向握手机制算法SBA-D (Deterministic Scan based algorithm)的性能。结果表明,双向握手机制中节点消耗的时隙明显小于单向握手机制。此外,采用选择性反馈机制,节点可以快速完成邻居发现过程。
{"title":"Neighbor Discovery Algorithm with Collision Avoidance in Ad Hoc Network using Directional Antenna","authors":"Yunliang Liao, Laixian Peng, Renhui Xu, Aijing Li, Lin Ge","doi":"10.1109/ICCC51575.2020.9344952","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344952","url":null,"abstract":"At present, most neighbor discovery algorithm mainly uses the 1-way handshake mechanism, which may lead to isolated nodes in the network. In order to solve this problem, an algorithm TSBA is proposed in this article, which uses the 2-way handshake mechanism to make the transmitting and receiving nodes cooperate to ensure the normal operation of subsequent communications. However, while solving the isolated nodes, the algorithm TSBA also caused the conflict and interference among nodes. For this reason, a selective feedback mechanism is added on the basis of the algorithm TSBA, and the algorithm TSBA-PI is pro-posed to reduce the probability of conflict and interference among nodes. By using OPNET 14.5 network simulation software, the performance of the algorithms TSBA, TSBA-PI and the 1-way handshake mechanism algorithm SBA-D (Deterministic Scan based Algorithm) is compared. The results show that the time slots consumed by the nodes in the 2-way handshake mechanism are significantly less than the 1-way handshake. In addition, nodes can quickly complete the neighbor discovery process when using the selective feed-back mechanism.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115698629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE 6th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1