Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974578
Chang Li, Xinran Zhang, Wei Lin, Songlin Sun
Security is an important concern in wireless networks. In this paper, we study secure transmission in heterogeneous massive MIMO systems. Base station (BS) with large-scale antenna transmits signal to mobile terminals through low power nodes (LPNs) in the presence of passive multi-antenna eavesdroppers. We consider the secure downlink transmission based on cooperative jamming relay. Meanwhile we employ artificial noise to enhance the security. Our simulation results reveal in heterogeneous massive MIMO systems with Jammer and AN, the SNR of MT is higher than Eve, the obtained positive secrecy capacity prove this scheme can guarantee the secure transmission.
{"title":"Secure transmission based on cooperative jamming relay in heterogeneous massive MIMO system","authors":"Chang Li, Xinran Zhang, Wei Lin, Songlin Sun","doi":"10.1109/ICNIDC.2016.7974578","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974578","url":null,"abstract":"Security is an important concern in wireless networks. In this paper, we study secure transmission in heterogeneous massive MIMO systems. Base station (BS) with large-scale antenna transmits signal to mobile terminals through low power nodes (LPNs) in the presence of passive multi-antenna eavesdroppers. We consider the secure downlink transmission based on cooperative jamming relay. Meanwhile we employ artificial noise to enhance the security. Our simulation results reveal in heterogeneous massive MIMO systems with Jammer and AN, the SNR of MT is higher than Eve, the obtained positive secrecy capacity prove this scheme can guarantee the secure transmission.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974547
Meina Song, G. Luo, E. Haihong
The paper present a Dynamic Service Discovery System[1] with a Priority Load Balance Strategy. The system not only integrates Zookeeper[2] and tradition web project written with Spring and SpringMVC to achieve the dynamic service discovery function, which feeds the basic needs of the Priority Load Balance Strategy. The experimental test result shows that the new system has lots of advantages over the Traditional Service-Oriented Architecture and the load balance module gets a better performance.
{"title":"A Service Discovery System based on Zookeeper with Priority Load Balance Strategy","authors":"Meina Song, G. Luo, E. Haihong","doi":"10.1109/ICNIDC.2016.7974547","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974547","url":null,"abstract":"The paper present a Dynamic Service Discovery System[1] with a Priority Load Balance Strategy. The system not only integrates Zookeeper[2] and tradition web project written with Spring and SpringMVC to achieve the dynamic service discovery function, which feeds the basic needs of the Priority Load Balance Strategy. The experimental test result shows that the new system has lots of advantages over the Traditional Service-Oriented Architecture and the load balance module gets a better performance.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117309667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974595
Jaehoon Lee, Junhyuk Kim, Hyowon Kim, Chansik Park, M. Lee, Sunwoo Kim
In this paper, we present a performance of cooperative quickest interference detection for GNSS. Various schemes for interference detection have already been studied in GNSS literature, the purpose is to focus on a reliable and fast detection. We consider cooperative detection using the CUSUM test in multi-GNSS receiver scenario. The proposed approach results of simulation show the fundamental framework to apply GNSS of cooperative quickest detection.
{"title":"Performance analysis of cooperative quickest interference detection for GNSS","authors":"Jaehoon Lee, Junhyuk Kim, Hyowon Kim, Chansik Park, M. Lee, Sunwoo Kim","doi":"10.1109/ICNIDC.2016.7974595","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974595","url":null,"abstract":"In this paper, we present a performance of cooperative quickest interference detection for GNSS. Various schemes for interference detection have already been studied in GNSS literature, the purpose is to focus on a reliable and fast detection. We consider cooperative detection using the CUSUM test in multi-GNSS receiver scenario. The proposed approach results of simulation show the fundamental framework to apply GNSS of cooperative quickest detection.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974604
Jie Zhou, Yan Ma
To manage Ethernet networks efficiently, detailed and accurate knowledge of their topology is needed, like network partition, performance prediction are based on network topology. In this paper, we proposed an algorithm to discover physical layout topology structure of Ethernet networks with incomplete address forwarding table information. This algorithm can handle both layer-2 switches with VLAN and layer-3 switches. We have implemented our algorithm in networks of some universities, and it works well in these networks divided by VLAN.
{"title":"Topology discovery algorithm for ethernet networks with incomplete information based on VLAN","authors":"Jie Zhou, Yan Ma","doi":"10.1109/ICNIDC.2016.7974604","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974604","url":null,"abstract":"To manage Ethernet networks efficiently, detailed and accurate knowledge of their topology is needed, like network partition, performance prediction are based on network topology. In this paper, we proposed an algorithm to discover physical layout topology structure of Ethernet networks with incomplete address forwarding table information. This algorithm can handle both layer-2 switches with VLAN and layer-3 switches. We have implemented our algorithm in networks of some universities, and it works well in these networks divided by VLAN.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974528
Xiaodong Liang, Xiaofeng Qiu
Software Defined Networking (SDN) is considered to meet the future needs of the 5G mobile networks. However, there have been only a few works so far that address the security issues in SDMN (Software Defined Mobile Networks), and all the proposed approaches have their drawbacks. So, in this context, a new security paradigm based on SDN introduces many opportunities and provides the potential to solve the security problem in the mobile core network. In this paper, we present the SDS-SC, a software defined security architecture for SDN based 5G network. With centralized security controller that communicates with SDN network controller, flexible and network-aware security services could be provided for mobile users on-demand. We also highlight how security applications could be developed easily in our architecture through application interface on top of the security controller.
{"title":"A software defined security architecture for SDN-based 5G network","authors":"Xiaodong Liang, Xiaofeng Qiu","doi":"10.1109/ICNIDC.2016.7974528","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974528","url":null,"abstract":"Software Defined Networking (SDN) is considered to meet the future needs of the 5G mobile networks. However, there have been only a few works so far that address the security issues in SDMN (Software Defined Mobile Networks), and all the proposed approaches have their drawbacks. So, in this context, a new security paradigm based on SDN introduces many opportunities and provides the potential to solve the security problem in the mobile core network. In this paper, we present the SDS-SC, a software defined security architecture for SDN based 5G network. With centralized security controller that communicates with SDN network controller, flexible and network-aware security services could be provided for mobile users on-demand. We also highlight how security applications could be developed easily in our architecture through application interface on top of the security controller.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974568
Jingxuan Yang, Qinjie Lyu, Sheng Gao, Lin Qiu, Jun Guo
User reviews, in the form of short unstructured natural texts, often provide rich information to benefit product adoption or service improvement. Aspect can be extracted as the abstract meaning from the reviews. Traditional methods have employed either rule-based templates or bag-of-words features for aspect extraction from text. However, these models cannot effectively handle short texts, especially in Chinese reviews. In this paper, we address the issue by learning the character embeddings as the basic semantic unit and incorporating the compositional sentence-level representation into a neural network approach for review aspect classification. For that, the character embeddings from the reviews are learned in position-based and clustered-based fashions, and then combined into sentence vectors to yield better text representations. Extensive experiments on real world data set suggest that our proposed model highly outperforms the state-of-the-art methods for review aspect extraction task.
{"title":"Review aspect extraction based on character-enhanced embedding models","authors":"Jingxuan Yang, Qinjie Lyu, Sheng Gao, Lin Qiu, Jun Guo","doi":"10.1109/ICNIDC.2016.7974568","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974568","url":null,"abstract":"User reviews, in the form of short unstructured natural texts, often provide rich information to benefit product adoption or service improvement. Aspect can be extracted as the abstract meaning from the reviews. Traditional methods have employed either rule-based templates or bag-of-words features for aspect extraction from text. However, these models cannot effectively handle short texts, especially in Chinese reviews. In this paper, we address the issue by learning the character embeddings as the basic semantic unit and incorporating the compositional sentence-level representation into a neural network approach for review aspect classification. For that, the character embeddings from the reviews are learned in position-based and clustered-based fashions, and then combined into sentence vectors to yield better text representations. Extensive experiments on real world data set suggest that our proposed model highly outperforms the state-of-the-art methods for review aspect extraction task.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126381069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974591
Lei Chen, Hui Peng, Mengyue Liu, Yu Liu
Frequency Hopping Communication Signal (FHCS) is widely used in military filed especially in military communication for its good anti-jamming performance and multiple access capability. Due to the rapid development of communication technology, the band width of FHCS become wider and wider, frequency become larger and larger. There will be a huge pressure on Analog to Digital Converter (ADC) as well as DSP device. Theory of compressed sensing (CS) enables a successful reconstruction of sparse signal by sampling at a sub-Nyquist sample rate. Analog to Information Converter is a better implementation of CS, which includes Random Demodulator scheme (RD) and Modulated Wideband Converter (MWC). In this paper, we apply these two schemes into FHCS's compressed sampling and reconstruction. Simulations are performed to verify that RD scheme can reconstruct signal successfully with high possibility with relatively low time complexity at low sample rate. Besides, MWC guarantees the accuracy and efficiency of signal collection.
{"title":"Compressed sensing for frequency hopping communication signals via analog to information converter","authors":"Lei Chen, Hui Peng, Mengyue Liu, Yu Liu","doi":"10.1109/ICNIDC.2016.7974591","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974591","url":null,"abstract":"Frequency Hopping Communication Signal (FHCS) is widely used in military filed especially in military communication for its good anti-jamming performance and multiple access capability. Due to the rapid development of communication technology, the band width of FHCS become wider and wider, frequency become larger and larger. There will be a huge pressure on Analog to Digital Converter (ADC) as well as DSP device. Theory of compressed sensing (CS) enables a successful reconstruction of sparse signal by sampling at a sub-Nyquist sample rate. Analog to Information Converter is a better implementation of CS, which includes Random Demodulator scheme (RD) and Modulated Wideband Converter (MWC). In this paper, we apply these two schemes into FHCS's compressed sampling and reconstruction. Simulations are performed to verify that RD scheme can reconstruct signal successfully with high possibility with relatively low time complexity at low sample rate. Besides, MWC guarantees the accuracy and efficiency of signal collection.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974602
Zhexin Li, Yu Liu, Yumei Wang
With the development of information technology, people's demand for wireless video is improved. Recently, an uncoded video transmission scheme called SoftCast was proposed for wireless video communication which provided graceful transition quality. However, when channel bandwidth is low, we need to discard some packets before transmitting to meet the requirement of bandwidth. This will cause a sharp decline on receiver video quality. This paper proposed an unequal block method (UBCAST) based on the frequency of image. UBCAST divides the lowest frequency into the biggest block to protect low frequency information, and divides the highest frequency into the smallest block which can protect low frequency packets from being discarded. What's more we can increase high frequency block proportion to improve transmission quality. And we can also increase low frequency block proportion to increase discarding packets proportion to meet the bandwidth requirement of channel. The experimental results show that when transmitting video information completely, we can improve the performance of the original SoftCast using 8∗8 block up to 2dB. When the SNR of channel is 20dB, discarding packets, we can even get a 10dB gain.
{"title":"Unequal block for low bandwidth adaption in wireless video broadcast","authors":"Zhexin Li, Yu Liu, Yumei Wang","doi":"10.1109/ICNIDC.2016.7974602","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974602","url":null,"abstract":"With the development of information technology, people's demand for wireless video is improved. Recently, an uncoded video transmission scheme called SoftCast was proposed for wireless video communication which provided graceful transition quality. However, when channel bandwidth is low, we need to discard some packets before transmitting to meet the requirement of bandwidth. This will cause a sharp decline on receiver video quality. This paper proposed an unequal block method (UBCAST) based on the frequency of image. UBCAST divides the lowest frequency into the biggest block to protect low frequency information, and divides the highest frequency into the smallest block which can protect low frequency packets from being discarded. What's more we can increase high frequency block proportion to improve transmission quality. And we can also increase low frequency block proportion to increase discarding packets proportion to meet the bandwidth requirement of channel. The experimental results show that when transmitting video information completely, we can improve the performance of the original SoftCast using 8∗8 block up to 2dB. When the SNR of channel is 20dB, discarding packets, we can even get a 10dB gain.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICNIDC.2016.7974542
Wenzhuo Song, Bo Yang, Xuehua Zhao, Fei Li
An important and widespread topic in cloud computing is text analyzing. People often use topic model which is a popular and effective technology to deal with related tasks. Among all the topic models, sLDA is acknowledged as a popular supervised topic model, which adds a response variable or category label with each document, so that the model can uncover the latent structure of a text dataset as well as retains the predictive power for supervised tasks. However, sLDA needs to process all the documents at each iteration in the training period. When the size of dataset increases to the volume that one node cannot deal with, sLDA will no longer be competitive. In this paper we propose a novel model named Mr.sLDA which extends sLDA with stochastic variational inference (SVI) and MapReduce. SVI can reduce the computational burden of sLDA and MapReduce extends the algorithm with parallelization. Mr.sLDA makes the training become more efficient and the training method can be easily implemented in a large computer cluster or cloud computing. Empirical results show that our approach has an efficient training process, and similar accuracy with sLDA.
{"title":"A fast and scalable supervised topic model using stochastic variational inference and MapReduce","authors":"Wenzhuo Song, Bo Yang, Xuehua Zhao, Fei Li","doi":"10.1109/ICNIDC.2016.7974542","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974542","url":null,"abstract":"An important and widespread topic in cloud computing is text analyzing. People often use topic model which is a popular and effective technology to deal with related tasks. Among all the topic models, sLDA is acknowledged as a popular supervised topic model, which adds a response variable or category label with each document, so that the model can uncover the latent structure of a text dataset as well as retains the predictive power for supervised tasks. However, sLDA needs to process all the documents at each iteration in the training period. When the size of dataset increases to the volume that one node cannot deal with, sLDA will no longer be competitive. In this paper we propose a novel model named Mr.sLDA which extends sLDA with stochastic variational inference (SVI) and MapReduce. SVI can reduce the computational burden of sLDA and MapReduce extends the algorithm with parallelization. Mr.sLDA makes the training become more efficient and the training method can be easily implemented in a large computer cluster or cloud computing. Empirical results show that our approach has an efficient training process, and similar accuracy with sLDA.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present the experimental study based on filtering techniques to extract essential vital signals such respiration rate (RR) using continuous wave (CW) Doppler radar sensor. Due to the fact that the CW Doppler radar offers very high sensitivity towards minor movements, based on this technology, various filtering techniques were introduced and the detection rate was compared to the reference devices to conclude the leading method for the respiration rate detection.
{"title":"An experimental study: The sufficient respiration rate detection technique via continuous wave Doppler radar","authors":"Ku-young Chung, Bong-Ki Lee, Kwangsub Song, Kangsoo Shin, Seok-Hyun Cho, Joon‐Hyuk Chang","doi":"10.1109/ICNIDC.2016.7974619","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974619","url":null,"abstract":"In this paper, we present the experimental study based on filtering techniques to extract essential vital signals such respiration rate (RR) using continuous wave (CW) Doppler radar sensor. Due to the fact that the CW Doppler radar offers very high sensitivity towards minor movements, based on this technology, various filtering techniques were introduced and the detection rate was compared to the reference devices to conclude the leading method for the respiration rate detection.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}