Yang Zhao, Xingkang Zhao, Jinxin Huang, Zhiquan Zhou
{"title":"Simulation of direct water-air communication by using an acousto-optic method","authors":"Yang Zhao, Xingkang Zhao, Jinxin Huang, Zhiquan Zhou","doi":"10.1117/12.2655402","DOIUrl":"https://doi.org/10.1117/12.2655402","url":null,"abstract":"This paper studies the simulation and algorism of acousto-optic method used in the wireless communication between water and air. Binary frequency shift keying (2FSK) is selected as the way of modulate underwater acoustic signals. Then, laser interferometry was introduced to detect the signal of underwater acoustic communication. Further, transmission information was demodulated by the differential-and-cross-multiplying (DCM) algorism. Information transmission rate of 2FSK was analyzed through the numerical simulation. The results shows that the maximum of information transmission rate is 67 bit/s at error free.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131268057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal detection based on deep learning in MIMO-OFDM systems","authors":"Yan Yang, Yuanchun Chen","doi":"10.1117/12.2655192","DOIUrl":"https://doi.org/10.1117/12.2655192","url":null,"abstract":"The signal detection is presented based on deep learning (DL) for Multiple-in-Multiple-out Orthogonal Frequency Division Multiplexing (MIMO-OFDM) Systems. In MIMO-OFDM systems, a receiver is designed to eliminate successive interference cancellation based on DL for multiple users. The signal detection and channel estimation are carried out using deep neural network (DNN) which is trained offline depend on simulation data. And the symbols online are recovered directly. The simulation results show that Deep learning (DL) method is better than those traditional methods for channel estimation. The error propagation effects are reduced by DNN in the signal detector. The inter-symbol interference (ISI) of systems is serious, which shows that the DL approach can achieve the better performance by the DL approach than the maximum likelihood approach.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"25 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZY-3 satellite image based analysis of overall landscape patterns in Huai’an-Yangzhou section along the Grand Canal","authors":"Hong Li, Huan Xu","doi":"10.1117/12.2655328","DOIUrl":"https://doi.org/10.1117/12.2655328","url":null,"abstract":"This paper studies the overall landscape patterns in Huai’an-Yangzhou section along the Grand Canal with RS (Remote Sensing) and GIS (Geographic Information System) based on ZY-3 satellite images of this area. During the study, the landscapes of Huai’an-Yangzhou section along the Grand Canal have been classified into six types, i.e. farmland landscape, garden and forest landscape, water landscape, architectural landscape, road landscape, and other landscapes. Meanwhile PD (Patch Density), perimeter area fractal dimension (PAFRAC), and AI (agglomeration index) of different landscapes in these two heritage sites have been calculated, whose results show that farmland landscape, architectural landscape, and water landscape are the three most obvious landscapes with a high degree of concentration in the two heritage areas. The findings can provide basic data for landscape protection and management of Huai’an-Yangzhou section along the Grand Canal.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic optimization method at five-way intersection based on green building materials and signal processing","authors":"Zijun Liang, Xu Zhan, Wei Kong, Yuanyuan Zhao, Yiran Niu, Min-Yang Peng","doi":"10.1117/12.2655335","DOIUrl":"https://doi.org/10.1117/12.2655335","url":null,"abstract":"With the rapid development of China's economy, the development speed and scale of transportation engineering have also expanded rapidly. But the problem of environmental pollution problems have also gradually emerged, and the use of environmental protection materials has become an inevitable trend of green transportation development. This paper puts forward the traffic optimization method at five-way intersection based on green building materials and signal processing. Firstly, the green and environment protection hot-melt reflective marking paint and color asphalt concrete pavement materials are used to construct the travel space of motor vehicles, non-motor vehicles and pedestrians at five-way intersection. Then, on this basis, the phase design method based on clipping method and the corresponding signal timing method are proposed to optimize the traffic flow travel time at five-way intersection. Finally, the evaluation and analysis is done by the VISSIM traffic simulation software, the results show that this method based on green building materials effectively defines the travel space of five-way intersection. On this premise, the traffic efficiency is further improved through signal processing optimization technology, which effectively reduces the number of conflict point at the five-way intersection and provides a basis for the research on the optimal control of deformed intersections based on green building materials and signal processing.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130445411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on smart city architecture system based on cloud-edge-terminal and blockchain technology","authors":"Xiuli Su, Jun Yang, Wei Ma","doi":"10.1117/12.2655179","DOIUrl":"https://doi.org/10.1117/12.2655179","url":null,"abstract":"In view of the problems of low data processing efficiency, security risks and low utilization rate in the construction of smart city, this paper uses the integration technology of Cloud-Edge-Terminal and blockchain to build the smart city architecture system, and proposes solutions for data storage and sharing in the architecture system, which not only realizes the real-time, efficient and rapid response of the smart city platform system, but further improves the security of data storage and sharing in the construction of smart city.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121536080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high-performance Webshell detection model","authors":"Wenhao Yuan, Shanfeng Wang, Yixuan Feng, Shujie Li, Songhua Li, Ruyin Sun","doi":"10.1117/12.2655320","DOIUrl":"https://doi.org/10.1117/12.2655320","url":null,"abstract":"Webshell exists as a command execution environment in the form of a web page file, which is often referred to as a backdoor. After hacking a website, hackers usually upload it to the web directory of the web server and mix it with the normal web files, and then access the backdoor program through the browser, which can achieve the purpose of controlling the browser. Since there are many kinds of web backdoors in the form of asp, php, jsp or cgi files, here we choose the more popular php file as the research object. In this paper, the Webshell dataset comes from common Webshell samples on the Internet, and the white samples mainly use common open source software developed based on PHP. We use bag-of-words and TF-IDF models for feature extraction, and construct Webshell detection models based on the LightGBM algorithm. The results show that our model is more than 98% accurate and has higher performance in space and time compared to the current popular classification models.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on application of radio physical layer key generation technology to proximity communication in 6G","authors":"Jingpeng Bai","doi":"10.1117/12.2655338","DOIUrl":"https://doi.org/10.1117/12.2655338","url":null,"abstract":"Based on the characteristic in time, frequency and spatial domain, radio physical layer can provide powerful basic support for constructing new radio communication security mechanism. How to integrate the radio layer security concept with the traditional radio communication security mechanism is one of the most important studies during 6G technology research. This paper focuses on the proximity based services (ProSe) that show the characteristics of radio communication in 6G, analyzes the potential security enhancement space of the current 3GPP 5G ProSe standardization scheme, and proposes a proximity radio communication security enhancement mechanism based on radio physical layer key generation technology. The mechanism uses the uniqueness of the radio channel characteristics of both sides of the communication as a shared physical layer private information source, constructs a PC5 interface security model across the physical layer and the ProSe protocol layer, and enhances the security protection of discovery messages and signaling messages on PC5 interface in proximity communication. The mechanism can effectively enhance the radio communication security when the traditional security mechanism is not fully activated. Finally, potential application scenarios for radio physical layer key generation techniques in 6G proximity communication services are discussed.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A non-convex optimization method for identification of cascaded nonlinear systems","authors":"Yu Fu, Zhenlong Xiao","doi":"10.1117/12.2655413","DOIUrl":"https://doi.org/10.1117/12.2655413","url":null,"abstract":"Identification of cascaded dynamic nonlinear systems has received more and more attention since it can be applied to characterize a wide class of engineering problems. However, this problem is inherently non-convex, and few efforts have been devoted to identifying these systems. In this paper, we propose a novel non-convex optimization method for identifying the cascaded nonlinear systems. The identification problem is modeled as a multi-objective consensus problem. Numerical simulation shows that the proposed algorithm is able to alleviate the non-convex characteristic and identifying the nonlinear dynamic cascade systems.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123799815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chen Chen, Guanghua Wang, Bo Yang, Lintao Yang, Xiaoyan Ye
{"title":"Build intrusion detection model based on CNN and ensemble learning","authors":"Chen Chen, Guanghua Wang, Bo Yang, Lintao Yang, Xiaoyan Ye","doi":"10.1117/12.2655173","DOIUrl":"https://doi.org/10.1117/12.2655173","url":null,"abstract":"In order to effectively detect network attacks, machine learning is widely used to classify different types of intrusion detection. Traditional detection usually used a single model to train data, which was prone to the problems of large generalization error and over fitting. In order to solve this problem, the idea of ensemble learning is introduced, and an intrusion detection model based on CNN and ensemble learning is proposed. Firstly, CNN is used to mine the deep information in the original data, and then the mined information is taken as the input and detected by using the ensemble learning model. According to the stacking strategy, a variety of heterogeneous models are used as the base-learner, and support vector machine is selected as the meta-learner. The NSL-KDD dataset is used to train and test the intrusion detection model. The experimental results show that the model can obtain higher accuracy and has very good intrusion detection classification effect.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125172721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Chen, Qing Liu, Bijun Zhang, Gang Li, Shaoping Wu
{"title":"Research on distributed competition big data hierarchical storage method based on Ceph architecture","authors":"Xiang Chen, Qing Liu, Bijun Zhang, Gang Li, Shaoping Wu","doi":"10.1117/12.2655365","DOIUrl":"https://doi.org/10.1117/12.2655365","url":null,"abstract":"In the face of intensive data access requests, the current big data storage methods have the problem of poor concurrent read-write performance. Based on Ceph architecture, a distributed big data hierarchical storage method is designed to realize the robust storage service of data files. According to the frequency and popularity of the access object, the cold data with low frequency is eliminated, and the access cache pool or back-end storage pool is selected. Standardize the I/O performance, load and capacity values in the OSD set, calculate the comprehensive weight, and determine the priority of node access. The entire Ceph architecture balances the data distribution. When highly concurrent data access operations occur, a random number is selected to execute the read service of the storage node to ensure the interconnection communication in different clusters. The test results show that the write and read time of the hierarchical storage method based on Ceph architecture is greatly reduced, and good results are achieved in terms of cache hit rate, which can effectively manage and store competitive big data.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131736026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}