2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)最新文献

筛选
英文 中文
Research on Near-far Effect and anti-impact noise interference pseudo-code sequence blind estimation algorithm in Pseudo Satellite System 伪卫星系统中近远效应及抗冲击噪声干扰伪码序列盲估计算法研究
Youming Li, J. Gao, Yuanfa Ji, Wentao Fu, Songke Zhao, Suqing Yan
{"title":"Research on Near-far Effect and anti-impact noise interference pseudo-code sequence blind estimation algorithm in Pseudo Satellite System","authors":"Youming Li, J. Gao, Yuanfa Ji, Wentao Fu, Songke Zhao, Suqing Yan","doi":"10.1109/ICICSP50920.2020.9232101","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232101","url":null,"abstract":"This article focuses on the problem of near-far effects in pseudo-satellite ground-based navigation enhancement systems. First, the article analyzes the near-far effects from the perspective of signal power and from the perspective of correlation values, and briefly introduces several methods to suppress the near-far effects and their applicability. Then introduced the pseudo-code blind estimation algorithm against impact noise. In this paper, fractional low-order statistics combined with M-estimation enhanced projection approximation subspace tracking pseudocode sequence blind estimation algorithm is used to blindly estimate the pseudo-code sequence and simulate the anti-noise effect. The estimation results show that the impact component is basically eliminated and the estimation effect of the pseudo code sequence is very good, which shows that the algorithm has anti-impact noise characteristics and is suitable for high-performance pseudo code information estimation under the condition of low signal-to-noise ratio.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121436443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Particle Filter Based on UKF and Weight Optimization 基于UKF和权值优化的改进粒子滤波
Zhao Hui, W. Lifen, Ren Yuan, Geng Mengmeng
{"title":"An Improved Particle Filter Based on UKF and Weight Optimization","authors":"Zhao Hui, W. Lifen, Ren Yuan, Geng Mengmeng","doi":"10.1109/ICICSP50920.2020.9232021","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232021","url":null,"abstract":"Aiming at the problem of limited efficiency and accuracy of state estimation in the case of non-linear and non-Gaussian systems, this paper proposes an improved particle filtering algorithm based on edge unscented Kalman filtering and weight optimization for the existing efficiency problems of UPF. Compared with traditional particle filtering, the improved filtering algorithm generates a suggested distribution function in order to avoid excessive variance of particle weights and combines the latest observation information to calculate a more efficient edgeless trace Kalman filter; during the resampling process The weight-optimized resampling method is introduced to solve the problem of particle depletion and improve particle diversity. It can be verified through theoretical derivation and simulation analysis that the improved algorithm effectively improves the calculation efficiency and has better estimation accuracy.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117039686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of the Sparse Low-rank Model in Denoising of Underwater Acoustic Signal 稀疏低秩模型在水声信号去噪中的应用
Yaowen Wu, Chuanxi Xing, Yifan Zhao
{"title":"Application of the Sparse Low-rank Model in Denoising of Underwater Acoustic Signal","authors":"Yaowen Wu, Chuanxi Xing, Yifan Zhao","doi":"10.1109/ICICSP50920.2020.9232059","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232059","url":null,"abstract":"Sound signals have good propagation effect in the marine environment, which is of great significance to under-water target positioning, underwater acoustic communication and so on. However, underwater acoustic signals are usually disturbed by a large amount of noise during the propagation due to the complexity of the marine environment. And we could not obtain the underwater acoustic signals precisely. Traditional denoising methods based on robust principal component analysis (RPCA) are limited by its incompleteness, and the denoised signal still has a lot of noise. We use the Go decomposition (Godec) algorithm in this paper, which is based on the RPCA algorithm to represent the noisy signal as sparse, low-rank and noise via sparse low-rank model. Then we use the non-negative matrix factorization (NMF) algorithm for the low-rank part to obtain the noise-free signal dictionary and the noise dictionary. Finally, the signal is reconstructed according to the noise-free signal dictionary, and we obtain the denoised underwater acoustic signal. To verify the effectiveness of this method, we perform denoising processing on the measured signals of the marine experiment. The results show that compared with the traditional RPCA algorithm, the denoised signal via our method in this paper has fewer noise components and has a better noise reduction effect.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Indoor Positioning Algorithm Based on Neighborhood Partitioning 基于邻域划分的室内定位算法研究
Zhilong Shan, Fan Zhang, Na Lv, Wan Xiang
{"title":"Research on Indoor Positioning Algorithm Based on Neighborhood Partitioning","authors":"Zhilong Shan, Fan Zhang, Na Lv, Wan Xiang","doi":"10.1109/ICICSP50920.2020.9232087","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232087","url":null,"abstract":"In order to solve the problem of long matching time caused by a large number of reference fingerprints and inaccurate positioning caused by KNN algorithm alone. A method based on KNN partitioning is proposed in this paper. Firstly, the fingerprint space is clustered, and then the K nodes closest to the unknown node are obtained in the clustered area according to KNN algorithm. Secondly, the maximum and minimum coordinates of K fingerprints are used to determine the region, and then the region is divided by Newton interpolation method to form a virtual fingerprint matrix. Finally, KNN algorithm is used to re-determine the region, and then particle swarm optimization algorithm is used to find the optimal location node in this region iteratively. Experiments show that the algorithm can improve the positioning accuracy and reduce the matching time effectively, especially when the reference fingerprints are sparse.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bone-Conducted Speech to Air-Conducted Speech Conversion Based on CycleConsistent Adversarial Networks 基于周期一致对抗网络的骨传导语音到空气传导语音的转换
Qing Pan, Jian Zhou, Teng Gao, L. Tao
{"title":"Bone-Conducted Speech to Air-Conducted Speech Conversion Based on CycleConsistent Adversarial Networks","authors":"Qing Pan, Jian Zhou, Teng Gao, L. Tao","doi":"10.1109/ICICSP50920.2020.9232121","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232121","url":null,"abstract":"Compared with traditional Air-Conducted Microphone (ACM) speech, Bone-Conducted Microphone (BCM) speech has the advantage of shielding background noise and helps to improve the communication quality in the strong noise environment. This paper proposes a method that uses Cycle-Consistent Adversarial Networks (CycleGAN) to extend the bandwidth for converting BCM speech to ACM speech based on the analysis of the bandwidth difference. The proposed method learns the mapping relationship between BCM speech and ACM speech without relying on parallel data, and does not require any additional data, modules or alignment process, it also avoids the over smoothing that is easy to appear in many statistical models. The experimental results show that the method can better reconstruct the high-frequency components of BCM speech. Compared with the original speech, it improves the subjective and objective results, and obtains Melspectrum features with higher similarity to the target speech.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs) 车载自组织网络(vanet)重放攻击防范方案综述
Mahmood A. Al-Shareeda, Mohammed Anbar, I. Hasbullah, S. Manickam, Nibras Abdullah, Mustafa Maad Hamdi
{"title":"Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs)","authors":"Mahmood A. Al-Shareeda, Mohammed Anbar, I. Hasbullah, S. Manickam, Nibras Abdullah, Mustafa Maad Hamdi","doi":"10.1109/ICICSP50920.2020.9232047","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232047","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) are self-organizing wireless communication networks that allow vehicles to exchange traffic-related messages automatically with neigh-boring vehicles. The goals of VANETs are to aid road users and make traffic management more efficient. However, the open nature of the communication network medium that is used by VANETs exposes the messages in transit to security attacks and the information within to privacy breaches. Researchers proposed many security schemes in their attempt to solve the security and privacy issues in VANETs. However, most existing schemes suffer from high computation and communication overheads. We studied and analyzed the effect of one of the most common security attacks in VANETs, the replay attack. This paper presents the result of the study and analysis, as well as the survey of existing replay attack prevention schemes in VANETs.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Novel Clutter Covariance Matrix Reconstruction Method for Airborne STAP 一种新的机载STAP杂波协方差矩阵重构方法
Mingxin Liu, L. Zou, Xue-gang Wang
{"title":"A Novel Clutter Covariance Matrix Reconstruction Method for Airborne STAP","authors":"Mingxin Liu, L. Zou, Xue-gang Wang","doi":"10.1109/ICICSP50920.2020.9232020","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232020","url":null,"abstract":"The clutter plus noise covariance matrix (CNCM) usually estimated by the training snapshots is the key to obtain the weight vector in space-time adaptive processing (STAP). However, the CNCM is difficult to estimate accurately in small samples, which affects the target estimation seriously. To solve this problem, a novel CNCM reconstruction method is developed. The proposed method reconstructs the CNCM with Toeplitz structure and then derives closed-form expression for the estimated CNCM. Finally, the weight vector is built, which is convenient to detect and analyze the target signals. The effectiveness of the proposed approach is shown in simulated results.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICICSP 2020 Cover Page ICICSP 2020封面
{"title":"ICICSP 2020 Cover Page","authors":"","doi":"10.1109/icicsp50920.2020.9232111","DOIUrl":"https://doi.org/10.1109/icicsp50920.2020.9232111","url":null,"abstract":"","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133117237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reversible Meaningful Image Encryption Scheme Based on Block Compressive Sensing 一种基于块压缩感知的可逆有意义图像加密方案
Liya Zhu, Xiaoxia Zhou, Xi Zhang
{"title":"A Reversible Meaningful Image Encryption Scheme Based on Block Compressive Sensing","authors":"Liya Zhu, Xiaoxia Zhou, Xi Zhang","doi":"10.1109/ICICSP50920.2020.9232129","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232129","url":null,"abstract":"An efficient and reversible meaningful image encryption scheme is proposed in this paper. The plain image is first compressed and encrypted simultaneously by Adaptive Block Compressive Sensing (ABCS) framework to create a noise-like secret image. Next, Least Significant Bit (LSB) embedding is employed to embed the secret image into a carrier image to generate the final meaningful cipher image. In this scheme, ABCS improves the compression and efficiency performance, and the embedding and extraction operations are absolutely reversible. The simulation results and security analyses are presented to demonstrate the effectiveness, compression, secrecy of the proposed scheme.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual Tracking Based On Matching Cascade 基于匹配级联的视觉跟踪
Jialin Wang, Li Zhou, Weigang Lu, Fei Yang, Rui Zhang, Lei Zhang
{"title":"Visual Tracking Based On Matching Cascade","authors":"Jialin Wang, Li Zhou, Weigang Lu, Fei Yang, Rui Zhang, Lei Zhang","doi":"10.1109/ICICSP50920.2020.9232085","DOIUrl":"https://doi.org/10.1109/ICICSP50920.2020.9232085","url":null,"abstract":"With the increasing application of multi-target tracking technique, improving the tracking efficiency and processing of online data has become a hot issue. To solve the online multi -target tracking problem, this paper presents a hybrid data association method based on the comparison of local and global da ta associations. The method can guide global association with local constraints and seek global optimization for local associations. Objects and possible associations in video frames are thus abstracted. By constructing a cost function and calculating the lowest cost, optimal data correlation can be sought out and the optimal trajectory is subsequently acquired. Hybrid data association is then implemented on the real video frames which are chosen as the data sets for the tracking experiment in this paper. The performance evaluation is carried out and is compared wit h the existing multi-target tracking technology. The experiment result shows that the method performs well in many challenging environments and tracking is effectively improved.","PeriodicalId":117760,"journal":{"name":"2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信