2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)最新文献

筛选
英文 中文
Hybrid localization algorithm based on APIT and DV-HOP in Wireless Sensor Networks 无线传感器网络中基于APIT和DV-HOP的混合定位算法
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961600
Songlin Liu, Chungang Liu, Wenbin Zhang, Donglai Zhao
{"title":"Hybrid localization algorithm based on APIT and DV-HOP in Wireless Sensor Networks","authors":"Songlin Liu, Chungang Liu, Wenbin Zhang, Donglai Zhao","doi":"10.1109/ICCChinaW.2015.7961600","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961600","url":null,"abstract":"As one of the most important basic supporting technology of WSN, wireless sensor network positioning technology has an indispensable role. Different positioning algorithms have different strengths and weaknesses, in order to achieve high positioning accuracy and large node coverage, this paper proposes hybrid positioning algorithms of APIT and DV-HOP based on the analysis of various basic algorithms deeply. To improve the positioning accuracy and the rate of node coverage, the new algorithm of using angles to determine the exact location of unknown nodes was approved. Then the algorithm of APIT is adopted to the unknown nodes in the triangle with positioning error from 14.7215 meters to 3.2348 meters, as well as the DV-HOP weighted with the minimum hops to localize the rest unknown nodes with positioning accuracy increased by 49%. MATLAB simulation proved its effectiveness.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"538 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Antenna calibration method for MMSE-based network MIMO system 基于mmse的网络MIMO系统天线标定方法
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961592
Qiang Liu, Xin Su, Jie Zeng, Lili Liu, Tiejun Lv
{"title":"Antenna calibration method for MMSE-based network MIMO system","authors":"Qiang Liu, Xin Su, Jie Zeng, Lili Liu, Tiejun Lv","doi":"10.1109/ICCChinaW.2015.7961592","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961592","url":null,"abstract":"In this paper, we propose a new channel reciprocity calibration method based on minimum mean square error (MMSE) in network multiple-input and multiple-output (MIMO) system. Network MIMO system can mitigate the inter-cell interference by joint precoding techniques. The system is assumed to operate in time division duplex (TDD). However, the generalized channeles do not only consist of free-space electromagnetic channel, but also include transceiver modules, the mismatches between the transceiver modules of the antennas destroy the channel reciprocity. Therefore the mismatches should be calibrated before channel reciprocity can be utilized. An effective method for calculating the calibration coefficients in the network MIMO system whose BSs are equipped with multiple antennas is proposed. The network MIMO system is divided into M independent centralized MIMO systems and one distributed MIMO system, then the calibration coefficients of the two systems can be combined to calculate the calibration coefficients of the network MIMO system. The validity of the method is proved by the simulation results.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125452404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-object tracking method based on super-pixel and energy minimization 基于超像素和能量最小化的多目标跟踪方法
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961584
Wang Liu, Ming-yue Zhang, Wei Chen, Wenxiang Li, Yuxia Sheng
{"title":"Multi-object tracking method based on super-pixel and energy minimization","authors":"Wang Liu, Ming-yue Zhang, Wei Chen, Wenxiang Li, Yuxia Sheng","doi":"10.1109/ICCChinaW.2015.7961584","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961584","url":null,"abstract":"Video target tracking research is a hot topic in the field of computer vision. It has broad prospects in many fields such as video surveillance, virtual reality, interactive and automatic navigation. For multi-object tracking in video sequences, we propose a method based on super pixel and energy minimization. First we achieve target detection by super-pixel labeling with minimized energy function, and we capture the target's appearance with data cost model, which can be trained by support vector machine (SVM). Next we can track object based on continuous energy minimization method. The recall ratio of this method can be 99.8% at high overlap rate, e.g., 0.9, and yields improvement by 70%. Experimental results show that the method has advantages over other methods in complex environment with similar color background and targets, and improves the accuracy of multiple target tracking.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rumor spreading in interdependent social networks 谣言在相互依赖的社会网络中传播
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961572
Qiyi Han, Runfa Liao, Jie Tang
{"title":"Rumor spreading in interdependent social networks","authors":"Qiyi Han, Runfa Liao, Jie Tang","doi":"10.1109/ICCChinaW.2015.7961572","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961572","url":null,"abstract":"Social networks have been indispensable in people's daily life. With the development of smart mobile devices, the social network applications intend to integrate the existing social relations of computer-based and web-based networking applications. The integration is inevitable to contribute to interdependent networks. The cascading failures are researched deeply, however the rumor spreading is the most critical security threats. In this paper, we analyze the security environment for interdependent social networks and propose a SIDR rumor spreading model to identify the malicious propagation procedure. Finally, we propose some security strategies to control the rumor propagation.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective acquisition of a phase-coherent DSFH satellite telemetry signal 一种相参DSFH卫星遥测信号的有效采集
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961586
Xiao Chen, Guangxia Li, Zhiqiang Li, Wenming Zhu
{"title":"Effective acquisition of a phase-coherent DSFH satellite telemetry signal","authors":"Xiao Chen, Guangxia Li, Zhiqiang Li, Wenming Zhu","doi":"10.1109/ICCChinaW.2015.7961586","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961586","url":null,"abstract":"A hybrid direct sequence and frequency hopping (DSFH) spread spectrum signal can greatly improve ranging precision and jamming resisting capability in spacecraft telemetry. The frequency hopping adds another searching dimension to acquisition and increases the acquisition complexity. Therefore, this paper designs an phase-compensating-based effective acquisition algorithm. First, the model DSFH telemetry signal is introduced. Then the auto-correlation function and the acquisition problem are analyzed. Finally, a phase-compensating-based acquisition algorithm is proposed, its computation complexity is analyzed, and the signal-to-noise ratio(SNR) losses due to necessary approximations are shown. The proposed method can be modified to adapt to different PN chip rates and frequency hopping rates.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
5G security architecture and light weight security authentication 5G安全架构和轻量级安全认证
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961587
Fei Pan, H. Wen, Huan-huan Song, Tang Jie, Longye Wang
{"title":"5G security architecture and light weight security authentication","authors":"Fei Pan, H. Wen, Huan-huan Song, Tang Jie, Longye Wang","doi":"10.1109/ICCChinaW.2015.7961587","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961587","url":null,"abstract":"The concept of future 5G (the 5th generation of mobile networks) widely spreads in industry, but the related standards are still unclear. The definition of 5G is to provide adequate RF coverage, more bits/Hz and to interconnect all wireless heterogeneous networks to provide seamless, consistent telecom experience to the user. In this paper we have surveyed 5G network architecture and proposed a multi-tier security architecture and a lightweight authentication measure for 5G. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Secrecy analysis for forward link multi-user massive MIMO system with MRT precoding MRT预编码前向链路多用户海量MIMO系统保密性分析
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961602
Bin Chen, Chunsheng Zhu, Wei Chen, Kun Wang, Jibo Wei
{"title":"Secrecy analysis for forward link multi-user massive MIMO system with MRT precoding","authors":"Bin Chen, Chunsheng Zhu, Wei Chen, Kun Wang, Jibo Wei","doi":"10.1109/ICCChinaW.2015.7961602","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961602","url":null,"abstract":"The secrecy performance of forward link multi-user massive multiple-input multiple-output (MIMO) system is investigated in this paper. The base station (BS) equipped with a large number of transmit antennas sends mutually independent datas to multiple single-antenna legitimate users simultaneously. A passive multi-antenna eavesdropper is placed in the scenario to intercept the signals. We consider the case that the number of legitimate users and eavesdropper antennas increases proportionally with the number of BS antennas. Maximum ratio transmission (MRT) is used as linear precoder at the BS. Lower bounds on the ergodic achievable rate of legitimate users and upper bounds of the eavesdropper are derived. By minimizing the upper bounds on the achievable rates of the eavesdropper while satisfying the rate constraints of legitimate users, we present the corresponding optimal radiated power scaling (RPS) factor. In the limit of an infinite number of BS antennas, we prove that the optimal RPS factor converge to a different constant limit with that of the case in which the number of legitimate users and eavesdropper antennas is finite. We show that when the number of BS antennas grows large, the secrecy performance is mainly determined by the ratios between the number of BS antennas, legitimate users and eavesdropper antennas. A number of simulation results are presented to visualize the analysis.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124217799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Variable step-size affine projection normalized subband adaptive filter design 可变步长仿射投影归一化子带自适应滤波器设计
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961569
Xiaohui Qi, Kaizhi Huang, J. Yang
{"title":"Variable step-size affine projection normalized subband adaptive filter design","authors":"Xiaohui Qi, Kaizhi Huang, J. Yang","doi":"10.1109/ICCChinaW.2015.7961569","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961569","url":null,"abstract":"In order to improve the convergence performance of the normalized subband adaptive filter (NSAF), the variable step-size affine projection normalized subband adaptive filter (VSS-AP-NSAF) based on multi-band structure is proposed in this paper. The VSS-AP-NSAF updates the tap-weight vector based on several previous input vectors, which not only increases the convergence rate, but also maintains the robustness against the impulsive interference. The variable step-size is obtained by minimizing the upper bound of mean square deviation in iteration. In addition, the VSS-AP-NSAF is similar to the affine projection algorithm (APA) on the computational complexity. Experimental results demonstrate that the VSS-AP-NSAF achieves faster convergence rate and lower misalignment than the existing algorithms in system identification, and has a good result for echo cancellation as well.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A WSN based system for CO2 concentration monitoring in large-scale petrochemical plants 基于WSN的大型石化装置CO2浓度监测系统
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961605
Feng Zhang, Lei Shu, Chunsheng Zhu, Xianjun Wu, Kailiang Li, Junlin Zeng, Meijie Zhu, Guangjie Han, Haobo Li, Mingxiang Zhang
{"title":"A WSN based system for CO2 concentration monitoring in large-scale petrochemical plants","authors":"Feng Zhang, Lei Shu, Chunsheng Zhu, Xianjun Wu, Kailiang Li, Junlin Zeng, Meijie Zhu, Guangjie Han, Haobo Li, Mingxiang Zhang","doi":"10.1109/ICCChinaW.2015.7961605","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961605","url":null,"abstract":"With the problem that concentration of carbon dioxide (CO2) continues to exceed the standard at the inlet air of the air separation unit (ASU) in Maoming petrochemical refiner, a wireless sensor network (WSN) based system for CO2 concentration monitoring in large-scale petrochemical plants is proposed. Collecting the information of the sensors around the ASU through the ZigBee terminal nodes, the system consists of the wireless monitoring networks, the remote monitoring center and mobile phone client. In the system, the ZigBee coordinator module transmits the data to embedded gateway, which processes the data with a protocol, data fusion and fuzzy processing, and finally converts it into visual information displayed on the QT interface. The gateway can also send instruction information to all the nodes in WSNs or exchange information with the exterior by Internet. The results of experimental test indicate that this system can detect temperature, humidity, wind speed and direction, the concentration of CO2 and other parameters around the ASU. In addition, it can realize the collection, processing, transmission of data as well as display data in real-time and online.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things for wildlife monitoring 物联网用于野生动物监测
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961581
Xiaohan Liu, Tao Yang, Baoping Yan
{"title":"Internet of Things for wildlife monitoring","authors":"Xiaohan Liu, Tao Yang, Baoping Yan","doi":"10.1109/ICCChinaW.2015.7961581","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961581","url":null,"abstract":"In the past 15 years, Internet of Things (IOT) provides efficient technology support for the biology and zoology research. In this manuscript, we focus on three applications of wildlife monitoring: location tracking, habitat environment observation, and behavior recognition. A monitoring unit includes sensing, communication, and relative hardware and software components. We analyze the IOT platform for monitoring scenarios, and discuss system implementation from four aspects: identification, mobile access point, monitoring device and application. We introduce preliminary research on the development of a GSM communication based tracker, and give some considerations on resource saving mechanisms from four aspects: MCU rest and activation, local data computation and integration, data storage, and effective data transmission.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信