{"title":"Hybrid localization algorithm based on APIT and DV-HOP in Wireless Sensor Networks","authors":"Songlin Liu, Chungang Liu, Wenbin Zhang, Donglai Zhao","doi":"10.1109/ICCChinaW.2015.7961600","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961600","url":null,"abstract":"As one of the most important basic supporting technology of WSN, wireless sensor network positioning technology has an indispensable role. Different positioning algorithms have different strengths and weaknesses, in order to achieve high positioning accuracy and large node coverage, this paper proposes hybrid positioning algorithms of APIT and DV-HOP based on the analysis of various basic algorithms deeply. To improve the positioning accuracy and the rate of node coverage, the new algorithm of using angles to determine the exact location of unknown nodes was approved. Then the algorithm of APIT is adopted to the unknown nodes in the triangle with positioning error from 14.7215 meters to 3.2348 meters, as well as the DV-HOP weighted with the minimum hops to localize the rest unknown nodes with positioning accuracy increased by 49%. MATLAB simulation proved its effectiveness.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"538 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna calibration method for MMSE-based network MIMO system","authors":"Qiang Liu, Xin Su, Jie Zeng, Lili Liu, Tiejun Lv","doi":"10.1109/ICCChinaW.2015.7961592","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961592","url":null,"abstract":"In this paper, we propose a new channel reciprocity calibration method based on minimum mean square error (MMSE) in network multiple-input and multiple-output (MIMO) system. Network MIMO system can mitigate the inter-cell interference by joint precoding techniques. The system is assumed to operate in time division duplex (TDD). However, the generalized channeles do not only consist of free-space electromagnetic channel, but also include transceiver modules, the mismatches between the transceiver modules of the antennas destroy the channel reciprocity. Therefore the mismatches should be calibrated before channel reciprocity can be utilized. An effective method for calculating the calibration coefficients in the network MIMO system whose BSs are equipped with multiple antennas is proposed. The network MIMO system is divided into M independent centralized MIMO systems and one distributed MIMO system, then the calibration coefficients of the two systems can be combined to calculate the calibration coefficients of the network MIMO system. The validity of the method is proved by the simulation results.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125452404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Liu, Ming-yue Zhang, Wei Chen, Wenxiang Li, Yuxia Sheng
{"title":"Multi-object tracking method based on super-pixel and energy minimization","authors":"Wang Liu, Ming-yue Zhang, Wei Chen, Wenxiang Li, Yuxia Sheng","doi":"10.1109/ICCChinaW.2015.7961584","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961584","url":null,"abstract":"Video target tracking research is a hot topic in the field of computer vision. It has broad prospects in many fields such as video surveillance, virtual reality, interactive and automatic navigation. For multi-object tracking in video sequences, we propose a method based on super pixel and energy minimization. First we achieve target detection by super-pixel labeling with minimized energy function, and we capture the target's appearance with data cost model, which can be trained by support vector machine (SVM). Next we can track object based on continuous energy minimization method. The recall ratio of this method can be 99.8% at high overlap rate, e.g., 0.9, and yields improvement by 70%. Experimental results show that the method has advantages over other methods in complex environment with similar color background and targets, and improves the accuracy of multiple target tracking.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rumor spreading in interdependent social networks","authors":"Qiyi Han, Runfa Liao, Jie Tang","doi":"10.1109/ICCChinaW.2015.7961572","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961572","url":null,"abstract":"Social networks have been indispensable in people's daily life. With the development of smart mobile devices, the social network applications intend to integrate the existing social relations of computer-based and web-based networking applications. The integration is inevitable to contribute to interdependent networks. The cascading failures are researched deeply, however the rumor spreading is the most critical security threats. In this paper, we analyze the security environment for interdependent social networks and propose a SIDR rumor spreading model to identify the malicious propagation procedure. Finally, we propose some security strategies to control the rumor propagation.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective acquisition of a phase-coherent DSFH satellite telemetry signal","authors":"Xiao Chen, Guangxia Li, Zhiqiang Li, Wenming Zhu","doi":"10.1109/ICCChinaW.2015.7961586","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961586","url":null,"abstract":"A hybrid direct sequence and frequency hopping (DSFH) spread spectrum signal can greatly improve ranging precision and jamming resisting capability in spacecraft telemetry. The frequency hopping adds another searching dimension to acquisition and increases the acquisition complexity. Therefore, this paper designs an phase-compensating-based effective acquisition algorithm. First, the model DSFH telemetry signal is introduced. Then the auto-correlation function and the acquisition problem are analyzed. Finally, a phase-compensating-based acquisition algorithm is proposed, its computation complexity is analyzed, and the signal-to-noise ratio(SNR) losses due to necessary approximations are shown. The proposed method can be modified to adapt to different PN chip rates and frequency hopping rates.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Pan, H. Wen, Huan-huan Song, Tang Jie, Longye Wang
{"title":"5G security architecture and light weight security authentication","authors":"Fei Pan, H. Wen, Huan-huan Song, Tang Jie, Longye Wang","doi":"10.1109/ICCChinaW.2015.7961587","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961587","url":null,"abstract":"The concept of future 5G (the 5th generation of mobile networks) widely spreads in industry, but the related standards are still unclear. The definition of 5G is to provide adequate RF coverage, more bits/Hz and to interconnect all wireless heterogeneous networks to provide seamless, consistent telecom experience to the user. In this paper we have surveyed 5G network architecture and proposed a multi-tier security architecture and a lightweight authentication measure for 5G. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bin Chen, Chunsheng Zhu, Wei Chen, Kun Wang, Jibo Wei
{"title":"Secrecy analysis for forward link multi-user massive MIMO system with MRT precoding","authors":"Bin Chen, Chunsheng Zhu, Wei Chen, Kun Wang, Jibo Wei","doi":"10.1109/ICCChinaW.2015.7961602","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961602","url":null,"abstract":"The secrecy performance of forward link multi-user massive multiple-input multiple-output (MIMO) system is investigated in this paper. The base station (BS) equipped with a large number of transmit antennas sends mutually independent datas to multiple single-antenna legitimate users simultaneously. A passive multi-antenna eavesdropper is placed in the scenario to intercept the signals. We consider the case that the number of legitimate users and eavesdropper antennas increases proportionally with the number of BS antennas. Maximum ratio transmission (MRT) is used as linear precoder at the BS. Lower bounds on the ergodic achievable rate of legitimate users and upper bounds of the eavesdropper are derived. By minimizing the upper bounds on the achievable rates of the eavesdropper while satisfying the rate constraints of legitimate users, we present the corresponding optimal radiated power scaling (RPS) factor. In the limit of an infinite number of BS antennas, we prove that the optimal RPS factor converge to a different constant limit with that of the case in which the number of legitimate users and eavesdropper antennas is finite. We show that when the number of BS antennas grows large, the secrecy performance is mainly determined by the ratios between the number of BS antennas, legitimate users and eavesdropper antennas. A number of simulation results are presented to visualize the analysis.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124217799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variable step-size affine projection normalized subband adaptive filter design","authors":"Xiaohui Qi, Kaizhi Huang, J. Yang","doi":"10.1109/ICCChinaW.2015.7961569","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961569","url":null,"abstract":"In order to improve the convergence performance of the normalized subband adaptive filter (NSAF), the variable step-size affine projection normalized subband adaptive filter (VSS-AP-NSAF) based on multi-band structure is proposed in this paper. The VSS-AP-NSAF updates the tap-weight vector based on several previous input vectors, which not only increases the convergence rate, but also maintains the robustness against the impulsive interference. The variable step-size is obtained by minimizing the upper bound of mean square deviation in iteration. In addition, the VSS-AP-NSAF is similar to the affine projection algorithm (APA) on the computational complexity. Experimental results demonstrate that the VSS-AP-NSAF achieves faster convergence rate and lower misalignment than the existing algorithms in system identification, and has a good result for echo cancellation as well.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A WSN based system for CO2 concentration monitoring in large-scale petrochemical plants","authors":"Feng Zhang, Lei Shu, Chunsheng Zhu, Xianjun Wu, Kailiang Li, Junlin Zeng, Meijie Zhu, Guangjie Han, Haobo Li, Mingxiang Zhang","doi":"10.1109/ICCChinaW.2015.7961605","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961605","url":null,"abstract":"With the problem that concentration of carbon dioxide (CO2) continues to exceed the standard at the inlet air of the air separation unit (ASU) in Maoming petrochemical refiner, a wireless sensor network (WSN) based system for CO2 concentration monitoring in large-scale petrochemical plants is proposed. Collecting the information of the sensors around the ASU through the ZigBee terminal nodes, the system consists of the wireless monitoring networks, the remote monitoring center and mobile phone client. In the system, the ZigBee coordinator module transmits the data to embedded gateway, which processes the data with a protocol, data fusion and fuzzy processing, and finally converts it into visual information displayed on the QT interface. The gateway can also send instruction information to all the nodes in WSNs or exchange information with the exterior by Internet. The results of experimental test indicate that this system can detect temperature, humidity, wind speed and direction, the concentration of CO2 and other parameters around the ASU. In addition, it can realize the collection, processing, transmission of data as well as display data in real-time and online.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things for wildlife monitoring","authors":"Xiaohan Liu, Tao Yang, Baoping Yan","doi":"10.1109/ICCChinaW.2015.7961581","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961581","url":null,"abstract":"In the past 15 years, Internet of Things (IOT) provides efficient technology support for the biology and zoology research. In this manuscript, we focus on three applications of wildlife monitoring: location tracking, habitat environment observation, and behavior recognition. A monitoring unit includes sensing, communication, and relative hardware and software components. We analyze the IOT platform for monitoring scenarios, and discuss system implementation from four aspects: identification, mobile access point, monitoring device and application. We introduce preliminary research on the development of a GSM communication based tracker, and give some considerations on resource saving mechanisms from four aspects: MCU rest and activation, local data computation and integration, data storage, and effective data transmission.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}