2022 3rd Information Communication Technologies Conference (ICTC)最新文献

筛选
英文 中文
Implementation of Cloud Component for Security Monitoring and Comprehensive Guarantee of Identifier Resolution System 安全监控云组件的实现与标识解析系统的综合保障
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778775
Zhong Na, Wei Liu, Kai Li
{"title":"Implementation of Cloud Component for Security Monitoring and Comprehensive Guarantee of Identifier Resolution System","authors":"Zhong Na, Wei Liu, Kai Li","doi":"10.1109/ictc55111.2022.9778775","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778775","url":null,"abstract":"Aiming at the fact that the existing security protection technology cannot effectively solve the security risks faced by enterprises accessing the identifier resolution system, the security monitoring comprehensive guarantee cloud component is developed to realize the functions of security protection, performance monitoring and high availability guarantee suitable for the identifier resolution system. Firstly, encapsulate the cloud component parameter configuration and management process. Then improve the security protection management mechanism. Next, design four modules which include service proxy, aggregation request, response analysis and log processing to monitor the system status. Finally, realize the service degradation technology based on business indicators. The experimental result indicates that the cloud component exhibits competitive performances in improving the security, observability and high availability, so that provide a strong guarantee for the stable and reliable operation of the identifier resolution system.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133839350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation Based Feedback Reduction for Online Fountain Codes 基于估计的在线喷泉码反馈约简
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778499
Yongwei Xiao, Yasheng Zhang, Jingxuan Huang
{"title":"Estimation Based Feedback Reduction for Online Fountain Codes","authors":"Yongwei Xiao, Yasheng Zhang, Jingxuan Huang","doi":"10.1109/ictc55111.2022.9778499","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778499","url":null,"abstract":"Online fountain codes attract much attentions for their good intermediate performance. However, the feedback requirement limits the application scenario of the coding scheme. In this paper, we reduce the feedback requirement of online fountain codes with no build-up phase (OFCNB). First we analyze the relationship between the overhead and the recovery rate as well as the relationship between the overhead and the butter occupancy. Based on the analysis, we proposed an estimation based degree selection (EBDS) scheme for OFCNB, where the coded symbol degree is selected based on the estimation of decoding state rather than through feedback. Simulation results validate the effectiveness of the proposed analysis. Compared with other feedback reduction scheme, the proposed OFCNBEBDS scheme requires less full recovery overhead with similar number of feedback transmissions.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Power Allocation Strategy for a MIMO-Integrated Radar and Communication System Based OFDM Waveform 基于OFDM波形的mimo集成雷达与通信系统的最优功率分配策略
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778643
Nihad A. A. Elhag, P. Wei, Xu Tang, Mohammad A. B. Mohammad, Abla Smahi
{"title":"Optimal Power Allocation Strategy for a MIMO-Integrated Radar and Communication System Based OFDM Waveform","authors":"Nihad A. A. Elhag, P. Wei, Xu Tang, Mohammad A. B. Mohammad, Abla Smahi","doi":"10.1109/ictc55111.2022.9778643","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778643","url":null,"abstract":"Multiple-input multiple-output (MIMO)-Integrated Radar and Communication System (IRCS) configuration is made up of multiple IRCS and communication users. The MIMO-IRCS uses the Orthogonal Frequency Division Multiplexing (OFDM) waveform, and this paper provides a power allocation strategy for both systems. The Karush-Kuhn-Tuckers (KKT) optimality requirements are used to formulate and solve the convex optimization problem analytically. The suggested strategy reduces total transmitted power while meeting two system prerequisites: SCNR (Signal-to-Clutter-plus-Noise Ratio) for target detection and SNR (Signal-to-Noise Ratio) for communication system performance. The simulation results show that the proposed strategy is effective in reducing the MIMO-IRCS system’s total power consumption.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Agent Model-Based Reinforcement Learning for Trajectory Design and Power Control in UAV-Enabled Networks 基于多智能体模型的无人机网络弹道设计与功率控制强化学习
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778837
Shiyang Zhou, Yufan Cheng, Xia Lei
{"title":"Multi-Agent Model-Based Reinforcement Learning for Trajectory Design and Power Control in UAV-Enabled Networks","authors":"Shiyang Zhou, Yufan Cheng, Xia Lei","doi":"10.1109/ictc55111.2022.9778837","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778837","url":null,"abstract":"Unmanned aerial vehicles (UAVs) serving as aerial base stations is a promising technology for wireless communications. This paper formulates a joint optimization problem of UAV trajectory design and power control to minimize the power consumption when satisfying users’ QoS requirements in a downlink transmission. Firstly, a multi-agent deep deterministic policy gradient (MADDPG) scheme with centralized training and decentralized execution is proposed to improve the overall performance of the UAVs in cooperation. Secondly, model value expansion (MVE) is incorporated into the model-free MADDPG scheme. By imaging future transitions, the proposed multiagent model value expansion deep deterministic policy gradient (MA-MVE-DDPG) algorithm generates more experiences, and thus accelerates training. Simulation results have demonstrated that our proposed MA-MVE-DDPG algorithm achieves better performance and converges faster than benchmark schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126331937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Beamforming and Channel Allocation for Multi-User and Multi-Channel URLLC Systems 多用户和多信道URLLC系统的联合波束形成和信道分配
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778790
Wenmeng Li, Yehua Zhang, Baoyin Bian, Hongzhen Yang, Lang Li, Qingming Wang, Hua Zhang, Jun-Bo Wang
{"title":"Joint Beamforming and Channel Allocation for Multi-User and Multi-Channel URLLC Systems","authors":"Wenmeng Li, Yehua Zhang, Baoyin Bian, Hongzhen Yang, Lang Li, Qingming Wang, Hua Zhang, Jun-Bo Wang","doi":"10.1109/ictc55111.2022.9778790","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778790","url":null,"abstract":"One of the key components in the sixth generation (6G) wireless networks is to support ultra-reliable low-latency communication (URLLC) for realizing mission-critical applications. For such networks, most existing works study the throughput and the power consumption while ignoring the decoding-error probability. In this paper, the worst-case decoding-error probability is minimized for downlink multi-user and multi-channel systems under finite blocklength coding. We jointly design beamforming and channel allocation at a central controller for serving multiple downlink users under the subject of transmit power and available channels. Based on the correlation of the users on channel state information, we propose a channel allocation scheme with low complexity. Then, we address the beamforming optimization through sequential convex approximation. Finally, simulation results illustrate that the proposed schemes obtain lower decoding-error probability compared with other baseline schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Requirements for Developing A Mobile Application to Assist with Career Transition: Design Science Research Methodology 开发移动应用程序以协助职业过渡的要求:设计科学研究方法
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778310
Manoj Chatpibal, Singha Chaveesuk
{"title":"Requirements for Developing A Mobile Application to Assist with Career Transition: Design Science Research Methodology","authors":"Manoj Chatpibal, Singha Chaveesuk","doi":"10.1109/ictc55111.2022.9778310","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778310","url":null,"abstract":"The purpose of this study is to propose the Design Science Research (DSR)’s phases of problem identification and solution development for the development of a mobile application for career transition assistance. The application aims to connect dismissed employees to potential transitional careers. As a result, the requirements are gathered through interviews with an Outplacement & Career Transition consultant, a downsizing employer, and an impacted employee using Qualitative Research Methodology. The mobile application could help outplaced people by identifying their current skill sets, listing potential careers ranked by skill gaps, and connecting them to resources to close those gaps. Contributing to the body of knowledge within a pragmatic research paradigm by developing a set of designed career transition principles. Researchers will benefit from the established model of career transition requirements, whereas practitioners, such as software developers, will be able to apply these findings to further develop the mobile application. Employers, employees, and consulting firms will all benefit from this identified requirement once the application is developed appropriately.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117014174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Open Data Aided Institutions’ Name Normalization and Attribute Enrichment 大开放数据辅助机构名称规范化与属性充实
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778332
Lei Wang, Jiahui Hu, Qian Wang, Yusheng Yang, Pei Lou, An Fang
{"title":"Big Open Data Aided Institutions’ Name Normalization and Attribute Enrichment","authors":"Lei Wang, Jiahui Hu, Qian Wang, Yusheng Yang, Pei Lou, An Fang","doi":"10.1109/ictc55111.2022.9778332","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778332","url":null,"abstract":"The institution is a critical component in the scientific resources. The peers in the field of the library have explored a variety of practices in the construction of its authority file. But the construction of the institution authority file still faces a series of challenges. The paper proposed a method to accomplish the institutions’ name normalization and attribute enrichment, to link the affiliations’ abbreviation in the article with its attribute value in the open data. It was separated into several parts, including data cleaning and normalization, big open data selection, data linking, big open data management, and export results. Open data was used to aid the name normalization and to provide the resource of the institutions’ attributes. Compared with other practices, the method also considered the management of big data to reduce the cost of data storage and support updating data in the future. In practice, it is feasible and has been applied.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Edge Computing Offloading Algorithm Based on Second-Order Oscillatory Particle Swarm Optimization 基于二阶振荡粒子群优化的边缘计算卸载算法
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778592
Dan Ye, Xiaogang Wang, Jin Hou
{"title":"An Edge Computing Offloading Algorithm Based on Second-Order Oscillatory Particle Swarm Optimization","authors":"Dan Ye, Xiaogang Wang, Jin Hou","doi":"10.1109/ictc55111.2022.9778592","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778592","url":null,"abstract":"In the research of edge computing offloading for IoT devices, most researchers only focus on the optimization of single index. This will cause the offloading algorithm not to meet the expected effect. To solve the above problems, a joint optimization edge computing offloading algorithm based on second-order oscillatory particle swarm optimization is proposed. Firstly, adaptive parameters are used to improve the processing ability of particle swarm optimization algorithm for joint optimization problems. Secondly, the second-order oscillation function is introduced into particle swarm optimization algorithm, which improves the evolution stability and the convergence speed. The simulation experimental results confirm the effectiveness of the proposed scheme. The improved algorithm can optimize the task execution delay and energy consumption of IoT devices jointly, and it has good convergence speed and optimization ability.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122920389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method to Calculate Complex Cramér-Rao Bound for Two-Dimensional Direction-of-Arrival Estimation with Multiple Measurement Vectors 计算具有多个测量向量的二维到达方向估计的复杂克拉梅尔-拉奥边界的新方法
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778675
Lin Han, Di Huang, Hanxu Li, Xiangrong Zhu
{"title":"A New Method to Calculate Complex Cramér-Rao Bound for Two-Dimensional Direction-of-Arrival Estimation with Multiple Measurement Vectors","authors":"Lin Han, Di Huang, Hanxu Li, Xiangrong Zhu","doi":"10.1109/ictc55111.2022.9778675","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778675","url":null,"abstract":"A new method to calculate the complex Fisher information matrix (FIM) and the Cramer-Rao bound (CRB) is proposed for tw 0-dimensional direction-0f-arrival (2D-DOA) with multiple measurement vectors (MMVsi. The detailed theoretic calculation process is presented in the text Finally, numerical results are conducted not only to verify accuracy of the theoretical result by comparing against another method to calculate complex CRB, but also to demonstrate the effectiveness of CRB as the performance metric","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Privacy Protection Method Based on Geohash Coding and Pseudo-Random Sequence 基于Geohash编码和伪随机序列的位置隐私保护方法
2022 3rd Information Communication Technologies Conference (ICTC) Pub Date : 2022-05-06 DOI: 10.1109/ictc55111.2022.9778536
Liu Kai, Han Yiliang, Wang Jingjing, Guo Kaiyang
{"title":"Location Privacy Protection Method Based on Geohash Coding and Pseudo-Random Sequence","authors":"Liu Kai, Han Yiliang, Wang Jingjing, Guo Kaiyang","doi":"10.1109/ictc55111.2022.9778536","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778536","url":null,"abstract":"The popularity of mobile communication devices and the rapid progress of social networks have not only promoted the development of location-based services, but also brought many risks to users’ privacy. In order to better protect users’ location privacy, based on the centralized structure, this paper proposes a k-anonymous location privacy protection scheme based on geohash coding and pseudo-random sequence generation technology, which uses the properties of region coding and pseudorandom sequence to solve the dependence on the credibility of the central server. Theoretical analysis and experimental simulation results show that this scheme can not only resist the central server attack and area central attack, but also has higher efficiency in constructing anonymous area compared with similar schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122207829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信