{"title":"Implementation of Cloud Component for Security Monitoring and Comprehensive Guarantee of Identifier Resolution System","authors":"Zhong Na, Wei Liu, Kai Li","doi":"10.1109/ictc55111.2022.9778775","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778775","url":null,"abstract":"Aiming at the fact that the existing security protection technology cannot effectively solve the security risks faced by enterprises accessing the identifier resolution system, the security monitoring comprehensive guarantee cloud component is developed to realize the functions of security protection, performance monitoring and high availability guarantee suitable for the identifier resolution system. Firstly, encapsulate the cloud component parameter configuration and management process. Then improve the security protection management mechanism. Next, design four modules which include service proxy, aggregation request, response analysis and log processing to monitor the system status. Finally, realize the service degradation technology based on business indicators. The experimental result indicates that the cloud component exhibits competitive performances in improving the security, observability and high availability, so that provide a strong guarantee for the stable and reliable operation of the identifier resolution system.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133839350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation Based Feedback Reduction for Online Fountain Codes","authors":"Yongwei Xiao, Yasheng Zhang, Jingxuan Huang","doi":"10.1109/ictc55111.2022.9778499","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778499","url":null,"abstract":"Online fountain codes attract much attentions for their good intermediate performance. However, the feedback requirement limits the application scenario of the coding scheme. In this paper, we reduce the feedback requirement of online fountain codes with no build-up phase (OFCNB). First we analyze the relationship between the overhead and the recovery rate as well as the relationship between the overhead and the butter occupancy. Based on the analysis, we proposed an estimation based degree selection (EBDS) scheme for OFCNB, where the coded symbol degree is selected based on the estimation of decoding state rather than through feedback. Simulation results validate the effectiveness of the proposed analysis. Compared with other feedback reduction scheme, the proposed OFCNBEBDS scheme requires less full recovery overhead with similar number of feedback transmissions.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nihad A. A. Elhag, P. Wei, Xu Tang, Mohammad A. B. Mohammad, Abla Smahi
{"title":"Optimal Power Allocation Strategy for a MIMO-Integrated Radar and Communication System Based OFDM Waveform","authors":"Nihad A. A. Elhag, P. Wei, Xu Tang, Mohammad A. B. Mohammad, Abla Smahi","doi":"10.1109/ictc55111.2022.9778643","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778643","url":null,"abstract":"Multiple-input multiple-output (MIMO)-Integrated Radar and Communication System (IRCS) configuration is made up of multiple IRCS and communication users. The MIMO-IRCS uses the Orthogonal Frequency Division Multiplexing (OFDM) waveform, and this paper provides a power allocation strategy for both systems. The Karush-Kuhn-Tuckers (KKT) optimality requirements are used to formulate and solve the convex optimization problem analytically. The suggested strategy reduces total transmitted power while meeting two system prerequisites: SCNR (Signal-to-Clutter-plus-Noise Ratio) for target detection and SNR (Signal-to-Noise Ratio) for communication system performance. The simulation results show that the proposed strategy is effective in reducing the MIMO-IRCS system’s total power consumption.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Model-Based Reinforcement Learning for Trajectory Design and Power Control in UAV-Enabled Networks","authors":"Shiyang Zhou, Yufan Cheng, Xia Lei","doi":"10.1109/ictc55111.2022.9778837","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778837","url":null,"abstract":"Unmanned aerial vehicles (UAVs) serving as aerial base stations is a promising technology for wireless communications. This paper formulates a joint optimization problem of UAV trajectory design and power control to minimize the power consumption when satisfying users’ QoS requirements in a downlink transmission. Firstly, a multi-agent deep deterministic policy gradient (MADDPG) scheme with centralized training and decentralized execution is proposed to improve the overall performance of the UAVs in cooperation. Secondly, model value expansion (MVE) is incorporated into the model-free MADDPG scheme. By imaging future transitions, the proposed multiagent model value expansion deep deterministic policy gradient (MA-MVE-DDPG) algorithm generates more experiences, and thus accelerates training. Simulation results have demonstrated that our proposed MA-MVE-DDPG algorithm achieves better performance and converges faster than benchmark schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126331937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenmeng Li, Yehua Zhang, Baoyin Bian, Hongzhen Yang, Lang Li, Qingming Wang, Hua Zhang, Jun-Bo Wang
{"title":"Joint Beamforming and Channel Allocation for Multi-User and Multi-Channel URLLC Systems","authors":"Wenmeng Li, Yehua Zhang, Baoyin Bian, Hongzhen Yang, Lang Li, Qingming Wang, Hua Zhang, Jun-Bo Wang","doi":"10.1109/ictc55111.2022.9778790","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778790","url":null,"abstract":"One of the key components in the sixth generation (6G) wireless networks is to support ultra-reliable low-latency communication (URLLC) for realizing mission-critical applications. For such networks, most existing works study the throughput and the power consumption while ignoring the decoding-error probability. In this paper, the worst-case decoding-error probability is minimized for downlink multi-user and multi-channel systems under finite blocklength coding. We jointly design beamforming and channel allocation at a central controller for serving multiple downlink users under the subject of transmit power and available channels. Based on the correlation of the users on channel state information, we propose a channel allocation scheme with low complexity. Then, we address the beamforming optimization through sequential convex approximation. Finally, simulation results illustrate that the proposed schemes obtain lower decoding-error probability compared with other baseline schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements for Developing A Mobile Application to Assist with Career Transition: Design Science Research Methodology","authors":"Manoj Chatpibal, Singha Chaveesuk","doi":"10.1109/ictc55111.2022.9778310","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778310","url":null,"abstract":"The purpose of this study is to propose the Design Science Research (DSR)’s phases of problem identification and solution development for the development of a mobile application for career transition assistance. The application aims to connect dismissed employees to potential transitional careers. As a result, the requirements are gathered through interviews with an Outplacement & Career Transition consultant, a downsizing employer, and an impacted employee using Qualitative Research Methodology. The mobile application could help outplaced people by identifying their current skill sets, listing potential careers ranked by skill gaps, and connecting them to resources to close those gaps. Contributing to the body of knowledge within a pragmatic research paradigm by developing a set of designed career transition principles. Researchers will benefit from the established model of career transition requirements, whereas practitioners, such as software developers, will be able to apply these findings to further develop the mobile application. Employers, employees, and consulting firms will all benefit from this identified requirement once the application is developed appropriately.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117014174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Wang, Jiahui Hu, Qian Wang, Yusheng Yang, Pei Lou, An Fang
{"title":"Big Open Data Aided Institutions’ Name Normalization and Attribute Enrichment","authors":"Lei Wang, Jiahui Hu, Qian Wang, Yusheng Yang, Pei Lou, An Fang","doi":"10.1109/ictc55111.2022.9778332","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778332","url":null,"abstract":"The institution is a critical component in the scientific resources. The peers in the field of the library have explored a variety of practices in the construction of its authority file. But the construction of the institution authority file still faces a series of challenges. The paper proposed a method to accomplish the institutions’ name normalization and attribute enrichment, to link the affiliations’ abbreviation in the article with its attribute value in the open data. It was separated into several parts, including data cleaning and normalization, big open data selection, data linking, big open data management, and export results. Open data was used to aid the name normalization and to provide the resource of the institutions’ attributes. Compared with other practices, the method also considered the management of big data to reduce the cost of data storage and support updating data in the future. In practice, it is feasible and has been applied.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge Computing Offloading Algorithm Based on Second-Order Oscillatory Particle Swarm Optimization","authors":"Dan Ye, Xiaogang Wang, Jin Hou","doi":"10.1109/ictc55111.2022.9778592","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778592","url":null,"abstract":"In the research of edge computing offloading for IoT devices, most researchers only focus on the optimization of single index. This will cause the offloading algorithm not to meet the expected effect. To solve the above problems, a joint optimization edge computing offloading algorithm based on second-order oscillatory particle swarm optimization is proposed. Firstly, adaptive parameters are used to improve the processing ability of particle swarm optimization algorithm for joint optimization problems. Secondly, the second-order oscillation function is introduced into particle swarm optimization algorithm, which improves the evolution stability and the convergence speed. The simulation experimental results confirm the effectiveness of the proposed scheme. The improved algorithm can optimize the task execution delay and energy consumption of IoT devices jointly, and it has good convergence speed and optimization ability.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122920389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method to Calculate Complex Cramér-Rao Bound for Two-Dimensional Direction-of-Arrival Estimation with Multiple Measurement Vectors","authors":"Lin Han, Di Huang, Hanxu Li, Xiangrong Zhu","doi":"10.1109/ictc55111.2022.9778675","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778675","url":null,"abstract":"A new method to calculate the complex Fisher information matrix (FIM) and the Cramer-Rao bound (CRB) is proposed for tw 0-dimensional direction-0f-arrival (2D-DOA) with multiple measurement vectors (MMVsi. The detailed theoretic calculation process is presented in the text Finally, numerical results are conducted not only to verify accuracy of the theoretical result by comparing against another method to calculate complex CRB, but also to demonstrate the effectiveness of CRB as the performance metric","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Privacy Protection Method Based on Geohash Coding and Pseudo-Random Sequence","authors":"Liu Kai, Han Yiliang, Wang Jingjing, Guo Kaiyang","doi":"10.1109/ictc55111.2022.9778536","DOIUrl":"https://doi.org/10.1109/ictc55111.2022.9778536","url":null,"abstract":"The popularity of mobile communication devices and the rapid progress of social networks have not only promoted the development of location-based services, but also brought many risks to users’ privacy. In order to better protect users’ location privacy, based on the centralized structure, this paper proposes a k-anonymous location privacy protection scheme based on geohash coding and pseudo-random sequence generation technology, which uses the properties of region coding and pseudorandom sequence to solve the dependence on the credibility of the central server. Theoretical analysis and experimental simulation results show that this scheme can not only resist the central server attack and area central attack, but also has higher efficiency in constructing anonymous area compared with similar schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122207829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}