2020 2nd International Conference on Computer Communication and the Internet (ICCCI)最新文献

筛选
英文 中文
An Anti-jamming Method Based on Convex Optimization for Dual Polarized Conformal Array 基于凸优化的双极化共形阵抗干扰方法
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145996
Chao Liu, Zhengfei Fang, Chuan Li
{"title":"An Anti-jamming Method Based on Convex Optimization for Dual Polarized Conformal Array","authors":"Chao Liu, Zhengfei Fang, Chuan Li","doi":"10.1109/ICCCI49374.2020.9145996","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145996","url":null,"abstract":"Beamforming is a promising technique for suppressing interferences and enhancing desired signal in communication system. However, when the interference is close to the desired signal, the performance of the traditional beamformer decreases sharply. In this paper, a novel space-polarization joint domain beamforming algorithm is proposed to suppress the main lobe interference based on dual polarized conformal array. The proposed beamformer is designed by using convex optimization constraint criterion, which integrates the space and polarization information of the signal and can suppress the interference of arbitrary space and polarization parameters. The simulation results show that the proposed algorithm provides good performance even if the interference and the desired signal come from the same space angle.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Collision Rate-Based Backoff Algorithm for Wireless Home Area Networks 基于碰撞率的无线家庭区域网络退避算法
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145988
Cheng-Han Lin, Ming-Fong Tsai, W. Hwang, Ming-Hua Cheng
{"title":"A Collision Rate-Based Backoff Algorithm for Wireless Home Area Networks","authors":"Cheng-Han Lin, Ming-Fong Tsai, W. Hwang, Ming-Hua Cheng","doi":"10.1109/ICCCI49374.2020.9145988","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145988","url":null,"abstract":"With the rapid development of the wireless network, IEEE 802.11 wireless network access technology has become a widely used technology, in which the contention channel of the distributed coordination function (DCF) is the default mechanism. Through the contention window, waiting time required before sending data can be determined. Therefore, the adjustment of the competition window is an important key that affects network transmission performance. At present, most related researches anchored on wireless local area networks (WLAN) to design channel competition backoff algorithms. These methods all consider the transmission collision problem caused by the increase of the number of nodes to improve the performance, which it is uncertain whether these methods can be applied on Wireless Home Area Network (WHAN) that contains fewer nodes. Through experimentation with different numbers of nodes and different contention window sizes, this study found a collision rate range with superior efficiency, and thus proposed a backoff algorithm for Home Area Network (BA-HAN). The size of the competition window is adjusted based on the size of the contention window to achieve the performance improvement and reduction of the collision rate. According to the experimental result, the BA-HAN algorithm is superior to related channel competition mechanisms (EIED, LILD, ELBA, and CRBA).","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Disaster Preparedness Backend Database to Read and Write Separation Technology Research 灾备后端数据库读写分离技术研究
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145978
Junjun Hu, Bo Yang, Runzhen Yan, Qiong Wang, K. Lin
{"title":"Disaster Preparedness Backend Database to Read and Write Separation Technology Research","authors":"Junjun Hu, Bo Yang, Runzhen Yan, Qiong Wang, K. Lin","doi":"10.1109/ICCCI49374.2020.9145978","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145978","url":null,"abstract":"GoldenGate and Active DataGuard are both products of Oracle. GoldenGate can realize data synchronization with production database at the second level. And the same time it can realize writing data on both ends at the same time. Active DataGuard not only can realize the data real-time synchronization. Therefore, to combine GoldenGate and Active DataGuard technology not only can realize the disaster of the production data, but also can realize separation of disaster preparedness back-end database, reading and writing, and improve the business processing ability of the system as a whole. At the same time it can make full use of the computing power of the backend resources to reduce the cost.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129271024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-Sensitive Multi-User Oriented Mobile Edge Computing Task Scheduling Algorithm 面向时敏多用户的移动边缘计算任务调度算法
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145970
Jingwen Zhang, Bo Jiang, Hua Zhao, Yue Xu
{"title":"Time-Sensitive Multi-User Oriented Mobile Edge Computing Task Scheduling Algorithm","authors":"Jingwen Zhang, Bo Jiang, Hua Zhao, Yue Xu","doi":"10.1109/ICCCI49374.2020.9145970","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145970","url":null,"abstract":"The Internet of Things and 5G technologies have made mobile cloud computing emerge and develop rapidly. However, the rapid development of mobile applications requires cloud computing to have lower network latency and computing energy consumption. Therefore, Mobile edge computing (MEC) which is a promising technology has received widespread attention. Nowadays, it is important to schedule resources reasonably due to the communication and computing resources shortage. In this paper, we propose a mobile edge computing task scheduling algorithm in a multi-user multi-tasking environment. The algorithm takes into account the time sensitivity of mobile applications. We optimize the traditional task scheduling algorithm with the user's minimum average execution time and minimum computing energy consumption as the goals. Extensive experiments are carried out on MATLAB. The result shows that our proposed algorithm can effectively reduce the time and energy cost of mobile edge computing.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133978824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Improvement for Blurred Images Utilizing Learning-Based Image Restoration Method 利用基于学习的图像恢复方法改进模糊图像的性能
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145983
M. Hongo, T. Goto
{"title":"Performance Improvement for Blurred Images Utilizing Learning-Based Image Restoration Method","authors":"M. Hongo, T. Goto","doi":"10.1109/ICCCI49374.2020.9145983","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145983","url":null,"abstract":"Blind image restoration, which restores a clear image from a single blurry image, is a difficult process of estimating two unknowns: a point-spread function (PSF) and an ideal image. In this paper, we use a learning-type restoration method that learns a sharp image without blur and an image that contains blur, and supposes the restoration of blurred images that occur especially when shooting fast-moving objects such as cars. We study the improvement of the image quality of the restored image by examining the training image used for the image.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115710373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intra-Network Clock Synchronization for Wireless Networks: From State of the Art Systems to an Improved Solution 无线网络内时钟同步:从最先进的系统到改进的解决方案
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145977
Dennis Krummacker, Christoph Fischer, Khurshid Alam, Michael Karrenbauer, Sergiy Melnyk, H. Dieter Schotten, Peng Chen, Siyu Tang
{"title":"Intra-Network Clock Synchronization for Wireless Networks: From State of the Art Systems to an Improved Solution","authors":"Dennis Krummacker, Christoph Fischer, Khurshid Alam, Michael Karrenbauer, Sergiy Melnyk, H. Dieter Schotten, Peng Chen, Siyu Tang","doi":"10.1109/ICCCI49374.2020.9145977","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145977","url":null,"abstract":"Since the announcement of Industry 4.0 (I4.0), the concepts and ideas behind this revolution have been overturning. On the communication side however, all scenarios can be reduced to similar requirements. I4.0 communication requires real-time capability, reliability and interconnectivity of many clients. The realization of these requirements is already made possible by the IEEE standardized TSN technology. A key enabler for the realization of these requirements is a common time understanding of all involved instances, in order to coordinate the complexity arising in such a scenario. For this purpose, clock synchronization is an essential component of TSN. However, there is another essential feature that many I4.0 use cases have in common, which is the spatial dynamics of clients that only wireless communication can provide. This paper presents an approach based on WLAN, which is also able to meet these requirements. The essential points of clock synchronization as used in TSN are analyzed and transferred to WLAN and further concepts and optimizations will be introduced. These concepts are evaluated and analyzed in simulations. The result is a communication concept, which is able to exceed the performance of wired TSN as shown by various KPIs.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reducing Dimensionality of Spectro-Temporal Data by Independent Component Analysis 利用独立分量分析降低光谱-时间数据的维数
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145984
S. D. You, Ming-Jen Hung
{"title":"Reducing Dimensionality of Spectro-Temporal Data by Independent Component Analysis","authors":"S. D. You, Ming-Jen Hung","doi":"10.1109/ICCCI49374.2020.9145984","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145984","url":null,"abstract":"This paper studies the use of independent component analysis (ICA) for reducing the dimensionality of one type of spectro-temporal features, known as the MPEG-7 audio signature descriptors. The dimension-reduced features are used to identify distorted audio items in the experiments. The proposed ICA-based reduction approach is compared with the block average method and the principal component analysis (PCA) method. The experimental results show that features obtained by the ICA approach have higher identification accuracy than comparison counterparts for moderate to highly distorted soundtracks. In this regard, the proposed approach is a better alternative for dimensionality reduction for spectro-temporal features with distortion.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison of Video Codecs Performance for Real-Time Transmission 实时传输视频编解码器性能比较
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145973
Georgios M. Minopoulos, Vasileios A. Memos, Konstantinos E. Psannis, Y. Ishibashi
{"title":"Comparison of Video Codecs Performance for Real-Time Transmission","authors":"Georgios M. Minopoulos, Vasileios A. Memos, Konstantinos E. Psannis, Y. Ishibashi","doi":"10.1109/ICCCI49374.2020.9145973","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145973","url":null,"abstract":"Nowadays, the need for more efficient video compression algorithms is growing, due to the increasing consumption of video content in higher resolutions. Thus, it is obvious that video compression technologies play a key role in the distribution of video content in broadcasting. In this paper, the video compression comparisons take into account the encoding or decoding time which is needed for each compression standard, in order to provide evidence about their adaptation under real-time streaming conditions. The video test sequences used in our experiments were retrieved from miscellaneous sources and their common characteristic is that they have High or Ultra High Definition resolution. Video codecs' performance was tested by using commercial coding libraries and reference software of the coding standards.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Efficient Certificateless Arbitrated Signature Scheme for IoT Environments 一种高效的物联网环境下无证书仲裁签名方案
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145974
Dae-Hwi Lee, Imyeong Lee
{"title":"An Efficient Certificateless Arbitrated Signature Scheme for IoT Environments","authors":"Dae-Hwi Lee, Imyeong Lee","doi":"10.1109/ICCCI49374.2020.9145974","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145974","url":null,"abstract":"Recently, researches on lightweight cryptosystems for the IoT (Internet of Things) environment have been continuously conducted. Among the public key cryptosystems, ID-based cryptography has the advantage of verify the public key by using an identifier in the form of a public key. However, a key escrow problem occurs that requires the generation of both public and private key pairs in the Key Generation Center (KGC). To solve this problem, Certificateless Public Key Cryptography (CL-PKC), which is a public key cryptosystem without certificate was proposed. The CL-PKC is actively researched in various cryptography fields such as authentication, key agreement, signature, and encryption. In this paper, we analyze the CLS (Certificateless Signature), a signature scheme using CL-PKC for IoT environment. The existing CLS schemes may have problems such as public key replacement attack due to the weakness of the nonrepudiation function, so we propose a CL-based arbitrated signature scheme, CLAS.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"79 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130549345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Forward and Inverse Integer Transforms Design with Fast Algorithm Based Hardware Sharing Architecture 基于快速算法的统一正逆整数变换硬件共享结构设计
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145980
Chia-Wei Chang, Hao-Fan Hsu, Chih-Peng Fan
{"title":"Unified Forward and Inverse Integer Transforms Design with Fast Algorithm Based Hardware Sharing Architecture","authors":"Chia-Wei Chang, Hao-Fan Hsu, Chih-Peng Fan","doi":"10.1109/ICCCI49374.2020.9145980","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145980","url":null,"abstract":"In this paper, the study aims to reduce the hardware cost by hardware sharing techniques to multiple 4×4 and 8×8 integer discrete cosine transforms for multiple-standard video coding applications. The proposed hardware sharing architecture supports two sizes transforms, i.e. 4×4 and 8×8, for H.264/AVC, AVS, VC-1, MPEG-1/2/4, HEVC, and VP8 video coding standards. The proposed design supports the hardware sharing based multiple forward and inverse transforms. Firstly, the transform matrices are replaced with the well-known matrix expressions, and then the entire transform matrices are decomposed to several sparse matrices. Thus, the computational complexity, the chip area, and the computational time are reduced. By the proposed matrix decomposition algorithm, the sparse transform matrices are decomposed to small ones further for ease and efficient hardware shares. Compared with the individual implementation without shares, the proposed 1-D hardware sharing based multiple forward and inverse transform design reduces additions by 83.5% and shift operations by 60.8%. The gate counts of the hardware sharing based 1-D forward and inverse transform design are 22.2K. The proposed hardware sharing based 2-D transform requires 57.3K gates. The operational frequency is 110.8MHz to satisfy the Full HD (1920×1080@60Hz) specification, and the maximum operational frequency can be up to 200MH.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129027485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信