2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)最新文献

筛选
英文 中文
Error beacon filtering algorithm based on K-means clustering for underwater Wireless Sensor Networks 基于k均值聚类的水下无线传感器网络误差信标滤波算法
Linfeng Liu, Jinglin Du, Dongyue Guo
{"title":"Error beacon filtering algorithm based on K-means clustering for underwater Wireless Sensor Networks","authors":"Linfeng Liu, Jinglin Du, Dongyue Guo","doi":"10.1109/ICCSN.2016.7587196","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7587196","url":null,"abstract":"Due to the highly hostile and unpredictable underwater environments, some beacon nodes in Underwater Wireless Sensor Networks (UWSNs) tend to move or be damaged. Therefore, the unknown nodes will be positioned with larger error, which abases the value of data collected by sensor nodes. In order to solve the beacon error problem, this paper proposes an error beacon filtering algorithm based on K-means clustering. Firstly, the position of each beacon is calculated by an improved trilateration method, and then the beacon with the maximum positioning error is filtered out through K-means clustering algorithm. Simulation results suggest that this algorithm can detect almost all error beacons effectively.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126561276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting sports fatigue from speech by support vector machine 基于支持向量机的语音运动疲劳检测
Shuxi Chen, Heming Zhao, Xueqin Chen, Cheng Fan
{"title":"Detecting sports fatigue from speech by support vector machine","authors":"Shuxi Chen, Heming Zhao, Xueqin Chen, Cheng Fan","doi":"10.1109/ICCSN.2016.7586626","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586626","url":null,"abstract":"Fatigue is a complex physiological phenomena which is a kind of human body's natural response and self-regulation for protection. Detection of fatigue is becoming indispensable for its positive significance in scientific physical training. Recently, many researchers from both speech signal area and machine learning area have already shown that automatically fatigue detection from speech can carry out, but there is still plenty of room for the improvement of the recognition accuracy. The key to raise the accuracy in voice-based fatigue detection is precise phonetic identification and alignment. Therefore, this paper proposes a method for detecting sports fatigue which is based on feature extraction and machine learning system - support vector machine (SVM). In order to establish a comprehensive identification system, speech samples are trained as speech sources at different times. Experimental results state the feasibility and effectiveness of this method we put forward. What's more, Receiver Operating Characteristic Curves (ROC Curves) are used to double check the results, so that the application of sports fatigue detection is ensured.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new decryption algorithm of the quasi-cyclic low-density parity-check codes based McEliece cryptosystem 基于准循环低密度奇偶校验码的McEliece密码系统的一种新的解密算法
Shuo Zhang, Wenhui Cao, Angyang Li, Wenjie Dong, Liwei Shao
{"title":"A new decryption algorithm of the quasi-cyclic low-density parity-check codes based McEliece cryptosystem","authors":"Shuo Zhang, Wenhui Cao, Angyang Li, Wenjie Dong, Liwei Shao","doi":"10.1109/ICCSN.2016.7586588","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586588","url":null,"abstract":"The McEliece public-key cryptosystem is believed to resist quantum attacks, but has not been used because of the extremely large public key size. In order to decrease the public key size, quasi-cyclic low-density parity-check (QC-LDPC) codes were used instead of Goppa codes in McEliece cryptosystem. A modified version of QC-LDPC McEliece is quasi-cyclic moderate density parity-check (QC-MDPC) McEliece, which focuses on ensuring fixed security level other than error-correction capability. The QC-MDPC McEliece scheme furtherly reduces the public key size at the cost of higher decryption complexity. However, the decryption algorithm of QC-LDPC McEliece variant has not been optimized. In this paper, we proposed a new decryption algorithm of the QC-LDPC McEliece variant. With the decryption algorithm we proposed, the key size reduces about 20% than the original algorithm, even 8% smaller than QC-MDPC variant.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"73 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120875306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High-performance implementation of SM2 based on FPGA 基于FPGA的SM2的高性能实现
Dan Zhang, Guoqiang Bai
{"title":"High-performance implementation of SM2 based on FPGA","authors":"Dan Zhang, Guoqiang Bai","doi":"10.1109/ICCSN.2016.7586618","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586618","url":null,"abstract":"This brief presents an FPGA-based ultra-high performance ECC implementation over SM2 prime field which can resist SPA. This processor is designed with bottom-up optimization focused on SM2 and make the best of advantages of modern FPGA. To counteract SPA more efficiently and reduce time cost, traditional MPL algorithm is modified to be the main algorithm which can execute point addition (PA) and point double (PD) in parallel. Then PA and PD are designed to be full-isochronous modules invoked by main algorithm to maximize the efficiency. Finite field operations adopt DSP blocks to increase frequency. Spliced multipliers are matched with same-frequency adders in the introduced pipeline structure, which improve hardware utilization to more than 95 percent. Run on Altera StratixII EP2S30F672 FPGA, this SM2 processor whose frequency reaches 62.3 MHz can be performed at a rate of about 1.3k point multiplications per second, and it only costs 8 DSPs and 4742 ALMs. Compared with other related works, our architecture offers not only ultra-high performance but also deep research about the FPGA-based implementation of SM2.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of complexity and brittleness on software architecture 复杂性和脆弱性在软件体系结构中的应用
Hong Zhang, Changzhen Hu, Xiaojun Wang
{"title":"Application of complexity and brittleness on software architecture","authors":"Hong Zhang, Changzhen Hu, Xiaojun Wang","doi":"10.1109/ICCSN.2016.7586587","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586587","url":null,"abstract":"Just like the catastrophe in power grid, software system may collapse during its operation. It reflects the complexity in software system itself, and the brittleness of software system is the main reason which results in the collapse. The notion of complex system and brittleness is introduced into the study of software system and some aspects which can induce the system to collapse are also discussed. Specifically, the notions of complex system, complex network and brittleness are introduced at first, then a detailed description of the complexity of software system is given; following that a fast-slow alternative dynamic model is built, which consists of a slow-dynamic model and a fast-dynamic model. In the end, a complex theory framework of brittleness on software architecture is presented, which covers the brittleness of software architecture from the way of language description, the analytical method, modeling to the evaluation. This can give a comprehensive research platform on the brittleness of software system. Some main research areas are also given for future study.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A pre-training strategy for convolutional neural network applied to Chinese digital gesture recognition 卷积神经网络预训练策略在中文数字手势识别中的应用
Yawei Li, Yuliang Yang, Yueyun Chen, Mengyu Zhu
{"title":"A pre-training strategy for convolutional neural network applied to Chinese digital gesture recognition","authors":"Yawei Li, Yuliang Yang, Yueyun Chen, Mengyu Zhu","doi":"10.1109/ICCSN.2016.7586597","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586597","url":null,"abstract":"In this paper, we present an approach to classify Chinese digital gesture based on convolutional neural network (CNN). Principal Component Analysis (PCA) is employed to learn convolution kernels as the pre-training strategy. The learned convolution kernels are used for extracting features instead of the random convolution kernels. The convolutional layers can be directly implemented without any further training, such as Back Propagation (BP). For better understanding, we name the proposed architecture for PCA-based Convolutional Neural Network (PCNN). The dataset is divided into six gesture classes including 14500 gesture images, with 12000 images for training and 2500 images for testing. We examine the robustness of the PCNN against noises and distortions. In addition, the MNIST database of handwritten digits is employed to assess the suitability of the PCNN. Different from the CNN, the PCNN reduces the high computational cost of convolution kernels training. About one-fifth of the training time is shortened. The result shows that our approach classifies six gesture classes with 99.92% accuracy. Multiple experiments manifest the PCNN serving as an efficient approach for image processing and object recognition.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic analysis of coupled Binary Sawtooth and Sawtooth and Cow patch cellular neural networks 二值锯齿和锯齿与牛补丁细胞神经网络耦合的动态分析
Mian Wang, L. Min, Min Li
{"title":"Dynamic analysis of coupled Binary Sawtooth and Sawtooth and Cow patch cellular neural networks","authors":"Mian Wang, L. Min, Min Li","doi":"10.1109/ICCSN.2016.7586589","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586589","url":null,"abstract":"Nature abounds with complex patterns emerging from biological, chemical, physical and social systems. Cellular Neural Networks (CNNs) may produce patterns similar to those found in nature, which implies that CNNs may be use as protoypes to describe some systems in nature. The Binary Sawtooth and Cow patch CNNs introduced by Chua et al. can generate pattern that sawtooths and cow patches coexist from any random initial pattern. In order to investigate the characteristics of the Binary Sawtooth and Cow patch CNNs, this study introduces concepts of so-called inherent (final) active, inherent (final) passive, and inherent (final) neutral for pattern pixels, and proposes Global Task and Local Rules of the Binary Sawtooth and Cow patch CNNs, and establishes a set of theorems. Three simulation examples have been carried out to verily the effectiveness of theoretical results.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122711676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new design of pulse waveform for waveform division multiple access UWB wireless communication system 一种新的波分多址UWB无线通信系统的脉冲波形设计
Zhendong Yin, Shaoxue Wu, Zhenguo Shi, Zhilu Wu
{"title":"A new design of pulse waveform for waveform division multiple access UWB wireless communication system","authors":"Zhendong Yin, Shaoxue Wu, Zhenguo Shi, Zhilu Wu","doi":"10.1109/ICCSN.2016.7586580","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586580","url":null,"abstract":"Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function is recently presented due to its admirable characteristics. However, the communication performance of the existing waveform of the system breaks down drastically as the number of users increases. In order to meet the communication requirement for WDMA-UWB system with massive users, a new design of pulse waveform is proposed in this paper. The correlation property and Bit Error Rate (BER) performance is raised apparently and close to that of the single-user system.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EnergyMap: Energy-efficient embedding of MapReduce-based virtual networks and controlling incast queuing delay EnergyMap:基于mapreduce的虚拟网络的高效嵌入和输入队列延迟控制
Ebrahim Ghazisaeedi, Changcheng Huang
{"title":"EnergyMap: Energy-efficient embedding of MapReduce-based virtual networks and controlling incast queuing delay","authors":"Ebrahim Ghazisaeedi, Changcheng Huang","doi":"10.1109/ICCSN.2016.7586614","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586614","url":null,"abstract":"Energy consumption is a major concern for today's data centers. MapReduce is a cloud computing paradigm that is widely deployed in many data centers. In this paper, we propose EnergyMap, a novel energy-efficient embedding method that maps heterogeneous MapReduce-based virtual networks onto a heterogeneous data center network. EnergyMap also tries to constrain the incast queuing delay that may happen in Virtualized Data Centers (VDCs). Simulation results show that EnergyMap significantly reduces a data center's energy consumption and effectively controls the queuing delay caused by incast traffic.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient and cost-effective context-parsing architecture for dynamically reconfigurable cryptographic processor 一种用于动态可重构密码处理器的高效、经济的上下文解析体系结构
Kai Luo
{"title":"An efficient and cost-effective context-parsing architecture for dynamically reconfigurable cryptographic processor","authors":"Kai Luo","doi":"10.1109/ICCSN.2016.7586621","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586621","url":null,"abstract":"A dynamically reconfigurable cryptographic processor (DRCP), which are driven by configuration context, has been proven to be efficient and cost-effective in the block cryptography domains. Two techniques focused on optimizing the context-parsing organization and the context memory are proposed: 1) The classification-based multi-concurrent configuration (CMC) can obviously reduce the parsing time cost and configuration delay. 2) The diversified context-abstraction compression (DCC) provides three different ways to compress the context memory and ease the context access based on data flow graph (DFG) abstraction. The related processor and architecture are implemented with TSMC 65nm technology. And the design achieves the context memory for block cipher algorithms reduced to less than 40%, while the CMC and DCC can also help to choose a most efficient way to compress the context.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130621047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信