2017 IEEE 17th International Conference on Communication Technology (ICCT)最新文献

筛选
英文 中文
A screening scheme based on energy for speech key-frame 基于能量的语音关键帧筛选方案
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359908
Yingjie Meng, Xiaoyu Teng, Huiran Liu, Sanshuai Cui, Zhiyuan Wang
{"title":"A screening scheme based on energy for speech key-frame","authors":"Yingjie Meng, Xiaoyu Teng, Huiran Liu, Sanshuai Cui, Zhiyuan Wang","doi":"10.1109/ICCT.2017.8359908","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359908","url":null,"abstract":"The research of the existing screening algorithm for speech frame has a great deal of shortcomings, such as its applicability and complexity. Worse still, those frames which are screened by algorithm can't achieve the requirement of express and the screening process greatly damages the original signal. This paper presents a strategy for screening speech keyframe and designs a screening scheme for key-frames based on the strategy. This scheme refers to the speech's logarithm energy and the weighted-zero-crossing rate. The detail process of screening scheme: firstly, screening frames according to the logarithm energy of the speech signals. Meanwhile, combine the speech amplitude and zero-crossing rate for frames screening. Finally, calculate the similarity of the two screening results, and getting the key-frame set. In addition, the scheme has been analyzed and validated from those aspects like continuity, characterization and applicability, in order to verify the effectiveness and availability. The results illustrate that these frames which have been screened by this scheme have advantages of continuity, characterization etc.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and simulation of an adaptive filter in MIMO-PLC system MIMO-PLC系统自适应滤波器的设计与仿真
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359920
Song-nong Li, Xingzhe Hou, Guoqing Xu, Xiao Liu
{"title":"Design and simulation of an adaptive filter in MIMO-PLC system","authors":"Song-nong Li, Xingzhe Hou, Guoqing Xu, Xiao Liu","doi":"10.1109/ICCT.2017.8359920","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359920","url":null,"abstract":"In recent years, much attention has been paid to multiple-input-multiple-output (MIMO) signal processing in power line communication (PLC), to increase channel capacity and anti-interference ability. In this study, an adaptive filter was designed to reduce the influence of interference and bit error rate in MIMO-PLC random channel. This filter was set in the receiving port of a 3×4 MIMO-PLC system. The bit error rate before and after adding filter was analyzed and compared. Results show that the filter provides a remarkable performance gain on bit error rate in this 3×4 MIMO-PLC system.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130021332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An adaptive PSO-based real-time workflow scheduling algorithm in cloud systems 云系统中基于自适应pso的实时工作流调度算法
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359966
Pengze Guo, Zhi Xue
{"title":"An adaptive PSO-based real-time workflow scheduling algorithm in cloud systems","authors":"Pengze Guo, Zhi Xue","doi":"10.1109/ICCT.2017.8359966","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359966","url":null,"abstract":"Cloud computing has emerged as a powerful platform for providing computing resources in the past decade. Developing workflow scheduling algorithms can efficiently reduce the cost of executing tasks in cloud systems. The features of elasticity and heterogeneity of cloud computing bring challenges for scheduling strategies. For real-time workflows, reducing execution time and reducing execution cost are two conflicting objectives. To address this issue, we propose in this paper an improved real-time workflow scheduling algorithm based on particle swarm optimization (PSO). Different from traditional scheduling heuristics which rely on the initial resource pool, our algorithm can adaptively optimize the resource usage. Simulation experiments are conducted to evaluate our algorithm on workflows with different sizes under various deadlines. Compared with the best algorithm ever known, our algorithm shows excellent performance in both cost and makespan.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic analysis of VANET using temporal reachability graph 基于时间可达图的VANET动态分析
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359744
Huifang Feng, Junpeng Zhang, Junxia Wang, Youji Xu
{"title":"Dynamic analysis of VANET using temporal reachability graph","authors":"Huifang Feng, Junpeng Zhang, Junxia Wang, Youji Xu","doi":"10.1109/ICCT.2017.8359744","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359744","url":null,"abstract":"The topology dynamic is one of the important characteristics of vehicular ad hoc network (VANET). The study of the temporal topology of VANET plays a significant role in network protocol development and management. The temporal model of VANET as temporal reachability graph model is built. This model not only describes the packet transmission time, but also can capture the store-and-forward mechanism in VANET. The relations of the packet transmission time τ and the maximum tolerated delay time δ to the density, global efficiency and link duration are analyzed. The results show that compared to the static network, the temporal network can capture the information transmission process in VANET better, and the decrease of packet transmission time τ or the increase of maximum tolerated delay time δ contributes to the improvement of transmission efficiency of VANET.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security performance analysis for cooperative communication system under Nakagami-m fading channel Nakagami-m衰落信道下协同通信系统的安全性能分析
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359628
Lei Peng, G. Zang, Qian Zhou, Yuanyuan Gao, Chenjing Xi
{"title":"Security performance analysis for cooperative communication system under Nakagami-m fading channel","authors":"Lei Peng, G. Zang, Qian Zhou, Yuanyuan Gao, Chenjing Xi","doi":"10.1109/ICCT.2017.8359628","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359628","url":null,"abstract":"In this paper, we investigate the secure transmission problem of cooperative communication systems where a potential malicious eavesdropper is existing. Based on the more general Nakagami-m fading channels, we adopt a strategy to improve the system security performance by decoding and forwarding signals at the relay as well as sending interference signals simultaneously. In this model, the outage probability and the intercept probability which represent reliability and security respectively are derived, meanwhile, the influence of the power allocation of each node on the system performance is discussed. Simulations are provided to analyze the tradeoff between reliability and security of the system, and the variation in tradeoff performance under different power allocation.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The technology of deviation compensation for radar phantom tracks 雷达幻迹偏差补偿技术
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/icct.2017.8359804
Xiang Liu, Dongsheng Li
{"title":"The technology of deviation compensation for radar phantom tracks","authors":"Xiang Liu, Dongsheng Li","doi":"10.1109/icct.2017.8359804","DOIUrl":"https://doi.org/10.1109/icct.2017.8359804","url":null,"abstract":"One important issue when multiple cooperating electronic combat air vehicles (ECAVs) are used to generate phantom radar tracks in a radar network is the position inaccuracy. Under the background of radar network with the centralized fusion architecture, the same-source-testing recognition for phantom track jamming has been proposed in the presence of the difference of spatial distribution property between phantom track and target track. In order to solve this problem, a deviation compensation for phantom radar tracks is presented. Firstly, the effect of the inaccuracies of radar position and ECAVs position to the phantom track is considered. Then, a deviation compensation for the same-source-testing recognition is proposed. Finally, the simulation results show that the method can reduce the recognition rate of phantom track effectively.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SPOIL: Practical location privacy for location based services 用于基于位置的服务的实用位置隐私
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359701
Chen Di, S. Xiaodong, Ge Hailong, Li Hao, Zhou Shilei
{"title":"SPOIL: Practical location privacy for location based services","authors":"Chen Di, S. Xiaodong, Ge Hailong, Li Hao, Zhou Shilei","doi":"10.1109/ICCT.2017.8359701","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359701","url":null,"abstract":"This paper presents SPOIL (Shifted POI List), a new method to achieve location privacy for map services on smartphones. Using SPOIL, users can query routes from POI (Point of Interests) A to POI B, while not revealing the locations of A and B to the map server. Different from previous works, SPOIL is transparent to existing map services, assume no trusted third party, and more efficient for smartphones. The basic idea is simple: the client (i.e., smartphone) shifts user-intended POIs to some neighboring POIs instead, and query the map server using the shifted POIs. By carefully selecting places for shifting, we ensure: (1) privacy: on observing the route query, it is difficult for an adversary to identify the user-intended endpoints. (2) usability: the returned route is very similar to the intended one, thus giving useful directions for the user; To make SPOIL efficient for smartphones, we let clients retrieve candidate places for shifting from an additional server, instead of storing all the places and computing nearest ones locally. We implement SPOIL as an Android application, and evaluate it with real query traces. Experimental results show that SPOIL strikes a good balance among privacy, usability and efficiency.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Video dual watermarking algorithm against geometric attack based on ASIFT and contourlet transform 基于ASIFT和contourlet变换的抗几何攻击视频双水印算法
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359931
Shuqin Chen, Zhi Li, Xinyu Cheng, Qingxia Gao
{"title":"Video dual watermarking algorithm against geometric attack based on ASIFT and contourlet transform","authors":"Shuqin Chen, Zhi Li, Xinyu Cheng, Qingxia Gao","doi":"10.1109/ICCT.2017.8359931","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359931","url":null,"abstract":"This study proposed a video dual watermarking algorithm based on affine-scale invariant feature transform (ASIFT) and contourlet transform. First, the human visual masking model of a 3D motion in video sequence is studied in depth. The human eye visual masking threshold is obtained as the maximum embedding intensity of watermark using various motion characteristics. Second, the high- and low-frequency sub-band coefficients of the contourlet field are obtained by contourlet transform. Chaotic watermarking sequence is embedded into the high-frequency sub-band coefficient with the highest energy to increase imperceptibility. Third, when the low-frequency sub-band coefficients has the stability of its coefficient histogram against geometric attacks such as rotation and scaling, the watermark signal is embedded in a low-frequency sub-band histogram of adjacent coefficients to increase the watermark of an anti-geometric attack. Finally, ASIFT is used as a trigger to determine whether the video frame is subjected to geometric attacks or not. For geometric distortions, ASIFT is used to regulate the geometrically attacked video frame. The low-frequency sub-band coefficients of the regulated video frame are used for the watermarking extraction algorithm. The high-frequency watermarking extraction algorithm is used directly for the non-geometric distortions. Experimental results show that the proposed algorithm could guarantee watermark invisibility and favorably extract the watermark for common geometric and conventional signal attacks. The proposed algorithm is a strong video-dual watermarking algorithm.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Saturated throughput analysis of vehicular ad hoc networks over Rayleigh-fading channels 瑞利衰落信道上车载自组网的饱和吞吐量分析
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359626
Wuwen Lai, Ning Guan, Han Liu, Hua Wang
{"title":"Saturated throughput analysis of vehicular ad hoc networks over Rayleigh-fading channels","authors":"Wuwen Lai, Ning Guan, Han Liu, Hua Wang","doi":"10.1109/ICCT.2017.8359626","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359626","url":null,"abstract":"Throughput is a key network performance for disseminating infotainment services in Vehicular Ad Hoc Networks (VANETs). However, when throughput is analyzed by Markov chain, wireless channel conditions and vehicle speed are not taken into account in modeling Medium Access Control (MAC) operations. In this paper, we propose an improved Markov chain model combining the above two factors to calculate the transmission probability. The saturated throughput is evaluated with considering MAC operations, wireless channel conditions, and vehicle speed. Compared with the basic model, our proposed model can accurately evaluate the saturation throughput with consideration of the aforementioned three factors simultaneously.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OFDM MIMO radar waveform design with high range resolution and low sidelobe level 高距离分辨率、低旁瓣电平的OFDM MIMO雷达波形设计
2017 IEEE 17th International Conference on Communication Technology (ICCT) Pub Date : 2017-10-01 DOI: 10.1109/icct.2017.8359797
Ting Bai, Hanying Hu, Xiyu Song
{"title":"OFDM MIMO radar waveform design with high range resolution and low sidelobe level","authors":"Ting Bai, Hanying Hu, Xiyu Song","doi":"10.1109/icct.2017.8359797","DOIUrl":"https://doi.org/10.1109/icct.2017.8359797","url":null,"abstract":"In this paper, we presented a novel waveform design method for orthogonal frequency division multiplexing (OFDM) multiple input multiple output (MIMO) radar with low sidelobe level and high range resolution. The signal model that all OFDM subcarriers are transmitted on each antenna is established to ensure high range resolution. And code domain orthogonality is achieved through complex orthogonal design (COD). Moreover, we transform range sidelobe suppression into an unconstrained optimization problem based on the relationship between the transmitted waveform and the phase. The Integrated Sidelobe Level (ISL) is utilized as the objective function, and then solved by Broyden-Fletcher-Goldfarb-Shanno (BFGS) algorithm. Simulation results show that the proposed method has remarkable performance in suppressing sidelobe and high range resolution.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信