2016 2nd IEEE International Conference on Computer and Communications (ICCC)最新文献

筛选
英文 中文
Study on anti-jamming frequency selection in radar netting 雷达组网中抗干扰频率选择的研究
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925008
Lei Ming, Zhang Jingfeng
{"title":"Study on anti-jamming frequency selection in radar netting","authors":"Lei Ming, Zhang Jingfeng","doi":"10.1109/COMPCOMM.2016.7925008","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925008","url":null,"abstract":"Radar anti-jamming, a struggle of radar for electromagnetic spectrum against the jamming equipment, nowadays has been a key factor influencing the overall situation of a modern war. As a radar anti-jamming technology, frequency selection suppresses jamming by taking advantage of the difference between the frequency domain feature of the radar signal and that of the jamming signal. However, most of the studies on the technology are more theoretical than practical. This paper studies the frequency selection technology for anti-jamming in radar netting, focusing on the possibility of avoiding jamming and the frequency bands to be avoided, and thus providing scientific and theoretical foundation for electronic warfare, decision support and radar control. The algorithm proposed features high operational speed and easy implementation, and simulation results have proved its effectiveness.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A high precision carrier tracking scheme based on phase estimation and compensation 一种基于相位估计和补偿的高精度载波跟踪方案
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924711
Ying Li, Ruisong Zhang, Wei Jiang
{"title":"A high precision carrier tracking scheme based on phase estimation and compensation","authors":"Ying Li, Ruisong Zhang, Wei Jiang","doi":"10.1109/COMPCOMM.2016.7924711","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924711","url":null,"abstract":"When phase locked loop (PLL) works in high dynamic environments, the dynamic stress error may be not ignorable, which limits the accuracy of carrier tracking. In this paper, we propose a new carrier tracking scheme to reduce the dynamic stress error of the PLL by concatenating the traditional PLL with a phase estimation and compensation (PEC) module. The PEC module can estimate and compensate the steady state phase error of the PLL's output. We theoretically analyze the phase error performance of this new scheme, namely PLL-PEC. Simulation results show that PLL-PEC reduces the dynamic stress error and increases the carrier tracking accuracy remarkably. Besides, PLL-PEC is very simple and easy to implement.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk assessment approach based on fuzzy 3D risk matrix for network device 基于模糊三维风险矩阵的网络设备风险评估方法
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924876
Danlin Zhang, Jihong Han, Jialiang Song, Lin Yuan
{"title":"A risk assessment approach based on fuzzy 3D risk matrix for network device","authors":"Danlin Zhang, Jihong Han, Jialiang Song, Lin Yuan","doi":"10.1109/COMPCOMM.2016.7924876","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924876","url":null,"abstract":"The reliability and security of network device is fundamental to network security. Thus risk management of network device is significant. As the crucial process of risk management, risk assessment has attracted major attention of researchers. This paper proposed a novel approach based on fuzzy 3D risk matrix for risk assessment of network device. Typical 2D risk matrix is widely adopted to assess and rank risk with likelihood and consequence, which is not reasonable with only two attributes of risk in practice. An attribute named risk controlling difficulty is added to establish a fuzzy 3D risk matrix, with triangular intuitionistic fuzzy number (TIFN) being used to evaluate it. What's more, fuzzy rules (FR) is used to rank the risk synthesizing the three attributes. The experiment demonstrates the implementation process of the proposed method which is proved to be effective and practical.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of VxWorks interrupt affinity based on MPIC 基于MPIC的VxWorks中断关联的应用
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925074
Liu Shirui, G. Haifeng, Qi Yalei
{"title":"Application of VxWorks interrupt affinity based on MPIC","authors":"Liu Shirui, G. Haifeng, Qi Yalei","doi":"10.1109/COMPCOMM.2016.7925074","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925074","url":null,"abstract":"With more and more interrupts of integrated core processor(ICP) in avionics, VxWorks interrupt affinity which is applied to ICP has drawn substantial attention. On the multi-core programmable interrupt controller(MPIC) which is hardware platform of ICP, VxWorks interrupt affinity not only helps dispatch interrupt to specific processor core in multi-core processors but also balance the interrupt loading of multi-core processors1. In this paper VxWorks affinity is applied to MPIC to achieve the purpose of shortening the interrupt response time. Firstly, the model of MPIC and its working principle have been studied in detail. And then, further research on the implement of VxWorks interrupt affinity based on the MPIC is made. Finally, a new interrupt dynamic routing method using VxWorks interrupt affinity is proposed to enhance the performance of MPIC. The experimental results demonstrate that the method is effective in dispatching the coming intrerrupts across multi-core and response to interrupt more quickly.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of visualization system based on network mass data 基于网络海量数据的可视化系统设计与实现
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924683
Zihan Zhuo, Jianwu Dong, Yueying He, Lixuan Guo, Bin Peng
{"title":"Design and implementation of visualization system based on network mass data","authors":"Zihan Zhuo, Jianwu Dong, Yueying He, Lixuan Guo, Bin Peng","doi":"10.1109/COMPCOMM.2016.7924683","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924683","url":null,"abstract":"With the extensive applications of Internet, the Internet data have grown at full speed. To directly reveal the relationship among mass data and the latent characteristics in information with visualization techniques has become an important research topic. Concerning small resource storage capacity and low data exchange efficiency of the traditionally visualization C/S system, this paper adopts the computer distributed framework and the efficient network transmission technique to finish overall framework design of the network data visualization system, and realizes it based on the Web full-stack technique. Experimental results suggest that the system can provide comprehensive visualization services for mass data and contribute to extraction of hidden information efficiently and directly from data, thus facilitating decision formulation.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reputation-based method against combinations of internal attacks in WSNs 基于声誉的wsn内部攻击组合防御方法
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925100
Sun Boyuan, Li Donghui
{"title":"A reputation-based method against combinations of internal attacks in WSNs","authors":"Sun Boyuan, Li Donghui","doi":"10.1109/COMPCOMM.2016.7925100","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925100","url":null,"abstract":"The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121359931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data synchronization algorithm for IoT gateway and platform 物联网网关与平台数据同步算法
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924676
Zhijie Lin, Lei Zhang
{"title":"Data synchronization algorithm for IoT gateway and platform","authors":"Zhijie Lin, Lei Zhang","doi":"10.1109/COMPCOMM.2016.7924676","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924676","url":null,"abstract":"Data synchronization is widely used in many fields such as database, cloud computing and distributed system. However, for Internet of Things (IoT) system, the existing synchronization algorithms are not very efficient because the data in IoT system have different characteristic like real-time and mutability. To resolve the problem, this paper proposes a new data synchronization algorithm for IoT system using timestamp and bitmap, which can improve the efficiency of network transmission in data synchronization and apply to IoT system better.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research of DBA schemes and QoS in PON system PON系统中DBA方案与QoS的研究
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925080
Li Li, Xin Shouting, Duan De-gong
{"title":"Research of DBA schemes and QoS in PON system","authors":"Li Li, Xin Shouting, Duan De-gong","doi":"10.1109/COMPCOMM.2016.7925080","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925080","url":null,"abstract":"With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127512724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method for improving the effective quantizer bits of the A/D converter based on the fractional Fourier Transform 一种基于分数阶傅里叶变换提高A/D转换器有效量化位的方法
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925178
Zi-xuan Yu, Ming-feng Lu, Feng Zhang, Xiao-Wei Jin
{"title":"A method for improving the effective quantizer bits of the A/D converter based on the fractional Fourier Transform","authors":"Zi-xuan Yu, Ming-feng Lu, Feng Zhang, Xiao-Wei Jin","doi":"10.1109/COMPCOMM.2016.7925178","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925178","url":null,"abstract":"To improve the Analog to Digital Converter's (ADC's) effective quantizer bits of wideband signals as linear frequency modulation (LFM) signal, a method based on the fractional Fourier transform (FRFT) is proposed. The expression of the signal-to-quantization-noise ratio (SQNR) in the FRFT domain is obtained. In comparison to the traditional methods in the Fourier domain, about 1.5 bits of improvement in effective quantizer bits are obtained. Simulation results validate the correctness of the theory and show the effectiveness of the proposed method in the fractional Fourier domain.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of mass emergency events based on molecular thermal motion algorithm 基于分子热运动算法的大规模突发事件预测
2016 2nd IEEE International Conference on Computer and Communications (ICCC) Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924707
Man Liu, Yuan Jiang, Yueping Peng
{"title":"Prediction of mass emergency events based on molecular thermal motion algorithm","authors":"Man Liu, Yuan Jiang, Yueping Peng","doi":"10.1109/COMPCOMM.2016.7924707","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924707","url":null,"abstract":"Because of the occurrence of mass incidents in public places in China, the society has put forward higher requirements for the monitoring of the group anomaly. In this paper, from the point of view of molecular thermal motion, the crowd pixel is modeled as a moving molecule to predict the mass emergencies. In order to improve the efficiency of the pre judge, classify the population density on the basis of the linear relationship between the number of people and the number of molecules, and in view of the high population density and the very high population density, through molecular thermal motion algorithm to extract the rate of population distribution law and thus build speed distribution function, using SVM to determine groups of abnormal behavior, completing the anticipation of group incidents finally.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信