2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)最新文献

筛选
英文 中文
On the Performance Evaluation of 5G MIMO Networks employing NOMA via System-Link Level Simulations 基于系统链路级仿真的NOMA 5G MIMO网络性能评估
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673928
P. Gkonis, P. Trakadas, L. Sarakis, A. Giannopoulos, S. Spantideas, N. Capsalis
{"title":"On the Performance Evaluation of 5G MIMO Networks employing NOMA via System-Link Level Simulations","authors":"P. Gkonis, P. Trakadas, L. Sarakis, A. Giannopoulos, S. Spantideas, N. Capsalis","doi":"10.1109/icicn52636.2021.9673928","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673928","url":null,"abstract":"In this paper the performance of a proposed non-orthogonal multiple access (NOMA) scheme in a fifth-generation (5G) multicellular orientation is evaluated. To this end, a hybrid system-link level simulator has been developed, making the performance evaluation of 5G orientations feasible for various radio resource management strategies. In particular, simulations were performed for a two-tier cellular network (i.e., 57 active sectors) and multiple antennas at both transmission ends (multiple input multiple output - MIMO configuration). According to the presented results, considering a $2 times 2$ MIMO configuration, the total network throughput can be significantly increased when NOMA is employed, without any mean bit error rate (BER) deterioration compared to orthogonal multiple access (OMA) transmission. Importantly, this improvement is achieved with minimum transceiver complexity since the results were derived without employing successive interference cancellation at the receiver side.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114552386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Greenhouse Control System Based on Edge Computing 基于边缘计算的温室控制系统设计
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9674024
Wenlong Han, Ansong Feng, Jinchao Xiao, Shuangfei Zi
{"title":"Design of Greenhouse Control System Based on Edge Computing","authors":"Wenlong Han, Ansong Feng, Jinchao Xiao, Shuangfei Zi","doi":"10.1109/icicn52636.2021.9674024","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9674024","url":null,"abstract":"With the rapid development of greenhouse technology and Internet of things technology, more and more intelligent sensors are widely used in the field of intelligent agricultural control. The types of plant growth data obtained are more and more abundant, and the amount of data is more and more huge. The traditional data processing mode only relying on Cloud Computing Center will lead to the increasing demand for computing power, slow system response-speed, and high bandwidth network continuous connection and so on. If data processing can be solved locally, part of the previous cloud computing tasks will be migrated to the local, which will provide guarantee for low delay, high reliability, data conversion, message distribution and intelligent control. In this paper, based on the edge computing scheme, the computing task of cloud computing center is transferred to the edge controller, which effectively solves the problems of cloud computing network bandwidth, long delay, waste of resources and so on. In addition, aiming at the problem of high coupling of greenhouse environment, fuzzy control method is used to realize the rapid adjustment of greenhouse environment.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115066691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Minors’ Personal Data in IoT-based Smart Homes According to GDPR 根据GDPR保护基于物联网的智能家居中的未成年人个人数据
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673911
Stavroula Rizou, Eugenia Alexandropoulou-Egyptiadou, Y. Ishibashi, K. Psannis
{"title":"Protecting Minors’ Personal Data in IoT-based Smart Homes According to GDPR","authors":"Stavroula Rizou, Eugenia Alexandropoulou-Egyptiadou, Y. Ishibashi, K. Psannis","doi":"10.1109/icicn52636.2021.9673911","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673911","url":null,"abstract":"Apart from the positive effects of smart homes, such as economic, energy, and security enhancements, and the focus on their efficiency and reliability, it should also be paid attention to the legal, ethical and social impacts of this ICT ecosystem. The field of children’s data protection is challenging, as they are likely more vulnerable to online risks, and as a result, their protection requires a specialized privacy-preserving scheme. This research work addresses the crucial issues of minors’ data protection, from a European law perspective, through IoT-based devices inside a smart home environment.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122177152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Point-to-Point Security Communication System: Artificial Noise Jamming Insertion 点对点安全通信系统:人工噪声干扰的插入
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673871
Dan Li, Xiao Ma, Weijia Han
{"title":"A Point-to-Point Security Communication System: Artificial Noise Jamming Insertion","authors":"Dan Li, Xiao Ma, Weijia Han","doi":"10.1109/icicn52636.2021.9673871","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673871","url":null,"abstract":"This paper mainly studies the point-to-point security transmission problem. A point-to-point transmission scenario consists of legitimate device, an unauthorized device (eavesdropper) and a jamming device (jammer). Generally, unauthorized devices can eavesdrop on confidential information in wireless transmission. Current jamming techniques usually interfere with eavesdroppers while also reducing the reception signal-to-noise ratio of legitimate users. To cope with the above challenges, the broadband waveform OFDM (Orthogonal frequency division multiplexing, OFDM) jamming insertion technique and narrowband waveform PDM (power division multiplexing, PDM) jamming insertion are proposed. The technique inserts a jamming signal orthogonal to the message in the time frequency domains and the power domain, respectively. By changing the form of the whole signal, it can not only protect the communication between legitimate users, but also interfere with illegal eavesdropping users. The experimental results show that the proposed technique can effectively interfere with eavesdroppers and improve the quality of service of legitimate users.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124007183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load Balancing Algorithm for Heterogeneous Wireless Networks Based on Motion State Estimation 基于运动状态估计的异构无线网络负载均衡算法
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673943
Guo Shiwei
{"title":"Load Balancing Algorithm for Heterogeneous Wireless Networks Based on Motion State Estimation","authors":"Guo Shiwei","doi":"10.1109/icicn52636.2021.9673943","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673943","url":null,"abstract":"Different wireless access technologies are complementary in terms of coverage and data transmission rate. Some areas are often covered by multiple wireless access networks at the same time. In some crowded places, the user's movement state has a certain regularity. Therefore, a heterogeneous network load balancing algorithm based on motion state estimation is proposed. The user's motion state is estimated first, and then part of the load is transferred from the cellular network to the WLAN according to the estimation result. The results show that the proposed algorithm can effectively balance the load between heterogeneous networks and improve system efficiency.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Social-Aware Cross-Chain Authentication Strategy in Mobile Edge Computing 移动边缘计算中社会感知跨链认证策略
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673890
Jinghan Zhao, Hui Yang
{"title":"Social-Aware Cross-Chain Authentication Strategy in Mobile Edge Computing","authors":"Jinghan Zhao, Hui Yang","doi":"10.1109/icicn52636.2021.9673890","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673890","url":null,"abstract":"With the rapid development of mobile edge computing (MEC), the amount of mobile devices and users is growing rapidly, and the distributed management architecture based on the blockchain technology is gradually used for the demand of trust and privacy protection in MEC. While most of the works focus on how to use blockchain to provide a secure and trusted environment in MEC, the problem of excessive authentication cost caused by repeated authentication has not been solved. This paper proposes a social-aware cross-chain authentication strategy in MEC. The concept of social network is introduced into MEC, based on data collected from the users, we can derive the social connection among users and select notaries from users with high credibility to cross the chain. Simulation results show that the proposed strategy can effectively reduce the system cost of distributed management architecture in MEC.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Development of On-Site Automatic Inspection System Based on Machine Vision Technology 基于机器视觉技术的现场自动检测系统设计与开发
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673944
Bo Liu, H. Yin, Wangchang Miao, Ai-fang Zhang
{"title":"Design and Development of On-Site Automatic Inspection System Based on Machine Vision Technology","authors":"Bo Liu, H. Yin, Wangchang Miao, Ai-fang Zhang","doi":"10.1109/icicn52636.2021.9673944","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673944","url":null,"abstract":"Automatic System Management based on machine vision technology is the development direction of field management. At present, there are many problems in the process of field management, such as high personnel input, Long time-consuming inspection and tedious work flow. In order to solve these problems, an automatic inspection system based on machine vision technology is constructed by using machine vision technology, information technology, image contrast technology and system applications such as Docker and Kubernetes. Combining the system requirement analysis, from two aspects of function realization and system architecture, each module of the system is designed, the key process flow in the system operation is analyzed, and through the dynamic construction technology, the operation of the system is optimized from the recognition accuracy. The result of example verification shows that the system can provide service according to user’s needs correctly.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Networks Applied for Broadcast Channels 神经网络在广播频道中的应用
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673962
Mohammad Abuabdoh
{"title":"Neural Networks Applied for Broadcast Channels","authors":"Mohammad Abuabdoh","doi":"10.1109/icicn52636.2021.9673962","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673962","url":null,"abstract":"The famous mathematical definition of the capacity region of broadcast channels assumes that the channel is a degraded. However, not all wireless communication channels can be mathematically represented as degrades ones. Motivated by the artificial intelligence revolution, this paper provides a novel approach for tackling this problem. In particular, this paper utilizes artificial neural networks for providing a solution for the problem of converting a broadcast channel into a degraded one. Creating a degraded channel implies modeling the broadcast channel as a series of cascaded channels connecting the transmitter to the receivers sequentially which in turn implies finding a middle (relay) channel connecting the receivers. This process of finding the middle channel is performed in this paper utilizing different models of neural networks. This approach is applied for binary symmetric channels and Gaussian channel. For the Gaussian case, this paper provides a novel approach for establishing the middle channel by providing an estimation of the distribution of the middle channel itself, not only the crossover probability or the variance of the distribution. As a result, several possible extensions for practical channels (like Rayleigh) is suggested. Furthermore, this paper provides an abundant evidence that artificial intelligent is capable of modernizing classical information theory that faces major problems with the complexity of the analytical solutions.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123284321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Narrowband jamming Mitigation in OFDM Systems Using Time Domain Interleaving 利用时域交错技术缓解OFDM系统中的窄带干扰
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9673946
T. Nazzal, B. AlQassab, M. Alblooshi, F. Salman, H. Almarzooqi, H. Mukhtar
{"title":"Narrowband jamming Mitigation in OFDM Systems Using Time Domain Interleaving","authors":"T. Nazzal, B. AlQassab, M. Alblooshi, F. Salman, H. Almarzooqi, H. Mukhtar","doi":"10.1109/icicn52636.2021.9673946","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9673946","url":null,"abstract":"In this paper, Time Domain Interleaving (TDI) is proposed to mitigate narrowband jamming in orthogonal frequency division multiplexing (OFDM) systems. TDI is previously used as a physical layer security technique against eavesdropping attacks. In this work, TDI ability to reject narrowband jamming is demonstrated and evaluated in additive white Gaussian noise (AWGN) with Rayleigh fading. Different narrowband jamming scenarios are considered with different numbers and locations of jammed subcarriers. The obtained results show that TDI significantly improves the bit error rate (BER) performance of OFDM under narrowband jamming.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Integration of XR with Haptic Feedback and 5G Networks XR与触觉反馈和5G网络的高效集成
2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN) Pub Date : 2021-11-25 DOI: 10.1109/icicn52636.2021.9674010
Georgios M. Minopoulos, Konstantinos E. Psannis, S. Goudos, S. Nikolaidis, G. Kokkonis, Y. Ishibashi
{"title":"Efficient Integration of XR with Haptic Feedback and 5G Networks","authors":"Georgios M. Minopoulos, Konstantinos E. Psannis, S. Goudos, S. Nikolaidis, G. Kokkonis, Y. Ishibashi","doi":"10.1109/icicn52636.2021.9674010","DOIUrl":"https://doi.org/10.1109/icicn52636.2021.9674010","url":null,"abstract":"The speedy development of immersive technologies and unexpected situations like the COVID-19 pandemic are expected to boost the application of extended reality (XR) in tourism. Virtualization techniques can create a virtual environment identical to the real one, giving to the user the feeling of actually being there. The aim of haptic systems is to enhance the degree of immersion into a virtual environment by intensifying the skill of physical interaction with people and objects in the distant space. The advancement of cellular networks enables haptic data transmission over high data rate and low latency wireless communication to create ambient haptic experience. The contribution of this research is to describe how XR and haptics are able to reshape tourism industry and present insights for tourism involved parties.","PeriodicalId":231379,"journal":{"name":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信