2018 IEEE 18th International Conference on Communication Technology (ICCT)最新文献

筛选
英文 中文
Understanding and Modeling of the Real Application Traffic Characteristics for Fast On-chip Network Evaluation 快速片上网络评估中实际应用流量特性的理解与建模
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599899
Kang Wang, Huaxi Gu
{"title":"Understanding and Modeling of the Real Application Traffic Characteristics for Fast On-chip Network Evaluation","authors":"Kang Wang, Huaxi Gu","doi":"10.1109/ICCT.2018.8599899","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599899","url":null,"abstract":"The on-chip interconnection network is an emerging and a promising candidate for multi-core computing system's packets transmission. Fast evaluation of an on-chip optical network design is critically important at the very beginning of building an on-chip network-based computing system. Network bandwidth, average latency, and power consumption because of network devices can be obtained from an evaluation. Therefore, the accuracy of an evaluation is critical. In this paper, we reveal that traditional traffic models cannot reflect the main characteristic of emerging application workloads. By investigating the traffic characteristics from a multi-dimension, we show the gap between the traditional traffic model and the real application traffic patterns. The investigation of the application provides key elements of describing an emerging workload. These elements can be used to build more suitable traffic models for on-chip network fast evaluation stage.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Charge-Controlled Memristor Model and Its Emulator Circuit 一种新型电荷控制忆阻器模型及其仿真电路
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599989
Bo Dang, Yongbin Yu, Huihui Ma, N. Yang, T. Nyima
{"title":"A Novel Charge-Controlled Memristor Model and Its Emulator Circuit","authors":"Bo Dang, Yongbin Yu, Huihui Ma, N. Yang, T. Nyima","doi":"10.1109/ICCT.2018.8599989","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599989","url":null,"abstract":"This paper highlights a novel charge-controlled memristor model, which is described as a quadratic polynomial between charge and flux. In light of circuit theory, theoretical analysis and MATLAB simulation show the Memristor fingerprint of pinched hysteresis loop. On the other hand, physical circuit of the new model is designed to emulate the memristive characteristic. Finally, circuit test measured by oscilloscope and its experimental result verify the memristive behavior of our proposed model.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Jamming Factors in Electronic Information System Based on Deep Learning 基于深度学习的电子信息系统干扰因素识别
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600065
Li Tingpeng, Wang Manxi, Peng Danhua, Y. Xiaofan
{"title":"Identification of Jamming Factors in Electronic Information System Based on Deep Learning","authors":"Li Tingpeng, Wang Manxi, Peng Danhua, Y. Xiaofan","doi":"10.1109/ICCT.2018.8600065","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600065","url":null,"abstract":"Jamming identification is the precondition of taking targeted anti-jamming measures, and it is very important to improve the adaptability of electronic information system to electromagnetic environment. The traditional recognition method of jamming is based on the feature extraction based on expert knowledge, but due to the jamming pattern diversity and different parameter, in practice it is difficult to determine the appropriate feature set. Therefore, this paper introduces a deep learning approach, which automatically extracts features from the original data to identify the jamming factors of electronic information system. In order to demonstrate the effectiveness and practicability of this approach, the noise jamming factor identification of the superheterodyne receiver is introduced.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobility Management for Network Slicing Based 5G Networks 基于网络切片的5G网络移动性管理
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600026
Ruihan Wen, G. Feng, Jianhong Zhou, Shuang Qin
{"title":"Mobility Management for Network Slicing Based 5G Networks","authors":"Ruihan Wen, G. Feng, Jianhong Zhou, Shuang Qin","doi":"10.1109/ICCT.2018.8600026","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600026","url":null,"abstract":"Network slicing has been viewed as one of the key architectural technologies for the next generation (5G) mobile network. The mobility pattern of User Equipments (UEs) in different network slices poses great challenge to the mobility management for the 5G systems, which is different from that for the 4G systems. In this paper we propose a multiple level tracking area (TA) and tracking area list (TAL) structure which considers the characteristics of UE mobility pattern and UE density of slices to analyze the location update frequency and the paging frequency of UE. Based on this structure, we employ an embedded Markov chain model to find a theoretically optimal TAL configuration for slice UEs by leveraging sequential and parallel paging schemes respectively. Numerical results demonstrate the effectiveness of our proposed analytical model and verify that the proposed multiple level TA architecture can significantly reduce the total signaling overhead in comparison with the legacy single level TA strategy.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Optimal Resource Allocation Algorithm Based on Sum Rate Maximization for Uplink SCMA system 基于和速率最大化的上行SCMA系统资源优化分配算法
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599973
Guan Xiong, Jun Sun
{"title":"An Optimal Resource Allocation Algorithm Based on Sum Rate Maximization for Uplink SCMA system","authors":"Guan Xiong, Jun Sun","doi":"10.1109/ICCT.2018.8599973","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599973","url":null,"abstract":"An optimal resource allocation algorithm based on sum rate maximization for uplink Sparse Code Multiple Access (SCMA) is proposed in this paper. The goal of the algorithm is to solve the problem of resource allocation based on maximizing system and rate in the uplink SCMA system. Firstly, based on the inter-user interference model in the system, an optimal subcarrier allocation algorithm is proposed to solve the subcarrier allocation problem. Then, based on the subcarrier allocation scheme, the optimization problem for maximizing the system sum rate is reduced to a convex optimization problem. A power allocation scheme is obtained by solving the convex optimization problem. Finally, the subcarrier allocation optimization algorithm and the power distribution solution are combined and iteratively optimized. Simulation results demonstrate that the proposed optimization algorithm can effectively increase the total capacity of the uplink SCMA system.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Survey of Ad-Hoc Network Technology for UAV 无人机自组网技术综述
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600107
Jiaqi Zhang, Kai Liu
{"title":"Survey of Ad-Hoc Network Technology for UAV","authors":"Jiaqi Zhang, Kai Liu","doi":"10.1109/ICCT.2018.8600107","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600107","url":null,"abstract":"This paper firstly introduces the principle, features and operation modes of UAV ad-hoc networks. Then its specific technologies in physical layer, data link layer and network layer are summarized, respectively. Finally, the application trend of UAV ad-hoc networks in the future is given.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OFDM-CPFSK Modulated Physical-Layer Network Coding over Frequency Selective Fading Channels 频率选择性衰落信道上的OFDM-CPFSK调制物理层网络编码
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599920
Nan Sha, Mingxi Guo, Yuanyuan Gao
{"title":"OFDM-CPFSK Modulated Physical-Layer Network Coding over Frequency Selective Fading Channels","authors":"Nan Sha, Mingxi Guo, Yuanyuan Gao","doi":"10.1109/ICCT.2018.8599920","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599920","url":null,"abstract":"In this paper, we aim to design an orthogonal frequency division multiplexing-continuous phase frequency shift keying (OFDM-CPFSK) modulated physical-layer network coding (PNC) scheme, i.e., PNC-OFDM-CPFSK, for a two-way relay network in frequency selective fading environments. Two classes of OFDM-CPFSK schemes are investigated, namely single- h and multi- h. The detection problem at the relay receiver is discussed and the end-to-end bit error rate (BER) performance of the PNC-OFDM-CPFSK system is carried out by simulation results. It is shown that PNC-OFDM-CPFSK can offer superior BER performance compared to PNC-OFDM-BPSK.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122812197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Backup Bethod of Service Function Chain Based on Security Classification 基于安全分类的业务功能链备份方法研究
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599990
Sun Zhiyong, Tan Hongbo, Jiang Xinsheng, You Wei, Liu Zhengming
{"title":"Research on Backup Bethod of Service Function Chain Based on Security Classification","authors":"Sun Zhiyong, Tan Hongbo, Jiang Xinsheng, You Wei, Liu Zhengming","doi":"10.1109/ICCT.2018.8599990","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599990","url":null,"abstract":"In the environment of cloud computing and data center, general X86 servers make it easier for attackers to discover vulnerabilities and infect or spread virus. It has a great impact that single physical node failed on the service performance of the service function chain (SFC). The existing backup methods lack the idea to choice the backup nodes and ignore the trust relationship between physical nodes and virtual nodes. Firstly, this paper proposes a security classification mechanism between the virtual nodes and physical nodes, secondly, the scheme of backup node selection is proposed based on security classification mechanism. then the trust mechanism between virtual node and physical node is built when nodes mapping. Finally, it's the destination to minimize resource overhead of mapping to improve physical resource utilization. Experiments show that this method can improve the duration of pivotal nodes endure vulnerability mining by 23.02% to strengthen the resilience of the network significantly while satisfy the performance requirements of SFC mapping.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Noise Signal Processing Method Based on LMD Envelope Spectrum 基于LMD包络谱的水下噪声信号处理方法
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600264
Tao Lu, Yi Zheng, A. Mudugamuwa
{"title":"Underwater Noise Signal Processing Method Based on LMD Envelope Spectrum","authors":"Tao Lu, Yi Zheng, A. Mudugamuwa","doi":"10.1109/ICCT.2018.8600264","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600264","url":null,"abstract":"Aiming the non-stationary characteristics of underwater noise signal, an underwater noise signal processing method based on LMD envelope spectrum is proposed in this paper, which uses the local mean decomposition (LMD) on the underwater noise signal, and product function (PF) components of some instantaneous frequencies with physical meaning are obtained. Then, the kurtosis of each PF component is calculated, and the components that contain more information of underwater target noise are selected as sensitive components according to kurtosis feature. After that, the wavelet packet decomposition and reconstruction are used for these sensitive PF components, and then the Hilbert transform is used to find the envelope spectrum of the reconstructed sensitive PF components. Through the processing and analysis of the signal collected by the experiment at the wharf, and compared with the EMD decomposition method, the experimental results show that: (1) When the underwater noise signal is processed, the result of LMD decomposition is better than that of EMD decomposition. (2) The underwater noise signal processing method based on LMD envelope spectrum can process underwater noise signal effectively, and there is an obvious spectral line in the frequency range of target sound source.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Jamming Attacks on a Hopped OFDM Communication System 跳频OFDM通信系统的干扰攻击分析
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599930
Mohamed A. Soliman, Karim H. Moussa, Walid Saad, S. Shaaban, M. Rizk
{"title":"Analysis of Jamming Attacks on a Hopped OFDM Communication System","authors":"Mohamed A. Soliman, Karim H. Moussa, Walid Saad, S. Shaaban, M. Rizk","doi":"10.1109/ICCT.2018.8599930","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599930","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) was considered to be a well-known robust method and a utilizing hopping method across various frequency bands or sub-bands that is known for its capability to enhance the performance of these communication systems. The combination between both of these techniques should be useful in mitigating interference especially the jamming that is caused accidentally or on purpose mainly in the military applications. This paper illustrates that the bit error rate (BER) performances of an improved OFDM communication system utilizing several frequency sub-bands hopping techniques against different categories of jammers are presented. In case of low jamming power at the front end of the receiver, the system performance is enhanced gradually by raising the number of frequency hopping sub-bands against narrowband, wideband and barrage jammers. At a high jamming power, no improvement is achieved using the sub-bands hopping methods.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124588359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信