2018 IEEE 18th International Conference on Communication Technology (ICCT)最新文献

筛选
英文 中文
Selective Encryption of H.264/AVC Based on Block Weight Model 基于块权重模型的H.264/AVC选择性加密
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599959
Mengdie Huang, Cheng Yang, Yuan Zhang
{"title":"Selective Encryption of H.264/AVC Based on Block Weight Model","authors":"Mengdie Huang, Cheng Yang, Yuan Zhang","doi":"10.1109/ICCT.2018.8599959","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599959","url":null,"abstract":"The rise of 4K and 8K techniques has led to the growth of video data streaming. Consequently, the greater challenges of encryption efficiency and information leakage facing selective encryption (SE) makes it necessary to reduce the encryption ratio as much as possible. In this paper, we design a SE scheme for H.264/AVC video which achieves a trade-off between low encryption ratio and high safety, for both cryptographic attack and sketch attack point of view. As a starting point, we propose a novel calculation model, called block weight model that can take advantage of reference structure of a video sequence to quantitatively analyze the impact of each block on the motion compensation of other blocks. This calculation model can conduce to accurately select the key bytes in the compressed bitstream for encryption, which greatly retains the network friendliness and improves the efficiency compared to previous work. In addition, our scheme supports scalable encryption granularity by providing an adjustable encryption parameter to meet different security levels. Experimental results verified that our solution is highly efficient in protecting confidential video content with simple computation.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127554388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Effective Selection Method for Vehicle Alternative Route under Traffic Congestion 交通拥堵条件下车辆备选路径的有效选择方法
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600055
Jie Xu, Yong Zhang, Chunxiao Xing
{"title":"An Effective Selection Method for Vehicle Alternative Route under Traffic Congestion","authors":"Jie Xu, Yong Zhang, Chunxiao Xing","doi":"10.1109/ICCT.2018.8600055","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600055","url":null,"abstract":"The development of the city transportation system provides us lots of conveniences, but it also can brings traffic congestion causing environmental pollution and increasing the travel cost. The current research mainly focuses on traffic volume prediction, route recommendation. However, it is also very mea-ningful and instructive to select a suitable less time-consuming alternative route on a specified congested road. In general, skilled taxi drivers who are relatively familiar with the traffic condition would like to choose the less time routes to avoid peak congestion road segments. Inspired by above ideas, in this paper, we propose a novel hybrid framework which integrates both urban traffic flow characteristics theory and machine learning techniques. We first describe the problem definition, then capture a typical set of congestion road features from the GPS trajectories, the features include traffic volume, road speed limit, route distance, traffic light, and weather features. After that, the most commonly used top-k candidate alternate routes based on historical data are generated, then the feature representations for congestion are feed to train the deep learning model, and the best alternative route is selected after the training process. Extensive experiments on realistic datasets derived from realistic car services demonstrate the superiority of our methodologies.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Link Congestion Oriented LEO Network Routing Protocol 面向链路拥塞的LEO网络路由协议
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600000
Wei-qiang Fan, Tao Zhang
{"title":"A Link Congestion Oriented LEO Network Routing Protocol","authors":"Wei-qiang Fan, Tao Zhang","doi":"10.1109/ICCT.2018.8600000","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600000","url":null,"abstract":"As a traditional routing protocol, the Routing Information Protocol (RIP) is widely used due to its low bandwidth overhead, easy management, and implementation. However, this protocol only considers the number of link hops and is difficult to solve the problem of local network congestion caused by the low-orbit satellite network topology or the uneven distribution of global users. This paper proposes a Link Congestion Oriented Routing Information Protocol (LCO-RIP), which uses link buffer area feedback mechanism and link cost mechanism to distribute the traffic that generates the congested link to other idle link in order to alleviate network congestion and reduce network packet loss. Through simulation and verification, LCO-RIP can significantly reduce packet loss in the network without affecting the average end-to-end delay.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129160345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HTML5 Web Worker Transparent Offloading Method for Web Applications Web应用程序的HTML5 Web Worker透明卸载方法
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600046
Zhao Wang, Haojiang Deng, Linlin Hu, Xiaoyong Zhu
{"title":"HTML5 Web Worker Transparent Offloading Method for Web Applications","authors":"Zhao Wang, Haojiang Deng, Linlin Hu, Xiaoyong Zhu","doi":"10.1109/ICCT.2018.8600046","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600046","url":null,"abstract":"With the release of HTML5 standards, web applications have become more powerful, complicated and resource-hungry, whereas smart devices are in general resource-constrained. Computation offloading is one of the approaches used to increase application efficiency and decrease energy consumption of smart devices. In this paper, the offloading methods of HTML5 web worker in web applications are discussed, and a transparent offloading method of web worker is proposed to reduce execution time of web application and energy consumption of smart device. By rewrite of web worker implementation and modification of HTML5 websocket mechanism of web platform, web worker is offloaded to server side transparently. Common nontransparent web worker offloading method with JS framework has also been implemented. The experiments results show that the proposed web worker transparent offloading method achieves better performance improvements comparing to no offloading and non-transparent offloading respectively.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mixing Matrix Estimation in Underdetermined Blind Source Separation Based on Objective Function and Artificial Bee Colony Algorithm 基于目标函数和人工蜂群算法的欠定盲源分离混合矩阵估计
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599968
Yongqiang Chen, Yingxiang Li, Juan Zhou
{"title":"Mixing Matrix Estimation in Underdetermined Blind Source Separation Based on Objective Function and Artificial Bee Colony Algorithm","authors":"Yongqiang Chen, Yingxiang Li, Juan Zhou","doi":"10.1109/ICCT.2018.8599968","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599968","url":null,"abstract":"To solve the problems of existing methods for mixing matrix estimation in underdetermined blind source separation such as the defect that separation performance is vulnerable to the initial value and low estimation accuracy, probability model is used to describe the distribution of the observed signals in this paper, and the objective function based on the maximum likelihood is obtained, which turns the problem of mixing matrix estimation into the problem of parameters estimation. The objective function is optimized by the artificial bee colony algorithm and mixing matrix estimation is obtained. Compared with some existing methods, the proposed method has more precise estimation accuracy.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116849702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
No-reference Image Quality Assessment Based on Convolutional Neural Network 基于卷积神经网络的无参考图像质量评估
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599897
Yangming Chen, Xiuhua Jiang
{"title":"No-reference Image Quality Assessment Based on Convolutional Neural Network","authors":"Yangming Chen, Xiuhua Jiang","doi":"10.1109/ICCT.2018.8599897","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599897","url":null,"abstract":"Image Quality Assessment (IQA) is a classic research topic, whose goal is to design algorithms and give objective values consistent with subjective values of the human visual system (HVS). IQA plays an important role in many image processing applications, such as image enhancement, image compression and reconstruction, watermark addition, etc. In this paper, we present two no-reference image quality assessment (NR-IQA) models based on convolutional neural networks (CNN). One of the biggest challenges in learning NR-IQA model is lack of images with subjective value. Thus, we label images with full-reference (FR) algorithms, the intermediate product “similarity map” is generated when some FR algorithms calculate image quality. We use similarity map or objective score of some FR algorithms to label images separately. The first model uses objective values of SSIM, VIF, GMSD and FSIM respectively, to label images to train the improved VGGNet. The second model uses similarity map generated by FSIM and VSI respectively, to label images to train the improved U-Net. Experiments conducted on the database D215 built in our laboratory show that our second model is comparable to the advanced NR-IQA model.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131085056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost Effective Hash Chain Based Key Pre-Distribution Scheme for Wireless Sensor Network 基于哈希链的高效无线传感器网络密钥预分配方案
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600178
Ching-Nung Yang, Ting-Ju Lin, Song-Yu Wu, S. Lin, Wei Bi
{"title":"Cost Effective Hash Chain Based Key Pre-Distribution Scheme for Wireless Sensor Network","authors":"Ching-Nung Yang, Ting-Ju Lin, Song-Yu Wu, S. Lin, Wei Bi","doi":"10.1109/ICCT.2018.8600178","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600178","url":null,"abstract":"In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may be compromised when sensor nodes are captured. Accordingly, the KP q- composite scheme was proposed to tackle this node-capture problem. Recently, Bechkit et al. proposed a hash chain based KP (HCKP) q-composite scheme to further enhance network resiliency against node capture. However, Bechkit et al.'s HCKP q-composite scheme has to perform too many hash operations to establish a secure link between two nodes for the case that the difference of node identifiers is large. This computational overhead is more serious for the large value of q. In this paper, we propose a computational overhead invariant HCKP q-composite scheme by storing one additional hashed value in sensor node. When compared with Bechkit et al.'s HCKP q-composite scheme, the proposed scheme reduces the number of hash operations, and meanwhile the storage overhead remains insignificant.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134206663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Adaptive OFDM Modulation Method for Middle Voltage Power Line Communication 一种用于中压电力线通信的自适应OFDM调制方法
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599962
Huang Rui, L. Xiaoping, Chen Shidong, Chen Xiangqun, Lu Jun, Cai Peng
{"title":"An Adaptive OFDM Modulation Method for Middle Voltage Power Line Communication","authors":"Huang Rui, L. Xiaoping, Chen Shidong, Chen Xiangqun, Lu Jun, Cai Peng","doi":"10.1109/ICCT.2018.8599962","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599962","url":null,"abstract":"To improve the transmission reliability of the services in the power distribution and utility network (PDUN), this paper proposes an adaptive OFDM modulation method based on the services' priority for the middle voltage power line communication. Firstly, the Quality-of-Service (QoS) requirements of PDUN-related services are analyzed. Then, the proposed method is described including its basic idea and related implementation, which divides the PDUN-related services into the different QoS priority and selects the modulation methods adaptively for the more reliable transmission performance. Simulation experiments illustrate that the proposed method is effective and can guarantee a better transmission rate with a lower bit error rate.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A General Method for Accelerating the Kasumi Algorithm on Intel Processors 在Intel处理器上加速Kasumi算法的通用方法
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8600093
Qilin Bai, Naijie Gu, Junjie Su, Kuai Yu
{"title":"A General Method for Accelerating the Kasumi Algorithm on Intel Processors","authors":"Qilin Bai, Naijie Gu, Junjie Su, Kuai Yu","doi":"10.1109/ICCT.2018.8600093","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8600093","url":null,"abstract":"The Kasumi algorithm is widely applied to mobile communication systems, for example it is a mobile standard block encryption algorithm for the third Generation Partnership Project. The efficiency of the encryption algorithm is crucial to mobile communication systems. So there are many accelerating methods for the Kasumi algorithm, but most of them are based on specific hardware. In this paper, we propose a general method with the characteristics of wide range, high flexibility and low cost for accelerating the Kasumi algorithm on Intel general-purpose processors. The proposed method consists of two parts: the general multi-packet parallel methods for different instruction sets and the FI function accelerating methods suitable for different cache sizes. Moreover, the experiments based on four kinds of Intel processors show that our method exhibits 6.15 times faster than the original protocol implementation.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128980807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reference Buffer with High-Efficiency for High-Speed and High-Precision Switched-Capacitor ADCs 一种用于高速高精度开关电容adc的高效率参考缓冲器
2018 IEEE 18th International Conference on Communication Technology (ICCT) Pub Date : 2018-10-01 DOI: 10.1109/ICCT.2018.8599906
Ni Yabo, Li Ting, Zhang Yong, Huang Zhengbo, Li Liang, Fu Dongbing
{"title":"A Reference Buffer with High-Efficiency for High-Speed and High-Precision Switched-Capacitor ADCs","authors":"Ni Yabo, Li Ting, Zhang Yong, Huang Zhengbo, Li Liang, Fu Dongbing","doi":"10.1109/ICCT.2018.8599906","DOIUrl":"https://doi.org/10.1109/ICCT.2018.8599906","url":null,"abstract":"A fully integrated reference buffer with high-efficiency for high-speed and high-precision Switched-capacitor ADCs is presented. To reduce hardware and power comsumption, the slow feedback loop and reference generation circuit are combined. And an improved stacked source follower is used to provide low output impedence with low power. The efficient reference buffer is applied to a 12-bit 1Gsps pipeline ADC with amplification phase less than 350ps. The power dissipation of the proposed reference buffer is 56.25mW with 2.5V supply voltage.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信