2021 13th International Conference on Communication Software and Networks (ICCSN)最新文献

筛选
英文 中文
Joint Pre-Equalization and Digital Resolution Enhancer in Bandwidth-Limited and Low-Resolution Optical Transmission Systems 带宽受限和低分辨率光传输系统中的联合预均衡和数字分辨率增强器
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463626
Mengqi Guo, L. Quan
{"title":"Joint Pre-Equalization and Digital Resolution Enhancer in Bandwidth-Limited and Low-Resolution Optical Transmission Systems","authors":"Mengqi Guo, L. Quan","doi":"10.1109/ICCSN52437.2021.9463626","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463626","url":null,"abstract":"With the exponentially increasing demand on data traffic, transmission capacity of the optical communications grows continuously. The increase of transmission capacity inevitably encounters bandwidth limitation impairments due to the insufficient bandwidth of the devices. Pre-equalization is commonly used to compensate the bandwidth limitation impairments, but the increased peak-to-average power ratio caused by pre-equalization has more stringent demand on the resolution of digital-to-analog converter (DAC). In this paper, a joint pre-equalization and digital resolution enhancer (DRE) algorithm is proposed in a bandwidth-limited and low-resolution optical transmission system. For 100-Gbaud dual-polarization 16QAM transmission, the joint pre-equalization and DRE algorithm allows the DAC with 40-GHz 3-dB bandwidth and 4-bits physical number of bits. Simulation results reveal that after jointly optimizing the pre-equalization and DRE, approximately 2-dB optical signal-to-noise ratio improvement is obtained at the 7% forward error correction limit. The effective range of pre-equalization strength in joint pre-equalization and DRE can achieve more than four times of that in pre-equalization only, which shows the proposed algorithm has the superiority in robustness.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116918601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Evaluation Method Based on Environmental Assessment in the Perception Layer of Internet of Vehicles 基于感知层环境评价的车联网信任评价方法
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463647
Haifeng Li, Qingqing Shan, Jiajun Zhan, Denghui Wang
{"title":"A Trust Evaluation Method Based on Environmental Assessment in the Perception Layer of Internet of Vehicles","authors":"Haifeng Li, Qingqing Shan, Jiajun Zhan, Denghui Wang","doi":"10.1109/ICCSN52437.2021.9463647","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463647","url":null,"abstract":"With the rapid development of Internet of things and intelligent transportation technology, the Internet of vehicles has become an important part of intelligent urban traffic. Similar to other heterogeneous wireless networks, there are many cross-network access and cross-network mobility interactions between nodes in urban vehicle network, which makes the trust relationship between nodes full of uncertainty. It is an important research content of trust management to evaluate the reliability of vehicle networking nodes objectively and effectively. This paper mainly studies trust evaluation in heterogeneous wireless networks. We proposed a trust evaluation model considering trust factors around nodes. According to the simulation analysis, compared with the existing trust evaluation model, this model can effectively improve the security of the whole network while ensuring the data transmission rate.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavior-Based Method for Real-Time Identification of Encrypted Proxy Traffic 基于行为的加密代理流量实时识别方法
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463594
Ping Luo, Fei Wang, Shuhui Chen, Zhenxing Li
{"title":"Behavior-Based Method for Real-Time Identification of Encrypted Proxy Traffic","authors":"Ping Luo, Fei Wang, Shuhui Chen, Zhenxing Li","doi":"10.1109/ICCSN52437.2021.9463594","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463594","url":null,"abstract":"Encrypted proxy is often used to hide malicious behavior or criminal activity on the Internet. Therefore, identifying encrypted proxy traffic is essential for network management and communication security. Existing researches usually use statistical features to profile network flows, which only have limited effects on encrypted proxy traffic, and are not suitable for real-time identification. In this paper, a novel behavior-based approach for encrypted proxy traffic detection is proposed. Two unique behavior features, IP proxy and data encryption behaviors, which are highly related to the activity of accessing network through encrypted proxies, are defined as learning features. Machine learning techniques are adopted for encrypted proxy traffic identification. The experiments on a real V2Ray traffic dataset demonstrate that the behavior-based method can identify encrypted proxy traffic with high accuracy, up to 99.86%. Besides, the method can timely seek out target flows, as all those behavior features can be obtained in the first packet.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Channel Estimation Method for Discrete Spectrum Modulated NFDM Systems 离散频谱调制NFDM系统的信道估计方法
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463650
Qian Liao, Xi Fang, Yingrong Chen, Lei Zhang
{"title":"Channel Estimation Method for Discrete Spectrum Modulated NFDM Systems","authors":"Qian Liao, Xi Fang, Yingrong Chen, Lei Zhang","doi":"10.1109/ICCSN52437.2021.9463650","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463650","url":null,"abstract":"In this paper, we systematically discussed channel estimation method for nonlinear frequency division multiplexing system with discrete spectrum modulation. It is shown in the simulation results that the proposed method improved the system performance, whether in a single eigenvalue or multiple eigenvalues transmission.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Implementation of Two-Axis Antenna Shafting Error Calibration Based on Calibration Satellite 基于标定卫星的两轴天线轴系误差标定研究与实现
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463617
Long Lan, Kai Guo, Ying Shen, Huiying Yang
{"title":"Research and Implementation of Two-Axis Antenna Shafting Error Calibration Based on Calibration Satellite","authors":"Long Lan, Kai Guo, Ying Shen, Huiying Yang","doi":"10.1109/ICCSN52437.2021.9463617","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463617","url":null,"abstract":"The measurement error of the measurement system includes two parts: random error and system error. Random error can be suppressed by smoothing filtering, while system error needs to be corrected. The calibration method is mainly used to correct the system error of the measuring equipment. Currently, there are three calibration methods, which are traditional calibration, star calibration and satellite calibration. In this paper, we plan to use calibration satellite system, the satellite precise ephemeris is used as the spatial position reference. At the same time, we preprocess the external measurement data of the system and correct the atomospheric refaction error and other errors, then obtain the measurement error of the system itself. Finally, the least square method is used to solve the error component of the measurement system.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Method on Fetal Electrocardiogram Extraction Utilizing LightGBM Combined with EKF 光导结合EKF提取胎儿心电图的方法
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463623
Liang Han, Wentao Cai, Xiu-Juan Pu, Haipeng Guo, Long Zhang, Yaling Tang
{"title":"Method on Fetal Electrocardiogram Extraction Utilizing LightGBM Combined with EKF","authors":"Liang Han, Wentao Cai, Xiu-Juan Pu, Haipeng Guo, Long Zhang, Yaling Tang","doi":"10.1109/ICCSN52437.2021.9463623","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463623","url":null,"abstract":"A novel method on fetal electrocardiogram (FECG) extraction utilizing LightGBM combined with Extended Kalman Filter (EKF) was proposed. Firstly, the nonlinear transform between maternal electrocardiogram (MECG) and MECG component in the abdominal signal was estimated using LightGBM. Then the optimal estimation of MECG component was obtained by MECG undergoing the estimated nonlinear transform. And noisy FECG was extracted by suppressing the estimated MECG component. At last, the FECG denoising was performed by use of EKF. The clinical data are adopted to validate the proposed FECG extraction method. The experimental results show that the proposed FECG extraction method is better than other conventional methods both on visual results and objective assessment.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126434040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link Quality Estimation Base on CatBoost 基于CatBoost的链路质量估计
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463662
Tingzhong Xiao, Linlan Liu, Jian Shu
{"title":"Link Quality Estimation Base on CatBoost","authors":"Tingzhong Xiao, Linlan Liu, Jian Shu","doi":"10.1109/ICCSN52437.2021.9463662","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463662","url":null,"abstract":"To estimate link quality for wireless sensor networks (WSN) accurately and rapidly, an approach of link quality estimation is proposed, which is based on Category Boosting (CatBoost). Received signal strength indicator mean, link quality indicator mean and the signal to noise ratio mean are selected as the link quality parameters. The K-means++ algorithm optimized by elbow method is used to divide the link quality level as the estimation index. The link quality estimation model is constructed based on CatBoost, and the parameters of the model are optimized by grid search method. Experiments in three scenarios of laboratory, corridor and parking show that the proposed method has higher estimation accuracy than F-LQE, SVM, LFI-LQE and RF, and can effectively estimate the link quality of WSN.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Nodes Evaluation in Social Networks Based on Multi-indicators 基于多指标的社会网络关键节点评价
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463635
Wanli Ma, Jian Shu, Linlan Liu
{"title":"Key Nodes Evaluation in Social Networks Based on Multi-indicators","authors":"Wanli Ma, Jian Shu, Linlan Liu","doi":"10.1109/ICCSN52437.2021.9463635","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463635","url":null,"abstract":"In order to accurately identify key nodes in social networks, this paper proposes a multi-indicators-based evaluation method for key nodes in social networks. The method uses degree centrality, LeaderRank, and betweenness centrality to construct multi-attribute decision-making matrix. Multi-attribute decision-making method VIKOR is used to calculate the importance of nodes in social networks, and the key nodes can be obtained from the ranking result of importance. The experimental results on two real network datasets show that this method can effectively and comprehensively evaluate the key nodes in social networks, and has a better evaluation effect in the classical SIR model.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radio Frequency Fingerprint Recognition Method Based on Generative Adversarial Net 基于生成对抗网络的射频指纹识别方法
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463629
Yixuan Yang, Tianfeng Yan
{"title":"Radio Frequency Fingerprint Recognition Method Based on Generative Adversarial Net","authors":"Yixuan Yang, Tianfeng Yan","doi":"10.1109/ICCSN52437.2021.9463629","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463629","url":null,"abstract":"RF fingerprint recognition is an emerging technology for identifying specific hardware features of wireless transmitters. In order to solve the problem of illegal transmitter hazardous wireless communication security, this paper proposes a method of generating RF fingerprint recognition methods based on generative adversarial net (GAN).This article first uses I / Q data through wavelet transform data pre-processing , Since the wavelet transform can describe the features of different frequency signals, the characteristics of radio frequency fingerprint can be highlighted after wavelet transform of I / Q data. Then we have designed a generative adversarial net model, which consists of a generate model and a discriminant model. Generate model input noise to generate a pseudo data distribution, The discriminant model enters the data distribution of the real trusted transmitter and the generated dummy data distribution generated, and the determination result is fed back to the generator, allowing the generator to update to generate more real pseudo data distributions, better The network model is used for radio frequency fingerprint recognition. Based on the above, it is possible to effectively identify rogue radio frequency transmitters to some extent to solve wireless security issues. The experimental results show that the generative adversarial net (GAN) can distinguish between 98.1% accuracy of the credibility transmitter and illegal transmitter, it has higher accuracy than traditional convolutional neural networks (CNN) and full connectivity neural network (DNN).","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117107890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fountain Coding with Weighted Non-uniform Selection for Reliable FSO Communication 基于加权非均匀选择的喷泉编码可靠FSO通信
2021 13th International Conference on Communication Software and Networks (ICCSN) Pub Date : 2021-06-04 DOI: 10.1109/ICCSN52437.2021.9463644
Shuyu Xiao, Yejun Liu, Song Song, Lei Guo, Yufang Zhou
{"title":"Fountain Coding with Weighted Non-uniform Selection for Reliable FSO Communication","authors":"Shuyu Xiao, Yejun Liu, Song Song, Lei Guo, Yufang Zhou","doi":"10.1109/ICCSN52437.2021.9463644","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463644","url":null,"abstract":"Free space optical (FSO) communication combines the advantages of optical fiber communication and wireless communication, and is anticipated with a great application prospect. However, the reliability of FSO link is sensitive to the atmospheric condition that imposes a critical challenge on its practice. Channel coding is a promising solution to improve the reliability of FSO link. However, most of the existing coding methods require the continuous knowledge of channel status information (CSI) that is not always perfectly available in FSO system. In this paper, we propose a new fountain coding scheme that does not require continuous CSI feedback for FSO system. Unlike the traditional fountain coding, the proposed scheme selects source packets non-uniformly without feedback information, which helps reduce the coding overhead and achieve a high packet recovery rate. We prototyping a FSO link and emulating an atmospheric channel by using an advanced chamber. The datasets of channel fading and Bit Error Rate (BER) are obtained under various fog conditions. On basis of the datasets, it is demonstrated that the proposed fountain coding scheme outperforms the benchmarks in multiple metrics. We also show the impact of packet size and the number of source packets on the proposed scheme in BER performance.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129268420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信