2019 IEEE 19th International Conference on Communication Technology (ICCT)最新文献

筛选
英文 中文
An Approach for Improving the Performance of Generalized Inverse Beamforming 一种提高广义逆波束形成性能的方法
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947105
Dehu Zhang, Tailiang Ju
{"title":"An Approach for Improving the Performance of Generalized Inverse Beamforming","authors":"Dehu Zhang, Tailiang Ju","doi":"10.1109/ICCT46805.2019.8947105","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947105","url":null,"abstract":"The generalized inverse beamforming algorithm only considers the currently selected target points to calculate the distribution of source amplitude during this iteration, but does not consider the result of the previous iteration. An improved generalized inverse beamforming algorithm has been introduced, which can improve the performance of generalized inverse beamforming algorithm. This is verified experimentally. It is proved to be a good method to improve generalized inverse beamforming algorithm.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Resource Allocation Algorithm in Relay-Enhanced D2D Communication Networks 中继增强D2D通信网络中的联合资源分配算法
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947286
Yingnan Cheng, Longyu Zhou, Xiaoyan Huang, Fan Wu, S. Leng
{"title":"Joint Resource Allocation Algorithm in Relay-Enhanced D2D Communication Networks","authors":"Yingnan Cheng, Longyu Zhou, Xiaoyan Huang, Fan Wu, S. Leng","doi":"10.1109/ICCT46805.2019.8947286","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947286","url":null,"abstract":"High expectation is given to the device-to-device (D2D) communication to improve the system capacity in cellular networks. But, the interference among specturm-sharing links is a major obstacle to fulfill the potential of D2D communication. To the end, we focus on joint optimization of mode selection, channel allocation, and power control in a direct and relay D2D communication coexisted scenario. The paper proposed a novel resource allocation scheme aiming at minimizing overall energy consumption, subject to the quality-of-service (QoS) requirements of cellular users (CUs) and D2D links. In order to solve the formulated non-convex combinatorial optimization problem, a three-stage scheme is proposed. Specifically, the joint mode selection and relay selection (JMSRS) algorithm is proposed to select communication modes for D2D links firstly. Then, the relay enhanced channel assignment (RCA) algorithm is used to determine the set of reused channels of each D2D link. Finally, the relay-enhanced power control (RPC) is devised to coordinate the transmit power of the BS, relays, and D2D transmitters to alleviate the interference. The simulation results demonstrate that the proposed scheme can significantly improve the system performance in terms of data rate and energy consumption, while guaranteeing diverse QoS requirements of the CUs and D2D links.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126622599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HBC-UWB Channel Modeling for In-body to On-body Communication Link 体对体通信链路的HBC-UWB信道建模
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947164
Fuye Han, Hailian Liu, Boyu Li, Jingjing Shi, Jianqing Wang
{"title":"HBC-UWB Channel Modeling for In-body to On-body Communication Link","authors":"Fuye Han, Hailian Liu, Boyu Li, Jingjing Shi, Jianqing Wang","doi":"10.1109/ICCT46805.2019.8947164","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947164","url":null,"abstract":"Human Body Communication (HBC) uses the human body as a transmission medium, providing a new means for data transfer for body area networks (BANs). On the other hand, to improve low-profile high data rates communication performance for in-body to on-body (IB2OB) links, Ultra-Wideband (UWB) technology is a preferable candidate. Hence, in this work, channel characteristics based on HBC-UWB signals (10-50 MHz) for typical in-body to on-body links, such as heart, brain, arm, small intestine to sensor nodes attached on the body surface, are investigated to derive a comprehensive a path-loss model using an anatomical human model. The results show that a linear regulation term related to surface wave propagation should be added to construct a more accurate IB2OB path-loss model. The shadow fading is normally distributed around the derived mean path-loss. Moreover, the key parameters for channel characterization are summarized to provide useful insight for developing HBC-UWB implant communication system.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles 基于区块链的车联网交通状况与驾驶行为预警方案
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947312
He Bai, Cangshuai Wu, Yuexiang Yang, Geming Xia, Yue Jiang
{"title":"A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles","authors":"He Bai, Cangshuai Wu, Yuexiang Yang, Geming Xia, Yue Jiang","doi":"10.1109/ICCT46805.2019.8947312","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947312","url":null,"abstract":"With the economic development, the number of cars is increasing, and the traffic accidents and congestion problems that follow will not be underestimated. The concept of the Internet of Vehicles is becoming popular, and demand for intelligent traffic is growing. In this paper, the warning scheme we proposed aims to solve the traffic problems. Using intelligent terminals, it is faster and more convenient to obtain driving behaviors and road condition information. The application of blockchain technology can spread information to other vehicles for sharing without third-party certification. Group signature-based authentication protocol guarantees privacy and security while ensuring identity traceability. In experiments and simulations, the recognition accuracy of driving behavior can reach up to 94.90%. The use of blockchain provides secure, distributed, and autonomous features for the solution. Compared with the traditional signature method, the group signature-based authentication time varies less with the increase of the number of vehicles, and the communication time is more stable.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125835600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EDGE AI for Heterogeneous and Massive IoT Networks 面向异构和大规模物联网网络的EDGE AI
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947193
Sifan Chen, Peng Gong, Bin Wang, A. Anpalagan, M. Guizani, Chungang Yang
{"title":"EDGE AI for Heterogeneous and Massive IoT Networks","authors":"Sifan Chen, Peng Gong, Bin Wang, A. Anpalagan, M. Guizani, Chungang Yang","doi":"10.1109/ICCT46805.2019.8947193","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947193","url":null,"abstract":"By combining multiple sensing and wireless access technologies, the Internet of Things (IoT) shall exhibit features with large-scale, massive, and heterogeneous sensors and data. To integrate diverse radio access technologies, we present the architecture of heterogeneous IoT system for smart industrial parks and build an IoT experimental platform. Various sensors are installed on the IoT devices deployed on the experimental platform. To efficiently process the raw sensor data and realize edge artificial intelligence (AI), we describe four statistical features of the raw sensor data that can be effectively extracted and processed at the network edge in real time. The statistical features are calculated and fed into a back-propagation neural network (BPNN) for sensor data classification. By comparing to the k-nearest neighbor classification algorithm, we examine the BPNN-based classification method with a great amount of raw data gathered from various sensors. We evaluate the system performance according to the classification accuracy of BPNN and the performance indicators of the cloud server, which shows that the proposed approach can effectively enable the edge-AI-based heterogeneous IoT system to process the sensor data at the network edge in real time while reducing the demand for computing and network resources of the cloud.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Joint Encryption and Channel Coding Scheme Based on Balancing Indices and Polar Codes 基于平衡索引和极坐标码的联合加密信道编码方案
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947156
Xu Han, Deyuan Chen, Can Zhang, Shaoshuai Gao
{"title":"Joint Encryption and Channel Coding Scheme Based on Balancing Indices and Polar Codes","authors":"Xu Han, Deyuan Chen, Can Zhang, Shaoshuai Gao","doi":"10.1109/ICCT46805.2019.8947156","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947156","url":null,"abstract":"A joint encryption and channel coding scheme is proposed in this paper. The proposed scheme takes advantage of the structure of balanced codes to reduce the encryption cost. We easily encrypt each codeword of polar codes to a stream cipher with its balancing index as the secret key and encrypt the balancing indices with a novel private-key cryptosystem which is based on the special structure of polar codes. Our private-key cryptosystem has the same timing complexity as polar codes with a shorter key size than the existing cryptosystems, as well as is quite secure against brute force attack and some well-known chosen-plaintext attacks. The proposed joint scheme makes the encryption easily and can efficiently reduce the error diffusion than the traditional schemes in which encryption and channel coding are handled separately. Compared with the original polar codes, it will only have a negligible loss in the code rate while remaining the same error-correcting ability, which is suitable for processing large volumes of data.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis on the Performance of Spectrum Prediction in HF Communications 高频通信中频谱预测性能分析
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947191
X. Yang, Yubai Li
{"title":"Analysis on the Performance of Spectrum Prediction in HF Communications","authors":"X. Yang, Yubai Li","doi":"10.1109/ICCT46805.2019.8947191","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947191","url":null,"abstract":"Automatic Linking Established (ALE) is a very important process in HF communications. An important indicator to measure the performance of ALE is the link establishing time. As a newer technology, spectrum prediction can be applied to optimize channel scheduling thus reducing the link establishing time. In this article, we will discuss to what degree the link establishing time of HF ALE can be reduced by introducing spectrum prediction. Firstly, based on the existing traditional thresholds, a more reasonable GMM-HMM threshold is proposed, which can more accurately classify the idle or occupied spectrum state of channel. Secondly, we use the entropy theory to analyze the spectrum state sequences, proving that the spectrum state of the HF channel is predictable and calculating the upper and lower bounds of spectrum prediction accuracy. In addition, a simple prediction algorithm, linear prediction algorithm, is introduced as a comparison and supplement to the prediction upper and lower bounds. Finally, we discuss the upper and lower bounds of the link establishing time reduced when spectrum prediction algorithms are applied to HF ALE.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-Efficiency Maximization Based Resource Allocation for RF Energy Harvesting Underlay CRN With QoS Guarantee 基于能效最大化的射频能量采集底层CRN资源分配与QoS保障
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947013
Xianglu Li, He Xiao, Jie Tian
{"title":"Energy-Efficiency Maximization Based Resource Allocation for RF Energy Harvesting Underlay CRN With QoS Guarantee","authors":"Xianglu Li, He Xiao, Jie Tian","doi":"10.1109/ICCT46805.2019.8947013","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947013","url":null,"abstract":"How to achieve energy-efficient transmission in energy harvesting cognitive radio network (EH-CRN) is of great importance when nodes in EH-CRN are self-maintained. This paper presents a radio frequency (RF) energy harvesting hardware-based underlay cognitive radio network structure, where a secondary transmitter (ST) first harvests energy from RF signals source originating from the primary network, and then communicates with a secondary receiver (SR) using the harvested energy. The total consumed energy by the SU must be equal to or less than the total harvested energy referred to as energy causality constraint. In addition, the ST possesses some initial energy which may be the residual energy from the former transmission blocks, and we consider the energy loss of energy harvesting circuit as a systematic factor as well. Our goal is to achieve the maximum energy efficiency (EE) of the secondary network by jointly optimizing transmitting time and power. To guarantee the quality of service (QoS) of secondary transceiver, a minimum throughput requirement constraint is imposed on the ST in the process of EE maximization. As the EE maximization is a nonlinear fractional programming problem, a quick iterative algorithm based on Dinkelbach method is proposed to achieve the optimal resource allocation. Simulation results show that the proposed strategy has fast convergence and can improve the system EE greatly while ensuring the QoS.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123737952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Parameter Control Scheme of Core Devices in DV-QKD DV-QKD中核心器件的自适应参数控制方案
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947141
Yuan Xi, Xiaofeng Xue, Xiwen Pan, Zhaoran Zhong, Qiong Li
{"title":"An Adaptive Parameter Control Scheme of Core Devices in DV-QKD","authors":"Yuan Xi, Xiaofeng Xue, Xiwen Pan, Zhaoran Zhong, Qiong Li","doi":"10.1109/ICCT46805.2019.8947141","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947141","url":null,"abstract":"In a discrete-variable quantum key distribution (DV-QKD) system, the optical devices, such as the single photon detector (SPD) and optical fiber, can be affected by the external environment. This will lead to the reduction of the efficiency of QKD system. In order to reduce the impact of the changes of external environment and maintain the system efficient and stable, it is necessary to control the parameters of SPD and phase modulator (PM). In this paper, an adaptive parameter control scheme of core devices in DV-QKD system is proposed to keep the QKD system efficient and stable. The scheme has been implemented and tested in a “Plug&Play” DV-QKD system developed by our research group. The experimental results demonstrate the effectiveness of our scheme. Besides, the scheme can also be modified accordingly to suit for other types of DV-QKD systems.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123742264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Progress of GNSS Spoofing and Spoofing Detection Technology GNSS欺骗与欺骗检测技术研究进展
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947107
Junzhi Li, Wanqing Li, Q. Fu, Beidian Liu
{"title":"Research Progress of GNSS Spoofing and Spoofing Detection Technology","authors":"Junzhi Li, Wanqing Li, Q. Fu, Beidian Liu","doi":"10.1109/ICCT46805.2019.8947107","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947107","url":null,"abstract":"With the highly implement of global satellite navigation system, the security and reliability of GNSS applications have attracted much attention, which raise the research attention of spoofing and spoofing detection technology. Research on GNSS spoofing and spoofing detection technology can improve the ability of navigation receiver to resist spoofing attacks, which is of great significance. In this paper, a brief review is given of the classification and influence of spoofing jamming. We summarize the latest research progress of spoofing detection technology. Finally, this paper points out the existing problems of spoofing detection methods, and discusses the possibility of applying the generated antagonistic network (GAN) to GNSS spoofing and anti- spoofing technology.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信