{"title":"Tri-Branch GAN: A Semi-supervised Method Based on Rebalance","authors":"Weiqiang Zhong, Tiankui Zhang, Yapeng Wang, Zeren Chen","doi":"10.1109/ISCIT55906.2022.9931307","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931307","url":null,"abstract":"For deep learning applications in industrial scenarios, few-shot and imbalanced available datasets are very common. Traditional methods usually adopt the idea of hierarchical training, semi-supervised learning and the rebalancing method to train the model respectively, which has certain limitations: Separate trainings does not fully exploit the correlation between the two problems and causes additional computational overhead. Therefore, this paper proposes a semi-supervised learning method based on rebalance, named as Tri-branch GAN (Generative Adversarial Networks). This method makes full use of the correlation between the two problems, avoids the updating coating problem after the model parameter training, and saves the computational cost. Simulation results show that the proposed method can effectively improve the classification accuracy.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of ADS-B Receiving System Based on LEO Satellite Constellation","authors":"Xiaofeng Zhu, Xiongfei Li, Xianfeng Gong","doi":"10.1109/ISCIT55906.2022.9931245","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931245","url":null,"abstract":"Automatic Dependent Surveillance-Broadcast (ADS-B) signal reception based on low-orbit satellite constellation system has gradually become an important technical method of airspace traffic management. In this paper, by establishing the satellite receiving ADS- B system model, the relationship between the system performance and the ADS-B receiver sensitivity and other factors is theoretically analyzed. Theoretical analysis and simulation show that the terminal position update rate of the ADS- B receiving system based on the low-orbit satellite constellation is mainly determined by the receiving performance of the ADS-B receiver, the number of overlapping coverage of the constellation system and the number of terminals within the beam coverage; When the frame performance is better than 1×10-1, increasing the overlap coverage of the constellation system is the most effective way to improve the system capacity.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal of Single Input BSS Method Using QMF for Pulse Wave Extraction","authors":"Seiya Ogawa, Minoru Komatsu, H. Matsumoto","doi":"10.1109/ISCIT55906.2022.9931304","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931304","url":null,"abstract":"Recently, a study of Pulse Wave(PW) extraction methods using blind source separation (BSS) has been progressing. BSS is a method to separate double source signals using only the signals observed by double sensors. In the pulse wave extraction method, various types of noises and PW are used as source signals, and the PW is extracted using BSS from the observed signal that is a mixture of these signals. However, since this method uses double sensors, there are still issues to be solved for practical use, such as adjusting the distance between sensors. In this study, we propose a single-input BSS method for PW extraction to solve this problem. In the proposed method, two series of signals are generated by a single input signal using QMF, and the BSS of these signals is used as the basis of the PW extraction method.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beidou Carrier Phase Difference Reliability Improvement Method Applied to Medium and Large Fixed Wing UAV in Complex Environment","authors":"Qi-yi Ren, Xiang Wan, Jiajia Wu","doi":"10.1109/ISCIT55906.2022.9931231","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931231","url":null,"abstract":"This paper aims at the problem of how to obtain the position information of self-height accuracy in real time when the medium and large UAV is affected by complex electromagnetic environment, high dynamics, large angle, high jitter and other factors in the process of task execution. Based on the Beidou carrier phase difference method, a method of integrity monitoring and a posteriori weight dynamic allocation is proposed to ensure the reliability of positioning results in complex environments. It is verified by simulation analysis and using the actual flight data of a certain UA V. The verification results show that the method introduced in this paper can make the UA V maintain high-precision and stable positioning in only 9 hours of mission.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127738155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Initial Implementation and Utilization of Instruction Dynamic Simulation in MEIMAT","authors":"Tadahiro Ogita, Tomoyuki Morimoto, Shunsuke Onogi, Ryota Kawamata, Ziming Wang, Toshiyuki Tsutsumi","doi":"10.1109/ISCIT55906.2022.9931212","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931212","url":null,"abstract":"We have been developing MEIMAT, meiji micro-processor (MPU) architecture design tools. Our MEIMAT has a feature to implement arbitrary instructions. However, the MEIMAT does not have a function to simulate those instructions. Therefore, we have newly developed a function of simulation to dynamically execute the designed instructions. The result of this dynamic simulation can be measured by the developed module viewers. It is also demonstrated that a higher performance MPU can be designed by our improved MEIMAT.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech Enhancement with Fractional Fourier Transform","authors":"Cun Zhu, Yan Sun, Chun-zhi Pan","doi":"10.1109/ISCIT55906.2022.9931218","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931218","url":null,"abstract":"The Fast Discrete Fourier Transform is commonly analysis method for speech signal processing in frequency domain. It has the problem of adjusting window size for desired resolution. But the Fractional Fourier Transform can have both time domain and frequency domain processing capabilities. This paper performs global processing by combining Fractional Fourier Transform and wavelet multi-scale local elimination on the speech signal and enhancement experiment with RNN neural network. The experimental results show that the speech signal is processed both locally by wavelet and globally by Fractional Fourier Transform. The combination of the two allows the speech signal to take into account both local and global information in the time and frequency domain.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129155843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Han, Jianan Su, Siting Lv, Peng Zhang, Xiaohui Li
{"title":"Task Offloading Strategies for Cloud-Side Cooperation in Compute-Intensive Scenarios Based on Edge Computing","authors":"Wei Han, Jianan Su, Siting Lv, Peng Zhang, Xiaohui Li","doi":"10.1109/ISCIT55906.2022.9931296","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931296","url":null,"abstract":"In computationally intensive scenarios, a large number of the terminal device is accessed locally. In order for the service to complete, the device needs to complete their tasks within the short time period set by the developers. Mobile Edge Computing (MEC) is an emerging technology deployed at the edge network of devices such as terminals and base stations, which can effectively meet the needs of computation-intensive scenarios. In this paper, we study a task offloading strategy based on edge computing to solve computationally intensive scenarios. We propose a collaborative cloud-edge task offloading model based on the framework of Mobile Device (MD), Edge Node (EN), and Cloud Computing (CC). Then we analyze the communication and computational requirements of the model and propose a linear offloading solution idea. We leverage this idea to propose a scheme to minimize the overall delay in the scene. The problem of the model is transformed into a non-convex problem by transforming it into a convex optimization thus solving the optimal offloading decision. Simulation results show that the scheme can effectively solve the delay optimization problem for computationally intensive scenarios.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-level Trusted Clustering Mechanism for IOT","authors":"Yaxin Zhao, Chunzi Chen","doi":"10.1109/ISCIT55906.2022.9931247","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931247","url":null,"abstract":"To solve the problem of data transmission security in the perception layer network, we propose a multi-level trusted clustering mechanism. This mechanism combines multi-level clustering, identity authentication and trusted computing, we also propose a two-way transmission authentication method based on symmetric cryptography. Finally, platform integrity is authenticated. The authentication scheme improves the security of intra-cluster communication and enables the network to form a secured and trusted cluster structure.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phan The Duy, Hien Do Hoang, Nghi Hoang Khoa, Do Thi Thu Hien, V. Pham
{"title":"Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN","authors":"Phan The Duy, Hien Do Hoang, Nghi Hoang Khoa, Do Thi Thu Hien, V. Pham","doi":"10.1109/ISCIT55906.2022.9931208","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931208","url":null,"abstract":"The adoption of deception technology constructed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the network system. Also, some static honeypots are deployed in the network system to attract adversaries for avoiding them accessing the real targets. This leads to a disclosure of the existence of cyber traps in the network that do not fool skillful attackers. Meanwhile, there are many intrusion detection systems (IDS) lack the abnormal traffic sample to obtain the knowledge of cyberattacks. Hence, it is vital to make honeypots more dynamically and give the material for harvesting useful threat intelligence for detector. Taking advantage of Software Defined Networking (SDN), cyber traps can be easily deployed when an intrusion detector triggers or actively laid in advance to mitigate the impact of adversaries into real assets. Instead of building IDS separately or blocking attacks promptly after an alert issued, in this paper, we utilize the strategy of associating Cyber Deception, and Moving Target Defense (MTD) with IDS in SDN, named FoolYE (Fool your enemies) to slow a network intruder down and leverage the behaviors of adversaries on traps for feeding back detector awareness.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning-Based Variable Scaling Beam Training for Massive MIMO mmWave Systems","authors":"Zaoshi Wang, Na Chen, M. Okada","doi":"10.1109/ISCIT55906.2022.9931243","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931243","url":null,"abstract":"Improving the accuracy of beam training while reducing the training overhead and the influence of noise has become an important issue for massive multiple-input multiple-output (MIMO) millimeter-wave (mmWave) communication systems. In this paper, we propose a deep learning-based multi-scale neural network for beam training in massive MIMO mmWave communication system. The model predicts the orientation of narrow beams by learning the characteristics of wide beams, achieving high accuracy and low training overhead. Specifically, our model consists of three modules. In the first module, we deploy a convolutional neural network (CNN) to extract features of the instantaneous received signal of a wide beam. In the second module, we develop multi-scale convolution to extract wide beam features of the different time combination. In the third module, we conduct a long-term short-term memory (LSTM) network to calibrate the orientation of narrow beams based on previous predictions, thereby enhance the model's robustness to noise. Finally, according to the experimental results, our model improves beam training accuracy with low training overhead while reducing the influence of noise.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}