2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)最新文献

筛选
英文 中文
ICSPCC 2022 Proceedings
{"title":"ICSPCC 2022 Proceedings","authors":"","doi":"10.1109/icspcc55723.2022.9984366","DOIUrl":"https://doi.org/10.1109/icspcc55723.2022.9984366","url":null,"abstract":"","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Power Allocation and Relay Selection Scheme in Multiple Untrusted Relay Networks 多不可信中继网络中的联合功率分配与中继选择方案
W. Su, Rugui Yao, Ye Fan, Yi Xie, Nan Qi, Xiaoya Zuo
{"title":"Joint Power Allocation and Relay Selection Scheme in Multiple Untrusted Relay Networks","authors":"W. Su, Rugui Yao, Ye Fan, Yi Xie, Nan Qi, Xiaoya Zuo","doi":"10.1109/ICSPCC55723.2022.9984259","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984259","url":null,"abstract":"Untrusted relays might decode the information while forwarding it and lead to threaten the security of the system in some realistic scenarios. The aim of the paper is to maximize the secrecy performance, and therefore on the ground of the cooperative jamming, we propose a novel power allocation-relay selection program in a multi-untrusted relay network where numerous antennas are equipped in the source and the destination simultaneously. Besides, we allow an optimal application of the power allocation factor and the proper selection of the relays, which makes the Ergodic Secrecy Rate (ESR) increased directly. Moreover, the closed-form expressions of the ESR in different scenarios to measure the secrecy performance are acquired. It can be known that the simulation results of the ESR are compliant with the theoretical, especially when Signal-to-Noise Ratio (SNR) is low. Apart from this, the ESR in theoretical values are tested to be approximately equal to the simulation. Compared to other relay selection strategies like partial selection strategy and the Max-Min (MM) selection strategy, the scheme proposed here can get the secrecy performance strengthen better.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target Intent Recognition Method Based on Evidence Fusion in TimeSeries Networks 基于时间序列网络证据融合的目标意图识别方法
R. Chen, Haozheng Li, Guanwei Yan, Zheng Wang, Haojie Peng
{"title":"Target Intent Recognition Method Based on Evidence Fusion in TimeSeries Networks","authors":"R. Chen, Haozheng Li, Guanwei Yan, Zheng Wang, Haojie Peng","doi":"10.1109/ICSPCC55723.2022.9984289","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984289","url":null,"abstract":"Target tactical intent identification in beyond-visual-range air combat is investigated by a novel method of target intent recognition based on information fusion, which combines the advantages of Dempster-Shafer evidence theory and deep temporal networks. The first is by constructing a 1DCNN-BiLSTM deep temporal network to extract the target change features in terms of trajectory and situation; the weighting coefficients of the evidence are proposed to be generated using information entropy of both kinds of evidence as the basis of weighted discounting so that the credibility of the proof is improved, and finally a more reasonable intent fusion result is obtained. The method proposed in this paper is applied to the test of the actual antagonistic data, and the result shows that the method has good dynamic performance and classification accuracy.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clusters 3D Real-time Cooperative Positioning Algorithm in Underground Mines 地下矿山集群三维实时协同定位算法
Cunle Zhang, Yi Zhang, Chengkai Tang, Haonan Wang, Jiaming Zhang, Haobo Li
{"title":"Clusters 3D Real-time Cooperative Positioning Algorithm in Underground Mines","authors":"Cunle Zhang, Yi Zhang, Chengkai Tang, Haonan Wang, Jiaming Zhang, Haobo Li","doi":"10.1109/ICSPCC55723.2022.9984540","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984540","url":null,"abstract":"Location service is becoming more and more important in modern large-scale mines, and its primary demand is large scale, high precision and fast speed. This paper proposes a real-time cooperative location method of three- dimensional factor graph to deal with large-scale user location to solve the problem of cluster target location, including mine height assistance strategy, information transmission criterion, factor graph confidence model and three-dimensional factor graph cooperative location algorithm. Simulation results show that the proposed algorithm is superior to other algorithms in positioning scale, accuracy and real-time performance.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survivability opportunistic routing protocol for Secure Underwater Acoustic Sensor Networks 一种安全水声传感器网络的生存性机会路由协议
Yifan Yuan, Xiaohong Shen, Yong Wang, Lin Sun, Shilei Ma
{"title":"A survivability opportunistic routing protocol for Secure Underwater Acoustic Sensor Networks","authors":"Yifan Yuan, Xiaohong Shen, Yong Wang, Lin Sun, Shilei Ma","doi":"10.1109/ICSPCC55723.2022.9984462","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984462","url":null,"abstract":"Survivability helps ensure that underwater acoustic sensor networks (UASN) provide essential services under conditions of attacks, failures, and accidents. In this paper, a survivable opportunistic routing protocol is presented to improve the security of UASN. Firstly, whole network node’s importance is continuously counted by sink node in the process of node information exchange. Then, by dynamic adjusting the node’s hold-time (HT) based on node’s importance at the opportunistic routing candidate set selection stage, we can improve the survivability of the UASN. Give the packet delivery rate (PDR) and end-to-end delay two measures to define the survivability of UASN. By simulating attacks, failures and accidents, the PDR and end-to-end delay results show that the proposed secure opportunistic routing protocol can greatly improve the survivability of the network.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-cooperative underwater acoustic communication signal detection method based on sliding cepstrum 基于倒谱的非合作水声通信信号检测方法
Heng Zhang, Haiyan Wang, Yongsheng Yan, Hongwei Zhang, Chao Wang
{"title":"Non-cooperative underwater acoustic communication signal detection method based on sliding cepstrum","authors":"Heng Zhang, Haiyan Wang, Yongsheng Yan, Hongwei Zhang, Chao Wang","doi":"10.1109/ICSPCC55723.2022.9984310","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984310","url":null,"abstract":"An underwater acoustic channel is a complicated and variable channel with noise. It is challenging to detect non-cooperative underwater acoustic communication signal under the condition of unknown signal parameters and low SNR. Now, cepstrum has been widely used in communication signal detection. However, it still cannot meet the requirement of non-cooperative underwater acoustic communication signal detection under the condition of low SNR. We propose a piecewise sliding cepstrum method based on the traditional cepstrum theory to improve detection performance further. We analyze the distribution characteristics of piecewise sliding cepstrum of noise data. Then we present Neyman-Pearson criterion-based piecewise sliding cepstrum detector for non-cooperative underwater acoustic communication signal detection. The value of piecewise sliding cepstrum is demonstrated by simulation and applied to actual recorded data. The results show that the piecewise sliding cepstrum method outperforms cepstrum considerably.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A three-level QR code sharing scheme based on SLIC and Hamming code 基于SLIC和汉明码的三级QR码共享方案
Wei-Na Wu, Lina Zhang, Jiehui Zhang, Chen-yu Cui, Xiaoyu Zhang, Miao Liu
{"title":"A three-level QR code sharing scheme based on SLIC and Hamming code","authors":"Wei-Na Wu, Lina Zhang, Jiehui Zhang, Chen-yu Cui, Xiaoyu Zhang, Miao Liu","doi":"10.1109/ICSPCC55723.2022.9984448","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984448","url":null,"abstract":"QR code is a typical two-dimensional code tag consisting of square symbols, which is widely used in social life due to the advantages of high readability and large storage capacity. However, its security performance is low, which has caused widespread concern among scholars in various industries. This paper proposes a three-level QR code scheme based on superpixel segmentation in response. Public information can be scanned directly from shares using any standard QR code scanner. Moreover, secret information can only be obtained by the dissimilarity of shares. The reconstructed secret image in this paper retains the main features of the embedded image, and the scheme is resistant to deformation, high load, and robust because it retains the advantages of visual ciphers and QR codes. Experimental results and analysis show this scheme has many advantages over other schemes.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121575357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insulator Defect Detection Based on Feature Fusion and Attention Mechanism 基于特征融合和注意机制的绝缘子缺陷检测
Yue Zhang, Baoguo Wei, Lin Zhao, Jinwei Liu, Zhilang Hao, Lixin Li, Xu Li
{"title":"Insulator Defect Detection Based on Feature Fusion and Attention Mechanism","authors":"Yue Zhang, Baoguo Wei, Lin Zhao, Jinwei Liu, Zhilang Hao, Lixin Li, Xu Li","doi":"10.1109/ICSPCC55723.2022.9984418","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984418","url":null,"abstract":"The performance of insulator defect detection model is not satisfactory due to the small object size, imbalanced and insufficient data. In this paper, based on YOLOv5 model, we propose an insulator defect detection method incorporating feature fusion and attention mechanism. Firstly, multi-scale feature fusion is introduced to strengthen the ability to extract minute features from images. Secondly, an attention mechanism based on SE-C module is proposed to improve the detection of defective objects. In addition, K-means++ is used to customize anchor boxes to meet the actual requirements and avoid mismatches. The experimental results show that the proposed model achieves 92.4% precision on the public insulator dataset, which demonstrates the applicability of the auto-detection system for insulator defects significantly.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Non-homogeneous Sea Clutter with Texture Modulated Doppler Spectra 用纹理调制多普勒谱模拟非均匀海杂波
Jiafei Zhao, Rongkun Jiang, Ran Li
{"title":"Modeling of Non-homogeneous Sea Clutter with Texture Modulated Doppler Spectra","authors":"Jiafei Zhao, Rongkun Jiang, Ran Li","doi":"10.1109/ICSPCC55723.2022.9984330","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984330","url":null,"abstract":"Regarded as the radar scattering from dynamic ocean surfaces, the sea clutter plays a significant role in the development of marine radar. However, modeling the sea clutter becomes a challenging problem due to the complex characterizations of ocean hydrodynamics, especially for the harsh marine environment. To make the models more realistic, a novel simulation method is proposed to generate non-homogeneous sea clutters for high-resolution radars, by taking the radar parameters and sea states into consideration. Based on the proposed method, the simulated sea clutters present range-varying Doppler spectra, which are modulated by spatially correlated gamma texture. Since the simulation results agree well with the theoretical values and actual sea clutter characteristics, the validity and reliability of the proposed approach are verified for practical senarios.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering Quantization Short-Time Energy Feature Extraction Method for MAC Protocol Identification in Non-cooperative UWANs 非合作广域网中MAC协议识别的聚类量化短时能量特征提取方法
Gaoyue Ma, Xiaohong Shen, Hong Wang, Shilei Ma
{"title":"Clustering Quantization Short-Time Energy Feature Extraction Method for MAC Protocol Identification in Non-cooperative UWANs","authors":"Gaoyue Ma, Xiaohong Shen, Hong Wang, Shilei Ma","doi":"10.1109/ICSPCC55723.2022.9984444","DOIUrl":"https://doi.org/10.1109/ICSPCC55723.2022.9984444","url":null,"abstract":"The identification of the MAC protocol in non-cooperative underwater acoustic networks (UWANS) is of great significance in the field of underwater acoustic countermeasures, where feature extraction is one of the most important tasks. By taking into consideration UWANs characteristics such as long propagation delays, multipath effects, and non-Gaussian noise, this research provides a receiving signal model for UWANs. To effectively identify three common types of MAC protocol, including TDMA, ALOHA, and CSMA, we propose a feature extraction method called clustering quantization short-time energy (CQSTE). This method can clearly reflect the change of energy with time, resulting in a feature set more suitable for MAC protocol identification of non-cooperative UWANs. The received signal data set of UWANs is established in this research, from which the CQSTE is extracted and the feature set is produced. To validate our work, random forest (RF) and support vector machine (SVM) are utilized to identify the MAC protocol. The experimental findings demonstrate that the CQSTE and the RF classifier features are more suited for complicated underwater acoustic environments and can obtain good results in MAC protocol identification of non-cooperative UWANs.","PeriodicalId":346917,"journal":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117302983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信