2020 IEEE 6th International Conference on Computer and Communications (ICCC)最新文献

筛选
英文 中文
Improved Strategies of LEACH-based Low Energy Consumption and High Reliable Multi-hop Routing Algorithm for Wireless Sensor Network 基于leach的无线传感器网络低能耗高可靠多跳路由算法改进策略
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345136
Lubin Guo, Jiayan Liu, Peng Qin, Xiongwen Zhao, Huiyuan Ma, Zhongjun Chi
{"title":"Improved Strategies of LEACH-based Low Energy Consumption and High Reliable Multi-hop Routing Algorithm for Wireless Sensor Network","authors":"Lubin Guo, Jiayan Liu, Peng Qin, Xiongwen Zhao, Huiyuan Ma, Zhongjun Chi","doi":"10.1109/ICCC51575.2020.9345136","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345136","url":null,"abstract":"LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the pioneer clustering routing algorithm, the idea of clustering proposed by which provides a good reference for the design of routing algorithm for wireless sensor network. In LEACH algorithm, the selection of cluster head ignores the consideration of node energy, which may lead to the death of cluster head and this will case the failure of data transmitted to sink. Besides, cluster head direct communication with the base station limits the expansion of the network scale. In response to these shortcomings, three strategies to improve the performance of LEACH-based algorithm are discussed in this paper, based on which we propose a low energy consumption high reliable multi-hop routing algorithm LEACH-MB. By improving the selection of cluster heads, introducing a mechanism of backup cluster head and adopting the approach of cluster head multi-hop, the performance of this new algorithm has been significantly improved compared to LEACH. Through the simulation analysis of the algorithm, we can find that this algorithm can prolong the network lifetime and improve the reliability of data transmission, and get a result of throughput increase.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trust Management of Mobile Users P2P Nodes Based on Blockchain 基于区块链的移动用户P2P节点信任管理
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345097
Xiang Wu, Hao Wu
{"title":"Trust Management of Mobile Users P2P Nodes Based on Blockchain","authors":"Xiang Wu, Hao Wu","doi":"10.1109/ICCC51575.2020.9345097","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345097","url":null,"abstract":"Mobile users need to consider the credibility of nodes to ensure their privacy when building a P2P network. Therefore, how to perform node trust management is an urgent problem to be solved. This paper proposes a trust management method that combines incentive mechanisms and punishment measures, introduces time-sensitive functions, integrates hash chains, and builds a mobile user trust evaluation model.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132723089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Self-Organizing Neural Network Based UAV Path Planning 基于竞争自组织神经网络的无人机路径规划
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344904
Mingsheng Gao, Pengfei Wei, Yuxiang Liu
{"title":"Competitive Self-Organizing Neural Network Based UAV Path Planning","authors":"Mingsheng Gao, Pengfei Wei, Yuxiang Liu","doi":"10.1109/ICCC51575.2020.9344904","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344904","url":null,"abstract":"Path planning is the fundamental aspect of applications for autonomous Unmanned Aerial Vehicles (UAVs) system. It allows UAV to find an optimal path relevant to some specific missions within limited time, especially in large sized scenarios. In this paper, a novel competitive self-organizing neural network algorithm is proposed to improve the search ability and speed up the convergence of traditional algorithms. More specifically, in the initialization phase, a new opposition-based learning is adopted to generate better neurons. Next, a secondary competitive layer is added above the hidden layer, thus enhancing accuracy of the algorithm. Simulations validate the proposed algorithm outperforms some intelligence algorithms in terms of optimization ability.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133202294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
VABD: Visual Analysis of Spatio-temporal Trajectory Based on Urban Bus Data 基于城市公交数据的时空轨迹可视化分析
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345182
Liang Liu, Song Wang, Ting Cai, Weixin Zhao
{"title":"VABD: Visual Analysis of Spatio-temporal Trajectory Based on Urban Bus Data","authors":"Liang Liu, Song Wang, Ting Cai, Weixin Zhao","doi":"10.1109/ICCC51575.2020.9345182","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345182","url":null,"abstract":"Spatio-temporal trajectory data cover a wide area, have high real-time performance, which can not only reflect the timing change of road traffic but also reflect the travel rules of residents. However, due to the lack of effective methods, it is difficult for analysts to conduct in-depth analysis and extract valuable information. To help users to understand the situation of urban traffic congestion, explore the social behavior pattern, this paper proposed and implemented a novel interactive visual analysis system, Visual Analyzer for Bus Data (VABD). Visual analysis of spatio-temporal trajectory data is introduced into “intelligent transportation” to provide new ideas and data support for solving urban congestion problems. A case study based on urban bus data of Mianyang proves the effectiveness of the system.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Data Trading Model Based on Blockchain 基于区块链的分布式数据交易模型
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345212
Jingang Yu, Peipei Zhao, Shu Li, Haiting Wang
{"title":"Distributed Data Trading Model Based on Blockchain","authors":"Jingang Yu, Peipei Zhao, Shu Li, Haiting Wang","doi":"10.1109/ICCC51575.2020.9345212","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345212","url":null,"abstract":"The current flow and trading of data has been a trend, but the current enthusiasm for data trading is not high. Due to the particularity of data and the current trading pattern of data, the ability of data trading platform to retain trading data has become a potential threat to both sides of the transaction and an obstacle to data trading. Due to the sensitivity of data, how to protect the privacy security of both sides of the transaction is also an important factor hindering the current data transaction. In response to the existing problems, this paper proposes a feasibility plan for data security transactions based on blockchain and in an untrusted environment, and designs a new decentralized transaction platform that will help transform data through online transactions. At the same time, it is technically guaranteed that the platform does not have the possibility of viewing, copying and detaining data, thereby ensuring the secure transaction of data and the privacy of both parties to the transaction.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Design and Performance Test for Phased Array Radar Communication 相控阵雷达通信系统设计与性能测试
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345113
Wenge Xing, Yuan Yao, Guang-xin Wu, Xinxin Liu, Jun Zhu
{"title":"System Design and Performance Test for Phased Array Radar Communication","authors":"Wenge Xing, Yuan Yao, Guang-xin Wu, Xinxin Liu, Jun Zhu","doi":"10.1109/ICCC51575.2020.9345113","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345113","url":null,"abstract":"Radar communication integration seems promising to meet multiple mission requirements, reduce the number of antennas, and improve the utilization of spectrum resources. However, proper system design is required to obtain these advantages. In this paper, we propose a radar communication framework which allows radar and communication to share aperture, beamforming, spectrum, and resource scheduling. Moreover, a burst communication waveform is proposed to overcome the impact of saturated power amplifiers and improve performance. Moreover, we develop a radar communication test system. Test results validate the feasibility and effect of our proposed radar communication framework. Besides, in the test radar communication integration system, over-the-horizon scattering communications have been realized.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block Halftoning for Size-Invariant Visual Cryptography Based on Two-Dimensional Lattices 基于二维格的大小不变视觉密码的块半调
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344985
Jincheng Zhou, Sian-Jheng Lin
{"title":"Block Halftoning for Size-Invariant Visual Cryptography Based on Two-Dimensional Lattices","authors":"Jincheng Zhou, Sian-Jheng Lin","doi":"10.1109/ICCC51575.2020.9344985","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344985","url":null,"abstract":"Visual cryptography (VC) encodes a secret image into multiple transparencies. The secret image can be revealed by stacking a subset of these transparencies. However, the pixel expansion problem is a critical issue for VCs as a pixel in the secret image is encoded into multiple pixels. To solve this problem, many size-invariant VCs have been proposed. But there are some drawbacks in the existing size-invariant VCs. i) The input image is a binary image rather than a grayscale image. ii) Some schemes are not a ($k, n$) - VC. iii) The quality of recovered image is poor. Based on two-dimensional lattices, a block halftone technology for a size-invariant VC is proposed. In particular, the proposed block error diffusion takes a grayscale image as the input. It is adaptable to any pixel expansion. The experiments show that the proposed halftone technique has a better visual quality for the stacking results than prior common schemes, such as probabilistic schemes.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hierarchical Blockchain Framework for Fog Computing-supported IoT Networks 雾计算支持物联网网络的分层区块链框架
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345159
Yong Zhang, Yong Xiao, Yuna Jiang, Xiaohu Ge
{"title":"A Hierarchical Blockchain Framework for Fog Computing-supported IoT Networks","authors":"Yong Zhang, Yong Xiao, Yuna Jiang, Xiaohu Ge","doi":"10.1109/ICCC51575.2020.9345159","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345159","url":null,"abstract":"Blockchain has been recently extended into Internet-of-Things (IoT) networks to further improve security and reliability of data communication. Modern IoT networks need to support a wide range of services with various requirements in terms of data delivering security, reliability, and timeliness. In this paper, a fog computing-supported hierarchical blockchain network framework is proposed. In the first layer, the Inter-Planetary File System is used to store the message uploaded by IoT devices. In the second layer, a set of subchains that are referred as channels are designed. Fog nodes subscribed to the same channel maintain the corresponding distributed ledger, and each channel support a specific IoT service. The security, latency, and communication cost of the proposed framework are derived. Besides, tradeoffs among the above three performance metrics are analyzed. Finally, a real deployment scenario based on the actual base station locations in Dublin is considered to evaluate the proposed framework. Numerical results show that it is impossible to optimize all the performance metrics at the same time. By carefully selecting the parameters of different “channels”, the proposed framework can support highly diversified services without sacrificing security.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Label Prediction of Mammography Based on CC and MLO Views 基于CC和MLO视图的乳腺造影语义标签预测
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345195
Xiaomeng Wang, Jiyun Li, Chen Qian
{"title":"Semantic Label Prediction of Mammography Based on CC and MLO Views","authors":"Xiaomeng Wang, Jiyun Li, Chen Qian","doi":"10.1109/ICCC51575.2020.9345195","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345195","url":null,"abstract":"Mammography image usually contains two views in different orientations-CC and MLO. In current computer-aided mammography label prediction systems, most models either assess information from only a single view which increases the false-positive rate or comprehensively evaluate information from four views of two breasts without distinguishing between the two breasts. In this paper, we propose a semantic label prediction model of mammography based on co-consideration of CC and MLO views. Firstly, a DCN is used to classify and enhance dense images. Secondly, a MLLN is designed to generate semantic labels of mammography by fusing the features of CC view and MLO view. The experiment shows that our model improves the prediction mAP of 7.3% compared to the single view model and 23.3% compared to the four-view model, respectively.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Neighbor Discovery Algorithm with Collision Avoidance in Ad Hoc Network using Directional Antenna 基于定向天线的Ad Hoc网络中具有避免碰撞的邻居发现算法
2020 IEEE 6th International Conference on Computer and Communications (ICCC) Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344952
Yunliang Liao, Laixian Peng, Renhui Xu, Aijing Li, Lin Ge
{"title":"Neighbor Discovery Algorithm with Collision Avoidance in Ad Hoc Network using Directional Antenna","authors":"Yunliang Liao, Laixian Peng, Renhui Xu, Aijing Li, Lin Ge","doi":"10.1109/ICCC51575.2020.9344952","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344952","url":null,"abstract":"At present, most neighbor discovery algorithm mainly uses the 1-way handshake mechanism, which may lead to isolated nodes in the network. In order to solve this problem, an algorithm TSBA is proposed in this article, which uses the 2-way handshake mechanism to make the transmitting and receiving nodes cooperate to ensure the normal operation of subsequent communications. However, while solving the isolated nodes, the algorithm TSBA also caused the conflict and interference among nodes. For this reason, a selective feedback mechanism is added on the basis of the algorithm TSBA, and the algorithm TSBA-PI is pro-posed to reduce the probability of conflict and interference among nodes. By using OPNET 14.5 network simulation software, the performance of the algorithms TSBA, TSBA-PI and the 1-way handshake mechanism algorithm SBA-D (Deterministic Scan based Algorithm) is compared. The results show that the time slots consumed by the nodes in the 2-way handshake mechanism are significantly less than the 1-way handshake. In addition, nodes can quickly complete the neighbor discovery process when using the selective feed-back mechanism.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115698629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信