2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)最新文献

筛选
英文 中文
Simulation of 5G Secondary Synchronization Signal Detection 5G二次同步信号检测仿真
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00133
Jing Liang, Jiazhi Hou
{"title":"Simulation of 5G Secondary Synchronization Signal Detection","authors":"Jing Liang, Jiazhi Hou","doi":"10.1109/ICICAS48597.2019.00133","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00133","url":null,"abstract":"In the mobile communication, the cell search is used to implement time synchronization and frequency synchronization between the user and the cell, and acquire the physical cell identification number. A new synchronization signal structure is defined in the 5G communication system to complete the cell search, wherein the secondary synchronization signal is greatly changed, and the cell group ID in the physical cell identifier can be obtained by the effective secondary synchronization signal sequence detection. This paper focuses on the secondary synchronization signal detection process, and proposes to use the gold sequence characteristics of the secondary synchronization signal to simplify the operation process of obtaining the cell group ID in the physical layer cell identifier. The simulation results show that the proposed improved secondary synchronization signal detection algorithm can reduce the complexity of the cell group ID in the physical cell identifier detection while ensuring the correct rate.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114628320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Application Layer Security Communication Protocol Based on Lightweight NTRU Public Key Cryptography 基于轻量级NTRU公钥加密的应用层安全通信协议研究
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00022
wenbin liu, Jie-sheng Zheng, Wuqiang Shen, Yaosong Lu, Ruigang Liang, Jing Li, Yiqi Hu, Donghe Ni
{"title":"Research on Application Layer Security Communication Protocol Based on Lightweight NTRU Public Key Cryptography","authors":"wenbin liu, Jie-sheng Zheng, Wuqiang Shen, Yaosong Lu, Ruigang Liang, Jing Li, Yiqi Hu, Donghe Ni","doi":"10.1109/ICICAS48597.2019.00022","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00022","url":null,"abstract":"The development of mobile Internet technology has made intelligent terminal devices and mobile applications popular, and computing at mobile devices is becoming more and more popular in people's daily lives. However, due to the processing speed and storage capacity limitations of mobile terminal devices, their security has become a major bottleneck in the development of mobile computing. Therefore, security research for mobile platforms is of great significance. The cryptosystem is an important part of realizing the anonymous security of mobile Internet information transmission. In general, the cryptosystem includes a symmetric cryptosystem and a public-key cryptosystem, both of which have advantages and disadvantages. The symmetric cryptosystem algorithm is fast, but the encryption and decryption keys of the two sides of the communication are the same, which hinders the security implementation of the key management security core key negotiation, and cannot be applied with a digital signature. The public key cryptosystem can separate the encryption key from the decryption key, but its operation speed is slow and limited by the mobile hardware platform. The paper proposes communication encryption and signature algorithm for the mobile terminal, which uses the public key cryptography algorithm. Based on ensuring the same security as the traditional public key cryptography algorithm, the computational overhead is reduced, the running speed is increased, and the storage requirement is reduced.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Deep Learning Based Personnel Positioning System for Key Cabin of Ship 基于深度学习的船舶关键舱室人员定位系统
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00108
Chao Ma, Long Chen, Chuping Yang, W. Zhang, Hemin Li
{"title":"A Deep Learning Based Personnel Positioning System for Key Cabin of Ship","authors":"Chao Ma, Long Chen, Chuping Yang, W. Zhang, Hemin Li","doi":"10.1109/ICICAS48597.2019.00108","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00108","url":null,"abstract":"With the development of ship information and intelligence, and the gradual deepening of ship safety management, ship personnel safety and damage disposal personnel positioning and other related research has attracted more and more attention. Deep learning technology is widely applied in various industries and fields through features extraction, multi-stage learning and complete expression. This paper studies the personnel positioning system of the ship's key cabin based on deep learning, aiming to provide auxiliary Suggestions and command decisions for the ship's commander through the application of intelligent technology","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Temperature Control System of Desktop 3D Printer Based on Fuzzy Adaptive 基于模糊自适应的桌面3D打印机温度控制系统研究
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00137
Yu Liang, Mo Fu, Yi Wang
{"title":"Research on Temperature Control System of Desktop 3D Printer Based on Fuzzy Adaptive","authors":"Yu Liang, Mo Fu, Yi Wang","doi":"10.1109/ICICAS48597.2019.00137","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00137","url":null,"abstract":"In the printing process of desktop 3D printer, the printing consumables is to be heated and melted, and the layers of the extrusion layer are stacked. The heating temperature control system has the characteristics of nonlinearity, large inertia and large hysteresis, which it is some disadvantages for making the heating process take more time and inaccurating temperature control. Aiming at the above problems, a fuzzy adaptive desktop 3D printer temperature control strategy is proposed in this paper. The ARM LPC1768 high-performance microcontroller is combined with the fuzzy adaptive feature to implement temperature control fastly and precisly, and the temperature simulation model of the control system is established by Matlab/Simulink. The experimental results show that the fuzzy adaptive PID controller has the advantages of small overshoot, good temperature tracking performance, fast dynamic response and high reliability compared with the conventional PID control method. It is optimal for the temperature control of the desktop 3D printer.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Automatic Decoding of Morse Code Based on Deep Learning 基于深度学习的莫尔斯电码自动译码研究
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00107
Weihao Li, Keren Wang
{"title":"Research on Automatic Decoding of Morse Code Based on Deep Learning","authors":"Weihao Li, Keren Wang","doi":"10.1109/ICICAS48597.2019.00107","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00107","url":null,"abstract":"The current automatic decoding method of the Morse telegram has limited accuracy, and can't adapt to signal distortion and code length deviation of the manual telegram. This paper introduces the deep learning method and constructs an automatic decoding model, which integrates feature extraction, sequence modeling and transcription into an end-to-end training neural network. The time-frequency diagrams of signals are used for training and testing. Experimental results show that the decoding system has strong adaptability to manual deviation and frequency drift, and is robust in a noisy environment.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluate Software Quality by Learning from Historical Data 通过学习历史数据来评估软件质量
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00012
P. Zong, Yichen Wang, Zekun Song, Wenqian Kang
{"title":"Evaluate Software Quality by Learning from Historical Data","authors":"P. Zong, Yichen Wang, Zekun Song, Wenqian Kang","doi":"10.1109/ICICAS48597.2019.00012","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00012","url":null,"abstract":"This paper proposes a method to evaluate software quality by learning from historical data. Quantitative evaluation of software quality is not an easy issue. But historical software can provide us with a lot of software quality information. We present a data acquiring model to guide the data collection from historical software. Then machine learning algorithm that support incremental training is applied to learn the relationship between software quality and software metrics from the data. As a case study, we collected the data of 82 aviation embedded software in an institute, and trained a k-Nearest Neighbors (k-NN) classification model optimized by genetic algorithms for evaluating the software reliability.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122246769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Flexibility of Carrier - Based Aircraft Equipment System Based on Complex Network Theory 基于复杂网络理论的舰载机装备系统柔性研究
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00061
Qianyu Zhang, Wei Zhang, Qingqing Li, Wanfeng Ji
{"title":"Research on the Flexibility of Carrier - Based Aircraft Equipment System Based on Complex Network Theory","authors":"Qianyu Zhang, Wei Zhang, Qingqing Li, Wanfeng Ji","doi":"10.1109/ICICAS48597.2019.00061","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00061","url":null,"abstract":"When a carrier-based aircraft equipment system based on a mission is in operation, a complex network is composed of reconnaissance and warning systems, command and control systems, fire strike systems, information countermeasures systems, combat evaluation system and integrated safeguard systems. From the view of complex network to analyze the carrier aircraft equipment system, the authors can find flexible features in the system in operation. This is of great significance for the analysis of combat effectiveness of the carrier-based aircraft equipment system.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulation for CBRN Hazard Source Item Estimation through Sensor Data Fusion 基于传感器数据融合的CBRN危险源项目估算建模与仿真
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00158
Xuecheng Liu, Jin Gu, Yansong Liang
{"title":"Modeling and Simulation for CBRN Hazard Source Item Estimation through Sensor Data Fusion","authors":"Xuecheng Liu, Jin Gu, Yansong Liang","doi":"10.1109/ICICAS48597.2019.00158","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00158","url":null,"abstract":"The parameter inversion of harmful gas diffusion source term is the inverse problem of harmful gas diffusion hazard assessment, which is of great significance to hazard prediction assessment and emergency response. Based on Bayesian reasoning method, using sensor detection data and forward atmospheric diffusion model, the likelihood function is constructed. Markov chain Monte Carlo (MCMC) sampling is used to establish the source term parameter inversion algorithm, and the simulation platform is established by MATLAB software for simulation analysis. The simulation results show that the inversion results are in good agreement with the initial source parameters, which proves the feasibility of the method.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BlockFedML: Blockchained Federated Machine Learning Systems BlockFedML:区块链联邦机器学习系统
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00162
Shufen Wang
{"title":"BlockFedML: Blockchained Federated Machine Learning Systems","authors":"Shufen Wang","doi":"10.1109/ICICAS48597.2019.00162","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00162","url":null,"abstract":"With the emphasis on security and privacy, Federated Machine Learning (FML) systems have become a research hotspot due to it can perform machine learning models without compromising security and privacy. However, there are two crucial challenges. One is a gradient information leak, and the other is vulnerable to integrity attacks. In this paper, we proposed a Blockchained Federated Machine Learning System, which called \"BlockFedML.\" In BlockFedML, we develop Security Parameter Aggregation Mechanisms, Checkpoint based-Smart Contracts, Incentive Mechanisms, and Transfer Learning. Finally, we outlined the BlockFedML system and its applications and explained our future work.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on Abnormal Data Mining Technology in Military Network Communication Data 军用网络通信数据异常数据挖掘技术研究
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) Pub Date : 2019-12-01 DOI: 10.1109/ICICAS48597.2019.00060
Rui Wang
{"title":"Research on Abnormal Data Mining Technology in Military Network Communication Data","authors":"Rui Wang","doi":"10.1109/ICICAS48597.2019.00060","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00060","url":null,"abstract":"In order to ensure the accuracy of data transmission in military network communication and improve the capability of intelligent fault analysis of military network communication, abnormal data mining is needed. An anomaly data mining model in military network communication is proposed based on simplified gradient algorithm and autocorrelation feature matching. Firstly, the military network communication system model is constructed, and the information flow model is constructed and the abnormal data feature extraction is carried out. The matched filter is used to filter the abnormal data in the military network communication data, and several known interference frequency components are removed. The matching projection method is used to find the optimized characteristic solution of the abnormal data mining. The simplified gradient algorithm is used for adaptive optimization of abnormal data mining, and the autocorrelation feature matching method is used to extract the abnormal data from military network communication data. The simulation results show that, this method is used to mine abnormal data in military network communication data, and it has good accuracy and strong anti-jamming ability.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信