{"title":"Simulation of 5G Secondary Synchronization Signal Detection","authors":"Jing Liang, Jiazhi Hou","doi":"10.1109/ICICAS48597.2019.00133","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00133","url":null,"abstract":"In the mobile communication, the cell search is used to implement time synchronization and frequency synchronization between the user and the cell, and acquire the physical cell identification number. A new synchronization signal structure is defined in the 5G communication system to complete the cell search, wherein the secondary synchronization signal is greatly changed, and the cell group ID in the physical cell identifier can be obtained by the effective secondary synchronization signal sequence detection. This paper focuses on the secondary synchronization signal detection process, and proposes to use the gold sequence characteristics of the secondary synchronization signal to simplify the operation process of obtaining the cell group ID in the physical layer cell identifier. The simulation results show that the proposed improved secondary synchronization signal detection algorithm can reduce the complexity of the cell group ID in the physical cell identifier detection while ensuring the correct rate.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114628320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application Layer Security Communication Protocol Based on Lightweight NTRU Public Key Cryptography","authors":"wenbin liu, Jie-sheng Zheng, Wuqiang Shen, Yaosong Lu, Ruigang Liang, Jing Li, Yiqi Hu, Donghe Ni","doi":"10.1109/ICICAS48597.2019.00022","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00022","url":null,"abstract":"The development of mobile Internet technology has made intelligent terminal devices and mobile applications popular, and computing at mobile devices is becoming more and more popular in people's daily lives. However, due to the processing speed and storage capacity limitations of mobile terminal devices, their security has become a major bottleneck in the development of mobile computing. Therefore, security research for mobile platforms is of great significance. The cryptosystem is an important part of realizing the anonymous security of mobile Internet information transmission. In general, the cryptosystem includes a symmetric cryptosystem and a public-key cryptosystem, both of which have advantages and disadvantages. The symmetric cryptosystem algorithm is fast, but the encryption and decryption keys of the two sides of the communication are the same, which hinders the security implementation of the key management security core key negotiation, and cannot be applied with a digital signature. The public key cryptosystem can separate the encryption key from the decryption key, but its operation speed is slow and limited by the mobile hardware platform. The paper proposes communication encryption and signature algorithm for the mobile terminal, which uses the public key cryptography algorithm. Based on ensuring the same security as the traditional public key cryptography algorithm, the computational overhead is reduced, the running speed is increased, and the storage requirement is reduced.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Ma, Long Chen, Chuping Yang, W. Zhang, Hemin Li
{"title":"A Deep Learning Based Personnel Positioning System for Key Cabin of Ship","authors":"Chao Ma, Long Chen, Chuping Yang, W. Zhang, Hemin Li","doi":"10.1109/ICICAS48597.2019.00108","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00108","url":null,"abstract":"With the development of ship information and intelligence, and the gradual deepening of ship safety management, ship personnel safety and damage disposal personnel positioning and other related research has attracted more and more attention. Deep learning technology is widely applied in various industries and fields through features extraction, multi-stage learning and complete expression. This paper studies the personnel positioning system of the ship's key cabin based on deep learning, aiming to provide auxiliary Suggestions and command decisions for the ship's commander through the application of intelligent technology","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Temperature Control System of Desktop 3D Printer Based on Fuzzy Adaptive","authors":"Yu Liang, Mo Fu, Yi Wang","doi":"10.1109/ICICAS48597.2019.00137","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00137","url":null,"abstract":"In the printing process of desktop 3D printer, the printing consumables is to be heated and melted, and the layers of the extrusion layer are stacked. The heating temperature control system has the characteristics of nonlinearity, large inertia and large hysteresis, which it is some disadvantages for making the heating process take more time and inaccurating temperature control. Aiming at the above problems, a fuzzy adaptive desktop 3D printer temperature control strategy is proposed in this paper. The ARM LPC1768 high-performance microcontroller is combined with the fuzzy adaptive feature to implement temperature control fastly and precisly, and the temperature simulation model of the control system is established by Matlab/Simulink. The experimental results show that the fuzzy adaptive PID controller has the advantages of small overshoot, good temperature tracking performance, fast dynamic response and high reliability compared with the conventional PID control method. It is optimal for the temperature control of the desktop 3D printer.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Automatic Decoding of Morse Code Based on Deep Learning","authors":"Weihao Li, Keren Wang","doi":"10.1109/ICICAS48597.2019.00107","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00107","url":null,"abstract":"The current automatic decoding method of the Morse telegram has limited accuracy, and can't adapt to signal distortion and code length deviation of the manual telegram. This paper introduces the deep learning method and constructs an automatic decoding model, which integrates feature extraction, sequence modeling and transcription into an end-to-end training neural network. The time-frequency diagrams of signals are used for training and testing. Experimental results show that the decoding system has strong adaptability to manual deviation and frequency drift, and is robust in a noisy environment.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluate Software Quality by Learning from Historical Data","authors":"P. Zong, Yichen Wang, Zekun Song, Wenqian Kang","doi":"10.1109/ICICAS48597.2019.00012","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00012","url":null,"abstract":"This paper proposes a method to evaluate software quality by learning from historical data. Quantitative evaluation of software quality is not an easy issue. But historical software can provide us with a lot of software quality information. We present a data acquiring model to guide the data collection from historical software. Then machine learning algorithm that support incremental training is applied to learn the relationship between software quality and software metrics from the data. As a case study, we collected the data of 82 aviation embedded software in an institute, and trained a k-Nearest Neighbors (k-NN) classification model optimized by genetic algorithms for evaluating the software reliability.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122246769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Flexibility of Carrier - Based Aircraft Equipment System Based on Complex Network Theory","authors":"Qianyu Zhang, Wei Zhang, Qingqing Li, Wanfeng Ji","doi":"10.1109/ICICAS48597.2019.00061","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00061","url":null,"abstract":"When a carrier-based aircraft equipment system based on a mission is in operation, a complex network is composed of reconnaissance and warning systems, command and control systems, fire strike systems, information countermeasures systems, combat evaluation system and integrated safeguard systems. From the view of complex network to analyze the carrier aircraft equipment system, the authors can find flexible features in the system in operation. This is of great significance for the analysis of combat effectiveness of the carrier-based aircraft equipment system.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation for CBRN Hazard Source Item Estimation through Sensor Data Fusion","authors":"Xuecheng Liu, Jin Gu, Yansong Liang","doi":"10.1109/ICICAS48597.2019.00158","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00158","url":null,"abstract":"The parameter inversion of harmful gas diffusion source term is the inverse problem of harmful gas diffusion hazard assessment, which is of great significance to hazard prediction assessment and emergency response. Based on Bayesian reasoning method, using sensor detection data and forward atmospheric diffusion model, the likelihood function is constructed. Markov chain Monte Carlo (MCMC) sampling is used to establish the source term parameter inversion algorithm, and the simulation platform is established by MATLAB software for simulation analysis. The simulation results show that the inversion results are in good agreement with the initial source parameters, which proves the feasibility of the method.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BlockFedML: Blockchained Federated Machine Learning Systems","authors":"Shufen Wang","doi":"10.1109/ICICAS48597.2019.00162","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00162","url":null,"abstract":"With the emphasis on security and privacy, Federated Machine Learning (FML) systems have become a research hotspot due to it can perform machine learning models without compromising security and privacy. However, there are two crucial challenges. One is a gradient information leak, and the other is vulnerable to integrity attacks. In this paper, we proposed a Blockchained Federated Machine Learning System, which called \"BlockFedML.\" In BlockFedML, we develop Security Parameter Aggregation Mechanisms, Checkpoint based-Smart Contracts, Incentive Mechanisms, and Transfer Learning. Finally, we outlined the BlockFedML system and its applications and explained our future work.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Abnormal Data Mining Technology in Military Network Communication Data","authors":"Rui Wang","doi":"10.1109/ICICAS48597.2019.00060","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00060","url":null,"abstract":"In order to ensure the accuracy of data transmission in military network communication and improve the capability of intelligent fault analysis of military network communication, abnormal data mining is needed. An anomaly data mining model in military network communication is proposed based on simplified gradient algorithm and autocorrelation feature matching. Firstly, the military network communication system model is constructed, and the information flow model is constructed and the abnormal data feature extraction is carried out. The matched filter is used to filter the abnormal data in the military network communication data, and several known interference frequency components are removed. The matching projection method is used to find the optimized characteristic solution of the abnormal data mining. The simplified gradient algorithm is used for adaptive optimization of abnormal data mining, and the autocorrelation feature matching method is used to extract the abnormal data from military network communication data. The simulation results show that, this method is used to mine abnormal data in military network communication data, and it has good accuracy and strong anti-jamming ability.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}