2019 IEEE 5th International Conference on Computer and Communications (ICCC)最新文献

筛选
英文 中文
A Lightweight Encryption Algorithm for Edge Networks in Software-Defined Industrial Internet of Things 软件定义工业物联网边缘网络的轻量级加密算法
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064352
Dongdong Ma, Yijie Shi
{"title":"A Lightweight Encryption Algorithm for Edge Networks in Software-Defined Industrial Internet of Things","authors":"Dongdong Ma, Yijie Shi","doi":"10.1109/ICCC47050.2019.9064352","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064352","url":null,"abstract":"With the development the industrial Internet of Things, a series of problems and challenges have emerged, and in order to solve these problems, many scholars and researchers have introduced software-defined networks into the Industrial Internet of Things. The introduction of software defined networks solves some of the problems, but there are still many problems to be solved. In this paper, we mainly analyze the safe transmission of data in the software-defined industrial IoT edge network. First, we analyze the special requirements of the data in the software-defined industrial IoT edge network. Then we analyze the principles and characteristics of several known lightweight encryption algorithms, and point out why the currently known lightweight algorithms cannot be directly used in software-defined industrial IoT edge networks, and we propose a new lightweight encryption algorithm. Finally, in this paper, experiments and evaluations of new lightweight encryption algorithms are carried out in several aspects. It is known from experiments that the lightweight encryption algorithm proposed in this paper satisfies the special requirements of software-defined industrial IoT edge network for data transmission.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"57 1","pages":"1489-1493"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72820485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Generating Exponentially Distributed Variates by Using Early Rejection 用早期拒绝法生成指数分布变量
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064220
Baoying Fan, Yusong Du, Baodian Wei, Xiao Ma
{"title":"On Generating Exponentially Distributed Variates by Using Early Rejection","authors":"Baoying Fan, Yusong Du, Baodian Wei, Xiao Ma","doi":"10.1109/ICCC47050.2019.9064220","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064220","url":null,"abstract":"We revisit von Neumann’s algorithm for generating exponentially distributed variable. This algorithm requires$e^{2}/(e-1)approx 4.30$ uniform deviates from (0,1) on average to generate an exponentially distributed variable. In 2016, the early rejection was suggested by Karney to use in von Neumann’s algorithm for lowering the expected number of uniform deviates to $el(sqrt{e}-1)approx 4.19$. In this paper, we give a new parameter setting for the early rejection step, which can help reduce the expected number to a minimum of 4. The experimental results also show that our improved version of von Neumann’s algorithm can be slightly more efficient than the version presented by Karney especially for software implementations.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"25 1","pages":"1307-1311"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72852930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonuniformity Correction Algorithm for TEC-less Uncooled Infrared Imaging System 无tec非制冷红外成像系统非均匀性校正算法
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064432
Xiaohe Cao, Bincheng Zhu, Shengzhe Wang, Yang Yong, Yihua Huo, Jianliang Huo
{"title":"Nonuniformity Correction Algorithm for TEC-less Uncooled Infrared Imaging System","authors":"Xiaohe Cao, Bincheng Zhu, Shengzhe Wang, Yang Yong, Yihua Huo, Jianliang Huo","doi":"10.1109/ICCC47050.2019.9064432","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064432","url":null,"abstract":"The TEC-less uncooled infrared focal plane array (UIRFPA) imaging system faces the problem of nonuniformity caused by substrate temperature drift. Based on the establishment of an ambient temperature effect function, an improved nonuniformity correction (NUC) algorithm with temperature drift compensation is proposed. The first stage is offline calibration: a templates lookup table is established experimentally, and then the fitting regression coefficients are obtained using Least Squares. The second stage is real-time correction: the original readout image is preprocessed by the fitting template to compensate for nonuniformity drift, and the total variation (TV) NUC algorithm with an adaptive iterative step size is designed to correct the residual high-frequency noise. Real infrared video test shows that the algorithm effectively compensates for the nonuniformity drift while avoiding degradation and ghosting artifacts. The corrected image quality is better than that of the traditional TV-NUC method, and the roughness is reduced by nearly 40% compared to the original image.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"70 1","pages":"214-219"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79975175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Requirements-Oriented MAC Protocol in Directional Ad Hoc Networks Using Collision-Free Dynamic Time Slot Assignment Algorithm 基于无冲突动态时隙分配算法的定向Ad Hoc网络中面向需求的MAC协议
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064396
Lingjun Liu, Laixian Peng, Renhui Xu, Wendong Zhao, Haiqin Shi
{"title":"A Requirements-Oriented MAC Protocol in Directional Ad Hoc Networks Using Collision-Free Dynamic Time Slot Assignment Algorithm","authors":"Lingjun Liu, Laixian Peng, Renhui Xu, Wendong Zhao, Haiqin Shi","doi":"10.1109/ICCC47050.2019.9064396","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064396","url":null,"abstract":"To satisfy the special demand of key information such as allegation information which cannot tolerate packet loss, this paper studies a novel requirements-oriented time slot assignment MAC protocol based on TDMA scheduling mechanism in Ad Hoc network using directional antenna, and a conflict-free dynamic time slot assignment algorithm based on requirement exchange is proposed. One scheduling process is divided into a requirement exchange stage and a data transmission stage. In the requirement exchange stage, each node runs a consistent pairing switching algorithm. After the requirement exchange stage is completed, each node can be guaranteed to obtain the transmission requirements of neighboring nodes. In the data transmission stage, according to the transmission requirements of the whole network, this paper proposes a maximizing concurrent transmission links (MCTL) time slot assignment algorithm. The MCTL algorithm is based on collision-free links group to achieve as many concurrent transmission links as possible in each scheduling process. Lastly, simulation results by OPNET 14.5 are given to evaluate the average delay and throughput of proposed algorithm.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"64 1","pages":"1154-1158"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76635604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting Pose Mask Features For Video Action Recognition 利用姿态面具特征的视频动作识别
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064443
Julia H. Miao, Hailun Xia, Zhimin Zeng
{"title":"Exploiting Pose Mask Features For Video Action Recognition","authors":"Julia H. Miao, Hailun Xia, Zhimin Zeng","doi":"10.1109/ICCC47050.2019.9064443","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064443","url":null,"abstract":"Existing state-of-the-art approaches in video action recognition mostly adopt RGB images and optical flows as input and neglect the abundant information provided by human poses. In this paper, we present a novel method that highlights the essential area of human body and takes it as complementary input for existing action recognition pipelines. The method, called Pose Mask Network (PMN), leverages a 2D pose estimator to extract heatmaps from frames and utilizes them as Pose Masks on the original images. The Pose Masks are robust to the variance of background and focus on key information of human body. Experiments show that our Pose Mask yields a result far exceeding that of using simple pose representations. More importantly, PMN acts as a supplement to other RGB-based approaches. Combining our PMN with Temporal Segment Network, we obtain state-of-the-art performance on the HMDB51 and JHMDB datasets.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"43 1","pages":"1706-1710"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82223977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Information System Security Assessment Model Based on TOPSIS Method and Linguisitc Viarable 基于TOPSIS方法和语言可行性的信息系统安全评估模型
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064245
Tong Wang
{"title":"The Information System Security Assessment Model Based on TOPSIS Method and Linguisitc Viarable","authors":"Tong Wang","doi":"10.1109/ICCC47050.2019.9064245","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064245","url":null,"abstract":"Information is the most valuable asset of most organizations today. At the same time, the problem of information security has also brought huge losses, and has attracted more and more attention from the society. Because of the complexity and uncertainty of information system, the security evaluation of information system inevitably involves a certain degree of fuzziness. A TOPSIS model based on linguistic variables for information system security assessment is proposed. Firstly, according to the feasibility and operability of information system security, a two-level index system of information system security is constructed. Secondly, linguistic variables are used to represent the evaluation values of the secondary indicators, and WAA operators are used to calculate the evaluation values of the primary indicators. Then TOPSIS method is used to evaluate and rank the schemes. The results show that TOPSIS method is more effective and practical for information system security risk assessment.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"18 1","pages":"1617-1620"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76357846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carrier Frequency Synchronization Algorithm for Millimeter-Wave Inter-Satellite Links 毫米波星间链路载波频率同步算法
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064150
Yue Zhao, Ding Tian, Jianfei Tong, Gaofeng Cui, Weidong Wang
{"title":"Carrier Frequency Synchronization Algorithm for Millimeter-Wave Inter-Satellite Links","authors":"Yue Zhao, Ding Tian, Jianfei Tong, Gaofeng Cui, Weidong Wang","doi":"10.1109/ICCC47050.2019.9064150","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064150","url":null,"abstract":"Carrier frequency synchronization is a difficult problem for inter-satellite links (ISLs) characterized by high dynamic and low signal-to-noise ratio (SNR). In this paper, a novel carrier frequency synchronization algorithm is proposed for Millimeter-Wave (mmWave) ISLs. The synchronization procedure can be divided to two steps. Firstly, we use autocorrelation function of short training field (STF) for differential analysis to depress the noise. And then Kalman filter is utilized in the second step to optimize the first-step estimation result. It can improve the stability of estimated frequency offset and track the time-varying frequency offset in ISLs. Simulation results manifest that the carrier synchronization algorithm can estimate the frequency offset with high accuracy and large estimation range.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"68 6 1","pages":"843-847"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76248720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Rate Control Method for Still Image Coding 一种新的静止图像编码速率控制方法
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064247
Zheng-Teng Zhang, Ruidong Fang, Jucai Lin, Jun Yin, Xingming Zhang
{"title":"A Novel Rate Control Method for Still Image Coding","authors":"Zheng-Teng Zhang, Ruidong Fang, Jucai Lin, Jun Yin, Xingming Zhang","doi":"10.1109/ICCC47050.2019.9064247","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064247","url":null,"abstract":"The still image coding encoders, such as JPEG image and intra frame in video coding, are highly required a specific frame size control method to support the various application. In this paper, a novel rate control method is proposed to control the frame size for different still image encoders. The gradient-based complexity is considered to construct a general Rate-Quantization (R-Q) model at block level. Then the specific quantization parameters (QP) can be generated for a single frame/image encoding with the R-Q model. Experimental results show that the proposed method achieves up to 94.5% and 99.75% bit match accuracy on JPEG encoder and x264 encoder, respectively.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"35 1","pages":"1777-1781"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87958375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parallel Placement Approach for Service Function Chain Using Deep Reinforcement Learning 基于深度强化学习的业务功能链并行布局方法
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064448
Hua Chai, Jiao Zhang, Zenan Wang, Jiaming Shi, Tao Huang
{"title":"A Parallel Placement Approach for Service Function Chain Using Deep Reinforcement Learning","authors":"Hua Chai, Jiao Zhang, Zenan Wang, Jiaming Shi, Tao Huang","doi":"10.1109/ICCC47050.2019.9064448","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064448","url":null,"abstract":"Network Function Virtualization (NFV) enables service flexibility and cost reduction by replacing traditional hardware middle-boxes with Virtual Network Functions (VNFs) running on general-purpose servers. Normally, network traffic usually needs to pass through several VNFs in a particular order. This phenomenon is known as Service Function Chaining (SFC). How to place SFCs with minimal resource is still an open problem. Most of the existing work thinks it's difficult to find the placement solution for all SFCs as a whole, they, instead, consider each demand sequentially, and deploy SFCs one by one. But such serial placement lacks consideration of the interrelations among demands and unable to minimize resource. In this paper, we innovatively propose a parallel deployment scheme based on Deep Reinforcement Learning (DRL). It satisfies demands with minimum resource. We design an overall SFC placement scheme for all demands, and deploy all SFCs simultaneously. We evaluate the proposed algorithms using extensive simulations and prototype experiments. The result demonstrates that our parallel deployment approach minimized resource costs compared with other schemes.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"41 1","pages":"2123-2128"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86258232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
OFDM with Index Modulation for UAV Communication Systems 基于索引调制的OFDM无人机通信系统
2019 IEEE 5th International Conference on Computer and Communications (ICCC) Pub Date : 2019-12-01 DOI: 10.1109/ICCC47050.2019.9064201
Quan Wang, Wendong Yang, Shiming Xu, Xufang Pei
{"title":"OFDM with Index Modulation for UAV Communication Systems","authors":"Quan Wang, Wendong Yang, Shiming Xu, Xufang Pei","doi":"10.1109/ICCC47050.2019.9064201","DOIUrl":"https://doi.org/10.1109/ICCC47050.2019.9064201","url":null,"abstract":"In this paper, we investigate the transmission issue of Unmanned Aerial Vehicle(UAV) communication systems using OFDM with index modulation, which is called OFDM-IM and the information is conveyed not only by M-ary signal constellations as in classical OFDM, but also by the indices of the activated subcarriers. We give the OFDM-IM framework and the transceiver model of the UAV communication system, investigate the system implementation scheme from several aspects such as index selection, LLR detection, channel estimation and equalization, etc. The performance of the spectrum efficiency, energy efficiency and bit error rate(BER) are analyzed according to different conditions and simulation parameters. It is shown that, due to the use of OFDM-IM, the UAV communication systems achieve higher spectral efficiency, higher energy efficiency and lower BER than those of classical OFDM when the signal-to-noise ratio(SNR) is greater than 11dB.","PeriodicalId":6739,"journal":{"name":"2019 IEEE 5th International Conference on Computer and Communications (ICCC)","volume":"15 1","pages":"1047-1052"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82769364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信