Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)

+ Advanced search
118 articles

Methods of Collective Intelligence in Exploratory Data Analysis: A Research Survey

Piotr A. KOWALSKI, Szymon Lukasik, Piotr KULCZYCKI
This study contains a brief presentation of the basic tasks for Exploratory Data Analysis (EDA), namely: classification, clustering, reduction of data dimensionality and number of data instances as well as detection of outliers. Herein, solutions to the aforementioned problems incorporating a wide range...

Dynamic Routing Mechanism in Network Simulation Based on Topology Perception Time Series

Lei-gang SUN, Yu-feng MA, Li-ju CHEN, Bo WU
A fundamental requirement for any routing mechanism in network simulation is to truly reflect the forwarding process of packet from source to destination in the simulated topology. In current network simulators, all the nodes know the information instantaneously when the topology changed, which is obviously...

Simulation Oriented OWL-S Extension and Cloud Interaction

Zhi-hui JIANG, Jian-feng LU, Hui WANG, Yao-ping YU
In the field of cloud manufacturing, in order to evaluate cloud service composition better, simulation could be introduced into the process of cloud service composition. This job requires adding simulation information to the service description document. Besides, for achieving the simulation of cloud...

The Characteristics of Compound Models Designed for Internet of Things

Jing SU, Fei MA, Bing YAO
In order to study the scale-free of more and more real-life networks, we design, construct a class of compound network models by the methods of graph theory for understand and try to simulate network models from Internet of Things (IoT), and we computed the parameters of models, such as: average degree,...

A Cross-Layer Routing Protocol Based on Location Information for Multi-hop Wireless Ad hoc Networks with Directional Antenna

Tai-bin HUANG, Lei LEI
In multi-hop wireless ad hoc networks, communications with directional antennas can effectively improve the transmission range of the node. Most of existing directional routing protocols adopt the four-way handshaking mechanism which transmits and receives with directional and omnidirectional antennas...

Method for Measuring the Internet Devices and Applications Based on the Features

Chuan GAO, Han-bing YAN, Zi-Xiao JIA
With the continuous development of the Internet, the security problem of the Internet is more and more serious. The security postures of the Internet devices and applications have subjected extensive attention of the growing number of Internet users. In this paper, we put forward a measurement method...

Power Communication Optical Network Traffic Grooming Algorithm Based on Differentiated Services

Zhong-miao KANG, Xi-jie DONG, Hui-tong LIU, Liang-rui TANG
With the development of smart grid, the data service of large particle and IP in power communication network has been increasing, which has put forward a great challenge to the existing power communication optical network based on MSTP (Multi-Service Transfer Platform) technology and WDM (Wavelength...

An Adaptive Algorithm of Data Network Traverse Based on Node Analysis

Yan XU, Yi ZHENG, Yu ZHANG, Hui LIU, Hao CUI, Hai-lin LIU
In this paper we describe a data network traverse algorithm. It traverses based on ternary tree and has Depth First Search (DFS) feature. The data network modeling employs three types of components: Line, Node and Intersection. Each type has typical data structure to connect other type. This algorithm...

The Improvement of Network Performance by Using the Technique of PF-RING Zero-copy to Optimize Spark Streaming

Feng LIU, Zhan-rong LI, Yang GAO, Sheng-si LUO
Regarding the problem of lower utilization rate of broadband and data throughput in the real-time computations when Spark Streaming receiving and treating a large number of TCP packet, we proposed a technique of effective zero-copy of IO kernel and optimiazation of user protocol stack. By comparing and...

Customized Service's Empirical Analysis And Exploration In LifeBased On Double O2O Mode-A Case Study Of 'Suning V Purchase'

Yi-peng LI, Di WANG
With the rapid development of the Internet economy, people's consumption level is getting higher and higher, the demand for customized services is becoming increasingly apparent. At the same time double O2O mode shine in the Internet Age. Based on the field investigation in Wuhan, this paper studies...

An NDN-based Query Processing Framework for Networked Databases

Zhu-hua LIAO, Zeng-de TENG, Jian ZHANG, Yi-zhi LIU
Nowadays, massive databases have accumulated and networked in the large-scale and distributed networks, however, in which extensive data are still hard to be directly shared to or efficiently exploited by the users as many challenges and technical designs of query processing are arising in the networks....

Hadoop-based Intrusion Detection Technology and Data Visualization for Website Security

Xiao-ming ZHANG, Yu-xin WANG, Ge-tong ZHANG, Guang WANG
Network attack becomes more popular today. It is still difficult to detect the intrusion activity accurately for users websites through traditional approaches. A kind of integrated system is designed and established for the website security analysis based on Hadoop system. The core components of hardware...

SDNForensics: A Comprehensive Forensics Framework for Software Defined Network

Shu-hui ZHANG, Xiang-xu MENG, Lian-hai WANG
Software-defined networking (SDN) is an emerging network architecture, which decouples the control and data planes of a network. Owing to its openness and standardization, SDN enables researchers to design and implement new innovative network functions and protocols in a much simpler and flexible way....

The k-spined Cubes and Its Properties

Xin-Yun QIN, Dao-Yun XU
The diameter of hypercube and its properties is an important issue for improving thecommunication efficiency of interconnection network. A new variant SQ _n^k of the n-dimensional hypercube is introduced by a spinningfunction _k. In this variant, called k-spined cubes, neighbors of any node can be quickly...

A SQLite Recovery Method for Various Primary Key and B+tree Reorganization

Jiang DU, Ming-jian LI
Free blocks and free pages have tremendous forensic potential. Based on analyzing layouts of cells which have different types of keys, the mechanism of deletion and free blocks coalescing, a new recovering method with byte level accuracy is proposed. First, aiming at multiple keys' types and rewriting...

Efficient Content Delivery and Caching Scheme Using Network Coding in CCN

Yan LIU, Shun-zheng YU
Content Centric Networking (CCN) is a new network architecture around content dissemination and retrieval, which treats content as a primitive and routes content by name. Differently from the conventional content dissemination and retrieval of the CCN, we introduce a novel content delivery scheme based...

An Application Based on Regular Expression

Jian-Ping DU, Ya-Shu LIU
Hypertext is the main format on the Internet, which has the characteristic of the non-continuity and simple formal standard. This paper researches how to extract information from hypertext by regular expression, gives the example on extracting weather information base on the web of Sohu, Sina and Tencent...

Hauth:A Novel Approach for Network Visibility Protection

Xin WANG, Neng GAO, Ling-chen ZHANG
Software-Defined Networking (SDN) is a new paradigm that offers services and applications great power to manage network. Based on the consideration that the entire network visibility is the foundation of SDN, many attacks emerge in poisoning the network visibility, leading to severe host hijacking. Meanwhile,...

Users Connection across Social Media Sites Based On Users'Relationship Vector

Zhou YAN, Shu-dong LI, Wei-hong HAN, Bin ZHOU, Wen-xiang HAN
The identification and association of multiple identities in different online social networks (osns) is an important problem, and also is the basis for many applications. At present, most of technologies try to solve this problem by matching the username of social networks or calculating the similarity...

Effects of Different Attaching Positions of Human Body on Wearable Tag Antenna

Shuo CHEN, Song LI, Hong-zhe LIU, Fan LU, Jian MA
In this paper, a research on radio frequency identification (RFID) tag for body wearable is presented. Performances of tag and antenna are mainly focused on with the tag patched on human body. Results are available from simulation and measurement to reflect the change of wearable tag performance. A human...

Delay Estimation Based on Compressed Sensing Subspace Pursuit Algorithm

Xue-dong LENG, Zi-lun ZHAO, Bin BA
In this paper, a novel method is constructed to estimate the time delay. The purpose of this article is to deal with the lack of measurement data in small sample (single snapshot) and low signal to noise ratio environment during wireless location. First, the sparse representation model of received signals...

Online Spectrum Sensing in Cognitive Radio

Wen-xiao WANG, Xue-mei BAI, Zhi-jun WANG, Bin GUO
Spectrum sensing is an essential part for cognitive radio which is used for directly or indirectly estimating the states of primary users (PUs) to find spectrum holes for second users (SUs). Nowadays, some online spectrum sensing algorithms have been proposed but most of them ignore the time complexity...

The Relations Between Classic and Geometric Probability and Scale-Free Feature In Social Networks

Fei MA, Jing SU, Bing YAO
Probability and statistics have been proved to be strong and useful tools for recovering the topological properties in complex systems and networks all over the world. We recall the process of studying complex systems in the past decades and propose general evolution equation about the dynamical function...

Autonomous Real-time Transmission Technology for Multiple Emergencies' Information

Fan WEI, Hui-jing GE, Xian-wei ZHANG
Wireless Sensor Network(WSN) is widely used in Emergency Management System(EMS) to assure requirement of safety in current society. When emergency appears, real-timely transmitting emergency information should be assured. But this requirement can not be satisfied by conventional approaches which are...

Impact of the Amount of RF Self-interference Cancellation on Digital Self-interference Cancellation in Full Duplex Communications

Si LI, Hong-tao LU, Shi-hai SHAO, You-xi TANG
The self-interference to noise ratio in digital domain decreases as the amount of RF self-interference cancellation increases in full-duplex (FD) communications. The amount of digital self-interference cancellation decreases as the self-interference power in digital domain decreases. The impact of the...

DOA Estimation Using Log Penalty under Large Arrays

Ye TIAN, He XU
This paper proposes a new direction-of-arrival (DOA) estimation algorithm, which is suitable for the scenario that the number of sensors is large, and is comparable with the number of samples in magnitude. Instead of utilizing classical subspace technique, sparse-recovery-based approach with log penalty...

Remote Monitoring and Control System for Wisdom Agricultural Greenhouse Based on Internet of Things Technology

Hong-ru LI, Fu-yin BIAN, Shi-hao GU, Xiao-Bai LI
The application of agricultural greenhouses is more and more extensive, while the air temperature and humidity and other environmental factors in greenhouses need to be regulated carefully by people as yet. This article designed a monitoring and control system for greenhouses to adjust the factors automatically,...

Application of Algorithm of Smoothing Pseudo-range with Carrier Phase to DRTS System

Hong-Jiao MA, Fei-Fei YAN, Zhi-Jun HOU
The algorithm of smoothing pseudo-range with carrier phase and its application to the dual ranging and time synchronization (DRTS) system are introduced. The calculation and analyses of the measured data show that the application of the algorithm of smoothing pseudo-range with carrier phase to the DRTS...

Research and Implementation of RDP Proxy Proxy-based Audit System

Xiao-Liang ZHANG, Xiao-Yu WU, Wu-Xia ZHANG
Using the Windows RDP protocol developed by Microsoft Inc to connect and operate the remote machines which base on the same system become a trend. However, the RDP has caused many security problems. It is necessary to design and implement a audit system to ensure the system's security and guarantee the...

An Inductorless Variable-Gain Transimpedance Amplifier Design for 4GHz Optical Communication using 0.18-æm CMOS

Lee Bai Song, Tan Yung Sern, Bharatha Kumar Thangarasu, Kiat Seng Yeo
This paper presents a novel variable-gain inductorless transimpedance amplifier (TIA) design using Global Foundries 0.18-æm CMOS technology which is suitable for high speed optical communication. A modified-RGC (M-RGC) preamplifier stage is used to reduce the input impedance through cascode and parallel...

A Cross-Coupled Ka-Band GaAs-pHEMT Based VCO

Kai Men, Lee Bai Song, Bharatha Kumar Thangarasu, Qiong Zou, Kiat Seng Yeo
A cross-coupled GaAs pseudomorphic high electron mobility transistor (pHEMT) based Ka-band voltage-controlled oscillator (VCO) is reported in this work, by using commercial OMMIC 0.13 m depletion-mode power pHEMT (D01PH) process. The simulation of the proposed VCO demonstrates an operating frequency...

Physical-Layer Secure Transmission Method with Random Sparse Array

Min WU, Meng WU
With the characteristics of narrow scanning beam and high spatial resolution, sparse array becames a research hotspot. However, it can produce higher side lobes which leads to the information leakage easily. A physical layer secure transmission method based on sparse array was proposed in this paper...

Application of LDPC Erasure Correcting Codes in High Mobility Satellite Communication

Yao-Wen WANG, Dao-Xing GUO, Xiao-Kai ZHANG
Providing reliable broadband satellite communications in high mobility environments has attracted considerable attentions in the past few years. One of the biggest challenges is caused by the large Doppler frequency shift due to the rapid relative motion between the transmitters and receivers. The shift,...

An Iterative Algorithm for Linear-Phase Paraunitary FIR Filter Banks with Impulse Responses of Different Lengths

Li CHEN, Hai-tao DENG
In this paper, a new design algorithm is presented for paraunitary filter banks with extended filter length. Equal-length filter banks are designed where the filter length is not restricted to integral multiples of the number of channels. Filter banks with unequal length are also studied. In the new...

Joint Beamforming and the Artificial Noise Security Scheme Based on Successive Convex Approximation in Multi-relay Cognitive Network

Xian-zhong XIE, Xiang-yu XIE, Shu TANG, Jiu-jiu CHEN
To solve the transmission problemof physical layer security(PLS) in relay cognitive radio network (CRN), this paper investigates the PLS transmission scheme of multiple relays CRN, which contains two pairs of secondary nodes without direct link each other. Compared with the model that consists ofa pair...

A Broadband Multi-layer Dual-polarization Slot Antenna Based on Differential-feed

Jin-dong LI, Ge GAO, Run-dong ZHENG, Ji-bin LIU
In this paper, a broadband dual-polarization slot antenna based on differential-feed at X band is proposed. By adopting wide round slots, the antenna inherits a good advantage of broad band. And the multi-layer structure achieves a good isolation between the two ports. In order to improve the high cross...

Design and Experiment of Adaptive Anti-saturation and Anti-jamming Modules for GPS Receiver Based on 4-antenna Array

Jian-feng TAN, Run-dong ZHENG, Ming-tuan LIN, Pei-guo LIU, Ji-bin LIU
Antenna array with adaptive beam forming technique is an effect way for GPS receiver to suppress the ambient interference, which, however, would be malfunctioning due to the saturation problem in radio frequency (RF) front or intermediate frequency (IF) front caused by the strong interference. To tackle...

Radiation Analysis of Antenna Array with Synthetic Functions

Wei-kang YU, Hu YANG, Yan-lin XU, Xiang LIU, Da PENG
Synthetic basis functions method(SBFM) is introduced to analyze the electromagnetic properties of large periodic arrays. Compared with the traditional method of moment (MoM), SBFM uses fewer high order basis functions which significantly reduces the number of unknowns, contributing to higher efficiency...

Research on Integration of Quality Testing based on Communication Technology

Meng-qing LI, Yan JIANG, Yu-lin WANG, Xiang WANG, Ru-shu PENG
This paper prosposes an integration research to apply advanced communication technology in quality testing, including three aspects: integration of inspection function based on equipment, integration of inspection equipment based on interface communication, and integration of inspection unit based on...

Broadband Dual-Polarized Stacked Patch Antenna with High Isolation

Jia-yi REN, Hu YANG, Xiang LIU, Xian-bin LI, Jun-ru GONG
In this paper, a wideband dual-polarized stacked patch antenna at S-band with high port isolation is presented. By adopting the structure of H-shaped coupling slots placed in "T" configuration, the proposed antenna achieves dual polarizations and high port isolation, and the impedance bandwidth is significantly...

Identifying Complete Individual Trajectories Using Multi-day Cellular Network Data

Yang ZHAO, Tong-yu ZHU
Individual Trajectory is the foundation of traveling behavior analysis. Cellular network data contains sufficient spatio-temporal information, which is widely used for trajectory analysis nowadays. However, we found in practice that most of the users' records are incomplete and fragmented. This is because...

Power Splitting and Power Allocation for Energy Harvesting Multi-antenna Relay Networks in the Presence of CSI Errors

Zhi-hui LIU, Ye MIAO, Zi-jing CHENG
Adaptive power splitting and power allocation can provide a substantial performance gain in energy-hungry multi-antenna relay wireless networks when perfect channel state information (CSI) is available at relay. In the case when only imperfect CSI is available, the performance may significantly degrade,...

An Improved Evaluation Method for Optical Flow of Angle Error

Zhen CHEN, Ren-zhi QIN, Cong-xuan ZHANG, Ding-ding KONG, Xuan SHANG
To address the challenge of evaluating modern optical flow computation technology, this paper proposes a corrected evaluation methodology for optical flow of angle error based on the popular Middlebury benchmark. Firstly, a corrected evaluation benchmark is proposed based on the Middlebury benchmark....

An Improved Evaluation Method for Optical Flow of Endpoint Error

Cong-xuan ZHANG, Ling-ling ZHU, Zhen CHEN, Ding-ding KONG, Xuan SHANG
A corrected evaluation benchmark is proposed based on the Middlebury benchmark. The major contributions of the presented benchmark include the following: error metrics of endpoint error are modified, and the corrected metrics can decrease the detrimental influence of human factors and reflect the actual...

Research on High Speed Parallel Blind Equalization Algorithm

Hao LI, Zhi-gang WANG, Hou-jun WANG
The paper presents an efficient high speed parallel blind equalization algorithm suitable for multi-mode signals in wireless communication system. The parallel algorithm combines the idea of coordinate transformation on the basis of the classical CMA. It converts a multi-mode signals into a constant-mode...

Band Coverage in Wireless Sensor Networks: A Preliminary Study

Yihui LI, Gaoxi XIAO
In this letter, we propose a novel sleep-wakeup mechanism, named band coverage scheme, for wireless sensor networks, with the objective of achieving high energy efficiency and high successful rate of event/intrusion detections in an area with a relatively large width. Unlike the classic barrier coverage,...

A Concurrent MAC Protocol based on Local Synchronization for Wireless Ad Hoc Networks with Directional Antennas

Ya-nan XU, Lei LEI
Using directional antennas is an effective method to improve the bandwidth utilization in wireless ad hoc networks. However, what remain unaddressed, are the new challenges with MAC protocol design induced by the directional transmissions, such as deafness problems, new hidden terminal problems etc....

Performance Comparison of Different Types of Receivers in Indoor MIMO-VLC Systems

Chen CHEN, Wen-De ZHONG
In this paper, we compare the performance of non-imaging receiver (NImR), imaging receiver (ImR) and imaging angle diversity receiver (ImADR) in an indoor multiple-input multiple-output visible light communication (MIMO-VLC) system, in terms of area spectral efficiency (ASE). Analytical ASE expressions...

Tri-frequency Microcosmic Fractal Dipole Antenna with PBG Structure Used for 2G, 3G and 4G Systems

Bin LIN
Basing on the requirement of the second generation, the third generation and the fourth generation mobile communication systems, a tri-frequency microcosmic fractal dipole antenna is designed with a novel PBG structure. A sample of this antenna has been tested after simulation analysis and discussed...

Vector Deviation for Recognition of Radar Target Intention

Dong YAN, De-cun BIAN, Jin-chang ZHAO, Shao-qing NIU
Radar data were used to develop judgement rules for target intention by analysis for known targets. For the eigenvector with corresponding dimension established by the known target, the standard vector determined by the air target vector with the known intention was adopted as the judging criteria. Matlab...