Proceedings of the 3rd International Conference on Wireless Communication and Sensor Networks (WCSN 2016)

+ Advanced search
158 articles
Proceedings Article

Sparse Chirp Stepped-frequency ISAR Super-resolution Imaging Method Based on 2D-FISTA Algorithm

Ming Zhou, Peng-Cheng Xu, Zhao-Hui He, Qing-Hua You
The traditional Sparse Chirp Stepped-frequency ISAR imaging method has the problem of low imaging quality and large computational complexity. In view of the above problems, this paper studies a sparse Chirp Stepped-frequency ISAR imaging method based on two-dimensional fast iterative shrinkage threshold...
Proceedings Article

Blind Identification of Space-time Block Coding (STBC) Using Single Receive Antenna over Frequency-selective Fading Channels

Hong-Wen Lin, Ke-Yuan Yu, Zhao-Gen Zhong, Shuai Liu
Blind recognition of STBC is an important issue in the non-cooperative context. However, the research on blind recognition over frequency-selective fading channels has been rarely reported. This paper introduces a novel and efficient algorithm for the frequency-selective fading channels to classify STBC...
Proceedings Article

A New RF Power Amplifier Linearization Method

Zhong-Yang Mao, Xiao-jun Wu, Fa-Ping Lu, Min Fan, Chuan-Hui Liu
For the weakness of the existing predistortion algorithm, when large amplitude component in the modulation signal which is more than the voltage in saturation will be limited, leading to predistortion algorithm become invalid, and a new joint RF power amplifier (PA) linearization method is proposed....
Proceedings Article

A New Research of Delegation Agent Model Based On RBAC

Ping Zhang, Nian-Feng Shi, Hong Jiang
This paper proposed a advanced delegation agent model based on roles, which was QRBAC(Quick Role-Based Access Control) based on the model of RBAC(Role-Based Access Control). By means of introducing the model's system architecture and defining element of QRBAC, the model has a great application values...
Proceedings Article

A ZigBee Distributed Address Assignment Mechanism Based On Prefix Codes

You-Meng Li, Can Ma, Yi-Kui Zhang, Li Xu
In ZigBee networks, a tree topology is often used to construct a wireless sensor network for data delivery applications. However, the distributed address assignment mechanism provided in the ZigBee specification make inefficient use of the address space, which may cause the orphan problem. In this paper...
Proceedings Article

CPRS Algorithm for Streaming Media Encryption and Its Functional Analysis for Wi-Fi Security and Rapidity

Dan Cai, Xiao-Yong Ji, Jia-Ming Pan
In order to ensure the security of the wireless network, Wi-Fi Alliance uses stream cipher algorithm RC4 to encrypt data in the security protocol WEP/WPA. RC4 is a fast algorithm but easy to break. To solve the problem, WPA2 is proposed which uses block cipher algorithm to improve the anti-crack ability...
Proceedings Article

The Remote Wifi Investigation of Network and Forensics System for Police Based on Raspberry Pi

Yang Liu, Dian-Jie Lu, Xing-Yue Li
This project brings forward the design of the remote WiFi investigation of network and forensics system for police based on Raspberry Pi. It can realize remote control in a few hundred meters away, and aim at the traffic data in the suspects' WiFi networks to gather the evidence. The contents of the...
Proceedings Article

Self-interference Cancellation in Co-time and Co-frequency Full Duplex System

Yu-Ting Yang, Nan Chen, Chang-Hua Zhu
It is of particular importance to use the limited spectrum resources efficiently since they are non-renewable. The spectrum efficiency can be doubled theoretically with the Co-time Co-frequency Full Duplex (CCFD) technology. Existing research results show that CCFD is achievable under the condition of...
Proceedings Article

An RF-based Method for Passive Localization of Targets in Wireless Networks

Zhi-Yong Yang, Ming Gao, Lin-Lan Liu
Device-free means targets not carrying any device. Localization and tracking of device-free targets has attracted much attention due to its potential applications where the targets are not cooperative, such as safe guard system. In this paper, we propose a simple Line-Of-Sight (LOS) model and Hierarchical...
Proceedings Article

Simulation on Denoising Method for Fiber Optic Gyroscope Signal

Ping Sun, Zhi-Lu Zhang, Xiang-Jin Wang, Zhe Li
Fiber Optics Gyroscopes (FOGs) are widely used due to their low cost. This paper proposes a simulation on denoising method for FOG signal. Hybrid Kalman filter algorithm are applied to denoise the FOG signal in both static and dynamic conditions. Single axis and three axis FOG signals with different...
Proceedings Article

Mobility Management Requirements for Diverse 5G Wireless Networks

Saba Qasim Jabbar, Dheyaa Jasim Kadhim, Raed Abduljabbar Aljiznawi, Naseer Hwaidi Alkhazaali
Mobile users increased demand for access to mobile communication services is accelerating the technological development towards the integration into the various modes of wireless access communications with respect to coverage, QoS assurance, implementation, operational costs supported features, etc....
Proceedings Article

Smart Helmet with Emergency Notification System-A Prototype

Sasirekha S., Joe Louis Paul I., Swamynathan S., Y. Gokul., P. Kirthana.
Motorcycles have higher rates of fatal accidents than any other automobiles in India. Hence, wearing a helmet alone is not sufficient to prevent accidents and save victims. Helmet wearing alone is not sufficient to save the life of a motor cyclist. The solution proposed in this work to address this life-threatening...
Proceedings Article

An Improved Algorithm for Indoor Location

Xiao-Feng Liu, Dong-Xu Zhang, Si-Qi An, Xu Sun
In order to improve the accuracy and efficiency of indoor location, an improved algorithm of indoor location is proposed in this paper, which is much easier and faster to achieve by a common hardware. The proposed algorithm based on the isosceles triangle layout is much more convenient to extend the...
Proceedings Article

A Web Page Classification Method Based on TCP/IP Header Features

Di Huang, Xin-Yi Zhang, Qi-Wei Tang
Web page classification has wide applications. Due to various types of web pages and vast amounts of network traffic, it is difficult to classify web pages by deeply inspecting the content of each packet. This paper presents a learning-based classification method according to TCP/IP header features....
Proceedings Article

A Weak Signal Detection Method Based on Double Time Difference of Arrival Collaborative Mechanism

Jia-Xu Yu, Zheng-Bo Sun, Qing He, Xin-Xin Ouyang
Considering the weak signal of partial radiant point, the traditional TDOA(Time Difference of Arrival) detector cannot meet the requirement. A weak signal detection method based on double time difference collaborative mechanism is proposed. In this thesis, the double time difference collaborative detector...
Proceedings Article

File Tracking Method and System Based on Life Cycle Tree

Guang-Yu Gu, Xiang Cai, Shu-Juan Zhang, Qing Yi, Kun Ding
There are many difficult challenges, such as variety, quantity, distribution etc. in the unstructured data tracking management, which lacks an effective file tracking management solution. In this paper, based on the storage mechanism of HBase, we propose a data life cycle tree storage structure, and...
Proceedings Article

The Accessible Interactive Mode of Traditional Printing Based on Two-Dimensional Code

Lu-Na Mao, Xiao-Jie Huang, Zhi Yu, Wei Wang, Sheng Zhou
There is a serious barrier to the interaction between the visually impaired and traditional printing, so this paper proposed a new accessible interaction on the basis of the existing application Voiceye. The whole process is uploading editable text information that corresponds to paper material to the...
Proceedings Article

Design of Power Quality Monitoring System Based on Wireless Network

Ke-Li Duan
In order to improve the real-time power quality monitoring, this paper presents a power quality monitoring system based on ZigBee, mainly comprising three parts, these are the monitoring system of power quality, composition data communications and monitoring center. Power system operation of power quality...
Proceedings Article

A Distributed Solution for Fair Bandwidth Distribution among Data Flows in Wireless Networks

Ji-Yu Chen, Shi-Ping Chen
In wireless networks, it is important to ensure fairness among data flows in their access to network bandwidth. Providing end-to-end fairness in mobile networks is particularly challenging. This paper proposes a packet tagging and prioritized scheduling scheme that achieves fairness under network dynamics,...
Proceedings Article

A Remote Monitoring and Decision-Making System for the Vehicle Rental

De Long, Jian-Jun Yi, Fei-xiang Xu, Xiao-Ming Zhu
Vehicle rental service is being developed greatly in recent 10 years. A remote monitoring and decision-making system is proposed in this paper. This system can help the lessors to supervise their vehicles in real time. It also facilitates the customers to acquire the real time status of the rented vehicle,...
Proceedings Article

A Time-Slot Routing Protocol for Smart Home

Xiao Tian, Nan Chen, Xian-Deng He
By adopting ad hoc technique, the routing protocol of data network can be realized in smart home system. Due to the features of low moving speed, less number of nodes and high data rate, few present ad-hoc protocols are suitable for smart home data network. In order to make up the deficiencies of present...
Proceedings Article

Fast Single Image Haze Removal Method based on Atmospheric Scattering Model

De-Wei Huang, Ke-Xin Chen, Jian-Qiang Lu, Wei-Xing Wang
In this paper, we propose an effective and efficient method to remove haze from a single input image. We first remove fine details from the minimum channel of RGB channels by a low-pass filter and then use it as a rough estimation of the transmission map. Then, we refine the rough estimation by using...
Proceedings Article

Hardware Accelerating Design Of Image Matching With FNCC Similarity Measure Algorithm

Xiong-Bo Zhao, Song-Ling Wu, Liang-Liang Liu
Similarity measure is a usual image processing algorithm, which is decisive for the quality of image registration. And Fast Normalized Cross Correlation(FNCC) is one of the most common similarity matching algorithm. However, it is computationally intensive and very time consuming which limits its application....
Proceedings Article

R/S Analysis in Mobile Social Networks

Wei Zheng, Kang Zhao
In this paper, a R/S analysis method based on clustering coefficient time series is presented to testify the mobile social networks (MSNs) is fractal and organized. It is found that MSNs are fractal in the scale of clustering coefficient. Then use the Hurst exponent to make some simple forecasts if the...
Proceedings Article

A New Approach for Single Image Haze Removal

Jian-Qiang Lu, Wei-Xing Wang, De-Wei Huang, Ke-Xin Chen
We require the system for haze removal can process in real-time and have an accurate result. However, the existing algorithm can hardly meet the two requirements which we discuss above. In this paper, we propose a novel algorithm which is using the minimum channel in R, G, B and the difference of the...
Proceedings Article

A Fire Monitoring Cloud Platform Based on Internet of Things

Fei-Xiang Xu, Jian-Jun Yi, Long De, Xiao-Ming Zhu
Based on the research of existing fire monitoring system, a fire monitoring cloud platform for monitoring building fire protection equipment status using Internet of Things (IoT) technology is proposed in this paper. The cloud platform consists of three layers: sensing communication layer, cloud computing...
Proceedings Article

Green Video Streaming in LTE Networks: A Client-Side Method for Power Efficiency of Mobile Devices

Jing-Yu Zhang, Yuan-Yi Chen, Xiao-Dong Meng, Chen-Tao Wu, Li-Ting Xu, Riaz Ali
Nowadays mobile data traffic is soaring gradually year by year, the total monthly mobile data traffic (includes uplink and downlink) has come to more than 3,500 Petabytes and the growing trend is continuing. Video streaming demand is the significant contributor of cellular network data traffic, it accounted...
Proceedings Article

A Variable-Parameter Coding Scheme Based on LDPC

Ling Zhao, Zhong Li, Man-Jie Zhu
The paper proposes a channel coding system with both error correction performance and security performance. The implementation of security performance is to construct a cluster of parity check matrices with the same structure and to replace check matrices constantly in the coding process, which can be...
Proceedings Article

Design of Servo Motor Control System Based on POWERLINK Fieldbus

Dang-feng Pang, Jiang Wang, Li-Qiang Wang, Sheng-Li Lu
With the continuous development of science and technology, the servo motor control system based on real time industrial Ethernet is now more widely applied in the field of industrial automation than ever. This paper expounds the design of a servo motor control system based on POWERLINK Industrial Ethernet....
Proceedings Article

LEACH Algorithm Improvement Based on Cluster Head Selection

Min-Sheng Tan, Chen-Cheng Wang, Miao Guo, Ting Xiang, Qun-Zhong Peng, Yang-Wei Li
In order to solve the problem of LEACH Algorithm cannot guarantee the larger residual energy node absolutely were elected as cluster head , and it consumes large amounts of energy for double counting of cluster head election, at the same time, the influence of the node distance for cluster head election...
Proceedings Article

An Trust Model Based on Grey Relational Analysis and Cooperative Computing in Opportunity Networks

Jian-Bo Xu, Dan-Ping Shou
The existence of selfish nodes and malicious nodes pose a significant threat to the complex environment of opportunistic network. In order to improve the transmission security in bad environment, a multi-dimensional trust model GRATM(Grey Relational Analysis Trust Model) based on gray relational degree...
Proceedings Article

A New Designated Verifier Proxy Signature in Standard Model

Li-Hong Guo, Hai-Tao Wu, Qing Yang
Proxy signature schemes have been suggested for use in a number of applications, so the security of proxy signature scheme is more and more important. However, at present, almost all the proxy signature schemas were proven secure in the random oracle model, which has received a lot of criticism. Recently,...
Proceedings Article

Finite Element Method on Contact Problem of Non-newtonian Fluid Material

Lu-Lu Ma, Lei Hou
In this paper, we use finite element method to study contact problem of non-Newtonian fluid material. We focus on Cauchy equation which describes the velocity changes in the flow field. The space domain is discrete by Lagrange interpolation function with 16-point bicubic elements. The time domain is...
Proceedings Article

Fast Parallel Compositon of Dunhuang Murals based on Matrix Tearing

Ming Chen, Yong-Chao Wang, Lei Zhao, Duan-Qing Xu
In this paper we have developed a robust scalable hybrid scheme for Fast Parallel compositon of Dunhuang murals based on Matrix Tearing. The large cost associated with solution of partitioned linear systems, which is required to perform the matrix-vector multiplication, was avoided by presenting a scheme...
Proceedings Article

Joint Cooperative Diversity and Network Coding for Wireless Video Streaming

Gang Wang, Zhi-Yi Qu, Yong-Wen Li
The letter introduces random linear network coding (RLNC) based cooperative diversity transmission scheme to guarantee reliable wireless video streaming transmission. For Rayleigh block fading channel, RLNC assisted direct communication method increases packet reliability at high signal-to-noise ratio...
Proceedings Article

Research on Traffic Monitoring Method of Elevated Road Based on DSP+FPGA

Rong-Bao Chen, Tian-Ze Fei, Ben-Xian Xiao, Peng Jiang, Dun-Hong Wang, Qian-Kun Zhang, Yu-Bing Pu, Ya-Feng Wu
Along with the development of the urban rapid transit, the overhead traffic monitoring, and according to the traffic situation in a timely manner to make all kinds of control, management, and induced measures is one of the development trend of urban intelligent transportation. In this paper, the video...
Proceedings Article

A LDPC-Coded Distributed Alamouti Space-time Relay Cooperation Scheme over Rayleigh Fading Channels

Lei Tang, Wei-Wei Liu, Tian-Yu Wang
An efficient distributed Alamouti Space-time coded relay cooperation scheme is proposed over a Rayleigh fading channel, where structured irregular systematic low-densityparity-check (LDPC) codes are employed. In the known channel state information (CSI) scenario, a concatenation of combiner and joint...
Proceedings Article

An Embedded Secondary Contention Window for In-Band Full-Duplex Enabled WLAN

Wen-Nai Wang, Xin-Meng Wang, Wei Wu
In-band full-duplex wireless techniques have provided an attractive opportunity to double both spectrum efficiency and network throughput. A shared wireless channel permits two sets of directional paths, one called by primary and the other by secondary, onto which two different pair of wireless stations...
Proceedings Article

Analysis of Inter-Satellite Terahertz Communication Link

Yuan-Ming Ding, Shan Gao, Xin Shi, Hao Wu
The domestic and foreign status of terahertz wireless communication is introduced, and the paper analyzes the feasibility of ultra high speed short range and high speed long range inter-satellite terahertz communication. The capacity of inter-satellite terahertz communication system under the ideal additive...
Proceedings Article

A Performance Optimization Model for Voice over IP Networks

Yao Lu, Rui Wang
In order to provide the same or better service quality in the Internet than traditional circuit-switched telephone network, there exist a number of issues to be dealt with that have hampered it in the Internet. These need good network planning and capacity management algorithms. The network performance...
Proceedings Article

Optimal Slot Allocation Method for ITE Systems

Bin Zeng, Rui Wang
To achieve better performance and bandwidth in the mobile communication, some vendors have already introduced LTE service. The following issues concerning LTE such as performance estimation, throughput analysis, quality of service, voice/data integration are of great interest for deep research. Therefore,...
Proceedings Article

Improvement in the Noise Characteristics of Optical Frequency Comb Based on Injection Locking

Jia-Xing Xie
Radio over fiber (ROF) systems are attractive solutions for broadband wireless access network due to its capacity for supporting high speed data rate transmission. And optical heterodyning is a promising method to generate microwave signals used in radio over fiber systems. Beating of the different modes...
Proceedings Article

Novel Asymmetric U-Shaped Slot Antenna with WLAN Application

Qiang Chen, Hou Zhang, Tao Zhong, Xue-Liang Min, Lu-Chun Yang
A novel asymmetric U-Shaped slot antenna with WLAN application is proposed and fabricated. The proposed antenna consists of an asymmetric U-shaped slot and an inverted L-shaped slot which are designed to applied to WLAN devices, in addition, fed by a coplanar waveguide (CPW) Furthermore, Good agreement...
Proceedings Article

Design of Bandpass Filter with High Selectivity Using Stepped Impedance Resonator

Xue-Liang Min, Hou Zhang, Tao Zhong, Qiang Chen
In this paper, a novel bandpass filter (BPF) with high selectivity and great out-of band suppression is proposed by using stepped impedance resonators (SIR) and defected ground structure. The measured 3-dB bandwidth of the proposed BPF is 2.62-2.72GHz; the maximum simulated insertion loss is 0.4 dB within...
Proceedings Article

Personalized Differential Privacy Preserving Data Aggregation for Smart Homes

Xin-Yuan Zhang, Liu-Sheng Huang, Shao-Wei Wang, Zhen-Yu Zhu, Hong-Li Xu
The aggregation of residents' private data drives improvements in the smart homes, however it comes with compromising on privacy. Hence, privacy preservation has become an increasing requirement for residents. Since users might have different privacy requirements, and their privacy requirements might...
Proceedings Article

Hybrid Data-Aided and Code-Aided Carrier Synchronization Schemes for Burst-Mode Communications

Jin-Hua Sun, Jing Cheng
For burst communication systems, high estimation accuracy and large estimation range cannot be achieved at the same time at low signal to noise ratio(SNR), a hybrid data-aided(DA) and code-aided(CA) carrier synchronization scheme is proposed. Firstly, the synchronization parameters coarse estimation...
Proceedings Article

New PIC Scheme for Multi-Carrier DS-CDMA

Guo-Xiong Xu
This paper explores a new parallel interference cancellation (PIC) scheme for multi-carrier DS-CDMA. For the PIC scheme, frequency diversity technique and the linearization of soft decision function are used to simplify the complexity and improve the system performance. The theoretical analysis over...
Proceedings Article

Multiple Powers Allocation Strategy under Sensing/Transmission Frame Structure in Cognitive Radio Networks

Dao-Yuan Ren, Shou-Yi Yang, Fang Wang, Liu-Jie Ji
In the traditional opportunity spectrum access cognitive radio system(OSA), the state of the primary user is assumed to be constant during the entire frame duration, the secondary user accesses licensed band with proper power only when primary user is detected idle. In fact, the state of the primary...
Proceedings Article

Intelligent Access Control System for Vulnerable Group Based on Bluetooth Low Energy

Qi-Lu Hong, Ai-Jun Zhang, Yin-Hong Su
Nowadays, intelligent application has been widely used which has an ever-increasing effect on our daily life. However, some applications are too complex to operate especially for vulnerable group. This article aims at designing an use-friendly door lock for vulnerable group when they are home. Bluetooth...
Proceedings Article

A New Discriminative Tracking Method Applied in Multi-rotor Unmanned Aircraft

Gang Wu, Xiao-Qin Zeng
Aiming at difficulties for vehicle tracking on the specific scenes such as fast motion, rotation, drastic illumination and scale change, a new discriminative tracking algorithm for moving vehicles is proposed in this paper. We incorporate low-rank sparse representation and dictionary learning with the...
Proceedings Article

A Handover Optimized Scheme and Performance Analysis in HMIPv6 Network

Jiao-Min Luo, Ying Li
Mobile communication is increasingly oriented towards the usage of all IP networks as fixed network components. The handover performance of mobile IPv6 is one of the key factors which guarantee the QoS of mobile Internet. In this paper, an enhance handover scheme in hierarchical MIPv6 networks by utilizing...
Proceedings Article

An Algorithm Managing Sleep-Nodes for CoAP Reliable Group Communications

Huan Guo, Geng-Yu Wei
In constrained networks of IoT applications, Constrained nodes have sleep mechanism to reduce energy consumption, which causes an unreliable communication. CoAP has been defined as an application protocol for Constrained networks by IETF CoRE WG, with reliable unicast and unreliable group communication...
Proceedings Article

Summary of Stateless Address Auto-Configuration for Ipv6

Zi-Wen Wang, Geng-Yu Wei
IPv6 stateless address auto-configuration is a brand new method to generate IPv6 address. Similar to IPv4, IPv6 has also defined stateful address auto-configuration rules based on DHCPv6, while SLAAC can either work without DHCPv6 or rely on some functions of it. This research has summarized and analyzed...
Proceedings Article

Research and Development of Android Client and Server Information Interaction Framework

Lan-Xin Zhu, Jia-Ming Zhang, Xiao-Li Rui, Xiao Liang
Nowadays the information technology and mobile terminal equipment are developing rapidly, how to develop mobile applications more effectively has become a really hot topic. This paper mainly focus on the research and design of information exchange between Android client and web server and the framework...
Proceedings Article

The Design and Implementation of CoAP Over WebSocket Proxy

Zhong-Yan Yuan, Geng-Yu Wei
CoAP is designed as an application layer protocol for IoT applications by IETF CoRE WG, and CoAP over WebSocket is currently of interest to researchers. This paper analyzes the features and defect of the HTTP/CoAP proxy proposed in RFC 7252, and explains the CoAP over WebSocket proxy as well as its advantage...
Proceedings Article

Design of a Full-Coherent Millimeter Wave Radar Frequency Synthesizer

Chang-Ming Chen, Jun Xu, Ye Peng
In this paper, with the combination of DDS, PLL, multiplier and mixing techniques, a millimeter wave (mm-wave) full-coherent frequency synthesizer with low phase-noise and spurs is developed. It includes a mm-wave source. A linear frequency modulation (LFM) generator and a microwave source serving as...
Proceedings Article

Investigation of Organic Polymerization in Treating Waste Water by Electrolysis

Guang-Zai Nong, Ya-Lei Jiang, Shuang-Fei Wang
Treating wastewater by bio-reactors combined with electrolytic cells gets better efficiencies in practices. Beside removal of pollutants by electro-oxidation reactions, organic polymerization is considered as another mechanism contributing to remove pollutants in treating wastewater by electrolysis....
Proceedings Article

SVD-based Blind Estimation of M-Sequence with Modulated DS-CDMA Signals

Yu Han, Lei Shen, Jia-Jia Miao
An Singular Value Decomposition (SVD) based method was proposed and developed in this work to estimate the m-sequence of modulated Direct-Sequence Code Division Multiple Access (DS-CDMA) signals with carrier frequency offset. By building eigenvalues based objections, a proper carrier frequency range...
Proceedings Article

WILS: Wireless Indoor Localization System using Commercial WiFi Infrastructures with Decimeter Accuracy

Zhu-Chuang Shao, Dong Wang, Run Zhao, Ahsan Jamal Akbar
we present Wireless Indoor Localization System (WILS) that enables commercial WiFi infrastructures to implement localization in the complex indoor environment. Receive Signal Strength Indication (RSSI) is utilized by some systems to get a high accuracy of localization, but they are easily be affected...
Proceedings Article

Garbage Collection of Virtual Object in IoT

Ze-Yi Zhao, Dong Wang
Since the Internet of Things has become more and more popular, the number of devices in IoT increase at a rapid clip. Some Researches introduced virtual object to enrich the management of the devices. Therefore, virtual object life cycles will need to be thoroughly managed, so that when their usage changes...
Proceedings Article

The Influence of Atmospheric Turbulence on Radio Vortex Wave

Ling-Ling Li, Heng-Kai Zhao, Shao-Jun Zhang, Xue-Feng Liu
Spiral space phase distribution of the vortex wave form specific orbital angular momentum. This paper studies the effect of atmospheric turbulence on the vortex wave phase through the numerical simulation. In order to analyze the influence of atmospheric turbulence on the vortex wave, we make comparison...
Proceedings Article

A Row-column Hybrid Storage Approach based on Massively Parallel Processing

Qiao Sun, Lan-Mei Fu, Peng Wu, Jia-Song Sun
Massively parallel processing architecture, as a common parallel processing server architecture, is widely used in the field of mathematical modeling and database processing which require a lot of computing. This architecture can complete the calls of multiple processors by the coordination, which can...
Proceedings Article

Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries

Wei Wang, Wen-Hong Zhao, Zhong Cheng, Xing-Hua Li
The existing anonymous region construction schemes based on continuous Location-based service (LBS) queries do not solve the temporal and spatial relationship of common user sets in adjacent anonymous regions. The attacker can reduce the anonymous region and reduce the common user set by the Maximum...
Proceedings Article

Optimizational Scheme for Constructing Anonymous Spatial Region under Continuous LBS Queries

Wei Wang, Wen-Hong Zhao, Cheng Zhong, Xing-Hua Li
K-anonymity technology is one of the important technologies of location privacy protection based on LBS(Location-based service, LBS), it protects users' location privacy by constructing ASR(anonymous spatial region, ASR). Existing construction schemes for ASR based on continuous LBS queries giving rise...
Proceedings Article

Contrastive Analysis for Human Activity Recognition Algorithms Using WiFi Signals

Jian Zhou, Han Su, Kai Yu
Human Activity monitoring has become increasingly important and has the potential to support a wide area of applications including elder care, well-being management, fitness tracking and building surveillance. Traditional approaches involve wearable sensors and specialized hardware installations. Compared...
Proceedings Article

Fine-Grained Virtual Network Embedding in 5G Hierarchical Network Infrastructure

Ling-Shu Li, Cai-Xia Liu, Quan Yuan, Xiao-Yang Fang, Yang-Yang Zhang
Resource allocation and deployment of network Service Function Chain (SFC) is a vital problem of 5G network virtualization. By introducing SDN and NFV technology, the core network is reclassified as the control layer, forwarding layer and scheduling layer. A Virtual Network Embedding algorithm based...
Proceedings Article

DONM: Domain-based Opportunistic Networks Model in Emergency Scenarios

Xia Wang, Wen-Wen Pan, Xu-Hong Li, Xiao-Fei Sun, Wei Zhang, Tao Xu
Sudden Disaster always damages communications infrastructure, adding to the difficulties of rescue efforts. To address this problem, this paper studies the features of post-disaster emergency communication scenario and proposes specific Domain-based Opportunistic Network Model (DONM) which divides an...
Proceedings Article

Method for IP geolocation based on Path Similarity

Lian-Xing Ren
The ability to accurately determine the geographic location of an arbitrary IP address has potential in many applications. This paper presented a novel algorithm for IP geolocating based on network measurement. Considering the features of China Internet's distribution, using trace route tools, we build...
Proceedings Article

Visual Verification Method for Indirect Line of Sight Stabilization

Zhu-Lin Wang, Wei-Wei Gao, Peng He, Hong-Yun Wang
In order to visualize the validation results of Indirect Line of sight stabilization, Visual simulation research is carried out. In the VC++ environment, the visual simulation platform is built by combining the OpenGL and MFC technology. The target and field of view are simulated. Process of Indirect...
Proceedings Article

SAR Images Target Recognition Based on Wavelet and KSVD

Lei Liu, Xiang-Wei Meng, Zhao-Gen Zhong, Ke-Yuan Yu
Ship targets recognition algorithm based on wavelet domain Kernel Singular Value Decomposition(KSVD) feature extraction was proposed to deal with the problem of ship targets recognition in SAR images. Low-frequency sub-band image is obtained by two-dimension discrete wavelet decomposition of a SAR image....
Proceedings Article

Secure Relay Beamforming in Non-Regenerative Two-Way Relay Cognitive Radio Networks with Energy Harvesting Constraints

Feng-Chuang Xing, Sai Zhao, Gao-Fei Huang, Ming-Xia Lv, Gui-Yun Liu, Guo-Qi Wang, Dong Tang
In this paper, we consider the problem of nonregenerative two-way secure relay beam forming (SRB) for cognitive radio network (CRN) under the background of the simultaneous wireless information and power transfer (SWIPT). Our objective is to maximize sum rate under the transmit power constraint at the...
Proceedings Article

Arana: A Cross-domain Workflow Scheduling System

Jian-Hua Gu, Xue-Yuan Lan, Ying Hao, Yu-Tong Hu
Single data center is difficult to meet current demands of data storage and computing resources, leading to data broadly stored in different data centers far from each other geographically. Cross-domain big data processing usually requires data from other data centers across different network. Since...
Proceedings Article

Path Tracking Control for Uncertainty Vehicles via LMI Optimization

Ming Yang, Chang-Fang Chen, Ming-Lei Shu, Yuan-Yuan Yang
This paper studies the path tracking control of fourwheel steering autonomous vehicles in presence of uncertainties of tire-road condition, modeling uncertainties, and unexpected disturbances. Due to the fast convergence of the wheel subsystem, the simplified vehicle model can be developed based on the...
Proceedings Article

Design and Application of Intelligent Monitoring System for Laminated Henhouse with Six Overlap Tiers Cages

Hua-Long Li, Xuan-Jiang Yang, Jun-Ying Li, Kai Zhan, Miao Li, Hui-Yi Gao, Ze-Lin Hu
Because of high breeding density, the laminated henhouse with six overlap tiers cages microclimate has more influence to layers health and production performance. At present, the environmental measuring parameters and the measuring points are too less to reflect the whole henhouse environment. To solve...
Proceedings Article

An Denoising Method Based on Analysis K-SVD and Disagreement Segment and Its Application on EMI Signal

Wen-Ru Gong, Hong-Yi Li, Di Zhao
Sparse representation plays an important role in signal processing. Recently, the analysis sparse representation has been attracting more and more attention. In this paper, an improved analysis K-SVD denoising algorithm based on disagreement-segment is proposed. A signal is first divided into small redundant...
Proceedings Article

A Synchronization Algorithm for TDD Active Optical Distribution Systems

Wei Wang, Zhi-de Li
As a new wireless network coverage device, the active optical distribution system used for coverage enhancement of GSM, TD-SCDMA and TD-LTE wireless networks has many merits, such as green, micro power, multi-antenna and multipoint uniform depth coverage when compared with the traditional indoor distribution...
Proceedings Article

Design of Fermentation Process Monitoring and Control System Based on LabVIEW

Feng Guo, Dong-Shuai Cui, Jie Li, Jia-Yu Cui, Chun-Tao Zhang
This paper focuses on the commonly used glass fermentation tank in biological fermentation, aiming at improving and optimizing the current monitoring process of biological fermentation. Based on the LabVIEW platform, we have designed a set of monitoring system to study biological fermentation process....
Proceedings Article

Critical Inforamtion Detection for the Prevention and Control of Burst Cybercrime Events Under the Background of Big Data

Cheng-De Zhang, Yan-Peng Pan
With the popularity of computer and internet, cybercrime is rampant. However, the characteristics of internet making it more difficult to monitor the cybercrime, such as openness anonymity high speed and across localization. In this paper, we propose a new method to prevent cybercrime. Critical Information...
Proceedings Article

Review on Corner Detection Algorithms

Xing-Fu Zhang, Yan-Bo Li, Jing-Feng Song
Corner detection algorithms are widely used in image recognition, image matching and edge detection. Accurately finding a corner in a image can greatly improves the algorithms accuracy of the above research areas. So many scientists and researchers have begun to the hot research field and have made much...
Proceedings Article

A Hybrid Covert Channel Over LTE-A System

Zu-Kui Wang, Liu-Sheng Huang, Wei Yang, Zhi-Qiang He
In this paper, we have analyzed the sub-protocol stack of Long Term Evolution Advanced (LTE-A) System, and proposed a hybrid covert channel, called HyLTEsteg, designed for LTE-A System. The HyLTEsteg uses covert timing channels (CTC), which is fitted the legitimate data stream of network, as a trigger...
Proceedings Article

Horizontal Displacement Prediction Research of Deep Foundation Pit Based on the Least Square Support Vector Machine

Wei-dong Li, Meng-Hong Wu, Nan Lin
Using of the least square support vector machine to predict the horizontal displacement of deep foundation pit. According to the measured time series data of horizontal displacement of foundation pit, using the least square support vector machine (SVM) to set up the relation model of foundation pit horizontal...
Proceedings Article

Simple Structured Data Initial SZG File's Generation Software Design and Implementation

Shuang Li, Yi Jin
SZG file is a programming platform for users to use Ternary Optical Computer (TOC) in high-level language program. This paper proposes an initial SZG file, with an extension .SZG, generation technology for structured data. The technology proposed in the paper can implement some functions such as storing...
Proceedings Article

A Cloud TOPSIS Method for Multiple Criteria Decision Making with Interval Number

Tie-Dan Wang, Ding-Hong Peng, Xiao-Shi Shao
In order to ensure the accuracy of decision-making, need to be integrated the inevitable uncertainty information and fuzzy information into their decision-making process. In view of this, this paper proposed a Cloud TOPSIS method with the decision matrix contained the uncertainty and fuzziness information...
Proceedings Article

Wideband Spectrum Compressed Blind Sensing without Reconstruction Based on Higher-order Moment

Chuan-Hai Jiao, Yong-Cheng Li, Rui Wang
To improve the detection performance and detection speed of wideband spectrum sensing algorithms with little priori knowledge, a scheme of cooperative wideband compressed blind sensing without reconstruction based on higher-order moment (CWCBS-HOM for short) is proposed. The test statistic is extracted...
Proceedings Article

HAPS Wireless Communication Network Channel Modeling and Simulation

Xiao-Yang Liu, Chao Liu, Wan-Ping Liu, Yi-Hao Zhang, Xiao-Ping Zeng
High altitude platform station (HAPS) is a new means of wireless communication method, which operate in stratosphere whose altitude is about 20km. In order to improve the channel quality of wireless communication transmission and signal-to-noise ratio.The wirless communication network of HAPS are studied...
Proceedings Article

Evaluation of the Rural Informatization in China under the Background of the Construction of New Socialist Countryside

Yong-Jiang Lei, Cheng-Yi Huang, Cong-Gang Fang, Ruo-Heng Tian
The paper presents a method (Improved Fuzzy Analytic Hierarchy Process) to evaluate the development of rural informatization over the past decade in China. This article developed a rural informatization evaluation system including Rural informatization infrastructure, Rural informatization technology...
Proceedings Article

Fuzzy Roughness Measurement Model Based on Membership Effect

Fa-Chao Li, Li-Kun Wang
Rough fuzzy set theory and fuzzy set theory are two commonly used tools in today's uncertain type of information processing. How to construct a fusion method for two kinds of uncertain information systematically has been a focus in both academic and applied fields. By analyzing the characteristics and...
Proceedings Article

2.5D Near-field Reproduction in Higher Order Ambisonics

Wen-Bei Wang, Mao-Shen Jia, Chang-Chun Bao
2.5-dimensional (2.5D) sound field reproduction is a hot topic in acoustic signal processing, which overcomes the dimensionality mismatch (DM) problem between 2-dimensional (2D) sound field synthesis and practical sound sources. Based on the cylindrical/spherical harmonic expansion of Higher Order Ambisonics...
Proceedings Article

An Improved Track Initial Algorithm Based by Waveform Agility

Ren Li, Yang Feng
Currently tracking Track initiation in most core processes, how to achieve multiple objectives in a complex environment more accurate track initiation is still the key and difficult problems of target tracking. Waveform agile radar is currently the latest breakthroughs in the field of cognitive technology...
Proceedings Article

The Staffing Problem of the N-Design Multi-Skill Call Center Based on Queuing Model

Chun-Yan Li, De-Quan Yue
This paper studied the staffing problem of a multi-skill call center in N-design. In this model, there are two types of customers and two groups of servers who have different skills. We proposed a new state space division method, according to the different state of each agent groups, dividing the infinite...
Proceedings Article

Fast Handover Algorithm Based on DAD-Less Mechanism for Hierarchical Mobile IPv6

Jia-Bao Fang, Zhen-Xing Wang, Lian-Cheng Zhang
A fast handover algorithm using DAD-Less mechanism for hierarchical mobile IPv6 was proposed for the problem of mobile node handover latency by duplicate address detection in HMIPv6 in order to improve the performance of handover for HMIPv6. The IP address allocation mechanism and new interface identifier...
Proceedings Article

A Light-weight Multilevel Recoverable Container for Event-driven System: A Self-healing CPS Approach

Peng Zhou, De-Cheng Zuo, Kun-Mean Hou, Zhan Zhang, Hong-Ling Shi
Cyber Physical Systems (CPS) is regarded as a new technological revolution, which tightly integrates computing, communication, and control technologies, to build a kind of smart networked distributed embedded control system. CPS is designed to interact autonomously with the volatile external environment,...
Proceedings Article

Perception and Response Model of Danger Signal Based on Immune Peril Principle

Min-Sheng Tan, Chen-Cheng Wang, Miao Guo, Zhi-Guo Zhao, Ting Xiang
Danger signal perception and response model of perception layer in IoT based on immune peril principle (DSPRM-IPP) and related algorithms were proposed. DSPRM-IPP model includes immunologic tolerance module, danger perception and accumulation module and response module. Immunologic tolerance module's...
Proceedings Article

The Necessary Observation Space for the Lowest GDOP in 2-D Wireless Location Systems

Hong-Tao He, Qing-Yi Quan, Wen-Bo Wang
The necessary observation space to achieve the lowest geometric dilution of precision (GDOP) based absolute-range measurement in two-dimension (2-D) wireless location systems is researched. Angle of coverage (AOC) is introduced as a parameter to describe the observation space. In fact, AOC reflects the...
Proceedings Article

High-Precision Synchronized Pulse Generation for Mobile Multistatic Radar System

Li-Chen Zhu, Chen-Ning Zhao, Qing-Zi Guo, Xiang-Yuan Bu
In order to settle the problem of time and frequency synchronization of Mobile Multistatic Radar System (MMSRS), an algorithm that combines pseudo-noise (PN) code ranging and dynamic fine phase shift capability of Digital Clock Manager (DCM) module in FPGA is proposed to realize accurate synchronized...
Proceedings Article

Discrete Particle Swarm Optimization Algorithms for the Prize-Collecting Call Control Problem on Lines

Qian-Na Cui, Xing Wu, Qiao-Yan Zhu
In this paper,we propose two discrete particle swarm optimization algorithms to solve a prize-collecting call control problem on lines based on the classical particle swarm optimization algorithm. The two algorithms combine simulated annealing and genetical methods with particle swarm optimization respectively....
Proceedings Article

Cache Management Based on Node Status in Delay Tolerant Networks

Jun-She Wang, Bin Zhang
Delay Tolerant Network (DTN) is a kind of wireless network with limited resources and often occurs congestion. The effective cache management can make full use of the network resources and reduce the network congestion. Therefore, aiming at the deficiency of the current research of cache management,...
Proceedings Article

Survey on Mobility Model of Opportunistic Networks

Sheng Zhang, Ming-Hui Yao, Xin Wang, Imran Khan
Opportunistic networks is a kind of self-organizing networks which does not need the complete communication paths between the source node and the destination node. They transfer messages through communication opportunities arising from nodes movement. Because the message transmission opportunity depends...
Proceedings Article

Frequency Estimation of Weighted Signals Based On DFT Interpolation Algorithm

Chang-Gui Xie
It is generally demanded for strict frequency estimation of sinusoidal signal in a good many engineering practice situations. This paper puts forward an iterative frequency estimation algorithm on strength of the interpolation of Fourier coefficients of weighted samples. The algorithm is practically...
Proceedings Article

Research on Technological Innovation of the Toll Road Industry----Based on the Perspective of Value Chain Management

Xia Zhang, Wu-Juan Liu
In the operation process of the toll road industry, compared to cash flow and logistics, information flow plays a more important role. It runs through every link of the industry value chain and provides guarantee and support for the increase of the additional value of value chain. From the perspective...