Day 1 16/11/2019
Room #1

## Session A 11:00 - 12:00 ↓↑

11:00 - 11:20
Accelerating Q-ary Sliding-Window Belief Propagation algorithm with GPU

In this paper, we present a parallel Sliding-Window Belief Propagation algorithm to decode Q-ary Low-Density-Parity-Codes. The bottlenecks of sequential algorithm are carefully investigated. We use MATLAB platform to develop the parallel algorithm and run these bottlenecks simultaneously on thousands of threads of GPU. The experiment results show that our parallel algorithm achieves 2.3 times to 30.3 times speedup ratio than sequential algorithm.
Authors: Bowei Shan (School of Information Engineering, Chang'an University), Sihua Chen (School of Information Engineering, Chang'an University), Yong Fang (School of Information Engineering, Chang'an University),
Hide Authors & Abstract

Show Authors & Abstract
11:20 - 11:40
A simple and reliable acquisition algorithm for low-orbit satellite signal

Authors: Yue Yan (School of Electronics and Information, Northwestern Polytechnical University, Xi’an, China), Hongwei Zhao (School of Electronics and Information, Northwestern Polytechnical University, Xi’an, China),
Hide Authors & Abstract

Show Authors & Abstract
11:40 - 12:00
An FPGA based Reconfigurable MAC Architecture for Universal Short Range Communication Networks

The wireless universal short-distance network refers to a heterogeneous network that combines multiple wireless short-distance networks such as a wireless local area network and a wireless personal area network. Users can choose to use different multiple access protocols to access the network according to the characteristics of the service. This paper proposes an FPGA-based reconfigurable MAC architecture, which uses a combination of software and hardware to select the working mode of the general MAC in the FPGA through ARM, so as to achieve fast switching between different networks. The proposed universal MAC module includes a finite state machine based control module and a data frame transceiver module, and implements a function of switching between different networks by configuring a finite state machine based control module as a finite state machine of different MAC protocols. A general MAC module combining ALOHA protocol and CSMA/CA protocol is designed and implemented. The simulation results show that the designed general MAC module is equivalent to the CSMA/CA protocol in terms of resource utilization, and can be flexibly switching between ALOHA protocol and CSMA/CA protocol.
Authors: Hongyu Zhang (School of Electronics and Information, Northwestern Polytechnical University), Bo Li (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Ding Wang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract

## Workshop on Edge Intelligence And Computing For Iot Communications And Applications 14:00 - 16:00 ↓↑

14:00 - 14:00
Acoustic Frequency Division Based on Active Metamaterial:An Experimental Demonstration of Acoustic Frequency Halving

In this paper, an acoustic filter with low frequency bandstop and a broadband (0.3~3kHz) bandstop filter are presented.In this paper, control algorithm and related equipment are integrated with piezoelectric ceramic thin film, ADC and FPGA to study a system which can mix acoustically in the process of acoustic transmission and only allow one-way transmission of sound waves.
Authors: Ping Zhao (Fudan University), Junyi Wang (Fudan University), Xihan Gu (Fudan University), Yun Chen (Fudan University), Yun Chen (Fudan University), Xiaoyang Zeng (Fudan University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00

With the rapid development of the technology, the user cannot support the computation-intensive applications, owing to the restricted computation resources, limited memory space. Mobile edge computing, provides a solution that the user can unload parts of tasks to edge servers. However, computation offloading in the wireless network can encounter many kinds of attacks. Specifically, edge servers located in the edge of network are vulnerable to these security threats, such as spoofing, jamming and eavesdropping. Moreover, the computation offloading can have time latency and energy consumption. How to minimize this consumption is the another problem to be solved. To improve the security and minimize the consumption, we formulate a system containing a primary user (PU), a second user (SU), an attacker and several edge servers. They communicate with each other by multiple input multiple output (MIMO) technology. In this system, the SU chooses an MEC server from the set of not being occupied by PU, determines an offloading rate and a transmission power, then the attacker selects the action of attack. The aim of this system is to optimize the utility of SU. To solve this problem, a Q-learning based optimal offloading strategy is proposed, without knowing the model of channel information. Simulation results show that our proposed scheme can improve the capacity of SU and efficiently decrease the attack rate of the attacker.
Authors: Songyang Ge (School of Electronics and Information Technology, Sun Yat-sen University; Key Lab of EDA, Research Institute of Tsinghua University in Shenzhen (RITS)), Beiling Lu (School of Data and Computer Science, Sun Yat-sen University), Jie Gong (School of Data and Computer Science, Sun Yat-sen University), Xiang Chen (School of Electronics and Information Technology, Sun Yat-sen University; Key Lab of EDA, Research Institute of Tsinghua University in Shenzhen (RITS)),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Distributed Resource Allocation Policy for Network Slicing with Inter-Operator Bandwidth Borrowing

Network slicing is a novel technology to effectively provide solutions for heterogeneous mobile service requirements in 5G network. Meanwhile, the shortage of spectrum resources becomes more severe with the increase of high data rate requirement. In this paper, we study how to allocate spectrum resources to satisfy the diversified traffic requirements with network slicing and improve the utilization of spectrum resources. Therefore, a spectrum resource allocation model with three layers is considered and the three layers are operator layer, slice layer and user layer. At the mobile operator layer, mobile operators can borrow frequency bandwidth from one another to improve the spectrum efficiency. Then, the mobile operator allocates its frequency bandwidth to the slices according to users' demand. At last, the slice assigns bandwidth to users. Based on our model, a network utility maximization problem is formulated and a distributed resource allocation algorithm is proposed based on alternating direction method of multipliers (ADMM). Simulation results show that the proposed algorithm can quickly converge to the optimal solution after several iterations. In addition, the overall network utility can be effectively improved by lending or borrowing spectrum resources among operators. By adding the slice layer, the network can meet different types of service requirements.
Authors: Jiajia Chen (School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, China), Jie Gong (School of Data and Computer Science, Sun Yat-sen University, Guangzhou 510006, China), Xiang Chen (School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, China), Xijun Wang (School of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou 510006, China),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Reliable Index Modulation Aided Spatial M-ary DCSK Design

Higher order modulation and spatial modulation schemes improve the data rate for differential chaos shift keying (DCSK) systems by transmitting more bits in one time slot, however, the reliability performances become worse respectively due to more dense signal distributions and potentially bad channel conditions of active antennas. In this paper, we propose to utilize the antenna and symbol index to improve both the data rate and the reliability performances for DCSK systems with aid of the index modulation. Therein the information is modulated cooperatively using the antenna index and the symbol index. Then with the aid of the feedback channel state information (CSI) from receivers, the antenna with the best CSI is selected to transmit modulated symbols, which further helps to improve the reliability performance. At the receiver, reverse operations are performed. Furthermore, we provide the theoretical symbol error rate (SER) and bit error rate (BER) over the multi-path Rayleigh fading channel. Simulation results demonstrate that the proposed scheme achieves better reliability performances than the counterpart schemes with the same data rate.
Authors: Zuwei Chen (Sun Yat-sen University), Lin Zhang (Sun Yat-sen University), Zhiqiang Wu (Tibet University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
A Contract-based Incentive Mechanism for Resource Sharing and Task Allocation in Container-based Vehicular Edge Computing

Vehicular edge computing (VEC) has emerged as a promising paradigm to provide low-latency service by extending the edge computing to vehicular networks. To meet the ever-increasing demand of computation and communication resource, utilizing vehicle as augmented infrastructure for computation offloading is an appealing idea. However, due to the lack of effective incentive and task allocation mechanism, it is challenging to exploit vehicles as infrastructure for computation offloading. To cope with these challenges, we first propose a container-based vehicular edge computing paradigm with efficient and flexible customization of vehicles' resource. Then we present a contract-based incentive mechanism to motivate vehicles to share their resources with service requesters (SRs). The contracts are designed for different types of vehicle with unique characteristic while maximizing the expected utility of SRs. Simulation results show that the proposed solution is effective compared with traditional schemes.
Authors: Siming Wang (Guangdong University of Technology), Xumin Huang (Guangdong University of Technology), Beihai Tan (Guangdong University of Technology), Rong Yu (Guangdong University of Technology),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
A New Method for Deriving Upper Bound of OCR-TDMA Performance

With the rapid development of flash memory technology, the buffer capacity of device becomes higher. In this case, infinite buffer could be introduced to derived the upper bound of system performance. In this paper, a new method which considers Enqueue rate and Dequeue rate of buffer is proposed to derive the performance of OCR-TDMA when buffer length of relay $L = \infty$. In simulation part, buffer lengths from 1 to $\infty$ are considered as parameters to compare system performances, and the theoretical results and simulation results match well. Therefore, the proposed method can be applied in other similar model to simplify the derivation of system performance.
Authors: Xinyu Liu (School of Computer and Information, Hefei University of Technology, Hefei, China), Qingfeng Zhou (School of Electric Engineering and Intelligentization, Dongguan University of Technology, China), Min Peng (Anhui Province Key Laboratory of Industry Safety and Emergency Technology, School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China),
Hide Authors & Abstract

Show Authors & Abstract
14:15 - 14:15
Power-Efficient Communication for UAV-Enabled Mobile Relay System

This paper studies a unmanned aerial vehicle (UAV)-based wireless relay communication system, where a UAV provides relay services for a source node and a destination node. We aim at minimizing the total power consumption of the UAV with a guarantee of the link transmission rate by jointly optimizing the UAVs trajectory, the UAV’s transmission power, and the transmission power of source node. In addition, this paper considers the transmission power constraints of the UAV and the source node, mobility constrains of UAV, and informationcausality constrain, so the original problem is a non-convex problem. In order to solve this problem, a successive convex approximation (SCA)-based optimization method is proposed, which can obtain an approximate optimal solution. Simulation results show the performance of the proposed method.
Authors: Long Chen (Nanjing University of Posts and Telecommunications), Shu Cai (Nanjing University of Posts and Telecommunications), Weidong Zhang (Nanjing University of Posts and Telecommunications), Jun Zhang (Nanjing University of Posts and Telecommunications), Yongan Guo (Nanjing University of Posts and Telecommunications),
Hide Authors & Abstract

Show Authors & Abstract

## Workshop on Ubiquitous Services Transmission For Internet Of Things 16:20 - 18:20 ↓↑

16:20 - 16:20
DOS/SP: Distributed Opportunistic Channel Access with Smart Probing in Wireless Cooperative Networks

This paper investigates optimal distributed opportunistic channel access in wireless cooperative networks with multiple relays deployed. While probing all potential relay channels could result in significant overhead and spectrum efficiency affected, distributed OCA strategies with smart relays probing is studied in this research. To achieve reliable communications of high efficiency, number of probed relays and way to use have to be carefully decided in a dynamic manner. Finding that the sequential channel probing and access are coupled, an optimal distributed OCA is much challenging, and main difficult lies in how to exploit multi-source diversity, multi-relay diversity and time diversity in full manner. To tackle this problem, an analytical framework is built based on theory of optimal sequential observation planned decision. This decision-theoretic approach integrates the design of MAC layer and physical layer, enabling smart probing and cooperative transmissions under multiple relays. Based on it, an optimal DOCA/SP strategy is proposed to maximize average system throughput, and the optimality is rigorously proved. The implementation is described, and through numerical and simulation results effectiveness is validated.
Authors: Zhou Zhang (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Ye Yan (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Wei Sang (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Zuohong Xu (National University of Defense Technology),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Energy-efficient Resource Allocation for Mobile Edge Computing System Supporting Multiple Mobile Devices

Nowadays, mobile edge computing (MEC) has become a promising technique to provide mobile devices with intensive computation capability for the applications in the Internet of Things and 5G communications. In a MEC system, a mobile device, who has computation tasks to complete, would like to offload part or all the data for computation to a MEC server, due to the limit of local computation capability. In this paper, we consider a MEC system with one MEC server and multiple mobile devices, who access into the MEC server via frequency division multiple access (FDMA). The energy consumption of all the mobile devices is targeted to minimized via optimizing the computation and communication resources, including the amount of data for offloading, the bandwidth for accessing, the energy budget for offloading data, the time budget for offloading, for each mobile device. An optimization problem is formulated, which is non-convex. We decompose it into two levels. In the lower level, a convex optimization problems is formulated. In the upper level, a one-dimensional variable is to be optimized by bisection search method.
Authors: Song Jin (Institute of Telecommunication Satellite, China Aerospace Science and Technology Corporation), Qi Gu (Beijing Jiaotong University), Xiang Li (Beijing Institute of Technology), Xuming An (Beijing Institute of Technology), Rongfei Fan (Beijing Institute of Technology),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Dynamic Maximum Iteration Number Scheduling LDPC Decoder for Space-based Internet of Things

For Space-based internet of things (S-IoT) application scenario, a Dynamic Maximum Iteration Number (DMI) scheduling decoder for LDPC codes is proposed. Distinct from traditional Static Maximum Iteration Number (SMI) scheduling LDPC decoder using fixed maximum iteration number, our DMI LDPC decoder has extra circuit to obtain the dynamic maximum iteration number, which could improves BER performance only at the expense of a slightly logic resources and a small ratio of memories, compared with conventional SMI scheme. Therefore, the DMI decoder is very suitable for the fluctuation of signal-to-noise ratio of S-IoT link.
Authors: Ruijia Yuan (China Academy of Space Technology (Xi’an), Xi’an, P. R. China),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
A Temperature Sensor System in the 4G-Based Internet of Things

In order to manage real-time ambient temperature values at all times and places, this paper realizes a 4G-based temperature sensor system for the internet of things. Sensor platform gets the temperature values from wireless terminal nodes through the ZigBee coordinator, and upload it to the remote MySQL database server via 4G. In addition, an application is developed on mobile phone for users to obtain real-time temperature values, and a website for PC users is set up to realize the temperature values searching and displaying in real time.
Authors: Donglin Bai (+86 13772545668), Feng Jin (+86 13324539778),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Compressive-sensing Based Codec of the Y Color Component for Point Cloud

The point cloud obtained by the 3D laser scanner contains a very large amount of data, in order to transmit the point cloud data as much as possible with the limited bandwidth, the effective compression of point cloud data has become a problem that needs to be solved urgently nowadays. In this paper, we use the compressive sensing theory to compress and reconstruct one of the point features, that is, the Y color component, served as the signal. We also use the K-SVD algorithm to explore the signal’s sparsity according to its unique structural features, the K-SVD algorithm can learns a sparse basis matrix that is common to all point cloud models used in our experiments. For experimental results, we use rate-distortion metric. The results show that for each point cloud model, our method can achieve a higher probability to reconstruct the original data after compressed
Authors: Weiwei Wang (Shandong University), Hui Yuan (Shandong University), Hao Liu (Shandong University), Qi Liu (Shandong University),
Hide Authors & Abstract

Show Authors & Abstract

Room #2

## Session B 11:00 - 12:00 ↓↑

11:00 - 11:00
An efficient certificateless short signature scheme with security proofs

Certificateless short signature (CLSS) has attracted significant research attention since it can reduce the signature size. A new CLSS scheme using bilinear pairings is proposed, the security proof is presented in the random oracle model (ROM) under the computational Diffie-Hellman (CDH) assumption. The proposed scheme is more efficient than the previously CLSS schemes in terms of computation and communication costs, and is more suitable for the applications of low-bandwidth channels and/or low-computation power such as PDAs, cell phones, RFID chips and sensor with less powerful battery.
Authors: Wenhao Liu (Hangzhou Normal University), Dandan Ding (Hangzhou Normal University), Yiwei Liu (Learnings.ai Company),
Hide Authors & Abstract

Show Authors & Abstract
11:00 - 11:00
Research on Unambiguous Acquisition of BOC Modulated Navigation Signal

BOC modulation is widely used in the new generation of satellite navigation system. It has been used in GPS, Galileo and BeiDou systems. Compared with the traditional BPSK modulation, it has sharper correlation characteristics and stronger anti-multipath performance. The spectrum relocation caused by its splitting frequency can effectively solve the current frequency band congestion problem. But BOC modulation has multiple peak characteristics in the time domain, and the existence of sub-peak increases the difficulty of acquisition. Adding a pseudo-code correlation branch to the original BOC code correlation branch by using autocorrelation side-peak cancellation technique (ASPeCT) can effectively weaken the sub-peak of the correlation function and avoid wrong acquisition. This paper applies this ASPeCT acquisition algorithm to the parallel pseudorandom code FFT acquisition strategy to acquire the BeidDou-3 navigation signals. And the research object is the BOC(1,1) signal of the pilot component in BeidDou-3. Experimental results show that the method adopted in this paper can ensure the acquisition time and the acquisition accuracy reaches half a chip
Authors: Chunyang Liu (School of Electronics and Information Northwestern Polytechnical University, Xi’an, China), Hongwei Zhao (School of Electronics and Information Northwestern Polytechnical University, Xi’an, China), Li Li (School of Electronics and Information Northwestern Polytechnical University, Xi’an, China),
Hide Authors & Abstract

Show Authors & Abstract
11:00 - 11:00
Distributed Network Resource Allocation Protocol Based on Collision Sparse and Push-pull Cascading Mechanism

Wireless directed ad hoc network has attracted close attention from academic area in recent years due to its large antenna gain small multipath interference, long propagation distance and space reusability. However, as the other side of a coin, since the signal in other directions cannot be well sensed, the environment of the communication channel cannot be predicted, thus causing interference between multiple concurrent transmission links. Therefore, it is extremely important to study the wireless directed ad hoc network and use its advantages to overcome its shortcomings. In this paper, the concurrent link interference problem in the wireless directed ad hoc network is analyzed.Firstly, this paper analyzes the advantages and disadvantages of the classical Push mechanism and Pull mechanism. Then based on this, a network resource allocation protocol, CSPC(Collision Sparse and Push-pull Cascade), is proposed for the transmission and reception of network resources ;CSPC protocol mainly uses the idea of collision sparse to increase the proportion of data transmission success by using frequency division of the time slot in the time slot where data transmission fails.The simulation results show that using CSPC protocol can increase the network throughput by 3-4 times when the number of nodes is small, and at least 15 times when the number of nodes is large.
Authors: Baodi Jiang (School of Electronics and Information, Northwestern Polytechnical University), Ding Wang (School of Electronics and Information, Northwestern Polytechnical University), Bo Li (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract

## Session C 14:00 - 16:00 ↓↑

14:00 - 14:00
Cryptanalysis and improvement of an identity based authentication and key agreement protocol for multi-server architecture

Recently, Lu et al. analyzed that Xue et al.’s protocol failed to satisfy desirable security attribute, and they proposed an improved scheme which employs random numbers instead of timestamps to avoid time synchronization. However, we found that Lu et al.’s solution still can’t meet some security features. This paper demonstrates Lu et al.’s scheme can achieve insider attack and off-line password guessing attack. Moreover, we propose an improved scheme to fix these weaknesses using pi calculus based formal verification tool ProVerif to prove the security and authentication.
Authors: Wenhao Liu (Hangzhou Normal University), Dandan Ding (Hangzhou Normal University), Yiwei Liu (Learnings.ai Company),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Measurement and Analysis of Fading Characteristics of V2V Propagation Channel at 5.9 GHz in Tunnel

In this paper, we present a vehicle-to-vehicle (V2V) wireless channel measurement at 5.9GHz in the tunnel environments. The small scale fading characteristics are analyzed for outside and inside the tunnel, and the conjunction part in between. We evaluate the received signal magnitude inside the tunnel by comparing its distribution with ﬁve typical theoretical fading distributions. The best ﬁt among the considered fading distributions is found to be Rician distribution that has the lowest Goodness of Fit (GoF) indicator. The K-factor calculated from measurements data inside the tunnel is lower than the values obtained outside the tunnel. Further, the K-factor is found to be dependent on the transmitter (Tx)-receiver (Rx) distance in the considered scenario.
Authors: Xu Zhang (School of Information Engineering, Chang'an University, Xi'an, China), Mi Yang (Beijing Jiaotong University, School of Electronic and Information Engineering, Beijing, China), Wei Wang (School of Information Engineering, Chang'an University, Xi'an, China), Ruisi He (Beijing Jiaotong University, School of Electronic and Information Engineering, Beijing, China), Jun Hou (School of Information Engineering, Chang'an University, Xi'an, China), Xinyi Liu (School of Information Engineering, Chang'an University, Xi'an, China),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Arrival Prediction based Reservation MAC for the Next Generation WLAN

Since the 1970s, WLAN(Wireless Local Area Network)technology has been greatly developed. With the increasing number of high-density deployment wifi networks, multi-user QoS (Quality of Service) and QoE (Quality of Experience) in high-density cell deployment will be a huge challenge for next-generation WLANs \cite{Bo2014A}.In order to cope with this challenge, many researchers have proposed a channel reservation mechanism, but the premise of the existing research is to know when the next data packet is transmitted. This assumption is too strong, because the next packet arrives when it is a stochastic process. In order to solve the above problem, in order to predict the future data packet incompletely, this paper proposes a channel reservation MAC（Media Access Control） protocol based on service arrival prediction. After simulation, the protocol can reduce the network conflicts generated by concurrency to a certain extent and improve network throughput.
Authors: Huanhuan Cai (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
OFDMA based Synchronization protocol for Distributed MIMO in the Next Generation WLAN

In the next generation Wireless Local Area Network, IEEE 802.11 regards improving the throughput of the network as a major technical goal. Distributed Multiple Input Multiple Output (D-MIMO) System is an important issue to improve system capacity efficiency, but D-MIMO technology requires extremely high clock consistency between nodes. Therefore, this paper proposes a synchronization protocol based on Orthogonal Frequency Division Multiple Access (OFDMA) for D-MIMO. Firstly, this paper chooses a new clock synchronization process for the synchronization protocol (Two-Way Message Exchange), which is characterized by high synchronization accuracy. Second, we propose and refine the flow of the synchronization protocol and design the frame structure of the protocol to make it compatible with 802.11 frame format. The simulation results show that with the increase of the number of APs in D-MIMO, the algorithm based on OFDMA-based synchronization protocol reduces the overhead by nearly 50% compared with SU-based synchronization protocol. and the clock synchronization accuracy increases with the increase of the number of information interactions.
Authors: Luoting Gan (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Qi Yang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Vehicle Feature Point Trajectory Clustering and Vehicle Behavior Analysis in Complex Traffic Scenes

Video-based analysis technology has a wide range of applications in intelligent transportation system (ITS). Vehicle segmentation and behavior analysis has become an important research area in traffic video analysis. To solve the problem of 2D video detection technology in actual traffic video scenes, a bottom-up analysis method is employed to study the related technical problems. Firstly, M-BRISK descriptor algorithm is proposed for describing local feature points, which based on the method of original BRISK. Secondly, a 3D feature analysis method based on rigid motion constraints for vehicle trajectory is proposed. With the result pf camera calibration and the preset back-projection plane, the 2D trajectory points can be back-projected to the 3D space, and the back projection data of the 2D image can be reconstructed in 3D space. Thirdly, similarity measure method is proposed for achieving the trajectory clustering. The experimental results show that the proposed method not only accelerates the speed of clustering method, but also improves the accuracy of trajectory clustering at some extent. Moreover, the vehicle motion information contained in the trajectory data can be analyzed to recognize vehicle behavior. All of these provide an important data foundation for vehicle abnormal behavior detection and the identification of traffic status levels in traffic scenes.
Authors: Xuan Wang (Yantai University), Jindong Zhao (Yantai University), Yingjie Wang (Yantai University), Jun Lv (Yantai University), Weiqing Yan (Yantai University),
Hide Authors & Abstract

Show Authors & Abstract
14:20 - 14:40
Task Migration using Q-learning Network Selection for Edge Computing in Heterogeneous Wireless Networks

For edge devices, pushing the task to other near devices has become a widely concerned service provision paradigm. However, the energy-constrained nature of edge devices makes optimizing for QoS difficult. Due to the delay limitation of different tasks for edge computing and the different rates in heterogeneous wire-less networks, we propose a network selection task migration algorithm based on Q- learning that captures the trade-off between QoS and energy consumption. Our approach can automatically choose a suitable network to perform task migra-tion reasons about the task’s QoS requirements and computing rate in 4G net-work, Wi-Fi, Device-to-device(D2D). We demonstrate a working prototype us-ing the YOLOv3 on the Vivo X9 devices. Based on real hardware and software measurements, we achieve 27.79% energy saving with only 13% QoS violations.
Authors: Yi Liu (Northwest University), Jie Zheng (Northwest University), Jie Ren (Shaanxi Normal University), Ling Gao (Northwest University), Hai Wang (Northwest University),
Hide Authors & Abstract

Show Authors & Abstract

## Workshop on Wireless Automated Networking For Internet Of Things 16:20 - 18:20 ↓↑

16:20 - 16:20
Channel Exploration and Exploitation with Imperfect Spectrum Sensing for Multiple Users

In this paper, the fundamental problem of multiple secondary users (SUs) contending for opportunistic spectrum sensing and access over multiple channels in cognitive radio networks is investigated, when sensing is imperfect and each SU can access up to a limited number of channels at a time. For each channel, the busy/idle state is independent from one slot to another. The availability information of channels is unknown and has to be estimated by SUs during channel sensing and access process. Learning loss, also referred as regret, is thus inevitable. To minimize the loss, we model the channel sensing and access process as a multi-armed bandit problem, and contribute to proposing policies for spectrum sensing and access among multiple SUs under both centralized and distributed framework. Through theoretical analysis, our proposed policies are proved with logarithmic regret asymptotically and in finite time, and their effectiveness is verified by simulations.
Authors: Zuohong Xu (College of Electronic Science, National University of Defense Technology, Changsha, China), Zhou Zhang (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Ye Yan (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Shilian Wang (College of Electronic Science, National University of Defense Technology, Changsha, China),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Distributed Scheduling in Wireless Multiple Decode-and-forward Relay Networks

In this paper, we study the distributed DOS problem for wireless multiple relay networks. Formulating the problem as an extended three-level optimal stopping problem, an optimal strategy is proposed guiding distributed channel access for multiple source-to-destination communications under the help of multiple relays. The optimality of the strategy is rigorously proved, and abides by a tri-level structure of pure threshold. For network operation, easy implementation is presented of low complexity. The close-form expression of the maximal expected system throughput is also derived. Furthermore, numerical results are provided to demonstrate the correctness of our analytical expressions, and the effectiveness is verified.
Authors: Zhou Zhang (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Ye Yan (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Wei Sang (Tianjin Artificial Intelligence Innovation Center (TAIIC), Tianjin, China), Zuohong Xu (National University of Defense Technology),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Theoretical and experimental comparisons of the self-pressurization in a cryogenic storage tank for IOT application

The application of satellite technology in the Internet of Things (IOT) can just make up for the defects of the ground system for its wide coverage and anti-damage. More and more satellites will participate in IOT. Cryogenic liquids like liquid hydrogen and liquid oxygen will play an integral role in aerospace mis-sions due to their high efficient thrust and non-pollution waste. Self-pressurization phenomenon is one of the most important problems in the storage of cryogenic liquid. The accurate prediction of pressure rise is necessary for the tank design. Numerical calculation of computational fluid dynamic model and ex-periments are always time and financial consuming. A theoretical thermal diffu-sion model is investigated in the paper by using a mass and energy model in the vapor and a one-dimensional conduction model in the liquid. The validation of the predictive capability is conducted by comparing the predictions with experimental data. Favorable agreement is found for both the experimental cylindrical and ob-late spheroidal tanks. The effect of fill level and tank size is also studied.
Authors: Juan Fu, Jingchao Wang (China Electronic System Engineering Company),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Vulnerability Analysis of Wireless Sensor Networks via Maximum Flow Interdiction

Due to limited resource and changing environments, wireless sensor networks are susceptible to device failures. In this paper, we evaluate network's vulnerability under potential device failures or attacking. Specifically, we model wireless sensors and their operating procedure as an S-T network, where the information rate regarding the network performance is defined. The network robustness is evaluated via considering how the maximum information rate varies when network changes. The evaluation process turns out be a maximum flow interdiction problem, which is then solved by transforming into a dual formation and approximating with a linear programming. Lastly, via numerical simulation, the proposed scheme is shown to be well suitable for evaluating network's robustness.
Authors: Keyu Wu (National University of Defense Technology), Zhou Zhang (Tianjin Artificial Intelligence Innovation Center), Xingchen Hu (National University of Defense Technology), Boliang Sun (National University of Defense Technology), Chao Chen (National University of Defense Technology),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Research on Integrated Management System of Water and Fertilizer Based on Internet of Things

This paper designs and implements a management system of agricultural water and fertilizer integration based on Internet of Things (IOT). The design of the management system, which solves the problems of energy consumption, accuracy, stability and expansibility, is mainly composed of modules with monitoring management, water and fertilizer control, data management and remote control, while realizing greening, intellectualization, networking and digitization. The system takes SK-S7G2 microcontroller as the core to build a bidirectional data channel between the client and temperature sensor, humidity sensor and light intensity sensor by using 4-G wireless network and Ethernet communication modes. Then, the sensor parameters are sent to the client and the control instructions of the client are received to realize the remote real-time control of the motor, fan and other equipment. the production environment data collected by SK-S7G2 are transferred into the database of cloud server to construct an agricultural database of real parameters of crop growth environment. Finally, the feasibility and validity of the management system have been verified by the real environmental test, which proves that the design of the management system proposed in this paper is an effective solution of the intelligent agricultural water and fertilizer irrigation system with the characteristics of energy saving, high efficiency, accuracy and scalability.
Authors: Lina Zeng, Huajie Lin (School of Electronics and Information, Northwestern Polytechnical University), Tao Li (School of Electronics and Information, Northwestern Polytechnical University), Deyun Zhou (School of Electronics and Information, Northwestern Polytechnical University), Jianhong Yao (School of Electronics and Information, Northwestern Polytechnical University), Zenghui Yan (School of Electronics and Information, Northwestern Polytechnical University), Qiang Wang (School of Electronics and Information, Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
16:20 - 16:20
Impact Analysis of Realistic Human Mobility over Wireless Network

Mobility management is crucial for mobile Internet services. Mobile IPv6 and many subsequent variants aim to provide network layer mobility support for mobile nodes or mobile networks, whose performance is highly dependent on user mobility model, network topology and traffic model. Several previous researches have evaluated their performance by simulations, analytical models, and experiments. However, most of them adopt classic mobility models such as RWP without considering more realistic human mobility characteristics since most of mobile devices are carried by human being. Therefore, the performance evaluation of these solutions under realistic human mobility models becomes an important issue. In this paper we investigate human mobility characteristics and evaluates their impacts on existing mobility management protocols based on a unified simulation platform which abstracts movement parameters from realistic traces and uses them to tune other mobility models. The final results show: (1) The mobility model has an important impact on performance evaluation, and the delivery costs of RD and RWP models are different from the realistic trace which may mislead the protocols design; (2) The current mobility management protocols little consider the human mobility characteristics which cannot benefit the positive of human mobility characteristics, and they should consider the impacts of human mobility and absorb human mobility characteristics in future.
Authors: Jianfeng Guan (Beijing University of Posts and Telecommunications), Wancheng Zhang (Beijing University of Posts and Telecommunication),
Hide Authors & Abstract

Show Authors & Abstract
Day 2 17/11/2019
Room #1

## Session D 09:00 - 10:20 ↓↑

09:00 - 09:00
Hexagram Linkage: An Ambient Assistive Living System with Healthcare for Elderly People Living Alone

To handle the worldwide problem of aging, one of the most successful and cost-effective solutions is an ambient assisted living system. These systems integrate a collection of sensors, the Internet of Things, health management, human-computer interaction, offline medical entities and nursing services. The key tech-nological component is a human activity recognition and anomaly detection sys-tem. We designed a platform framework that defines activity at three levels: atom-ic, basic and complex. Our framework process uses separate modelling with clas-sical algorithms, so that four kinds of anomalies (point, set, scene and trend) can be detected. We implemented a real-world system and used it over two years within a scenario with nearly 200 users, thus proving the validity of the system and identifying certain deficiencies in the user’s experience. Our system has the characteristics of practicability, compatibility, cost-effectiveness and robustness.
Authors: Xiaohu Fan (School of Computer Science and Technology,HUST), Qubo Xie (School of Computer Science and Technology, HUST), Hao Huang (School of Software Engineering, HUST), Changsheng Xie (Wuhan National Laboratory for Optoelectronics，WNLO), Xuejiao Pang (Wuhan BoHuTech. Co. Ltd),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
Message Transmission Reliability Evaluation of CAN Based on DSPN

The message transmission reliability is an important performance of CAN communication. The message transmission reliability of the CAN refers to the ability of the message to be successfully transmitted within its deadline. In order to assess the message transmission reliability of CAN, a four-nodes CAN communication model is set up based on the deterministic and stochastic Petri net in this paper, which is used to simulate the arbitration mechanism and error handling mechanism of CAN. The model is used to demonstrate the operation of the CAN bus in an interference environment with transient bursts which simulate the external electromagnetic interference. Message transmission failure probability under the interference is used as the indicator of the message transmission reliability of CAN, and a solution method for proposed model based on the queuing theory is given to acquire the stationary value of the message transmission failure probability. The simulation gives the analysis of reliability of message transmission under different interference arrival intervals, different message priorities and different message periods, which verifies the validity and feasibility of the proposed model.
Authors: Shujun Yong (China Huayin Ordnance Test Center), Lerong Qi (School of Electronic and Information， Northwestern Polytechnical University), Yunhong Ma (School of Electronic and Information， Northwestern Polytechnical University), Yifei Zhao (School of Electronic and Information， Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
Sliding-Window Belief Propagation with Unequal Window Size for Nonstationary Heterogeneous Source

This paper presents a Sliding-Window Belief Propagation with Unequal Window Size (SWBP-UWS) algorithm to deal with the nonstationary heterogeneous source. In this algorithm, the entire source is divided into several sections according to its variation and each optimum window size is individually determined by each section. The experimental results show this algorithm outperforms the SWBP algorithm.
Authors: Jiao Fan (School of Information Engineering, Chang'an University, Xi'an, China), Bowei Shan (School of Information Engineering, Chang'an University, Xi'an, China), Yong Fang (School of Information Engineering, Chang'an University, Xi'an, China),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
Traffic Lights Detection Based on Deep Learning Feature

Traffic lights detection is an important task for intelligent vehicles. It is non-trivial due to variance backgrounds and illumination conditions. Therefore, a traffic lights detection system that can apply to different scenes is necessary. In this paper, we research the traffic lights detection based on deep learning, which can extract features with representation and robustness from input image automatically and avoid using artificial features. The approach of traffic lights detection proposed in this paper includes two stages: (1) region proposal and (2) classifica- tion of traffic lights. Firstly, we propose a region proposal method based on intensity, color, and geometric information of traffic lights. Secondly, CNN was introduced for the traffic lights classification, obtaining 99.6% average accuracy. For detection, we evaluate our system on 6804 images, the recall and accuracy of detection achieve 99.2% and 98.5% respective-ly.
Authors: Changhao Wang (Northwestern Polytechnical University), Guanwen Zhang (Northwestern Polytechnical University), Wei Zhou (Northwestern Polytechnical University), Yukun Rao (Northwestern Polytechnical University), Yu Lv (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract

## Session F 10:40 - 12:00 ↓↑

10:40 - 10:40
Industrial Internet of Things Interoperability between OPC UA and oneM2M

With the emergence of the Industrial Internet of Things (IIoT), a huge amount of devices in the factory need be connected to the Internet. The use cases being con-sidered include data exchange for inter-factory manufacturing, integrity of data collection and real-time monitoring, etc. It is important to allow seamless com-munications among IIoT devices of different protocols and standards. In this re-search, we investigate how to achieve IIoT interoperability via two popular global IIoT standards: oneM2M and OPC-UA by adopting the OPC-UA system in the field domain but connecting it to the oneM2M system in the infrastructure do-main. We propose an optimized design of oneM2M Interworking Proxy Entity for resources mapping and procedures mapping between OPC-UA and oneM2M. The design contains both (1) interworking functions and (2) OPC-UA client APP, installed on the oneM2M Middle Node in the field domain, to handle the data exchange.
Authors: Fuchun Joseph Lin (National Chiao Tung University),
Hide Authors & Abstract

Show Authors & Abstract
10:40 - 10:40
Accuracy Analysis on GDOP of Pseudolite Positioning System Based on TDOA Technology

In the case that the GNSS satellite signal is interfered and the satellite constellation visibility is affected, an independent pseudolite navigation and positioning system can be constructed to achieve the positioning operation of the target user. This paper proposes an independent navigation and positioning system consisting of four pseudolites based on the principle of Time Difference of Arrival (TDOA). In this paper, the geometric dilution of precision (GDOP) expression of the positioning system under the TDOA technology is derived. In view of the influence of pseudolites geometric layout on GDOP, this paper proposes two layout schemes, Y-type and T-type, and simulates the distribution of GDOP values under each layout scheme. After comparing and analyzing the simulation graphs, it is concluded that the T-shaped geometric layout can significantly reduce the GDOP value compared with the Y-shaped layout.
Authors: Li Li (School of Electronics and Information, Northwestern Polytechnical University), Yiqin Cao (School of Electronics and Information, Northwestern Polytechnical University), Hongwei Zhao (School of Electronics and Information, Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
10:40 - 10:40
Research And Simulation Of Physical Layer Abstraction Model For Next Generation WiFi Integrated Simulation

In this paper we study the phy layer interference abstraction. First, we analyse the physical layer abstraction methods for the next generation WLAN, including high frequency WLAN and low frequency WLAN, and describe their implementation details. Then the RBIR and the MMIB PHY abstraction methods are studied separately. We design process of two PHY abstraction methods and implements they in our simulation platform. Some corresponding simulation results sre gived. Then the accurate SINR model of the uplink MU-MIMO are studied.the calculation of SINR are similar between uplink MU-MIMO with SU-MIMO. The next-generation Wi-Fi standard for the 60 GHz band must make full use of the strengths of directional beam gains. So beam tracking uses to track changes in the baseband beamformer for SU and MU MIMO transmissions that employ hybrid beamforming transmission.The simulation results show that the RBIR method accurately predicts link level simulatio performance in a simple mapping method.
Authors: Kun Zhang (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Qi Yang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
10:40 - 10:40
Traffic Arrival Prediction for WiFi Network: a Machine Learning Approach

At present, Wi-Fi plays a very important role in the fields of online media, daily life, industry, military, etc., so its research is very meaningful. Machine learning is a multidisciplinary interdisciplinary study of how computers simulate or implement the learning behaviors of human to acquire new knowledge or skills and to continuously improve existing knowledge structures' performance. Combining the two, considering the prediction research of the arrival of WiFi network traffic, this paper provides a machine learning-based method, using random forest regression algorithm to model, carry out experimental design and simulation, and compare with the results of linear prediction. The results show that the prediction accuracy of this model is about 95%, the effect is good, and the accuracy of linear prediction of flow is close to zero, the effect is bad. Through prediction, resources can be reserved in advance for the arrival of data traffic, and the channel can be optimally configured, thereby achieving better fluency of the device and smoothness of the network. This problem is studied based on the machine learning method in order to provide a self-learning and updating model to learn, supervise and predict channel traffic at all times, so as to continuously improve the model while predicting the arrival time of traffic packets. The accuracy rate, which in turn increases the accuracy of the prediction.
Authors: Ning Wang (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Ding Wang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract

## Session H 14:00 - 15:40 ↓↑

14:00 - 14:00
Generation and Performance Evaluation of Distributed Interference Based on Multiple-wavelet

Sensor networks are groups of specialized transducers that have a communica-tions infrastructure which is intended to record and monitor conditions at differ-ent locations. Sensor network are widely adopted in distributed interference be-cause they are lightweight, small and extremely portable. In order to ensure the safety of civil aviation, it is necessary to control and disperse the unmanned aerial vehicle (UAV). This paper proposed the precise distributed interference for the UAV management and control by aggregating interference signal energy at the specific point and in the specific area. First, the distance between the distributed jammers and the target point is given, and the time of different wavelets reach the target point is calculated. Then the initial phases of all the wavelets are adjusted so as to ensure all the wavelets reaching the peak value at the specific point. Finally, the interference generated in specific area is proposed to meet practical application requirements. The experiment results demonstrate that the proposed distributed interference method can be used for precise interference under UAV management and control and even in the dynamic warfare environments.
Authors: Xiaozhu Shi (State Key Laboratory of Air Traffic Management System and Technology), Zichun Zhang (School of Electronics and Information, Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Analysis of ADAS technology principle and application scenario

With the development of vehicle sensors, artificial intelligence and vehicle network technique, Advanced Driving Assistant System (ADAS) technology is now experiencing a rapid development. However the interaction of the sensors' data in the real scene is seldom discussed. This paper firstly describes the application scenarios and typical working mechanism of ADAS. Then it analyses the advantages and deficiencies of the environment perception based on vehicle sensors. Secondly, it describes the main research of vehicle networking. Lastly through two typical scenes it analyses the possibility and problem of communicating the sensors' data via vehicle networking. Through the application scenarios analysis, it proposes a new potential research route for the ADAS.
Authors: Yao Tang (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Mao Yang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Electromagnetic Wave with OAM and Its Potential Applications in IoT

As one of the hot techniques, the Internet of Things (IoT) is gradually penetrating all aspects of human life. The limitation of the spectrum resources has limited the development of the IoT, which forces us to look for new ways to increase the efficiency of the spectrum utilization. The Electromagnetic (EM) wave with orbital angular momentum (OAM), also called the EM vortex wave is a promising method to solve this problem. In this article, the basic theory of EM wave with OAM in radio frequency (RF) is introduced and the main techniques in the OAM radio beams, including the generation of the EM with OAM, the receive, the multiplexing based on OAM mode are summarized. Based on the main properties of EM wave with OAM in RF, the potential applications of EM vortex beam in the IoT are discussed.
Authors: Jinhong Li (Northwestern Polytechnical University), Xiaoyan Pang (Northwestern Polytechnical University), Chen Feng (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Propagation properties of optical beams with multi-OAM modes: effect of the off-axis vortex

As one of the promising techniques to improve the spectral efficiency of the network in the Internet of Things (IoT), the orbitalangular-momentum (OAM) multiplexing optical wireless communication has been studied a lot. In the optical beams with multi-OAM modes, the vortices deviating from the beam center sometimes cannot be avoidable, and they will strongly influence the transverse patterns during the beam propagation. In this article, the expressions of optical beams with offaxis vortices are derived in a commonly used focusing system, and the effect of the vortices deviating from the beam center on the propagation properties of the optical beam is discussed. We find that the number of the bright spots in the transverse patterns of the superposition of two OAM modes with off-axis vortices is not always equal to the absolute value of the mode difference which is observed in the field with only on-axis vortices. The bright spot can also be found to rotate during the beam propagating, and as the number of the modes increases in the overlapping, the superposition patterns become more complicated and these patterns can be adjusted by the off-axis distance and the topological charge of the vortices. Our result will be helpful in developing the network of the IoT.
Authors: Ying Dang (No. 365 Institute of Northwestern Polytechnical University (Xi’an ASN Technology), Xi’an, China), Wenrui Miao (School of Electronics and Information, Northwestern Polytechnical University, Xi’an, China),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Unequally Weighted Sliding-Window Belief Propagation for Binary LDPC Codes

In this paper, an Unequally Weighted Sliding-Window Belief Propagation (UW-SWBP) algorithm was proposed to decode the binary LDPC code. We model the important of overall beliefs of variable nodes in a sliding window as Gaussian distribution, which means central nodes play a more importance role than the nodes on both side. The UW-SWBP demonstrates better performance than SWBP algorithm in both BER and FER metrics.
Authors: Zhaotun Feng (School of information engineering,Chang'an University), Bowei Shan (School of information engineering,Chang'an University), Yong Fang (School of information engineering,Chang'an University),
Hide Authors & Abstract

Show Authors & Abstract
Room #2

## Session E 09:00 - 10:20 ↓↑

09:00 - 09:00
A Novel Algorithm for HRRP Target Recognition Based on CNN

Compared with traditional methods, deep neural networks can extract deep information of targets from different aspects in range resolution profile (HRRP) radar automatic target recognition (RATR). This paper proposes a new convolutional neural network (CNN) for target recognition based on the full consideration of the characteristics (time-shift sensitivity, target-aspect sensitivity and large redundancy) of radar HRRP data. Using a convolutional layer with the large convolution kernel, large stride, and large grid size max-pooling, the author built a streamlined network, which can get better classification accuracy than other methods. At the same time, in order to make the network more robust, the author uses the center loss function to correct the softmax loss function. The experimental results show that we have obtained a smaller feature within the class and the classification accuracy is also improved.
Authors: Jieqi Li (China Academy of Launch Vehicle Technology), Shaojie Li (Northwestern Polytechnical University), Shaohui Mei (Northwestern Polytechnical University), Qi Liu (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
Analysis of the Influence of CAN bus Structure on Communication Performance

A CAN bus communication network for vehicle is established based on CANoe tool which is designed for CAN bus simulation. The influence of different network structures on the CAN bus transmission performance is analyzed by changing the network structure of the CAN bus system. The simulation result demonstrates that using the gateway dividing the CAN bus into different subnet is useful to reduce the bus load and shorten the message transmitting delay.
Authors: Shujun Yong (Huayin Test Center of China), Yunhong Ma (Northwestern Polytechnical University), Yifei Zhao (School of Electronic and Information ，Northwestern Polytechnical University), Lerong Qi (School of Electronic and information ,Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
Failure Reasons Identification for the Next Generation WLAN: a Machine Learning Approach

Artificial Intelligence (AI) technology is one of the hottest research directions nowadays. And machine learning is an important branch of AI. It allows the machine to make its own decisions without human telling the computer exactly what to do. At the same time, Wireless Local Area Network (WLAN) Media Access Control (MAC) technology is also the current research hotspot. However, due to station (STA) collision, noise, interference, channel fading and other reasons, the STA access to access point (AP) may fail. This is limiting the overall performance of the communication system. To solve the problems above, this paper proposes a new idea. If the STA can obtain the current access environment state in real time, it can adjust protocol parameters such as Modulation and Coding Scheme (MCS) and Contention Window (CW) according to the current environment. Thus, the overall performance of the communication system is improved. Therefore, in this paper, the machine learning technology is applied to the WLAN. We use the ACK information to identify the current access environment state. In this paper, access environment is divided into four categories: nice, severe collision, channel fading, collision and channel fading. Different training models are used to train the data. Through our experiments, the result of Naive Bayes model is not bad. And the accuracy can reach 83%. And after feature extraction, the accuracy of Random Forest model can reach 99%.
Authors: Zhaozhe Jiang (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Qi Yang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
Deep Convolutional Neural Network based Traffic Vehicle Detection and Recognition

Traffic vehicle detection and recognition is a core technology of advanced driver assistant system (ADSD) for the intelligent vehicle.In this paper, we employ the convolution neural network (CNN) to perform the end-to-end vehicle detection and recognition. Two vehicle classification CNNs are proposed.One is a convolution neural network consisting of four convolution layers and another is a multi-label classification network. The first networks can achieve the accuracy more than 95% while the second can achieve the accuracy more than 98%. Due to the multiple constraints, the proposed multi-label classification network is able to converge fast and achieve higher accuracy. The vehicle detection model proposed in this paper is a model on the basis of the network model single shot multibox detector(SSD). Our network model employs the network proposed for vehicle classification as a basis network for feature extraction and design a multi-label loss for detection. The proposed network structure can achieve 77.31% mAP on the vehicle detection dataset. Compared with that of SSD network model, the obtained mAP is improved by 2.17%. The processing speed of proposed vehicle detection network can reach 12FPS, which can meet the real-time requirements.
Authors: Yukun Rao (Northwestern Polytechnical University), Guanwen Zhang (Northwestern Polytechnical University), Wei Zhou (Northwestern Polytechnical University), Changhao Wang (Northwestern Polytechnical University), Yu Lv (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract

## Session G 10:40 - 12:00 ↓↑

10:40 - 10:40
Enabling IoT/M2M System Scalability with Fog Computing

As increasingly more IoT/M2M devices are connected to Internet, they will cause serious congestion to IoT/M2M systems normally deployed in the cloud. Although Cloud can scale out to support more data requests, it may not be able to satisfy the low latency demanded by certain IoT/M2M applications. Fog, as an edge of Cloud, can alleviate the congested problem in the cloud and provide low latency for critical IoT/M2M applications due to its proximity to IoT/M2M devices. In this research, we propose (1) utilizing oneM2M, a global IoT/M2M standard, as the middleware to connect the cloud and the fog, (2) using Traffic Classifiers to intercept and divert IoT/M2M traffic requiring low latency to Fog and (3) deploying independent scalability mechanisms for Cloud and Fog. We demonstrate and verify our scalability design using a smart hospital use case and show that our proposed system can achieve better scalability results in terms of latency, CPU usage and power consumption compared to those with only Fog or Cloud.
Authors: Yuan-Han Lee (National Chiao Tung University), Fuchun Lin (National Chiao Tung University),
Hide Authors & Abstract

Show Authors & Abstract
10:40 - 10:40
Towards Efficient Privacy-preserving Personal Information in User Daily Life

The popularity of smart home has added a lot of convenience to people's lives. However, while users use these smart products, users' privacy data has also been leaked and it may cause some risks. Besides, because of untrusted third-party servers, we simply use traditional privacy-preserving methods could no longer protect users' private information effectively. In order to solve these problems, this paper proposes a privacy-preserving method for multi-private data: we first determine the privacy data format that needs to be protected, such as audio or text; Secondly, if the data format is text, we will use the local differential privacy method. We first obtain the key attributes of the user from the key information chain, and then select the appropriate localized differential privacy method according to the text characteristics of the key attributes. The user realizes the local disturbance of the data and then uploads it to the data collection center-- the cloud platform. Finally, when an attacker attempts to obtain user information from the cloud platform, it uses the central differential privacy method to add noise and the noise-added data is transmitted to the attacker. If the data format is voice, we first convert the voice information into binary code, then chaotically encrypt the binary code, and upload the encrypted binary code to the cloud platform. We verify the effectiveness of our methods by experiments, and it can protect users’ privacy information better.
Authors: Hai Wang (NorthWest University), Tong Feng (NorthWest University), Zhe Ren (NorthWest University), Ling Gao (Xi'an Polytechnic University), Jie Zheng (Northwest University),
Hide Authors & Abstract

Show Authors & Abstract
10:40 - 10:40
Properties and performance of the orbital-angular-momentum modes in wireless communication

The orbital-angular-momentum (OAM) mode multiplexing is one of the promising ways to improve the efficiency of the spectrum utilization of the network in the Internet of Things (IoT). In this article, the propagation properties and the communication performance of the OAM modes in radio frequency are studied. The transverse patterns for the single mode, two/three superimposed modes are discussed, while the influences of the mode number and the propagation distance on the beam width are analyzed. Based on 2FSK and 2PSK modulations the bit error rate (BER) of OAM modes are found varying with both the mode and the receiving radius of the array antennas. By analyzing the BER, it is found that when both the transmitting antenna and the transmitting power are fixed, also the noise power is the same, an OAM mode can have different optimal receiving radii in the single mode transmission and in the mode multiplexing transmission. These results will be helpful in optimizing the OAM mode receiving system and may have applications in the network of the IoT
Authors: Chen Feng (Northwestern Polytechnical University), Jinhong Li (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
10:40 - 10:40
Vehicle re-identification using joint pyramid feature representation network

Vehicle re-identification (Re-ID) technology plays an important role in intelligent video surveillance systems. Due to various factors, e.g., resolution variation, viewpoint variation, illumination changes, occlusion, etc., vehicle Re-ID is a very challenging computer vision task. In order to solve this problem, a joint pyramid feature representation network (JPFRN) is proposed in this paper. Based on the consideration that various convolution blocks with different depths hold various resolution and semantic information of the vehicle image, which can help to effectively identify the vehicle, the proposed JPFRN method obtains four vehicle feature blocks with different depths by designing pyramidal feature fusion of each convolution block in a basic network. After that, a joint representation of these pyramidal features is feed into the loss function for learning discriminative features for vehicle Re-ID. We validated the proposed approach on a commonly used vehicle database i.e., VehicleID. Extensive experimental results show that the proposed method is superior to multiple state-of-the-art vehicle Re-ID methods.
Authors: Xiangwei Lin (Huaqiao University), Huanqiang Zeng (Huaqiao University), Jinhui Hou (Huaqiao University), Jianqing Zhu (Huaqiao University), Jing Chen (Huaqiao University), Kai-Kuang Ma (Nanyang Technological University),
Hide Authors & Abstract

Show Authors & Abstract

## Session I 14:00 - 15:40 ↓↑

14:00 - 14:00
Direction of arrival estimation of spread spectrum signal

The sensor networking based on multi-source information fusion can significant-ly improve direction accuracy, and the sensor networking is always used in direc-tion of spread spectrum signals. Aimed at eliminating the phase ambiguity of the phase-comparison method, this paper proposed a direction-finding method based on ISM and CSM algorithms. Firstly, the wideband spread spectrum signal is di-vided into narrowband at different time points. Then perform the DCT transform and obtain the covariance matrix at different frequency points. Finally, the nar-rowband signal power spectrums at independent frequency points are synthesized to obtain the total power spectrum of spread spectrum signal. The simulation re-sults demonstrate that the ISM and CSM algorithms can accurately determine the direction of the spread spectrum signal, and the direction error is kept within when the signal-to-noise ratio (SNR) is higher than 5dB, which satisfy the accu-rate direction-finding requirement. Therefore, the ISM and CSM algorithms based on sensor networking is a necessary solution in high-precision direction of spread spectrum signals.
Authors: Hongwei Zhao (School of Electronics and Information, Northwestern Polytechnical Univerisity), Zichun Zhang (School of Electronics and Information, Northwestern Polytechnical Univerisity),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
A Trigger-Free Multi-user Full Duplex User-Pairing Optimizing MAC Protocol

In order to improve the spectrum efficiency, the academia and industry will introduce Co-frequency Co-time Full Duplex (CCFD) technology into MAC as a key technology. However, the existing full-duplex Medium Access Control (MAC) protocol based on access point (AP) scheduling has the problem of low success rate in establishing full-duplex links. To solve this problem, this paper proposes a dynamic full-duplex link pair matching algorithm based on Bipartite-Graph, which is based on the author's earlier research on FD-OMAX\cite{16}. This algorithm uses bipartite graph matching theory to establish the relationship model between full-duplex link and Resource Unit (RU). In each round of full-duplex transmission, AP establishes the optimal full-duplex link transmission based on the user's dynamic interference information on RU resources. In order to improve the success probability of establishing full-duplex links and spectrum efficiency, an enhanced trigger-free full-duplex MAC protocol, EnFD-OMAX, is designed on the basis of FD-OMAX protocol. The simulation results show that compared with FD-OMAX protocol, MuFuPlex protocol, OMAX protocol and FuPlex protocol, the throughput distribution of EnFD-OMAX protocol increases by 26.5\%, 56.60\%, 88.37\% and 118.4\% under saturated traffic. In high-density deployment scenarios, the probability of full duplex link to successful transmission and MAC efficiency are increased by 88.98\% and 149.9\% respectively compared with OMAX protocol.
Authors: Meiping Peng (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Mao Yang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Adaptive Block ACK for Large Delay of Space-Terrestrial Integrated Network

Aiming at the large delay characteristics of space-terrestrial integrated network, an efficient MAC protocol based on TDMA adaptive block ACK is proposed in this paper. Among them, the adaptive block ACK can effectively reduce the delay of the space-terrestrial integrated network by reducing the probability of retransmitting, at the same time, it can reduce the overhead of the MAC layer and help to achieve high throughput of the Space-Terrestrial integrated network. The simulation results with different access strategies show that the proposed efficient MAC access protocol has great advantages over the traditional ACK and block ACK access methods in system delay and network throughput, and has certain guiding significance for Space-Terrestrial integrated network.
Authors: Tianjiao Xie (Northwestern Polytechnical University), Bo Li (Northwestern Polytechnical University), Mao Yang (School of Electronics and Information, Northwestern Polytechnical University), Zhongjiang Yan (Northwestern Polytechnical University), Zhaozhe Jiang (Northwestern Polytechnical University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Design and Implementation of Tunnel Environment Monitoring System Based on LoRa

Tunnel is the basic construction project to construct underground, underwater, and mountain buildings, such as mines, subways, and so on. Effective monitoring of tunnel environment plays on important part in the tunnel management, it can provide early warning before the accidents and minimize the hazard of the accident. Compared with the traditional IoT technologies such as ZigBee, Wi-Fi, and so on, the LoRa (Long Range) technology emerging in recent years performs better in terms of coverage range, connection number, and energy consumption, etc. It is foreseeable that the LoRa technology will certainly make a tremendous promotion in the field of tunnel environment monitoring. In this paper, A Lora-based tunnel environment monitoring system is designed and implemented. Firstly, the system architecture is described. Then, the detailed design and implementation of LoRa terminal hardware, LoRa terminal embedded software, LoRa server and monitoring App is given respectively. Finally, the experimental results show that the system has good network coverage capacity and communication reliability, can accurately monitor the tunnel environment and have low power consumption. This system has good promotion and application value.
Authors: Gui Zhu (College of Information and Communication, National University of Defense Technology, Xi'an,China), Honggang Zhao (College of Information and Communication, National University of Defense Technology, Xi'an,China), Zuobin Liu (College of Information and Communication, National University of Defense Technology, Xi'an,China), Chen Shi (College of Information and Communication, National University of Defense Technology, Xi'an,China),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Wyner-Ziv Video Coding for Highway Traffic Surveillance using LDPC Codes

This paper presents a 2D Q-ary Sliding-Window Belief Propagation (2DQSWBP) algorithm to decode Low-density Parity-check (LDPC) code which is utilized to compress highway traffic surveillance video under Wyner-Ziv video framework. This framework is beneficial for camera device with limited memory and computing ability. The differences of successive frames is modeled as Truncated Discrete Laplace (TDL) distribution. The experimental result shows the 2DQSWBP outperforms the Q-ary Belief Propagation (QBP) algorithm in both Bit-Error-Rate and computing time.
Authors: Linlong Guo (School of Information Engineering, Chang'an University, Xi'an, China), Bowei Shan (School of Information Engineering, Chang'an University, Xi'an, China), Yong Fang (School of Information Engineering, Chang'an University, Xi'an, China),
Hide Authors & Abstract

Show Authors & Abstract