ICCC 2020 submission deadline extends to August 15, 2020. ICCC'2020 21 st International Carpathian Control Conference Conference ID: 49264 . We reformulate the stated problem and design a substitution-knapsack algorithm to reach a sub-optimal solution. A large-scale antenna array base station (BS) with zero-forcing (ZF) precoders transmits confidential information to multiple scheduled users via random user selection. The technical program [â¦] Based on the ray-tracing (RT) simulation technology, this paper discusses the channel characteristics in subway carriage scenarios at 26 GHz and 38 GHz millimeter-wave (mm-wave) bands. In this paper, we propose a novel and simple transmitter selection criterion to enhance the reliability performance of downlink transmission in a wireless vehicular network. Then, the fractional objective function is transformed into a parameter subtractive form by using Dinkelbach's approach meanwhile the coupled beamforming vector of BS and the phase shift of IRS are decoupled by using an alternative iteration method. It reveals that by introducing more antennas together with the innovation of cell free network architecture, and by making effective balance between block length, error probability, data rate, and minimum number of antennas, future 6G technology still has great potential to be improved, but it needs both to make a compromise between system performance and deployment cost, and to carefully make use of the special features of MIMO channels in higher frequency band. 4:40 PM CST, Aug 10 Mon, 3:10 AM To tackle these challenges, we consider an untrusted MEC server and propose a nonce hash computing ordering (HCO) mechanism in MBEC networks. Each year, around 3,000 researchers submit proposals for paper presentations and program sessions to be held at the annual conference. Then, according to the distribution characteristics of different Wi-Fi signals, the principal component analysis (PCA) algorithm is used to reconstruct the signal to complete the de-nosing processing of the Wi-Fi signal. Read all the papers in 2020 IEEE International Conference on Communications Workshops (ICC Workshops) | IEEE Xplore. Therefore, it remains unclear whether the neural network under variable dimensions can still approach the traditional algorithm. To address this challenge, we propose a novel method to predict device status based on the IoT temporal knowledge graph (TKG) and the long short term memory (LSTM) model. Fully integrated millimeter-wave front-ends are one of the key solutions for reducing the overall system costs and the sizes. Considering that the problem is non-convex, we develop an alternating optimization method that decomposes our formulated problem into two blocks when another variable is fixed. In this paper, a low complexity STSK dispersion matrix optimization scheme is proposed. A distributed learning algorithm based on a swarm collaboration framework, i.e., stigmergy which enables an F-AP to expand its influence to other F-APs is proposed to improve caching resource utilization. The VCOP 2020 is the 1st virtual online panel in IEEE Region 10 (Asia Pacific) where all concerned stakeholders will share the expectations, challenges and possible solutions in a Full Virtual Technical Conference with respect to traditional face to face technical conferences. QoE is not only our optimization goal but also the grouping basis of the algorithm proposed in this paper. Sign Up. — CT-01: Vehicular Communications. This paper presents a data security transmission scheme based on high efficiency fountain code. Besides, the statistical analysis methods verify this effectiveness. Key parameters such as path loss, root mean square (RMS) delay spread, power angle spectrum, angular spread, and spatial correlation are investigated. Simulation results demonstrate the effectiveness and superiority of the proposed scheme. Recently, data-based deep learning methods have achieved remarkable performances by training a large amount of data but encounter some challenges such as, lack of available training data and explainability. However, due to the lack of the method toward improving angle resolution of AOA, AOA-based indoor localization method is difficult to achieve sub-meter accuracy. Early bird registration fee: from October 1 st, 2019 to April 30 th, 2020. In order to solve this problem, this paper proposes a low complexity activity detection scheme. Simulation results show that our proposed solution outperforms the existing solutions (with indivisible tasks or without resource sharing) in terms of both the total cost and the task failure probability. Ad Hoc & Sensor Networks Symposium. 12:00 AM EDT, 1:30 PM Simulation results show that the proposed hybrid routing scheme offers good performance in terms of end-to-end delay and throughput. Machine learning methods has drawn extensive concern in this field. Tuesday to Thursday 27-29 October 2020. Final Program online: May 31 st, 2020 A proxy is introduced to delegate the high complexity decryption algorithm to improve the decryption efficiency of the mobile terminal. ICCC 2020å»¶é¿æç¨¿å°8æ15æ¥ ã May 14, 2020. In this paper, we design a multi-source data fusion scheme in edge computing-enabled vehicle-to-infrastructure (V2I) cooperative systems, where data fusion can be processed at RSU or vehicle. Channel State Information (CSI)-based indoor Angle of Arrival (AoA) localization has gradually become a hot research direction. SAC-02: Learning-based Schemes, Session Then, relying on the random matrix theory (RMT)-based large-system analysis, we derive a deterministic approximation of the achievable downlink sum- rate. Our studies reveal that 60% of the system cost can be saved by trading cost-effective storage for expensive spectrum resources. In this paper, we study the coordinated multi-point secure transmissions in mmWave cellular networks against randomly distributed eavesdroppers. Adaptive algorithm is a traditional method for solving acoustic echo cancellation (AEC) problem, which need to perform well in different scenes, especially in the double talk (DT) scenarios. With the dramatic increment of data traffic, energy efficiency has become a critical concern in the beyond 5G mobile system. Besides, we consider the optimality gap introduced by unpredictable network changes and delayed network reconfigurations and propose a re-route policy to keep the gap small while minimizing the network reconfiguration cost. Identification and resolution system is an important part of the industrial Internet, is the key hub to realize the information exchange of all elements and links of industry, and is one of the core infrastructure of the safe operation of the industrial internet. To further improve the global world content distribution efficiency in the integrated satellite and terrestrial networks, this paper proposes a synergic distribution architecture with satellites and the Content Delivery Network (CDN). However, mobile vehicles are not always considered credible, the attack of malicious vehicles may lead to the failure of city management. IEEE/CIC ICCC 2021 is â¦ Main Conference Workshops & Tutorials Sign In. From the perspective of Shannon theory and its extensions, this talk is devoted to evaluating the technique potentials of future 6G mobile communication system. The sparse code multiple access technology and polar code technology can meet the functional requirements of the three major scenarios of 5G. The optimal scheduling strategy is obtained by formulating the joint optimization of D2D pairing, parallel link selection and time slot allocation into an integer linear program (ILP) problem. Simulation results show that the signal to noise ratio (SNR) improvement and the symbol error rate (SER) reduction of the denoiser is significant. The experiment confirms that the cooperative sensing network can achieve 33 fps and improve the detection precision by around 10% as opposed to the typical detection method. O KAYAK pode ajudar no planejamento da sua viagem comparando todas as opções de viagem em um só lugar. We invite the submission of workshop proposals. The experiment is done using Universal Kriging algorithm and Inverse Distance Weighted algorithm to interpolate the database with 30% sampling points. Nevertheless, we are facing a challenge of design of computation offloading and resource allocation strategy on a part of a task offloaded to MEC server. Because of the presence of an eavesdropper (Eve), the UAV jammer sends friendly interference signals to protect private information. NEW DEADLINE ABSTRACT SUBMISSION: Sunday, March 15th, 2020. More specifically, the BLDnet can not only perform hard decisions but also provide the soft outputs for further processing in channel decoder. Furthermore, we deduce the switching thresholds for CLD by means of the approximation of the PER with the constraint of the target packet error rate (PER). In this paper, storage in edge-datacenter is introduced into the transmission scheme for temporarily storing delay-tolerant bulky flows. Where. It was shown that the best user can achieve full diversity order while the worst user can only achieve unit diversity order. In this paper, a Consistency Trust Verification strategy for Mobile Vehicles (CTV-MV) is proposed, including three stages: opportunistic routing stage, recruitment stage, and trust verification stage. Then, we propose a heuristic algorithm (BPSO-HPA) to find the optimal solution. This paper provides fundamental analysis and preparation for signal processing in the phase domain. We prototype our system on the low-cost off-the-shelf WiFi devices and evaluate its performance in real-world experiments. You are encouraged to use zoom to provide you with a comfortable online meeting experience. Therefore, we propose an improved CoSaMP channel estimation algorithm called iCoSaMP. We analyse and optimize security performance in terms of secrecy throughput under a stochastic geometry framework. 2020 5th IEEE International Conference on Computing, Communication and Automation is being jointly organized by Aurel Vlaicu University of Arad, Romania & Galgotias University, India on October 30-31, 2020 at Galgotias University Greater Noida (NCR New Delhi) India. We use a bipartite graph to model in-flight Internet access network and develop a flow deviation method for matching to optimize the allocation of Internet traffic flows to aircraft through multiple ground base stations. Multi-access Edge Computing (MEC) introduced by sinking cloud resources from the Remote Cloud to the edge of the network is one of the solutions to support 5G low-latency applications. Simulation results show that the scheme has high security and transmitter transmission efficiency in the presence of eavesdropping scenarios. The eighth IEEE/CIC International Conference on Communications in China (ICCC 2019) will be held in Changchun, China, 11-13 August, 2019. This talk will provide some visionary concepts of the future mobile networks that contemplate edge computing and aerial support using results from some existing intelligent techniques. With the development of Internet of Things (IoT) technology, unattended operation of devices has become an important feature of IoT, which requires devices to perform proper actions to provide services without human intervention. First, considering the delay constraint of data processing, the concept of effective data is introduced. The vehicles transmit to the cluster head in a non-orthogonal manner, then the cluster head communicates also non-orthogonally with the base station. The 30th International Conference on Computer Communications and Networks (ICCCN 2021) July 19 - 22, 2021 (tentative), Athens, Greece An algorithm based on the recursive successive convex approximation (SCA) technique is proposed to obtain the optimal beamforming matrices at the base station (BS) and IRS. Furthermore, two clustering algorithms with global search and local search are designed to implement our models. The fully connected DNN trained by different-dimensional data is proved to be the closest to the traditional algorithms. As a new paradigm for the monitoring and troubleshooting of backbone networks, the multilayer in-band network telemetry (ML-INT) with deep learning (DL) based data analytics (DA) has recently been proven to be effective on real-time visualization and fine-grained monitoring. This paper compares the implementations basing on both CMOS 65nm and SiGe 0.18um technologies and the results show that the cost using CMOS 65nm is more than 3.3 times higher than that of using SiGe 0.18um, meanwhile, integrated millimeter-wave front-ends by using SiGe 0.18um technology have much better reliability than that of using CMOS 65nm. More specifically, we jointly consider cache placement and file transmission in F-RAN, where fog access points (F-APs) serving as collaborative caching agents to provide caching for popular files, thus reducing the traffic from cloud and improving content delivery efficiency. Simulations show that both ML-IG and DetNet-IG can provide better BER performance than ISIC, and DetNet-IG exhibits distinguished robustness against channel model incongruity. To this end, we propose a hybrid routing algorithm to provide seamless integration of satellite network with terrestrial networks, in which transmission path can be selected adaptively according to the traffic demands of user terminals (UTs). Transmission in co-frequency network always affected by co-channel interferences. However, the existing algorithms have high beam training overhead, and it is difficult to achieve real-time tracking of the beam. Further, the over-the-air (OTA) results validate the feasibility of the system design, and show that link adaptation module can significantly improve the quality of the received signal. The architecture takes advantage of LEOs' mobility characteristic to cache and deliver multiple times along the trajectory. Thirdly, according to the risk level of a certain dimension of the IoT system, defenders can decide to implement the risk plan and execute the risk management until the risk level was reduced. It should be noted that the primary transmission of CR networks cannot be disturbed. IEEE ICCC 2020. Then, the main factors affecting channel characteristics, including antenna position, antenna array, array element spacing, etc., were analyzed to provide some recommendations for the design of 5G communication network in urban rail traffic station. Registration . Keynote-1: Keynote 1, Session In Delay Tolerant Network (DTN), sensors lacking connectivity can store data temporarily and wait for the mobile vehicles in the city to forward, which greatly improves the efficiency of data collection in the city. The current solutions, however, are unable to identify various ambient signals. CIS-03: Network Security 2, Session Backscatter is one of the important techniques of IoTs as it can offer low-cost and low-energy wireless communication. The program won the first prize in 2019 Chinese University Student Computer Games Competition and 13th National Computer Games Tournament. 9:00 AM CST, Aug 9 Sun, 8:30 PM The wolf swarm hunting idea of gray wolf optimization algorithm and the herd interaction idea of sheep optimization algorithm are used to improve the lion swarm optimization algorithm. Although it would take some time before we get the full picture of credibility of 5G, researchers already know that it would suffer from a range of shortcoming with the introduction of new applications and thus; the need for work on its successor 6G. Early bird registration fee: from October 1 st, 2019 to April 30 th, 2020. In this paper, a software-defined A2G framework is proposed to efficiently and flexibly select multiple ground base stations for data transmissions from a global perspective. As you may be aware, the IEEE ICCC 2020 conference will be held online due to the outbreak of COVID-19 on 9â11 August 2020. The 5G has already been commercially deployed for more than one year. This can be well explained by density buildings and low antenna heights in UMi scenario, which leads to rich scattering environment. We firstly build a TKG for the IoT to provide rich semantic information for the objects and the continuously changing time series data in the IoT. WCS-02: Intelligence Communications I, Session ICCC 2019 aims at a key theme on âTo Wireless Infinity and Beyondâ. For the former, we capture signal fluctuations caused by the micro movements like typing and extract the keystroke features on channel response obtained from commodity WiFi devices. However, the RNN model is difficult to process in parallel, taking into account only the global context features, not the correlation between the sentiment polarity and the local context. Specifically, we utilize a universal mixture of Gaussian (MoG) model to deal with the nongaussianity of the noise and interference in complex communication environments, which can adaptively adjust involved parameters to fit the true distribution by observed data. About The Conference. When the full channel state information (CSI) of the eavesdropper is unknown, our goal is to maximize the power of artificial noise (AN) to jam the eavesdropper under transmit power and energy-harvesting (EH) constraints by optimizing the beamforming matrix at the access point (AP) and IRS. Extensive simulations show that the algorithm proposed in this paper greatly outperforms adaptive weighted average model and traditional BPNN model, in terms of the accuracy of data fusion. Due to the complex communication environment, the line-of-sight transmissions of aerial-ground networks are probably blocked, which seriously affects the communication quality. Aided by numerical results, we demonstrate the accuracy of the derived expression and explicitly show the performance advantage of the proposed criterion. Besides, there are some security and privacy issues, such as the disclosure of patients' identities, the attacks from malicious users, etc. By using our websites, you agree to the placement of these cookies. The channel vector from the destination node is designed to be aligned with that from the source node, so that the eavesdropping node cannot decode user signals. In this paper, we develop a novel task offloading framework for AGI-VEC, which is called the learning-based Intent-aware Upper Confidence Bound (IUCB) algorithm. Numerical results are also presented to validate the theoretical analyses and to demonstrate the security performance of our proposed transmission schemes. 6:20 AM EDT, Session Personal Identification Number (PIN) and biometrics are the main approaches for identifying the user on the basis of his/her identity. Then a Baseline mechanism is used to trust reasoning for evaluating the trust vaule of mobile vehicles. You now will need to download the Zoom client for your operating system before using it for online meeting. The simulation results demonstrate the efficiency and performance superiority of our proposed paradigm over the existing schemes. Secondly, Multidimensional Scaling (MDS) is used to reduce the recovered EDM dimension to obtain the relative position of nodes while maintaining the distance value between nodes. Furthermore, for the online localization, unlike traditional approaches, which estimate locations only based on features of signal space, we proposed a dual-domain constraints localization algorithm (DCLA), which takes the physical space into consideration at the same time based on mean shift clustering algorithm. ICCC 2019 aims at a key theme on âTo Wireless Infinity and Beyondâ. Smart city includes all kinds of advanced technologies and solutions, whose construction is based on the collection of data. WCS-05: UAV Aided Wireless Communications, Session In addition, when the popularity of the content changes, we add the name of the content to the monitoring list to determine whether it is an attack content. In the traditional mobile-mobile (M2M) scenario, the dual non-stationary characteristics of the array domain and the time domain did not considered, where single or twin cluster link models are too simple to simulate actual scenarios. The network extracts and merges the feature map contained in multiple data blocks, which is helpful to explore the internal relation of data. In order to balance the load of UAV, this paper proposes a multi-UAV deployment mechanism which is based on the difference evolution (DE) algorithm. Specifically, an Average Distance based Outlier Detection (ADOD) algorithm is designed as a consistency mechanism of heterogeneous data. Further, we implement our backscatter in the FPGA hardware to evaluate the design. ICCCS 2020 is to be held at Indian Institute of Technology Patna, India during October 14-16, 2020. The formulated problem is non-convex optimization, so we transform it into three solvable convex subproblems. The third round submission deadline is September 15. This novel architecture is used to offload computing-intensive applications and services for IoT users in the marine environment. IEEE websites place cookies on your device to give you the best user experience. In this paper, based on adaptive trust estimation, we propose a multi-sensor data fusion algorithm (T-NN) in neural network, aiming to solve the problem of low accuracy and poor stability of multi-sensor data fusion. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. The IIT Patna is nearby to the ancient place Nalanda University and Bodh Gaya. It will be held in Chengdu every year. Considering the devices' limited data storage capacity and battery life, we propose a multi-objective optimization problem that aims to minimize the average data buffer length, maximize the residual battery level of the system and avoid data overflow and running out of battery of devices. Furthermore, the full diversity order of three is demonstrated to be achieved if the buffer size is not less than three, which is larger than conventional non-buffer-aided C-NOMA schemes whose diversity order is only two in the considered C-NOMA system. We propose a low complexity activity detection scheme for massive access scenarios with massive multiple-input multiple-output (MIMO) communication systems. MWN-01: Localization, Session Our study provides insights into the following questions: Who is capable of being a moving server? Grant-free (GF) nonorthogonal multiple access turns to be a competitive candidate, since it avoids the granting access and reduces the signaling overheads. Instead, we propose a heterogeneous data synchronization scheme (HDSS) to integrate the RSSI data obtained by the Wi-Fi device and the corresponding coordinates obtained by UWB device. Firstly, the dispersion matrix entries are discretized to reduce the search space of the candidate dispersion matrix sets and the saturation level is optimized. The content distribution process not only involves content transfer among static nodes in the terrestrial CDN, but also mobile satellites serving as couriers. It is a trend for satellites to enhance the content distribution efficiency in cooperation with the terrestrial network. Although the Internet has made great success since its inception, it faces many serious issues such as the lack of trustworthiness, the rigidity in deploying novel technologies at layer 3, as evidenced by the proliferation of various cyberattacks and the difficulty in deploying IPv6. This solution improves the iterative convergence speed of the receiver by transmitting verified messages to each node in the factor graph in time. Data transmission and real-time processing of Internet of Things (IoT) devices in remote unmanned area are becoming a challenging issue. With the development of deep learning, the deep neural network (DNN) provides a more powerful and effective approach to denoising. SPC-02: MIMO, Session Moreover, with the aid of combining the previous particle competition experiences as well as the defined particle's walking rules, our propose community detection scheme can automatically select and update the core nodes based on the results of previous evolution. In this paper, we propose a method for estimating the ergodic capacity of vehicle-mounted APs, and the convergence reflected by the rate function can be used to know the ceiling of the ergodic capacity, which is of great importance for the performance analysis. Simulation results show that, our proposed power allocation factor can work well with different channel estimation errors. By using a simultaneously L&S signal model, we employ the number of the bigger singular values and Bayesian learning which incorporates an L&S-inducing prior over the signal and the appropriate hyperpriors over all hyperparameters to recover the signal. Final Program online: May 31 st, 2020 To tackle this issue, we design a novel follow-up computation offloading paradigm, where moving servers can provide extra computing resources and the deep Q-learning based computation offloading strategy will improve the quality of service. The results can provide insights for the application of tri-polarized MIMO systems. First, the network model is developed for UAVs to provide communication services in disaster area. A few things to note: 1. To cope with the error floor induced by ICI and ISI in one-tap equalization and iterative serial interference cancellation (ISIC), we develop a maximum likelihood (ML) based iterative grouping detection algorithm (ML-IG), which utilizes the correlation among the received signals on adjacent subcarriers to improve the detection accuracy. It is worth mentioning that in terms of feature extraction, we innovatively use the empirical mode decomposition (EMD) algorithm to extract the difference in time series of similar actions. As a fully virtual conference, all the presentations will be given via pre-recorded videos during September 18 â 20, 2020 based on Hawaii's time zone through the BigMarker Video Broadcasting Platform. Aspect sentiment analysis is a fine-grained task of sentiment analysis, which aims to identify the sentiment polarity of specific aspects in a given context. We jointly optimize content placement and spectrum allocation to minimize content delivery delay, taking into account time-varying content popularity, transmission method selection, and different QoE requirements of users. Optimization algorithms play an important role in resource allocation problems. On real-world QoT time series benchmark, the experimental results show that our proposals significantly outperform the state-of-the-art models for single-channel QoT prediction. Then, leveraging the advantages of LSTM in sequence learning, the timing characteristics of semantic information in TKG are learned to realize intelligent prediction of the equipment status. These issues makes it extremely difficult to further expand the Internet to satellite networks, industrial networks and vehicular networks because, as widely recognized, IP does not perform well in these network environments. However, fingerprint-based localization method has a bottleneck, namely, the offline database construction is time-consuming and labor-intensive, which hampers its implementation and adaption.