Day 1 (May. 25): Keynotes and Technical Sessions
09:00-09:30 | Opening
——Floor1, CHAMPS ELYSEES C Hall, Sofitel Hotel (Moderator: Prof. Cheng Li) |
|||
9:30-10:30 | Keynote Address I: Prof. Jinhong Yuan (Floor1, CHAMPS ELYSEES C Hall, Sofitel Hotel)
Random access for machine-type communications |
|||
10:30-10:45 | Coffee Break —— Floor1 | |||
10:45-11:45 | Keynote Address II: Prof. Ekram Hossain (Floor1, CHAMPS ELYSEES C Hall, Sofitel Hotel)
Deep Reinforcement Learning for Radio Resource Allocation in Large Cellular Networks |
|||
11:45-13:45 | Lunch —— Floor2 | |||
Invited and Regular Sessions | ||||
Session
Rooms |
Floor1
Tuileries Room |
Floor1
Louvres Room |
Floor3
Seine Room |
Floor3
Loire Room |
13:45-15:45 | S01:Invited Paper | S03: AI for Communications and Networks I | S05: Edge Computing and IOT
|
S07: Routing and Path II
|
15:45-16:00 | Coffee Break —— Floor1 | |||
16:00-18:00 | S02:Invited Talk
|
S04: AI for Communications and Networks II | S06: Routing and Path I
|
S08: PHY I
|
18:00-21:00 | Dinner—— Floor1, CHAMPS ELYSEES C Hall |
Day 2 (May. 26): Keynotes and Technical Sessions
09:00-10:00 | Keynote Address III: Prof. Guoqiang Mao (Floor1, CHAMPS ELYSEES C Hall, Sofitel Hotel)
From Vehicular Networks to IoT for Smart Roads – How a Communication Engineer Can Help Solve Transportation Problems |
||||
10:00-10:15 | Coffee Break —— Floor1 | ||||
10:15-11:15 | Keynote Address IV: Prof. Byonghyo Shim (Floor1, CHAMPS ELYSEES C Hall, Sofitel Hotel)
Sparse Vector Coding for Ultra short packet transmission in 5G and beyond |
||||
11:15-11:45 | Sponser Speak: MS. Fangze Tu (Floor1, CHAMPS ELYSEES C Hall, Sofitel Hotel)
Evolving 5G and Beyond |
||||
11:45-13:45 | Lunch —— Floor2 | ||||
Regular Sessions and Tutorial | |||||
Session
Rooms |
Floor1
Tuileries Room |
Floor1
Louvres Room |
Floor3
Seine Room |
Floor3
Loire Room |
Floor1
Concorde |
13:45-15:45 | S09: PHY II
|
S11: Information Applications II | S13: Information Applications I | S15: PHY III
|
Tutorial |
15:45-16:00 | Coffee Break —— Floor1 | ||||
16:00-18:00 | S10: Position and Navigation I | S12: Software Design | S14: Signal Processing | S16: Position and Navigation II | Tutorial |
18:00-20:00 | Dinner —— Floor2 |
- Invited Paper
Sensor-based Human Activity Recognition for Smart Healthcare: A Semi-supervised Machine Learning
Abrar Zahin, TanThanh Le, Rose Qingyang Hu
Human action recognition is an integral part of smart health monitoring, where intelligence behind the services is obtained and improves through sensor information. we propose a semi-supervised classifier for time-series data. The proposed framework is the joint design of variational auto-encoder (VAE) and convolutional neural network (CNN). In particular, the VAE intends to extract the salient characteristics of human activity data and to provide the useful criteria for the compressed sensing reconstruction, while the CNN aims for extracting the discriminative features and for producing the low-dimension latent codes. Given a combination of labeled and raw time-series data, our architecture utilizes compressed samples from the latent vector in a deconvolutional decoder to reconstruct the input time-series. We intend to train the classifier to detect human actions for smart health systems.
Edge Computing based Traffic Analysis System Using Broad Learning
Xiting Peng, Kaoru Ota, Mianxiong Dong
Edge computing is a more promising way to save the bandwidth resources and improve users’ privacy by offloading these tasks to the edge node. In this paper, we propose a novel edge computing based traffic analysis system using broad learning. For one thing, edge computing can provide a distributed architecture for saving the bandwidth resources and protecting users’ privacy. For another, we use broad learning to incrementally train the traffic data, which is more suitable for edge computing because it can support incremental updates of models on the edge nodes without retraining all data. We implement our system on the Raspberry Pi, and experimental results show that we have 98% probability to accurately identify these traffic data. Moreover, our method has the faster training speed compared with Convolutional Neural Network (CNN).
Transmission Quality Improvement Algorithms for Multicast Terrestrial-Satellite Cooperation System
Yuandong Zhang, Liuguo Yin
In this paper, we investigate a terrestrial-satellite multicast beamforming cooperative system to optimize the problem of low expenses and high capacity requirements of ground users. We first formulate a joint optimization problem to maximize the system capacity performance, and we design the beamforming vectors of the base stations and the satellite cooperatively on the basis of user group scheduling and power constraints. Then we extend the problem into a more realistic scene that the link delay of satellite is larger than it of base stations, this may influence the joint optimization timeliness of condition changes. So we propose a two phases algorithm that we optimize terrestrial-satellite system jointly in the first phase and optimize terrestrial part independently in the second phase. The simulation results show that, the proposed algorithm gains
Simultaneous Wireless Information and Power Transfer Protocol Under the Presence of Node Hardware Impairments
Yanlin Liu, Juan Li, Fengye Hu, Qiao Qiao
Hardware impact to the wireless sensor network node can reduce the life cycle and communication quality of the energy harvesting network. In this paper, we use a three-node network communication model to derive the exact closed form and asymptotic expression of the outage probability and through the Rayleigh fading channel. Then, we study the outage probability and throughput of the wireless sensor network from the hardware impact of the source node and the destination node. In addition, we provide numerical results to demonstrate the correctness of the simulation. The hardware impact of the node physical transceiver is unavoidable, but we can minimize the impact on the network by selecting configuration parameters, which is of great significance to engineering practice.
Non-orthogonal Multiple Access enabled Power Allocation for Cooperative Jamming in Wireless Networks
Yuan Wu, Weicong Wu, Daohang Wang, Kejie Ni, Liping Qian, Weidang Lu, Limin Meng
In this work, we investigate the non-orthogonal multiple access (NOMA) enabled power allocation for cooperative jamming under a two-user downlink scenario. In particular, we consider that there exists a malicious eavesdropper overhearing the data transmission of the mobile user (MU) with a stronger channel power gain. In particular, we formulate a power allocation problem to maximize the secure throughput of the strong MU while satisfying the throughput requirement of the weak MU. Despite the non-convexity of the formulated problem, we provide an efficient algorithm to compute the optimal solution (i.e., the power allocations for the two users). Numerical results have been provided to validate the effectiveness of our proposed algorithm and the performance of our optimal power allocation scheme.
Mobility-Aware Task Parallel Offloading for Vehicle Fog Computing
Jindou Xie, Yunjian Jia, Zhengchuan Chen, Liang Liang
When applying fog computing paradigm into Internet of vehicle, vehicles are regarded as intelligent devices with computation and communication capability. These moving intelligent devices are often employed to assist various computation-intensive task offloading in vehicle fog computing, which brings real-time responses. However, vehicles mobility and network dynamics make it challenging to offload tasks to ideal target nodes for user-vehicle. In this paper, leveraging the result of vehicle mobility-awareness, we investigate the task offloading problem in vehicle fog computing aiming to minimize service time. Specifically, we consider that a task can be decomposed into subtasks in any proportion and offloaded from user-vehicle to multi service vehicles in parallel via vehicle-to-vehicle (V2V) links. Mobility information of vehicles collected by RSU is modeled to predicted the states of V2V links based on hidden Markov model (HMM). Then, we refine a rule to select target service-vehicles and the size of each subtask according to predicted results. Comparing with random and single-point task offloading, the proposed approach indicates a better performance on amount of finished task and service time in vehicle dense area.
Research on the Security of Personal Information in the Era of Big Data
Cheng Chi, Tengyu Liu, Xiaochen Yu, Shuo Zhang
The advent of the era of big data has made people’s lives more intelligent and convenient, and has brought enormous value to human beings. At the same time, it has brought about a lot of challenges. Personal information security is one of them. In the big data era, massive amounts of personal information are continuously input, simultaneously, the means of illegally acquiring, disseminating, and applying personal information are emerging in endlessly, Raising human thinking about information security. Therefore, the personal information security problem caused by big data should not be underestimated. Firstly, it introduces the related concepts of personal information, discusses the sources of risks faced by personal information in the process of implantation, dissemination and application. Secondly, it discusses the existing problems and solutions in China. Finally, the application difficulties and coping strategies of information security technology are analyzed, which provides theoretical support for personal information security in the era of big data.
- Invited Talk
Key Technologies for Vehicle Behavior-Driven Intelligent Vehicular Networks
Haixia Zhang received the B.E.degree from the Department of Communication and Information Engineering, Guilin University of Electronic Technology, China, in 2001, and received the M.Eng. and Ph.D. degrees in communication and information systems from the School of Information Science and Engineering, Shandong University, China, Currently, she works as full professor at Shandong University. She has been actively participating in many academic events, serving as TPC members, session chairs, and giving invited talks for conferences, and serving as reviewers for numerous journals. She is the associate editor for the International Journal of Communication Systems. Her current research interests include cognitive radio systems, cooperative (relay) communications, resource management, space time process techniques, mobile edge computing and smart communication technologies.
Big Data Privacy: from Networking and Artificial Intelligence Perspectives
Shui Yu is a Professor of School of Software, University of Technology Sydney, Australia. Dr Yu’s research interest includes Security and Privacy, Networking, Big Data, and Mathematical Modelling. He has published two monographs and edited two books, more than 200 technical papers, including top journals and top conferences, such as IEEE TPDS, TC, TIFS, TMC, TKDE, TETC, ToN, and INFOCOM. Dr Yu initiated the research field of networking for big data in 2013. His h-index is 35. Dr Yu actively serves his research communities in various roles. He is currently serving a number of prestigious editorial boards, including IEEE Communications Surveys and Tutorials (Area Editor), IEEE Communications Magazine (Series Editor). He has served many international conferences as a member of organizing committee. He is a Senior Member of IEEE, a member of AAAS and ACM, and a Distinguished Lecturer of IEEE Communication Society.
- Sessions
Index
Paper ID | Session | Paper ID | Session | Paper ID | Session |
282998 | S03-01 | 283280 | S07-06 | 283435 | S12-04 |
283424 | S03-02 | 283563 | S07-07 | 283944 | S12-05 |
283549 | S03-03 | 283283 | S08-01 | 283501 | S12-06 |
283583 | S03-04 | 283475 | S08-02 | 283469 | S13-01 |
283679 | S03-05 | 282974 | S08-03 | 283546 | S13-02 |
283105 | S03-06 | 282975 | S08-04 | 283506 | S13-03 |
283126 | S04-01 | 283012 | S08-05 | 283112 | S13-04 |
283000 | S04-02 | 283033 | S08-06 | 283019 | S13-05 |
283291 | S04-03 | 283117 | S09-01 | 283290 | S13-06 |
283479 | S04-04 | 283169 | S09-02 | 283292 | S14-01 |
283110 | S04-05 | 283287 | S09-03 | 283354 | S14-02 |
283582 | S04-06 | 283550 | S09-04 | 283462 | S14-03 |
283295 | S05-01 | 283557 | S09-05 | 283508 | S14-04 |
282961 | S05-02 | 283426 | S09-06 | 283540 | S14-05 |
283069 | S05-03 | 283499 | S10-01 | 283555 | S14-06 |
283481 | S05-04 | 283492 | S10-02 | 283116 | S15-01 |
283394 | S05-05 | 283004 | S10-03 | 283002 | S15-02 |
283309 | S05-06 | 283562 | S10-04 | 283099 | S15-03 |
283496 | S06-01 | 283474 | S10-05 | 283120 | S15-04 |
283232 | S06-02 | 283284 | S10-06 | 283001 | S15-05 |
283564 | S06-03 | 283018 | S11-01 | 283451 | S15-06 |
283297 | S06-04 | 283310 | S11-02 | 283674 | S16-01 |
283464 | S06-05 | 283299 | S11-03 | 283559 | S16-02 |
283470 | S06-06 | 283134 | S11-04 | 283552 | S16-03 |
283500 | S07-01 | 283186 | S11-05 | 283450 | S16-04 |
283558 | S07-02 | 283289 | S11-06 | 283296 | S16-05 |
283298 | S07-03 | 283161 | S12-01 | 283312 | S16-06 |
283503 | S07-04 | 283111 | S12-02 | 283003 | S16-07 |
283108 | S07-05 | 283288 | S12-03 |
Detail
13:45-15:45(Sat,25 May 2019) Location: Floor1 Louvres Room(卢浮宫厅) | |
S03: AI for Communications and Networks I | |
Chair: Ruoyu Su | |
No. 282998 | Deep Learning-Based Space Shift Keying Systems |
Yue Zhang, Xuesi Wang, Jintao Wang, Yonglin Xue, Jian Song (Tsinghua University) | |
No. 283424 | A video-selection-encryption privacy protection scheme based on machine learning in smart home environment |
Qingshui Xue, Haozhi Zhu, Xingzhong Ju, Xiangwei Zheng, Baochuan Zuo (Shanghai Institute of Technology); Haojin Zhu, Fengying Li (Shanghai Jiao Tong University) | |
No. 283549 | A Transfer learning method for Aircrafts Recognition |
Hongbo Li, Guo Bin, Gao Tong, Chen Hao(Harbin Institute of Technology) | |
No.283583 | A Multi-Agent Reinforcement Learning based Power Control Algorithm for D2D Communication underlaying Cellular Networks |
Wentai Chen, Jun Zheng (Southeast University) | |
No. 283679 | Improved Neural Machine Translation with POS-tagging through Joint Decoding |
Xiaocheng Feng, Zhangyin Feng, Bing Qin, Ting Liu(Harbin Institute of Technology); Wanlong Zhao(Harbin Engineering University); Nan Zou (Harbin University of Commerce) | |
No.283105 | Posture Recognition and Heading Estimation Based on Machine Learning Using MEMS Sensors |
Boyuan Wang, Xuelin Liu(College of Information and Communication Engineering, Harbin Engineering University); Baoguo Yu, Ruicai Jia, Lu Huang(State Key Laboratory of Satellite Navigation System and Equipment Technology) | |
16:00-18:00(Sat,25 May 2019) Location: Floor1 Louvres Room(卢浮宫厅) | |
S04: AI for Communications and Networks I I | |
Chair: Zhuoming Li | |
No. 283126 | Neural Networks in Hybrid Precoding for Millimeter Wave Massive MIMO Systems |
Jing Yang, Kai Chen, Xiaohu Ge, Yonghui Li, Lin Tian (Huazhong University of Science and Technology) | |
No.283000 | A Floor Distinction Method Based on Recurrent Neural Network in Cellular Network |
Yongliang Zhang, Lin Ma(Harbin Institute of Technology);Danyang Qin (Heilongjiang University); Miao Yu (Ministry of Public Security) | |
No. 283291 | MCU-based Isolated Appealing Words Detecting Method with AI Techniques |
Liang Ye, Yue Li, Wenjing Dong (Harbin Institute of Technology), Sepp nen Tapio, Alasaarela, Esko (University of Oulu) | |
No.283479 | A Reinforcement Learning Based Task Offloading Scheme for Vehicular Edge Computing Networks |
Jie Zhang(Xidian University);Hongzhi Guo,Jiajia Liu(Northwestern Polytechnical University) | |
No.283110 | Manifold Learning Based Super Resolution for Mixed-resolution Multi-view Video in Visual Internet of Things |
Yuan Zhou, Yeda Zhang,Xiaoting Du,Chuo Li (Tianjin University); Ying Wang (Unit 61660 of PLA); | |
No. 283582 | A Reinforcement Learning based Joint Spectrum Allocation and Power Control Algorithm for D2D Communication underlaying Cellular Networks |
Wentai Chen, Jun Zheng (Southeast University) | |
13:45-15:45(Sat,25 May 2019) Location: Floor 3 Seine Room(塞纳河厅) | |
S05: Edge Computing and IOT | |
Chair: Danyang Qin | |
No. 283295 | Multitasks Scheduling in Delay-bounded Mobile Edge Computing |
Longyu Zhou (University of Electronic Science and Technology of China); Supeng Leng, Ning Yang, Ke Zhang (University of Electronic Science and Technology of China) | |
No. 282961 | An Emergency Resource Scheduling Model Based on Edge Computing |
Songyan Zhong, Tao He (China Aerospace Science and Industry Corporation Limited Network Information Department); Mengyu Li, Lanlan Rui, Guoxin Xia, Yu Zhu (Beijing University of Posts and Telecommunications) | |
No. 283069 | Social Aware Edge Caching in D2D Enabled Communication |
Jingyi Chen ( Chongqing University of Posts and Telecommunications) | |
No.283481 | Deep Reinforcement Learning based Task Offloading in SDN-enabled Industrial Internet of Things |
Jiadai Wang,Yurui Cao(Xidian University);Jiajia Liu, Yanning Zhang (Northwest Polytechnic University) | |
No.283394 | IOT-based Thermal Comfort Control for Livable Environment |
Zang Miao,Xing Zhiqiang,Tan Yingqi (North China University of Technology) | |
No.283309 | A Biometric-based IoT Device Identity Authentication Scheme |
Qingshui Xue, Xingzhong Ju, Haozhi Zhu(Shanghai Institute of Technology);Haojin Zhu, Fengying Li (Shanghai Jiao Tong University); Xiangwei Zheng (Shandong Normal University) | |
16:00-18:00(Sat,25 May 2019) Location: Floor3 Seine Room(塞纳河厅) | |
S06: Routing and Path I | |
Chair: Wedang Lu | |
No.283496 | An Improved A* Algorithm Based on Divide-and-conquer Method for Golf Unmanned Cart Path Planning |
Yi Chen, Liangbo Xie, Wei He, Qing Jiang, Junxing Xu (Chongqing University of Posts and Telecommunications) | |
No.283232 | Cross Station-Voltage-Level Route Planning Algorithm for System Protection Services in UHV Grid |
Danyang Xu, Wenjing Li, Xuesong Qiu, Luoming Meng(Beijing University of Posts and Telecommunications) | |
No.283564 | Optimization of AODV Routing Protocol in UAV Ad Hoc Network |
Jianze Wu, Shuo Shi, Zhongyue Liu, Xuemai Gu(Harbin Institute of Technology) | |
No.283297 | Adaptive Routing Protocol for Underwater Wireless Sensor Network based on AUV |
Yuying Ding, Cheng Li, Kun Hao, Xiujuan Du, Lu Zhao, Qi Liu (Tianjin Chengjian University) | |
No.283464 | Secure Access and Routing Scheme for Maritime Communication Network |
Yuzhou Fu, Yurong Qin (Guangxi University); Chuanao Jiang, Liuguo Yin (Tsinghua University) | |
No.283470 | Trajectory Optimization Under Constrained UAV-Aided Wireless Communications with Ground Terminals |
Kun Chen, Hong Lu, Xiangping Zhai, Bryce Li Congduan, Yunlong Zhao, Bing Chen (Nanjing University of Aeronautics and Astronautics) | |
13:45-15:45(Sat,25 May 2019) Location: Floor3 Loire Room(卢瓦尔河厅) | |
S07: Routing and Path II | |
Chair: Jiajia Liu | |
No.283500 | Research on UAV Swarm Interference based on Improved Invasive Weed Optimization Algorithm |
Lijiao Wang, Yanping Liao, Xiaoming Luan (Harbin Engineering University) | |
No. 283558 |
A UAV based Multi-Object Detection Scheme to Enhance Road Condition Monitoring and Control for Future Smart Transportation |
Jian Yang (Nanjing University of Posts and Telecommunications), Jielun Zhang, Feng Ye (University of Dayton), Xiaohui Cheng (Nanjing University of Posts and Telecommunications) | |
No.283298 | Fuzzy Probabilistic Topology Control Algorithm for Underwater Wireless Sensor Networks |
Wenhao Ren, Kun Hao, Cheng Li, Xiujuan Du, Yonglei Liu, Li Wang (Tianjin Chengjian University) | |
No.283503 | Naive Bayes Classifier Based Driving Habit Prediction Scheme for VANET Stable Clustering |
Tong Liu, Shuo Shi, Xuemai Gu (Harbin Institute of Technology) | |
No.283108 | A Cross-Layer Approach to Maximize the Lifetime of Underwater Wireless Sensor Networks |
Yuan Zhou, Hui Liu, Hai Cao, Dan Li (National Ocean Technology Center); Hongyu Yang, Tao Cao (Tianjin University) | |
No.283280 | An energy-efficient routing protocol for internet of underwater things |
Ruoyu Su, Fei Ding, Hongbo Zhu, Hongxiao Wang (Nanjing University of Posts and Telecommunications) | |
No.283563 | Path Optimization with Machine-Learning Based Prediction for Wireless Sensor Networks |
Jianxin Ma, Shuo Shi, Xuemai Gu (Harbin Institute of Technology) | |
16:00-18:00(Sat,25 May 2019) Location: Floor3 Loire Room(卢瓦尔河厅) | |
S08: PHY I | |
Chair: Hongzhi Guo | |
No. 283283 | The performance of DF Relaying System Based on Energy Harvesting and Dual-Media channels |
Zhixiong Chen, Lijiao Wang, Cong Ye, Dongsheng Han (North China Electric Power University) | |
No. 283475 | Design of Radar-Communication Integrated Signal Based On OFDM |
Tianqi Liang , Zhuoming Li, Mengqi Wang, Xiaojie Fang (Harbin Institute of Technology) | |
No. 282974 | Energy Efficiency Optimization Based SWIPT in OFDM Relaying Systems |
Dan Huang, Mengshu Hou (University of Electronic Science and Technology of China), Weidang Lu (Zhejiang University of Technology) | |
No. 282975 | Millimeter Wave Massive MIMO Channel Estimation and Tracking |
Yanwu Song, Shaochuan Wu, Wenbin Zhang, Huafeng Zhang (Harbin Institute of Technology)
|
|
No.283012 | Research on the Maximization of Total Information Rate Based on Energy Allocation in Multi-User SWIPT Relaying System |
Jianxiong Li, Xuelong Ding, Xianguo Li, Kunlai Li, Ke Zhao, Weiguang Shi (Tianjin Polytechnic University) | |
No. 283033 | A Resistance Frequency Offset Synchronization Scheme Based on the Zadoff-Chu Conjugate Sequence |
Cong Ma, Xuejun Sha, Yong Li, Xu Lin (Harbin Institute of Technology) | |
13:45-15:45(Sun,26 May 2019) Location: Floor1 Tuileries Room(杜乐丽厅) | |
S09: PHY II | |
Chair: Rong Bo | |
No. 283117 | Joint Time-frequency Diversity in the Context of Spread-spectrum Systems |
Qiuhan Teng, Xuejun Sha, Cong Ma (Harbin Institute of Technology) | |
No. 283169 | Dual-Mode OFDM-IM by Encoding All Possible Subcarrier Activation Patterns |
Xiaoping Jin, Zheng Guo, Mengmeng Zhao, Ning Jin, Dongxiao Chen (College of Information Engineering) | |
No. 283287 | Performance Analysis of Energy-Efficient Cell Switch off Scheme for CoMP Networks |
Fei Ding, Jialu Li, Ruoyu Su, Dengyin Zhang, Hongbo Zhu (Nanjing University of Posts and Telecommunications) | |
No. 283550 | An Efficient Resource Allocation Algorithm for LTE Uplink VMIMO Systems |
Yang Cai, Shaojun Qiu, Jia Cai, Wenchi Cheng, Xiaofeng Lu (Xidian University, China.) | |
No.283557 | Application of Wavelet Analysis Method in Radar Echo Signal Detection |
Qiuyue Li (China Agricultural University); Xiangyu Tong (Harbin Institute of Technology) | |
No. 283426 | A Multicast Beamforming Algorithm to Improve the Performance of Group Service for Multicell B-TrunC System |
Zheming Zhang, Chengwen Zhang, Bin Wang (Harbin Institute of Technology); Yutao Liu (Science and Technology on Communication Networks Laboratory) | |
16:00-18:00(Sun,26 May 2019) Location: Floor1 Tuileries Room(杜乐丽厅) | |
S10: Position and Navigation I | |
Chair: Lin Ma | |
No.283116 | Joint BP and RNN for Resilient GPS Timing Against Spoofing Attacks |
Bhamidipati, Sriramya (University of Illinois at Urbana-Champaign); Kim, Kyeong Jin ,Sun Hongbo, Orlik Philip, Zhang Jinyun (Mitsubishi Electric Research Labs (MERL)) | |
No. 283002 | Research on Fusion of Multiple Positioning Algorithms Based On Visual Indoor Positioning |
Guangchao Xu, Danyang Qin, Min Zhao, Ruolin Guo (Heilongjiang University) | |
No. 283099 | An Innovative Weighted KNN Indoor Location Technology |
Lu Huang, Xingli Gan, Boyuan Wang, Shuang Li (The 54th Research Institute of China Electronics Technology Group Corporation) ; Dan Du (Pla army Equipment Department) | |
No. 283120 | Angle-of-Arrival Positioning System Based on CSI Virtual Antenna Array |
Lu Yin, Ziyang Wang, Zhongliang Deng, Tianrun Jiang, Yuan Sun (Beijing University of Posts and Telecommunications) | |
No.283001 | Research on Indoor Localization based on Joint Coefficient |
Min Zhao, Danyang Qin, Ruolin Guo (Heilongjiang University); Lin Ma (Harbin Insitute of Technology) | |
No.283451 | A Multi-Classifier Approach for Fuzzy KNN Based WIFI Indoor Localization |
Yuanfeng Du (Beihang Univeristy); Dongkai Yang (Beihang Univeristy) | |
13:45-15:45(Sun,26 May 2019) Location: Floor1 Louvres Room(卢浮宫厅) | |
S11: Information Applications II | |
Chair: Mianxiong Dong | |
No. 283469 | Sentiment Analysis for Tang Poetry based on Imagery Aided and Classifier Fusion |
Shen Yabo, Ma Yong, Li Chunguo, Li Shidang, Gu Mingliang, Zhang Chaojin, Jin Yun, Shen Yingli(Jiangsu Normal University) | |
No.283546 | Chinese News Keyword Extraction Algorithm Based on TextRank and Topic Model |
Ao Xiong, Qing Guo (Beijing University of Posts and Telecommunications) | |
No. 283506 | Regional landslide sensitivity analysis based on cpso-lssvm |
Yanze Li, Zhenjian Yang, Yunjie Zhang, Zhou Jin
(Tianjin Chengjian University) |
|
No.283112 | Context Adaptive Visual Tracker in Surveillance Networks |
Feng Wei (Systems Engineering Research Institute of China State Shipbuilding Corporation); Li MinYe (Unit 61660 of PLA); Zhou Yuan, Li Zizi,Li Chenghao (Tianjin University) | |
No.283019 | Software Defect Prediction Model Based on Stacked Denoising Auto-Encoder |
Yu Zhu (Beijing University of Posts and Telecommunications, Beijing, China); Dongjin Yin , Yingtao Gan (Beijing TangMIX Technology Co., Ltd) | |
No.283290 | A Physical and Verbal Bullying Detecting Algorithm Based on K-NN for School Bullying Prevention |
Shangbin Gao, Liang Ye (Harbin Institute of Technology) | |
16:00-18:00(Sun,26 May 2019) Location: Floor1 Louvres Room(卢浮宫厅) | |
S12: Software Design | |
Chair: Shaochuan Wu | |
No. 283018 | Deep&Cross network for software-intensive system fault prediction |
Dongjin Yin , Yingtao Gan (Beijing TangMIX Technology Co.Limited); Lanlan Rui , Yu Zhu, Guoxin Xia (Beijing University of Posts and Telecommunications) | |
No.283310 | Multipath based Privacy Protection Method for Data Transmission in SDN |
Na Dong, Liangmin Wang (Jiangsu University); Zhigeng Han (Nanjing Audit University); | |
No. 283299 | Detection of Insulator Defects based on YOLO V3 |
Fei Guo, Kun Hao, Mengqi Xia, Lu Zhao, Li Wang, Qi Liu (Tianjin Chengjian University) | |
No.283134 | An Efficient Implementation of Multi-interface SSD Controller on SoC |
Yifei Niu, Hai Cheng, Songyan Liu (Heilongjiang University) | |
No.283186 | CoLoRSim: A Highly Scalable ICN Simulation Platform |
Hongyi Li (Beijing Jiaotong University); Hongbin Luo (Beihang University) | |
No. 283289 | School Violence Detection Based on Multi-sensor Fusion and Improved Relief-F Algorithms |
Liang Ye, Jifu Shi (Harbin Institute of Technology), Ferdinando Hany, Seppnen Tapio, Alasaarela Esko (University of Oulu) | |
13:45-15:45(Sun,26 May 2019) Location: Floor3 Seine Room(塞纳河厅) | |
S13: Information Applications I | |
Chair: Yuan Wu | |
No. 283161 | Age and gender classification for permission control of mobile devices in tracking systems |
Choukri Merahi, Shaochuan Wu (Harbin Institute of Technology) | |
No. 283111 | Cross-sensor Image Change Detection Based on Deep Canonically Correlated Autoencoders |
Yuan Zhou, Hui Liu, Dan Li, Hai Cao, Jing Yang, Zizi Li (Tianjin University) | |
No.283288 | Speech Bullying Vocabulary Recognition Algorithm in Artificial Intelligent Child Protecting System |
Tong Liu, Liang Ye (Harbin Institute of Technology); Tian Han (Harbin University of Science and Technology); Yue Li (Ministry of Public Security); Alasaarela Esko (University of Oulu) | |
No.283435 | VITEC: A Violence Detection Framework |
Ferdinando Hany,Huuki Tuija, Seppnen, Tapio ,Alasaarela, Esko (University of Oulu); Liang Ye (Harbin Insitute of Technology); Tian Han, Zhang Zhu (Harbin University of Science and Technology); Guobing Sun (Heilongjiang University) | |
No.283944 | Compressed Sensing ISAR 3D Imaging Methods Based on OMP Algorithm |
Jingcheng Zhao, Zongkai Yang, Shaozhu Gu (Beijing University of Aeronautics and Astronautics) | |
No.283501 | Binocular Vision-based Human Ranging Algorithm Based On Human Faces Recognition |
Xiaolin He , Lin Ma, Weixiao Meng (Harbin Institute of Technology) | |
16:00-18:00(Sun,26 May 2019) Location: Floor3 Seine Room(塞纳河厅) | |
S14: Signal Processing | |
Chair: Yulong Gao | |
No.283292 | Ambiguity Function Analysis of Radar-Communication Integrated Waveform based on FDM and TDM Technologies |
Hongzhi Men, Zhiqun Song (The 54th Research Institute of China Electronics Technology Group Corporation); Zhiqun Song, Guisheng Liao (Xidian University) | |
No. 283354 | Sparse Decomposition Algorithm Based on Joint Sparse Model |
Qiyun Xuan, Si Wang, Yulong Gao, Junhui Cheng (Harbin Institute of Technology) | |
No. 283462 | Research on Evaluation Method of Cooperative Jamming Effect in Cognitive Confrontation |
Jing Ma, Bin Shi (Science and Technology on Special System Simulation Laboratory); Fei Che, Sitong Zhang (Harbin Engineering University) | |
No.283508 | An adaptive threshold decision algorithm in Non-cooperative signal detection |
Ziheng Li, Shuo Shi, Xuemai Gu (Harbin Institute of Technology) | |
No.283540 | A new two-microphone reduce size SMFTF algorithm for speech enhancement in new telecommunication systems |
Guernaz, Zineddine, Xuanli Wu (Harrbin Institute of Technology) | |
No.283555 | An Adaptive Window Time-Frequency Analysis Method Based on Short-Time Fourier Transform |
zhiqiang Li, Xiao Wang, Shuai Han (Harbin Institute of Technology); Ming Li (Institute of Telecommunication Satellite) | |
13:45-15:45(Sun,26 May 2019) Location: Floor3 Loire Room(卢瓦尔河厅) | |
S15: PHY III | |
Chair: Yunjian Jia | |
No. 283499 | Adaptive Beamforming of Vertical Frequency Diverse Array for Airborne Radar |
Xuzi Wu , Yongliang Sun (Nanjing Tech University) | |
No. 283492 | 2D DOA estimation of PR-WSF algorithm based on modified fireworks algorithm |
Yanping Liao, Chang Fu, Mung nya, EmmanuelMilambo (Harbin Engineering University) | |
No.283004 | Realization and Performance Simulation of Spectrum Detection Based on Cyclostationarity Properties |
Zhiqun Song, Zhongzhao Zhang (Harbin Institute of Technology); Yujing Lv (The 54th Research Institute of CECT) | |
No.283562 | Research on Application and Development of Key Technologies of Dynamic Wireless Charging System in New Intelligent Transportation System |
Lina Ma, Shi An (Harbin Institute of Technology); Wanlong Zhao (Harbin Engineering University) | |
No.283474 | Power Allocation Method for Satellite Communication Based on Network Coding |
Jin Liu, Zhuoming Li, Gongliang Liu (Harbin Institute of Technology) | |
No.283284 | Performance Analysis based on MGF Fading Approximation in Hybrid Cooperative Communication |
Cong Ye, Zhixiong Chen, Jinsha Yuan, Lijiao Wang (North China Electric Power University) | |
16:00-18:00(Sun,26 May 2019) Location: Floor3 Loire Room(卢瓦尔河厅) | |
S16: Position and Navigation II | |
Chair: Deyue Zou | |
No.283674 | Navigation Performance Comparison of ACE-BOC signal and TD-AltBOC signal |
Chunxia Li, Jianjun Fan, Min Li, Yang Gao (Beijing Satellite Navigation Center) | |
No.283559 | A KFL-TDOA UWB Positioning Method based on Hybrid Location Algorithm |
Shuo Shi, Meng Wang, Kunqi Hong (Harbin Institute of Technology) | |
No. 283552 | Distance Measurement based on Linear Phase Correlation in WiFi CSI |
Qingfei Kang , Liangbo Xie, Mu Zhou, Zengshan Tian (Chongqing University of Posts and Telecommunications) | |
No.283450 |
Seamless Positioning and Navigation System Based on GNSS, WIFI and PDR for Mobile Devices |
Yuanfeng Du, Dongkai Yang (Beihang Univeristy) | |
No.283296 | An Improved TDoA Localization Algorithm Based on AUV for Underwater Acoustic Sensor Networks |
Kaicheng Yu, Kun Hao, Cheng Li, Xiujuan Du, Beibei Wang, Yonglei Liu (Tianjin Chengjian University) | |
No. 283312 | Research on Indoor and Outdoor Seamless Positioning Based on Combination of Clustering and GPS |
Jingqiu Ren, Ke Bao (Northeast Petroleum University), Siyue Sun (Shanghai Engineering Center for Micro-satellites), Weidang Lu (Zhejiang University of Technology) | |
No.283003 | An Efficient Indoor Localization Method based on Visual Vocabulary |
Ruolin Guo, Danyang Qin, Min Zhao, Guangchao Xu (Heilongjiang University) |