Submit & Review

Published in

Chinese Journal of Electronics

Volume 31, Issue 4

05 July, 2022

Articles in press have been peer-reviewed and accepted, which are not yet assigned to volumes /issues, but are citable by Digital Object Identifier (DOI).
Display Method:
Abstract(171) HTML(74) PDF(20)
Abstract:
By solving the existing expectation-signal-to-noise ratio (expectation-SNR) based inequality model of the closed-form instantaneous cross-correlation function type of Choi-Williams distribution (CICFCWD), the linear canonical transform (LCT) free parameters selection strategies obtained are usually unsatisfactory. Since the second-order moment variance outperforms the first-order moment expectation in accurately characterizing output SNRs, this paper uses the variance analysis technique to improve parameters selection strategies. The CICFCWD’s average variance of deterministic signals embedded in additive zero-mean stationary circular Gaussian noise processes is first obtained. Then the so-called variance-SNRs are defined and applied to model a variance-SNR based inequality. A stronger inequalities system is also formulated by integrating expectation-SNR and variance-SNR based inequality models. Finally, a direct application of the system in noisy one-component and bi-component linear frequency-modulated signals detection is studied. Analytical algebraic constraints on LCT free parameters newly derived seem more accurate than the existing ones, achieving better noise suppression effects. Our methods have potential applications in optical, radar, communication and medical signal processing.
Abstract(196) HTML(92) PDF(21)
Abstract:
Optimal trajectory planning is a fundamental problem in the area of robotic research. On the time-optimal trajectory planning problem during the motion of a robotic arm, the method based on segmented polynomial interpolation function with a locally chaotic particle swarm optimization (LCPSO) algorithm is proposed in this paper. While completing the convergence in the early or middle part of the search, the algorithm steps forward on the problem of local convergence of traditional particle swarm optimization (PSO) and improved learning factor PSO (IFPSO) algorithms. Finally, simulation experiments are executed in joint space to obtain the optimal time and smooth motion trajectory of each joint, which shows that the method can effectively shorten the running time of the robotic manipulator and ensure the stability of the motion as well.
Abstract(51) HTML(24) PDF(9)
Abstract:
Multi-task learning is an essential yet practical mechanism for improving overall performance in various machine learning fields. Owing to the linguistic hierarchy, the hierarchical joint model is a common architecture used in natural language processing. However, in the state-of-the-art hierarchical joint models, higher-level tasks only share bottom layers or latent representations with lower-level tasks thus ignoring correlations between tasks at different levels, i.e., lower-level tasks cannot be instructed by the higher features. This paper investigates how to advance the correlations among various tasks supervised at different layers in an end-to-end hierarchical joint learning model. We propose a semi-shared hierarchical model that contains cross-layer shared modules and layer-specific modules. To fully leverage the mutual information between various tasks at different levels, we design four different dataflows of latent representations between the shared and layer-specific modules. Extensive experiments on CTB-7 & CONLL-09 show that our semi-shared approach outperforms basic hierarchical joint models on sequence tagging while having much fewer parameters. It inspires us that the proper implementation of the cross-layer sharing mechanism and residual shortcuts is promising to improve the performance of hierarchical joint NLP models while reducing the model complexity.
Abstract(18) HTML(9) PDF(1)
Abstract:
Color quick response (QR) code is an important direction for the future development of QR code, which has become a research hotspot due to the additional functional characteristics of its colors as the wide application of QR code technology. The existing color QR code has solved the problem of information storage capacity, but it requires an enormous hardware and software support system, making how to achieve its direct readability an urgent issue. This paper proposes a novel color QR code that combines multiple types of different identification information. This code combines multiplexing and color-coding technology to present the publicly encoded information (such as advertisements, public query information) as plain code, and traceability, blockchain, anti-counterfeiting authentication and other information concealed in the form of hidden code. We elaborate the basic principle of this code, construct its mathematical model and supply a set of algorithm design processes, which breakthrough key technology of halftone printout. The experimental results show that the proposed color QR code realizes the multi-code integration and can be read directly without special scanning equipment, which has unique advantages in the field of printing anti-counterfeiting labels.
Abstract(204) HTML(87) PDF(18)
Abstract:
Protein localization information is essential for understanding protein functions and their roles in various biological processes. The image-based prediction methods of protein subcellular localization have emerged in recent years because of the advantages of microscopic images in revealing spatial expression and distribution of proteins in cells. However, the image-based prediction is a very challenging task, due to the multi-instance nature of the task and low quality of images. In this paper, we propose a multi-task learning strategy and mask generation to enhance the prediction performance. Furthermore, we also investigate effective multi-instance learning schemes. We collect a large-scale dataset from the Human Protein Atlas database, and the experimental results show that the proposed multi-task multi-instance learning model outperforms both single-instance learning and common multi-instance learning methods by large margins.
Abstract(217) HTML(101) PDF(18)
Abstract:
In rail transit systems, improving transportation efficiency has become a research hotspot. In recent years, a method of train control system based on virtual coupling has attracted the attention of many scholars. And the train operation control method is not only the key to realize the virtual coupling train operation control system but also the key to prevent accidents. Therefore, based on the existing research, a virtual coupled train dynamics model with nonlinear dynamics is established. Then, the recursive least square method based on the train running process data is used to identify the model parameters of the nonlinear dynamics virtual coupling train coupling process, and it is applied to the variable parameter artificial potential field (VAPF) to identify the parameters. A fusion controller based on feature-based generalized model prediction (GPC) and VAPF is used to control the virtual coupled train and prevent collision. Finally, a section of Beijing-Shanghai high-speed railway is taken as the background to verify the effectiveness of the proposed method.
Abstract(116) HTML(46) PDF(11)
Abstract:
Satellites based positioning has been widely applied to many areas in our daily lives and thus become indispensable, which also leads to increasing demand for high-positioning accuracy. In some complex environments (such as dense urban, valley), multipath interference is one of the main error sources deteriorating positioning accuracy, and it is difficult to eliminate via differential techniques due to its uncertainty of occurrence and irrelevance in different instants. To address this problem, we propose a positioning method for global navigation satellite systems (GNSS) by adopting a modified teaching-learning based optimization (TLBO) algorithm after the positioning problem is formulated as an optimization problem. Experiments are conducted by using actual satellite data. The results show that the proposed positioning algorithm outperforms other algorithms, such as particle swarm optimization based positioning algorithm, differential evolution based positioning algorithm, variable projection method, and TLBO algorithm, in terms of accuracy and stability.
Abstract(43) HTML(22) PDF(3)
Abstract:
A synchronous GNSS generator spoofer aims at directly taking over the tracking loops of the receiver with the lowest possible spoofing to signal ratio (SSR) without forcing it to lose lock. This paper investigates the factors that affect spoofing success and their relationships. The necessary conditions for successful spoofing are obtained by deriving the code tracking error in the presence of spoofing and analyzing the effects of SSR, spoofing synchronization errors, and receiver settings on the S-curve ambiguity and code tracking trajectory. The minimum SSRs for a successful spoofing calculated from the theoretical formulation agree with Monte Carlo simulations at digital intermediate frequency signal level within 1 dB when the spoofer pulls the code phase in the same direction as the code phase synchronization error, and the required SSRs can be much lower when pulling in the opposite direction. The maximum spoofing code phase error for a successful spoofing is tested by using TEXBAT datasets, which coincides with the theoretical results within 0.1 chip. This study reveals the mechanism of covert spoofing and can play a constructive role in the future development of spoofing and anti-spoofing methods.
Abstract(106) HTML(49) PDF(13)
Abstract:
The triangular geometry is the basis of near field array accurate distance estimation algorithms. The fisher expression of traditional distance estimation is derived by utilizing the Taylor series. To improve convergence rate and estimation accuracy, a novel iterative distance estimation algorithm is proposed with differential equations based on the triangular geometry. Firstly, its convergence performance is analysed in detail. Secondly, the selection of the initial value and the number of iterations are respectively studied. Thirdly, compared with the traditional estimation algorithms by utilizing the fisher approximation, the proposed algorithm has a higher convergence rate and estimation accuracy. Moreover, its pseudocode is presented. Finally, the experiment results and performance analysis are provided to verify the effectiveness of the proposed algorithm.
Abstract(55) HTML(29) PDF(6)
Abstract:
synthetic aperture radar (SAR) imaging is an efficient strategy which exploits the properties of microwaves to capture images. A major concern in SAR imaging is the reconstruction of image from back scattered signals in the presence of noise. The reflected signal consist of more noise than the target signal and it is a challenging problem to reduce the noise in the collected signal for better reconstruction of an image. Current studies mostly focus on filtering techniques for noise removal. This can result in an undesirable point spread function (PSF) causing extreme smearing effect in the desired image. In order to handle this problem, a computational technique, particle swarm optimization (PSO) is used for de-noising purpose and later the target performance is further improved by an amalgamation of Wiener filter. Moreover, to improve the de-noising performance we have exploited the singular value decomposition based morphological filtering. To justify the proposed improvements we have simulated the proposed techniques and results are compared with the conventional existing models. The proposed method revealed considerable decrease in mean square error (MSE) compared to Wiener filter and PSO techniques. Quantitative analysis of image restoration quality are also presented in comparison with Wiener filter and PSO based on the improvement in signal to noise ratio (ISNR) and peak signal to noise ratio (PSNR).
Abstract(177) HTML(90) PDF(29)
Abstract:
A common but critical task in biological ontologies data analysis is to compare the difference between ontologies. There have been numerous ontology-based semantic-similarity measures proposed in specific ontology domain, but it still remains a challenge for cross-domain ontologies comparison. An ontology contains the scientific natural language description for the corresponding biological aspect. Therefore, we develop a new method based on natural language processing (NLP) representation model bidirectional encoder representations from transformers (BERT) for cross-domain semantic representation of biological ontologies. This article uses the BERT model to represent the word-level of the ontologies as a set of vectors, facilitating the semantic analysis or comparing the biomedical entities named in an ontology or associated with ontology terms. We evaluated the ability of our method in two experiments: calculating similarities of pair-wise disease ontology and human phenotype ontology terms and predicting the pair-wise of proteins interaction. The experimental results demonstrated the comparative performance. This gives promise to the development of NLP methods in biological data analysis.
Abstract(289) HTML(134) PDF(44)
Abstract:
Adopt software-definition technology to decouple the functional components of the industrial control system (ICS) in a service-oriented and distributed form is an important way for the industrial Internet of things to integrate information technology, communication technology, and operation technology. Therefore, this paper presents the concept of software-defined control architecture and describes the time consistency requirements under the paradigm shift of ICS architecture. By analyzing the physical clock and virtual clock mechanism models, the global clock synchronization space is logically divided into the physical and virtual clock synchronization domains, and a formal description of the global clock synchronization space is proposed. According to the fundamental analysis of the clock state model, the physical clock linear filtering synchronization model is derived, and a distributed observation fusion filtering model is constructed by considering the two observation modes of the virtual clock to realize the time synchronization of the global clock space by way of timestamp layer-by-layer transfer and fusion estimation. Finally, the simulation results show that the proposed model can significantly improve the accuracy and stability of clock synchronization.
Abstract(287) HTML(119) PDF(29)
Abstract:
Samples collected from most industrial processes have two challenges: one is contaminated by the non-Gaussian noise, and the other is gradually obsolesced. This feature can obviously reduce the accuracy and generalization of models. To handle these challenges, a novel method, named the robust online extreme learning machine (RO-ELM), is proposed in this paper, in which the least mean $\boldsymbol{p}$-power criterion is employed as the cost function which is to boost the robustness of the ELM, and the forgetting mechanism is introduced to discard the obsolescence samples. To investigate the performance of the RO-ELM, experiments on artificial and real-world datasets with the non-Gaussian noise are performed, and the datasets are from regression or classification problems. Results show that the RO-ELM is more robust than the ELM, the online sequential ELM (OS-ELM) and the OS-ELM with forgetting mechanism (FOS-ELM). The accuracy and generalization of the RO-ELM models are better than those of other models for online learning.
Abstract(41) HTML(20) PDF(2)
Abstract:
The interactive multiple-model (IMM) is a popular choice for target tracking. However, to design transition probability matrices (TPMs) for IMMs is a considerable challenge with less prior knowledge, and the TPM is one of the fundamental factors influencing IMM performance. IMMs with inaccurate TPMs can make it difficult to monitor target maneuvers and bring poor tracking results. To address this challenge, we propose an adaptive IMM algorithm based on end-to-end learning. In our method, the neural network is utilized to estimate TPMs in real-time based on partial parameters of IMM in each time step, resulting in a generalized recurrent neural network. Through end-to-end learning in the tracking task, the dataset cost of the proposed algorithm is smaller and the generalizability is stronger. Simulation and automatic dependent surveillance-broadcast (ADS-B) tracking experiment results show that the proposed algorithm has better tracking accuracy and robustness with less prior knowledge.
Abstract(277) HTML(125) PDF(37)
Abstract:
Recently, many deep learning models have shown excellent performance in hyperspectral image (HSI) classification. Among them, networks with multiple convolution kernels of different sizes have been proved to achieve richer receptive fields and extract more representative features than those with a single convolution kernel. However, in most networks, different-sized convolution kernels are usually used directly on multi-branch structures, and the image features extracted from them are fused directly and simply. In this paper, to fully and adaptively explore the multiscale information in both spectral and spatial domains of HSI, a novel multi-scale weighted kernel network (MSWKNet) based on an adaptive receptive field is proposed. First, the original HSI cubic patches are transformed to the input features by combining the principal component analysis and one-dimensional spectral convolution. Then, a three-branch network with different convolution kernels is designed to convolve the input features, and adaptively adjust the size of the receptive field through the attention mechanism of each branch. Finally, the features extracted from each branch are fused together for the task of classification. Experiments on three well-known hyperspectral data sets show that MSWKNet outperforms many deep learning networks in HSI classification.
Abstract(99) HTML(49) PDF(7)
Abstract:
To reduce the overhead and complexity of channel state information acquisition in interference alignment, the topological interference management (TIM) was proposed to manage interference, which only relied on the network topology information. The previous research on topological interference management via the low-rank matrix completion approach is known to be NP-hard. This paper considers the clustering method for the topological interference management problem, namely, the low-rank matrix completion for TIM is applied within each cluster. Based on the clustering result, we solve the low-rank matrix completion problem via nuclear norm minimization and Frobenius norm minimization function. Simulation results demonstrate that the proposed clustering method combined with TIM leads to significant gain on the achievable degrees of freedom.
Abstract(116) HTML(45) PDF(10)
Abstract:
Carotid artery stenosis is a serious medical condition that can lead to stroke. Using machine learning method to construct classifier model, carotid artery stenosis can be diagnosed with transcranial doppler data. We propose an improved fuzzy support vector machine (FSVMI) model to predict carotid artery stenosis, with the maximum geometric mean (Gmean) as the optimization target. The fuzzy membership function is obtained by combining information entropy with the normalized class-center distance. Experimental results showed that the proposed model was superior to the benchmark models in sensitivity and geometric mean criteria.
Abstract(223) HTML(99) PDF(19)
Abstract:
To solve the problem of semantic loss in text representation, this paper proposes a new embedding method of word representation in semantic space called wt2svec based on supervised latent Dirichlet allocation (SLDA) and Word2vec. It generates the global topic embedding word vector utilizing SLDA which can discover the global semantic information through the latent topics on the whole document set. It gets the local semantic embedding word vector based on the Word2vec. The new semantic word vector is obtained by combining the global semantic information with the local semantic information. Additionally, the document semantic vector named doc2svec is generated. The experimental results on different datasets show that wt2svec model can obviously promote the accuracy of the semantic similarity of words, and improve the performance of text categorization compared with Word2vec.
Abstract(83) HTML(34) PDF(11)
Abstract:
In this paper, we derive and propose a track-oriented marginal Poisson multi-Bernoulli mixture (TO-MPMBM) filter to address the problem that the standard random finite set (RFS) filters cannot build continuous trajectories for multiple extended targets. Firstly, the Poisson point process (PPP) model and the multi-Bernoulli mixture (MBM) model are used to establish the set of birth trajectories and the set of existing trajectories, respectively. Secondly, the proposed filter recursively propagates the marginal association distributions and the Poisson multi-Bernoulli mixture (PMBM) density over the set of alive trajectories. Finally, after pruning and merging process, the trajectories with existence probability greater than the given threshold are extracted as the estimated target trajectories. A comparison of the proposed filter with the existing trajectory filters in two classical scenarios confirms the validity and reliability of the TO-MPMBM filter.
Abstract(125) HTML(62) PDF(17)
Abstract:
Existing neural approaches have achieved significant progress for Chinese word segmentation (CWS). The performances of these methods tend to drop dramatically in the cross-domain scenarios due to the data distribution mismatch across domains and the out of vocabulary words problem. To address these two issues, proposes a lexicon-augmented graph convolutional network for cross-domain CWS. The novel model can capture the information of word boundaries from all candidate words and utilize domain lexicons to alleviate the distribution gap across domains. Experimental results on the cross-domain CWS datasets (SIGHAN-2010 and TCM) show that the proposed method successfully models information of domain lexicons for neural CWS approaches and helps to achieve competitive performance for cross-domain CWS. The two problems of cross-domain CWS can be effectively solved through various interactions between characters and candidate words based on graphs. Further, experiments on the CWS benchmarks (Bakeoff-2005) also demonstrate the robustness and efficiency of the proposed method.
Abstract(61) HTML(25) PDF(10)
Abstract:
Due to insufficient data and high cost of data annotation, it is usually necessary to use knowledge transfer to recognize speech emotion. However, the uncertainty and subjectivity of emotion make speech emotion recognition based on transfer learning more challenging. Domain adaptation based on maximum mean discrepancy considers the marginal alignment of source domain and target domain, but without paying regard to the class prior distribution in both domains, which reduces the transfer efficiency. To solve this problem, a novel cross-corpus speech emotion recognition framework based on local domain adaption is proposed, in which a local weighted maximum mean discrepancy is used to evaluate the distance between different emotion datasets. Experimental results show that the cross-corpus speech emotion recognition has been improved when compared with other cross-corpus methods including global domain adaptation and cross-corpus speech emotion recognition directly.
Abstract(132) HTML(62) PDF(12)
Abstract:
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion by filtering redundant features, thus alleviating the dimensional disaster problem and achieving efficient identification of malware families for proper classification. Malware authors use obfuscation technology to generate a large number of malware variants, which imposes a heavy analysis burden on security researchers and consumes a lot of resources in both time and space. To this end, we propose the MalFSM framework. Through the feature selection method, we reduce the 735 opcode features contained in the Kaggle dataset to 16, and then fuse on metadata features (count of file lines and file size) for a total of 18 features, and find that the machine learning classification is efficient and high accuracy. We analyzed the correlation between the opcode features of malicious samples and interpreted the selected features. Our comprehensive experiments show that the highest classification accuracy of MalFSM can reach up to 98.6% and the classification time is only 7.76s on the Kaggle malware dataset of Microsoft.
Abstract(212) HTML(90) PDF(25)
Abstract:
The robustness of adversarial examples to image scaling transformation is usually ignored when most existing adversarial attacks are proposed. In contrast, image scaling is often the first step of the model to transfer various sizes of input images into fixed ones. We evaluate the impact of image scaling on the robustness of adversarial examples applied to image classification tasks. We set up an image scaling system to provide a basis for robustness evaluation and conduct experiments in different situations to explore the relationship between image scaling and the robustness of adversarial examples. Experiment results show that various scaling algorithms have a similar impact on the robustness of adversarial examples, but the scaling ratio significantly impacts it.
Abstract(93) HTML(47) PDF(11)
Abstract:
Deep-learning-based language models have improved generation-based linguistic steganography, posing a huge challenge for linguistic steganalysis. The existing neural-network-based linguistic steganalysis methods are incompetent to deal with complicated text because they only extract single-granularity features such as global or local text features. To fuse multi-granularity text features, we present a novel linguistic steganalysis method based on attentional LSTMs and short-cut dense CNNs (BiLSTM-SDC). The BiLSTM equipped with the scaled dot-product attention mechanism is used to capture the long dependency representations of the input sentence. The CNN with the short-cut and dense connection is exploited to extract sufficient local semantic features from the word embedding matrix. We connect two structures in parallel, concatenate the long dependency representations and the local semantic features, and classify the stego and cover texts. The results of comparative experiments demonstrate that the proposed method is superior to the previous state-of-the-art linguistic steganalysis.
Abstract(371) HTML(177) PDF(52)
Abstract:
With the development of deep learning, graph neural networks (GNNs) have yielded substantial results in various application fields. GNNs mainly consider the pair-wise connections and deal with graph-structured data. In many real-world networks, the relations between objects are complex and go beyond pair-wise. Hypergraph is a flexible modeling tool to describe intricate and higher-order correlations. The researchers have been concerned how to develop hypergraph-based neural network model. The existing hypergraph neural networks show better performance in node classification tasks and so on, while they are shallow network because of over-smoothing, over-fitting and gradient vanishment. To tackle these issues, we present a novel deep hypergraph neural network (DeepHGNN). We design DeepHGNN by using the technologies of sampling hyperedge, residual connection and identity mapping, residual connection and identity mapping bring from GCNs. We evaluate DeepHGNN on two visual object datasets. The experiments show the positive effects of DeepHGNN, and it works better in visual object classification tasks.
Abstract(80) HTML(37) PDF(9)
Abstract:
Few-Shot learning (FSL) is a new machine learning method that applies the prior knowledge from some different domains tasks. The existing FSL models of metric-based learning have some drawbacks, such as the extracted features cannot reflect the true data distribution and the generalization ability is weak. In order to solve the problem in the present, we develop a model, named COOPERATE (CrOss mOdal adaPtive fEw-shot leaRning bAsed on Task dEpendence). A feature extraction and task representation method based on task condition network and auxiliary co-training is proposed. Semantic representation is added to each task by combining both visual and textual features. The measurement scale is adjusted to change the property of parameter update of the algorithm. The experimental results show that the COOPERATE has the better performance comparing with all approaches of the monomode and modal alignment FSL.
Abstract(163) HTML(63) PDF(5)
Abstract:
This paper proposed a novel design method for pyramid horns which are under the constraints of 3 dB beamwidth. It is based on the general radiation patterns of E\H planes derived from Huygens’ principle. Through interpolation and fitting techniques, the E\H plane’s maximum aperture error parameter of the pyramid horn is obtained as a function of the angle and aperture electrical size. Firstly, the aperture size of the E (or H) plane is calculated with the help of the optimal gain principle. Secondly, the constraint equation of another plane is derived. Finally, the intersection of constraint equation and interpolation function, which can be solved iteratively, contains all the solution information. The general radiation patterns neglect the influence of the Huygens element factor which makes the error bigger in large design beamwidth. In this paper, through theoretical analysis and simulation experiments, two correction formulas are employed to correct the Huygens element factor’s influence on the E\H planes. Simulation experiments and measurements show that the proposed method has a smaller design error in the range of 0–60 degrees half-power beamwidth.
Abstract(214) HTML(99) PDF(29)
Abstract:
In this paper, we propose a low complexity distributed approach to address the multitarget detection/tracking problem in the presence of noisy and missing data. The proposed approach consists of two components: a distributed flooding scheme for measurements exchanging among sensors and a sampling-based clustering approach for target detection/tracking from the aggregated measurements. The main advantage of the proposed approach over the prevailing Markov-Bayes-based distributed filters is that it does not require any priori information and all the information required is the measurement set from multiple sensors. A comparison of the proposed approach with the available distributed clustering approaches and the cutting edge distributed multi-Bernoulli filters that are modeled with appropriate parameters confirms the effectiveness and the reliability of the proposed approach.
Abstract(161) HTML(66) PDF(18)
Abstract:
With the recent increase in the number of Internet of Things (IoT) services, an intelligent scheduling strategy is needed to manage these services. In this paper, the problem of automatic choreography of microservices in IoT is explored. A type of reinforcement learning (RL) algorithm called TD3 is used to generate the optimal choreography policy under the framework of a softwaredefined network. The optimal policy is gradually reached during the learning procedure to achieve the goal, despite the dynamic characteristics of the network environment. The simulation results show that compared with other methods, the TD3 algorithm converges faster after a certain number of iterations, and it performs better than other non-RL algorithms by obtaining the highest reward. The TD3 algorithm can effciently adjust the traffc transmission path and provide qualified IoT services.
Abstract(107) HTML(44) PDF(11)
Abstract:
A family of binary sequences derived from Euler quotients $\psi(\cdot)$ with RSA modulus $pq$ is introduced. Here two primes $p$ and $q$ are distinct and satisfy $\gcd(pq, (p-1)(q-1))=1$. The linear complexities and minimal polynomials of the proposed sequences are determined. Besides, this kind of sequences is shown not to have correlation of order $four$, although there exists the following relation $\psi(t)-\psi(t+p^2q)-\psi(t+q^2p)+\psi(t+(p+q)pq)=$$0 \pmod {pq}$ for any integer $t$ by the properties of Euler quotients.
Abstract(85) HTML(42) PDF(12)
Abstract:
A software ecosystem (SECO) can be described as a special complex network. Previous complex networks in an SECO have limitations in accurately reflecting the similarity between each pair of nodes. The community structure is critical towards understanding the network topology and function. Many scholars tend to adopt evolutionary optimization methods for community detection. The information adopted in previous optimization models for community detection is incomprehensive and cannot be directly applied to the problem of community detection in an SECO. Based on this, a complex network in SECOs is first built. In the network, the cooperation intensity between developers is accurately calculated, and the attribute contained by each developer is considered. A multi-objective optimization model is formulated. A community detection algorithm based on NSGA-II is employed to solve the above model. Experimental results demonstrate that the proposed method of calculating the developer cooperation intensity and our model are advantageous.
Abstract(225) HTML(99) PDF(15)
Abstract:
Pre-mRNA splicing is an essential procedure for gene transcription. Through the cutting of introns and exons, the DNA sequence can be decoded into different proteins related to different biological functions. The cutting boundaries are defined by the donor and acceptor splice sites. Characterizing the nucleotides patterns in detecting splice sites is sophisticated and challenges the conventional methods. Recently, the deep learning frame has been introduced in predicting splice sites and exhibits high performance. It extracts high dimension features from the DNA sequence automatically rather than infers the splice sites with prior knowledge of the relationships, dependencies, and characteristics of nucleotides in the DNA sequence. This paper proposes the AttentionSplice model, a hybrid construction combined with multi-head self-attention, convolutional neural network (CNN), bidirectional long short-term memory (Bi-LSTM) network. The performance of AttentionSplice is evaluated on the Homo sapiens (Human) and Caenorhabditis Elegans (Worm) datasets. Our model outperforms state-of-the-art models in the classification of splice sites. To provide interpretability of AttentionSplice models, we extract important positions and key motifs which could be essential for splice site detection through the attention learned by the model. Our result could offer novel insights into the underlying biological roles and molecular mechanisms of gene expression.
Abstract(215) HTML(91) PDF(25)
Abstract:
The weighted sampling methods based on k-nearest neighbors have been demonstrated to be effective in solving the class imbalance problem. However, they usually ignore the positional relationship between a sample and the heterogeneous samples in its neighborhood when calculating sample weight. This paper proposes a novel neighborhood-weighted based (NWBBagging) sampling method to improve the Bagging algorithm’s performance on imbalanced datasets. It considers the positional relationship between the center sample and the heterogeneous samples in its neighborhood when identifying critical samples. And a parameter reduction method is proposed and combined into the ensemble learning framework, which reduces the parameters and increases the classifier’s diversity. We compare NWBBagging with some stateof-the-art ensemble learning algorithms on 34 imbalanced datasets, and the result shows that NWBBagging achieves better performance.
Abstract(217) HTML(88) PDF(21)
Abstract:
Compared with cloud computing environment, edge computing has many choices of service providers due to different deployment environments. The flexibility of edge computing makes the environment more complex. The current edge computing architecture has the problems of scattered computing resources and limited resources of single computing node. When the edge node carries too many task requests, the makespan of the task will be delayed. We propose a load balancing algorithm based on weighted bipartite graph for edge computing (LBA-EC), which makes full use of network edge resources, reduces user delay, and improves user service experience. The algorithm is divided into two phases for task scheduling. In the first phase, the tasks are matched to different edge servers. In the second phase, the tasks are optimally allocated to different containers in the edge server to execute according to the two indicators of energy consumption and completion time. The simulations and experimental results show that our algorithm can effectively map all tasks to available resources with a shorter completion time.
Abstract(175) HTML(71) PDF(21)
Abstract:
Since the basic probability of an interval-valued belief structure (IBS) is assigned as interval number, its combination becomes difficult. Especially, when dealing with highly conflicting IBSs, most of the existing combination methods may cause counter-intuitive results, which can bring extra heavy computational burden due to nonlinear optimization model, and lose the good property of associativity and commutativity in Dempster-Shafer theory (DST). To address these problems, a novel conflicting IBSs combination method named CSUI (conflict, similarity, uncertainty, intuitionistic fuzzy sets)-DST method is proposed by introducing a similarity measurement to measure the degree of conflict among IBSs, and an uncertainty measurement to measure the degree of discord, non-specificity and fuzziness of IBSs. Considering these two measures at the same time, the weight of each IBS is determined according to the modified reliability degree. From the perspective of intuitionistic fuzzy sets, we propose the weighted average IBSs combination rule by the addition and number multiplication operators. The effectiveness and rationality of this combination method are validated with two numerical examples and its application in target recognition.
Abstract(183) HTML(83) PDF(23)
Abstract:
Quantum algorithms are raising concerns in the field of cryptography all over the world. A growing number of symmetric cryptography algorithms have been attacked in the quantum setting. Type-3 generalized Feistel scheme (GFS) and unbalanced Feistel scheme with expanding functions (UFS-E) are common symmetric cryptography schemes, which are often used in cryptographic analysis and design. We propose quantum attacks on the two Feistel schemes. For $d$-branch Type-3 GFS and UFS-E, we propose distinguishing attacks on $(d+1)$-round Type-3 GFS and UFS-E in polynomial time in the quantum chosen plaintext attack (qCPA) setting. We propose key recovery by applying Grover's algorithm and Simon's algorithm. For $r$-round $d$-branch Type-3 GFS with $k$-bit length subkey, the complexity is $O({2^{(d - 1)(r - d - 1)k/2}})$ for $r\ge d + 2$. The result is better than that based on exhaustive search by a factor ${2^{({d^2} - 1)k/2}}$. For $r$-round $d$-branch UFS-E, the attack complexity is $O({2^{(r - d - 1)(r - d)k/4}})$ for $d + 2 \le r \le 2d$, and $O({2^{(d - 1)(2r - 3d)k/4}})$ for $r > 2d$. The results are better than those based on exhaustive search by factors ${2^{(4rd - {d^2} - d - {r^2} - r)k/4}}$ and ${2^{3(d - 1)dk/4}}$ in the quantum setting, respectively.
Abstract(441) HTML(205) PDF(48)
Abstract:
Phrase-indexed question answering (PIQA) seeks to improve the inference speed of question answering (QA) models by enforcing complete independence of the document encoder from the question encoder, and it shows that the constrained model can achieve significant efficiency at the cost of its accuracy. In this paper, we aim to build a model under the PIQA constraint while reducing its accuracy gap with the unconstrained QA models. We propose a novel framework—AnsDR, which consists of an answer boundary detector (AnsD) and an answer candidate ranker (AnsR). More specifically, AnsD is a QA model under the PIQA architecture and it is designed to identify the rough answer boundaries; and AnsR is a lightweight ranking model to finely re-rank the potential candidates without losing the efficiency. We perform the extensive experiments on public datasets. The experimental results show that the proposed method achieves the state of the art on the PIQA task.
Abstract(367) HTML(165) PDF(46)
Abstract:
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and technology, new changes have taken place in both thinking space and cyberspace. To this end, this paper divides the current integration and development of thinking space and cyberspace into three stages, namely Internet of brain (IoB), Internet of thought (IoTh), and Internet of thinking (IoTk). At each stage, the contents and technologies to achieve convergence and connection of spaces are discussed. Besides, the Internet of creation (IoC) is proposed to represent the future development of thinking space and cyberspace. Finally, a series of open issues are raised, and they will become thorny factors in the development of the IoC stage.
2022, 31(4): 595-603.   doi: 10.1049/cje.2020.00.268
Abstract(229) HTML(108) PDF(59)
Abstract:
Non-intrusive load monitoring (NILM) can infer the status of the appliances in operation and their energy consumption by analyzing the energy data collected from monitoring devices. With the rapid increase of electric loads in amount and type, the traditional way of uploading all energy data to cloud is facing enormous challenges. It becomes increasingly significant to construct distinguishable load signatures and build robust classification models for NILM. In this paper, we propose a load signature construction method for load recognition task in home scenarios. The load signature is based on the Gramian angular field encoding theory, which is convenient to construct and significantly reduces the data transmission volume of the network. Moreover, edge computing architecture can reasonably utilize computing resources and relieve the pressure of the server. The experimental results on NILM datasets demonstrate that the proposed method obtains superior performance in the recognition of household appliances under insufficient resources.
et al.
2022, 31(4): 604-611.   doi: 10.1049/cje.2021.00.139
Abstract(185) HTML(84) PDF(25)
Abstract:
The similarity detection between two cross-platform binary functions has been applied in many fields, such as vulnerability detection, software copyright protection or malware classification. Current advanced methods for binary function similarity detection usually use semantic features, but have certain limitations. For example, practical applications may encounter instructions that have not been seen in training, which may easily cause the out of vocabulary (OOV) problem. In addition, the generalization of the extracted binary semantic features may be poor, resulting in a lower accuracy of the trained model in practical applications. To overcome these limitations, we propose a double-layer positional encoding based transformer model (DP-Transformer). The DP-Transformer’s encoder is used to extract the semantic features of the source instruction set architecture (ISA), which is called the source ISA encoder. Then, the source ISA encoder is fine-tuned by the triplet loss while the target ISA encoder is trained. This process is called DP-MIRROR. When facing the same semantic basic block, the embedding vectors of the source and target ISA encoders are similar. Different from the traditional transformer which uses single-layer positional encoding, the double-layer positional encoding embedding can solve the OOV problem while ensuring the separation between instructions, so it is more suitable for the embedding of assembly instructions. Our comparative experiment results show that DP-MIRROR outperforms the state-of-the-art approach, MIRROR, by about 35% in terms of precision at 1.
2022, 31(4): 612-625.   doi: 10.1049/cje.2020.00.391
Abstract(660) HTML(303) PDF(53)
Abstract:
Software trustworthiness is an essential criterion for evaluating software quality. In component-based software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
et al.
2022, 31(4): 626-634.   doi: 10.1049/cje.2021.00.125
Abstract(164) HTML(73) PDF(24)
Abstract:
Because a significant number of algorithms in computational science include search challenges and a large number of algorithms that can be transformed into search problems have garnered significant attention, especially the time rate and accuracy of search, a quantum walk search algorithm on hypergraphs, whose aim is to reduce time consumption and increase the readiness and controllability of search, is proposed in this paper. First, the data points are divided into groups and then isomorphic to the permutation set. Second, the element coordinates in the permutation set are adopted to mark the position of the data points. Search the target data by the controllable quantum walk with multiparticle on the ring. By controlling the coin operator of quantum walk, it is determined that search algorithm can increase the accuracy and controllability of search. It is determined that search algorithm can reduce time consumption by increasing the number of search particles. It also provides a new direction for the design of quantum walk algorithms, which may eventually lead to entirely new algorithms.
2022, 31(4): 635-646.   doi: 10.1049/cje.2021.00.217
Abstract(202) HTML(97) PDF(34)
Abstract:
In the traditional quantum wolf pack algorithm, the wolf pack distribution is simplified, and the leader wolf is randomly selected. This leads to the problems that the development and exploration ability of the algorithm is weak and the rate of convergence is slow. Therefore, a quantum wolf pack evolutionary algorithm of weight decision-making based on fuzzy control is proposed in this paper. First, to realize the diversification of wolf pack distribution and the regular selection of the leader wolf, a dual strategy method and sliding mode cross principle are adopted to optimize the selection of the quantum wolf pack initial position and the candidate leader wolf. Second, a new non-linear convergence factor is adopted to improve the leader wolf’s search direction operator to enhance the local search capability of the algorithm. Meanwhile, a weighted decision-making strategy based on fuzzy control and the quantum evolution computation method is used to update the position of the wolf pack and enhance the optimization ability of the algorithm. Then, a functional analysis method is adopted to prove the convergence of the quantum wolf pack algorithm, thus realizing the feasibility of the algorithm’s global convergence. The performance of the quantum wolf pack algorithm of weighted decision-making based on fuzzy control was verified through six standard test functions. The optimization results are compared with the standard wolf pack algorithm and the quantum wolf pack algorithm. Results show that the improved algorithm had a faster rate of convergence, higher convergence precision, and stronger development and exploration ability.
et al.
2022, 31(4): 647-651.   doi: 10.1049/cje.2021.00.283
Abstract(149) HTML(60) PDF(16)
Abstract:
This work presents a novel plane-based area-saving control bus design with distributed registers in 3D NAND flash memory. 99.47% control signal routing wires are reduced compared to the conventional control circuit design. Independent multi-plane read is compatible with the existing read operations thanks to the register addresses are reasonably assigned. Furthermore, power-saving register group address-based plane gating scheme is proposed which saves about 2.9 mW bus toggling power. A four-plane control bus design with 20K-bits registers has been demonstrated in field programmable gate array tester. The results show that the plane-based control bus design is beneficial to high-performance 3D NAND flash memory design.
et al.
2022, 31(4): 652-657.   doi: 10.1049/cje.2021.00.032
Abstract(228) HTML(100) PDF(41)
Abstract:
Graphene solution-gated field effect transistors (G-SgFETs) have been widely developed in the field of biosensors, but deficiencies in their theories still exist. A theoretical model for G-SgFET, including the three-terminal equivalent circuit model and the numerically calculating method, is proposed by the comprehensive analyses of the graphene-liquid interface and the FET principle. Not only the applied voltages on the electrode-pairs of gate-source and drain-source, but also the nature of graphene and its derivatives are considered by analysing their influences on the Fermi level, the carriers’ concentration and mobility, which may consequently affect the output drain-source current. To verify whether it is available for G-SgFETs based on different method prepared graphene, three kinds of graphene materials which are liquid-phase exfoliated graphene, reduced graphene oxide (rGO), and tetra (4-aminophenyl) porphyrin hybridized rGO are used as examples. The coincidences of calculated output and transfer feature curves with the measured ones are obtained to confirm its adaptivity for simulating the basic G-SgFETs’ electric features, by modulating Fermi level and mobility. Furthermore, the model is exploited to simulate G-SgFETs’ current responding to the biological functionalization with aptamer and the detections for circulating tumor cells, as a proof-of-concept. The calculated current changes are compared with the experimental results, to verify the proposed G-SgFETs’ model is also suitable for mimicking the bio-electronic responding, which may give a preview of some conceived G-SgFETs’ biosensors and improve the design efficiency.
et al.
2022, 31(4): 658-664.   doi: 10.1049/cje.2020.00.286
Abstract(174) HTML(95) PDF(26)
Abstract:
The passive noise-shaping successive approximation register (NS-SAR) analog-to-digital converter (ADC) demonstrates high performance in resolution improvement, power reduction, and process scaling, while its charge-sharing loss and limited bandwidth weaken the noise-shaping effect. This paper presents a first-order NS-SAR ADC based on error-feedback (EF) structure to realize high-efficiency noise shaping. It employs a lossless EF path by using a set of ping-pong switching capacitors with passive signal-residue summation technique. The proposed first-order EF NS-SAR prototype can be promoted to multi-order structure with the minor modification. Verified by simulation in 65-nm CMOS process, the proposed 9-bit NS-SAR ADC consumes 183.66 μ W when operating at 20 MS/s with the supply voltage of 1.2 V. At the oversampling ratio of 16, it achieves a peak signal-to-noise-and-distortion ratio of 81 dB, yielding Schreier figure of merit of 176.32 dB.
MORE+
2017, 26(5): 1057-1063.   doi: 10.1049/cje.2017.08.024
[Abstract](444) [PDF 634KB](376)

According to the standard for the GSM for railway (GSM-R) wireless systems in China train control system level 3 (CTCS-3), the control data transfer delay should be no larger than 500ms with greater than 99% probability. Coverage of both non-redundant networks and intercross redundant networks and cases of single Mobile terminals (MTs) and redundant MTs on one train are considered, and the corresponding vehicle-ground communication models, delay models, and fault models are constructed. The simulation results confirm that the transfer delay can meet the standard requirements under all cases. In particular, the probability is greater than 99.996% for redundant MTs and networks, and the standard of transfer delay in CTCS-3 will be improved inevitably.
2017, 26(1): 1-12.   doi: 10.1049/cje.2016.11.016
[Abstract](617) [PDF 1424KB](2655)

The explosive growth of data volume and the ever-increasing demands of data value extraction have driven us into the era of big data. The "5V" (Variety, Velocity, Volume, Value, and Veracity) characteristics of big data pose great challenges to traditional computing paradigms and motivate the emergence of new solutions. Cloud computing is one of the representative technologies that can perform massive-scale and complex data computing by taking advantages of virtualized resources, parallel processing and data service integration with scalable data storage. However, as we are also experiencing the revolution of Internet-of-things (IoT), the limitations of cloud computing on supporting lightweight end devices significantly impede the flourish of cloud computing at the intersection of big data and IoT era. It also promotes the urgency of proposing new computing paradigms. We provide an overview on the topic of big data, and a comprehensive survey on how cloud computing as well as its related technologies can address the challenges arisen by big data. Then, we analyze the disadvantages of cloud computing when big data encounters IoT, and introduce two promising computing paradigms, including fog computing and transparent computing, to support the big data services of IoT. Finally, some open challenges and future directions are summarized to foster continued research efforts into this evolving field of study.
2016, 25(3): 397-402.   doi: 10.1049/cje.2016.05.001
[Abstract](750) [PDF 6951KB](2542)

A clustering algorithm named "Clustering by fast search and find of density peaks" is for finding the centers of clusters quickly. Its accuracy excessively depended on the threshold, and no efficient way was given to select its suitable value, i.e., the value was suggested be estimated on the basis of empirical experience. A new way is proposed to automatically extract the optimal value of threshold by using the potential entropy of data field from the original dataset. For any dataset to be clustered, the threshold can be calculated from the dataset objectively instead of empirical estimation. The results of comparative experiments have shown the algorithm with the threshold from data field can get better clustering results than with the threshold from empirical experience.
2018, 27(2): 439-444.   doi: 10.1049/cje.2017.10.009
[Abstract](287) [PDF 566KB](331)

This research investigate the information interaction protocols for Cooperative vehicleinfrastructure systems (CVIS) safety-related services and optimizes them in three aspects. It puts forward a selfadaptive back-off algorithm. This algorithm considers retransmission times and network busy degree to choose a suitable contention window. A mathematical analysis model is developed to verify its performance improvement. Finally, different scenario models of Vehicle ad hoc network (VANET) are simulated through the network simulation tool and the influences of different access modes on Quality of Service (QoS) are investigated. The simulation results have verified the improvement of the proposed algorithm is obvious and RTS/CTS access mode can sacrifice slight delay for great improvement of packet lost rate when there are large amount of vehicle nodes.
2018, 27(4): 704-717.   doi: 10.1049/cje.2018.05.008
[Abstract](616) [PDF 827KB](898)

Network function virtualization (NFV) and Service function chaining (SFC) can fulfill the traditional network functions by simply running special softwares on general-purpose computer servers and switches. This not only provides significantly more agility and flexibility in network service deployment, but can also greatly reduce the capital and operating cost of networks. In this paper, a comprehensive survey on the motivations and state of the art efforts towards implementing the NFV and SFC is provided. In particular, the paper first presents the main concepts of these new emerging technologies; then discusses in details various stages of SFC, including the description, composition, placement and scheduling of service chains. Afterwards, existing approaches to SFC are reviewed according to their application environments, parameters used, and solution strategies. Finally, the paper points out a number of future research directions.
2017, 26(2): 377-384.   doi: 10.1049/cje.2017.01.013
[Abstract](337) [PDF 1133KB](515)

2019, 28(1): 120-126.   doi: 10.1049/cje.2018.11.004
[Abstract](594) [PDF 1983KB](1084)

The major challenge that text sentiment classification modeling faces is how to capture the intrinsic semantic, emotional dependence information and the key part of the emotional expression of text. To solve this problem, we proposed a Coordinated CNNLSTM-Attention(CCLA) model. We learned the vector representations of sentence with CCLA unit. Semantic and emotional information of sentences and their relations are adaptively encoded to vector representations of document. We used softmax regression classifier to identify the sentiment tendencies in the text. Compared with other methods, the CCLA model can well capture the local and long distance semantic and emotional information. Experimental results demonstrated the effectiveness of CCLA model. It shows superior performances over several state-of-the-art baseline methods.
2016, 25(4): 601-607.   doi: 10.1049/cje.2016.07.002
[Abstract](420) [PDF 583KB](1710)

The sentiment classification of Chinese Microblog is a meaningful topic. Many studies has been done based on the methods of rule and word-bag, and to understand the structure information of a sentence will be the next target. We proposed a sentiment classification method based on Recurrent neural network (RNN). We adopted the technology of distributed word representation to construct a vector for each word in a sentence; then train sentence vectors with fixed dimension for different length sentences with RNN, so that the sentence vectors contain both word semantic features and word sequence features; at last use softmax regression classifier in the output layer to predict each sentence's sentiment orientation. Experiment results revealed that our method can understand the structure information of negative sentence and double negative sentence and achieve better accuracy. The way of calculating sentence vector can help to learn the deep structure of sentence and will be valuable for different research area.
2017, 26(5): 1079-1085.   doi: 10.1049/cje.2017.07.018
[Abstract](194) [PDF 418KB](315)

In the user selection phrase of the conventional Multiple-input-multiple-output (MIMO) scheduling schemes, the frequent user exchange deteriorates the Quality of user experience (QoE) of the bursty data service. And the channel vector orthogonalization computation results in a high time cost. To address these problems, we propose an inertial scheduling policy to reduce the number of noneffective user exchange, and substitute self-organization policy for channel vector orthogonalization computation to reduce computational complexity. The relationship between the scheduling effectiveness and the inertia of objective function is observed in the simulation. The simulation results show that the inertial scheduling policy effectively reduce the number of potential noneffective scheduling which is inversely proportional to the Mean opinion score (MOS) that quantifies the QoE. Our proposed scheduling scheme provides significant improvement in QoE performance in the simulation. Although the proposed scheduling scheme does not consider the channel vector orthogonalization in the user selection phrase, its throughput approaches the level of the throughput-oriented scheme because of its selforganization scheduling policy.
2016, 25(2): 372-378.   doi: 10.1049/cje.2016.03.026
[Abstract](243) [PDF 411KB](1131)

Joint transmission is one of the major transmission schemes in Coordinated multipoint (CoMP) transmission/reception systems for Long term evolutionadvanced (LTE-A). Due to different distances between User equipments (UE) and Base stations (BS), signals are not able to arrive at the receiver with perfect synchronization, which implies that the reception at UE is asynchronous. This paper presents an evaluation on asynchronous UE reception in multi-cell downlink joint transmission systems using our LTE-based CoMP simulator. Then, due to asynchronous reception, we propose an improved reception strategy to mitigate the interference which compensate for Rx timing difference on Joint transmission (JT) CoMP systems. Simulation results show that the per-subband global precoding scheme widely used in the CoMP system is considerably sensitive to asynchronous reception since the performance is dominated by the subcarrier used for precoding vector calculation. It is verified that our proposed solution is able to achieve significant improvements under asynchronous reception.
2009, 18(1): 13-19.
[Abstract](860) [PDF 423KB](124)
Abstract:
Camellia is the final winner of 128-bit blockcipher in NESSIE project, and is also certified as the international IETF standard cipher for SSL/TLS cipher suites.In this study, we present an effcient differential fault attack on Camellia. Ideally, by using our techniques, on average, the complete key of Camellia-128 is recovered with64 faulty ciphertexts while the full keys of Camellia-192and Camellia-256 are retrieved with 96 faulty ciphertexts.Our attack is applicable to generic block ciphers with overall Fiestel structure using a SPN round function.All theseattacks have been successfully put into experimental simulations on a personal computer.
2014, 23(4): 678-681.
[Abstract](1401) [PDF 832KB](968)
Abstract:
A novel Power-on-reset (POR) circuit is proposed with ultra-low steady-state current consumption. A band-gap voltage comparator is used to generate a stable pull-up voltage. To eliminate the large current consumptions of the analog part, a power switch is adopted to cut the supply of band-gap voltage comparator, which gained ultra-low current consumption in steady-state after the POR rest process completed. The state of POR circuit is maintained through a state latch circuit. The whole circuit was designed and implemented in 65nm CMOS technology with an active area of 120μm*160μm. Experimental results show that it has a steady pull-up voltage of 0.69V and a brown-out voltage of 0.49V under a 1.2V supply voltage rising from 0V, plus its steady-state current is only 9nA. The proposed circuit is suitable to be integrated in system on chip to provide a reliable POR signal.
2019, 28(6): 1092-1098.   doi: 10.1049/cje.2019.07.012
[Abstract](988) [PDF 3162KB](190)
Abstract:
Face liveness detection, as a key module of real face recognition systems, is to distinguish a fake face from a real one. In this paper, we propose an improved Convolutional neural network (CNN) architecture with two bypass connections to simultaneously utilize low-level detailed information and high-level semantic information. Considering the importance of the texture information for describing face images, texture features are also adopted under the conventional recognition framework of Support vector machine (SVM). The improved CNN and the texture feature based SVM are fused. Context information which is usually neglected by existing methods is well utilized in this paper. Two widely used datasets are used to test the proposed method. Extensive experiments show that our method outperforms the state-of-the-art methods.
2012, 21(2): 254-259.
[Abstract](1386) [PDF 273KB](190)
Abstract:
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
2012, 21(3): 460-465.
[Abstract](781) [PDF 334KB](175)
Abstract:
In this paper, a new Global k-modes (GKM) algorithm is proposed for clustering categorical data. The new method randomly selects a sufficiently large number of initial modes to account for the global distribution of the data set, and then progressively eliminates the redundant modes using an iterative optimization process with an elimination criterion function. Systematic experiments were carried out with data from the UCI Machine learning repository. The results and a comparative evaluation show a high performance and consistency of the proposed method, which achieves significant improvement compared to other well-known k-modes-type algorithms in terms of clustering accuracy.
2020, 29(1): 1-15.   doi: 10.1049/cje.2019.09.001
[Abstract](975) [PDF 4261KB](385)
Abstract:
This paper provides a survey of research activities of Large spaceborne deployable antennas (LSDAs) in the past, present and future. Firstly, three main kinds of spaceborne antennas, such as solid reflector, inflatable reflector and mesh reflector, are issued by showing the strengths and weaknesses. Secondly, a detailed research situation of LSDAs with mesh is discussed, for majority of the in-orbit large diameter and high frequency antennas are made in this type of structures. Thirdly, new conception of antenna is proposed as it does have both advantages of large aperture (high gain) and high precision (high frequency). Fourthly, the design theory and approach of LSDAs are concerned. It includes thermal-electromechanical multidisciplinary optimization, shaped beam design technique, performance testing technology and evaluation method, passive intermodulation of mesh, and application of new materials. Finally, the ultra large spaceborne deployable antennas of the next generation are presented, such as the deployable frame and inflatable reflector antennas, space-assembled ultra large antennas, smart array antennas and so on.

MORE+

### Review Articles

et al.
2021, 30(6): 991-1007.   doi: 10.1049/cje.2021.07.021
Abstract(603) PDF(191)
et al.
2021, 30(5): 793-814.   doi: 10.1049/cje.2021.06.002
Abstract(493) PDF(107)
et al.
2021, 30(1): 1-17.   doi: 10.1049/cje.2020.11.002
Abstract(1083) HTML(510) PDF(217)
et al.
2020, 29(6): 992-1000.   doi: 10.1049/cje.2020.09.001
Abstract(430) PDF(388)
2020, 29(6): 1001-1015.   doi: 10.1049/cje.2020.10.006
Abstract(443) PDF(277)
et al.
2020, 29(5): 793-811.   doi: 10.1049/cje.2020.07.001
Abstract(612) PDF(485)
2020, 29(4): 595-607.   doi: 10.1049/cje.2020.05.002
Abstract(501) PDF(574)
2020, 29(3): 397-416.   doi: 10.1049/cje.2020.02.016
Abstract(443) PDF(514)
MORE+

30 January 2022

New Year’s Message 2022