Just Accepted

Just Accepted Papers are peer-reviewed and accepted for publication. They will soon (normally in 1–3 weeks) transform into Typeset Proofs when initial checks such as language editing and reference cross-validation are completed and typesettings of the papers are done. Note that for both types of papers under this directory, they are posted online prior to technical editing and author proofing. Please use with caution.
Display Method:

Coming soon.....

Research Article
Deformable Perfect Vortex Wave-Front Modulation Based on Geometric Metasurface in Microwave Regime
Yueyi YUAN, Wenjie ZHOU, Mengnuo FAN, Qun WU, Kuang ZHANG
, Available online  , doi: 10.23919/cje.2023.00.416
Abstract(7) HTML (4) PDF(0)
Abstract:
Perfect vortex (PV) beam, as a novel paradigm to carry orbital angular momentum (OAM), owns constant radius of energy intensity and infinite mode of helical patterns, which overcomes the divergence performances of conventional vortex beam. However, common approaches for PV beam generations requires optical cascading systems that constitutes of various lenses and components with bulk volume and high alignment standards, also cannot realize PV customization. Thus, in this paper, we propose a general scheme based on compact platform of geometric metasurface to achieve PV beams generations and deformable wave-front modulations. The adopted unit cell is designed with “ABA”-shaped configuration, which can high-efficiently transform circular polarization incident wave into its cross-polarized states and impose required PV phase patterns. Here, we construct series of metasurface lenses to achieve PVs with eight different OAM modes at operating frequency 10 GHz, and additionally conduct quasi-elliptical energy-ring intensities and fractional modals of PVs by introducing asymmetric periodicity and extra singularities. By exploiting compact metasurface platform, this general scheme for PV beam generation and modulation would provide a theoretical foundation for the electromagnetic waves controlling in modern wireless communication systems.
Multi-Type GNSS User Classification Using RANSAC-K-means Clustering
LI Kun, CHEN Shuailong, ZHENG Shuaiyong, WANG Xuanwen, LIU Jixi, YANG Peng, GAO Mengzhi, JIN Xiaoqin
, Available online  , doi: 10.23919/cje.2024.00.041
Abstract(6) HTML (3) PDF(0)
Abstract:
The BeiDou Navigation Satellite system (BDS-3) has provided Positioning, Navigation and Timing (PNT) services to global users across land, maritime, and aviation. However, how to classify these three users with complex movement patterns poses great challenges to the work of monitoring and evaluating of PNT system. To accurately classify multi-type Global Navigation Satellite System (GNSS) users, this paper proposes a method that combines Random Sample Consensus (RANSAC) and K-means clustering to track the movements of massive users and classify them based on their dynamic characteristics in different areas, which is noted as RANSAC-K-means. The simulated massive user data show that the recognition rate of the proposed algorithm exceeds 83.22%, compared with the conventional method, the proposed RANSAC-K-means method improved the recognition rate by 11.16%. The RANSAC-K-means method can provide more accurate clustering results under the situations where multi-type users present dynamic characteristics with significant differences, showing significant stability and robustness. The proposed method is more suitable for monitoring and evaluating the service performance of satellite navigation systems.
Non-stationarity Characteristics in Dynamic Vehicular ISAC Channels at 28 GHz
ZHANG Zhengyu, HE Ruisi, YANG Mi, ZHANG Xuejian, QI Ziyi, MI Hang, SUN Guiqi, YANG Jingya, AI Bo
, Available online  , doi: 10.23919/cje.2024.00.003
Abstract(7) HTML (3) PDF(0)
Abstract:
Integrated sensing and communications (ISAC) is a potential technology of 6G, aiming to enable end-to-end information processing ability and native perception capability for future communication systems. As an important part of the ISAC application scenarios, ISAC aided vehicle-to-everything (V2X) can improve the traffic efficiency and safety through intercommunication and synchronous perception. It is necessary to carry out measurement, characterization, and modeling for vehicular ISAC channels as the basic theoretical support for system design. In this paper, dynamic vehicular ISAC channel measurements at 28 GHz are carried out and provide data for the characterization of non-stationarity characteristics. Based on the actual measurements, this paper analyzes the time-varying PDPs, RMSDS and non-stationarity characteristics of front, lower front, left and right perception directions in a complicated V2X scenarios. The research in this paper can enrich the investigation of vehicular ISAC channels and enable the analysis and design of vehicular ISAC systems.
Differential Evolution with Perturbation Estimation Strategy for Multiobjective Optimization
WANG Shuai, ZHOU Aimin, ZHANG Yi
, Available online  , doi: 10.23919/cje.2023.00.322
Abstract(8) HTML (4) PDF(0)
Abstract:
In recent years, multiobjective differential evolution (DE) algorithms have gained significant attention due to their effective search capabilities for multiobjective optimization problems. The differential mutations of DE operators distinguish them from other generators. However, the efficiency of DE operators heavily relies on the selection of parents used to generate differential perturbation vectors. To address this challenge, this work proposes a novel algorithm, called perturbation estimation strategy based DE algorithm (PESDE), for multiobjective optimization. In PESDE, at each iteration, it utilizes a clustering approach to partition the population, and then constructs a probability model to estimate the distributions of differential perturbation vectors of the solutions within a cluster. Specifically, the differential perturbation vectors of solutions are regarded as trial points in building a probability model in the proposed approach. In this way, perturbation vectors are sampled from the built probability model, and then embedded in the solutions to generate new trial solutions. Empirical experimental studies are conducted to investigate the performance of PESDE by comparing it with five representative multiobjective evolutionary algorithms on several test instances with complicated Pareto set and front shapes. The results have demonstrated the advantages of the proposed algorithm over other approaches.
Word2State: Modeling Word Representations as States with Density Matrices
ZHANG Chenchen, LI Qiuchi, SU Zhan, SONG Dawei
, Available online  , doi: 10.23919/cje.2023.00.336
Abstract(35) HTML (17) PDF(3)
Abstract:
Polysemy is a common phenomenon in linguistics. Quantum-inspired complex word embeddings based on Semantic Hilbert Space play an important role in natural language processing (NLP), which may accurately define a genuine probability distribution over the word space. However, the existing quantum-inspired works manipulate on the real-valued vectors to compose the complex-valued word embeddings, which lack direct complex-valued pre-trained word representations. Motivated by quantum-inspired complex word embeddings, we propose a complex-valued pre-trained word embedding based on density matrices, called Word2State. Unlike the existing static word embeddings, our proposed model can provide non-linear semantic composition in the form of amplitude and phase, which also defines an authentic probabilistic distribution. We evaluate this model on twelve datasets from the word similarity task and six datasets from the relevant downstream tasks. The experimental results on different tasks demonstrate that our proposed pre-trained word embedding can capture richer semantic information and exhibit greater flexibility in expressing uncertainty.
Energy-Efficient D2D-Aided Dual UAV Data Collection
HUANG Qiulei, WANG Wei, SONG Zhaohui, ZHAO Nan
, Available online  , doi: 10.23919/cje.2023.00.271
Abstract(67) HTML (35) PDF(17)
Abstract:
Aided by device-to-device (D2D) connections, unmanned aerial vehicle (UAV) can significantly enhance the coverage of wireless communications. In this paper, we consider a data collection system with the assistance of D2D, where two fixed-wing UAVs as aerial base stations cooperatively serve the ground devices. To accommodate more devices, we propose two effective algorithms to establish the multi-hop D2D connections. Then, the user scheduling, UAV trajectory and transmit power are jointly optimized to maximize the energy efficiency, which is a non-convex problem. Accordingly, we decompose it into three subproblems. The scheduling optimization is first converted into a linear programming. Then, the trajectory design and the transmit power optimization are reformulated as two convex problems by the Dinkelbach method. Finally, an iterative algorithm is proposed to effectively solve the original problem. Simulation results are presented to verify the effectiveness of the proposed scheme.
Wideband Millimeter Wave Antenna with Cavity Backed Slotted Patch and Magneto-Electric Dipole
CHENG Yang, DONG Yuandan
, Available online  , doi: 10.23919/cje.2023.00.064
Abstract(139) HTML (60) PDF(20)
Abstract:
This paper proposes a wideband cavity-backed slotted patch antenna, loaded with a magneto-electric (ME) dipole and fed by a microstrip line, for millimeter wave (mm-Wave) applications. The coupled-feed cavity-backed slotted patch antenna is loaded with the ME-dipole. The slotted patch antenna serves both as a radiator and a ground for the ME-dipole. The combination of the ME-dipole antenna and the slotted patch antenna realizes a -10dB impedance bandwidth covering over 22.86-44.35GHz (63.9%). The pattern of the antenna element remains stable throughout this bandwidth. The proposed broadband antenna unit not only realizes single linearly polarized (LP) radiation but also can be designed for dual-LP radiation. The dual-polarized radiation can be achieved by changing the slot of the patch antenna to a crossed slot and altering the ME-dipole antenna to a dual-polarization form. A 2×2 dual-polarized array has been designed, fabricated, and tested. A novel dual-polarized feeding network is proposed. To achieve higher isolation, broadband in-phase feed and differential feed are adopted, respectively. A low-loss single to the differential structure is proposed for differential feeding. The simulated isolation of the array is higher than 40 dB. Measured results show that the dual-polarized 2×2 array has an overlapping bandwidth of 52.3% (|S11|<−10 dB and |S21|<−30 dB) with a peak gain of 14 dBi. The proposed antenna, featuring a wide overall bandwidth, low cost, and good radiation performance, is well suited for mm-Wave applications.
TE101 Substrate Integrated Waveguide Filter With Wide Stopband Up to TE10(2n-1) and Coplanar Ports
CHU Peng, FENG Jianguo, GUO Lei, ZHU Fang, KONG Wei-Bin, LIU Leilei, LUO Guo Qing, WU Ke
, Available online  , doi: 10.23919/cje.2023.00.225
Abstract(108) HTML (55) PDF(16)
Abstract:
This article presents a new method for substrate integrated waveguide (SIW) filters to achieve wide stopbands. Using the proposed staggered inter-coupling structures, double-layer SIW filters working at the fundamental mode TE101 (f0) can have wide stopbands up to TE10(2n-1), where n is the order of the filter. They can break the upper limit of the stopband extension and have coplanar ports suitable for planar circuits and systems in comparison to their multilayer counterparts, and they can further extend the stopbands and have shielding structures suitable for high-performance and high-frequency applications in comparison to their hybrid counterparts. Three examples are provided. The measured results show that they respectively achieve wide stopbands up to 3.97 f0, 5.22 f0, and 6.53 f0. The proposed technique should be effective for developing wide stopband SIW filters for microwave circuits and systems.
A Microstrip Leaky-Wave Antenna with Scanning Beams Horizontal to the Antenna Plane
Henghui WANG, Peiyao CHEN, Sheng SUN
, Available online  , doi: 10.23919/cje.2023.00.033
Abstract(166) HTML (84) PDF(42)
Abstract:
A leaky-wave antenna with horizontal scanning beams and broadside radiation is presented on the periodically modulated microstrip. The horizontal radiation is realized by periodically etching a set of resonant open-ended slots on the ground plane. Dispersion diagrams and Bloch impedance are first analyzed to investigate the propagation and radiation characteristics of the periodic structure. Subsequently, shunt matching stubs are installed aiming to obtain seamless beam scanning property through the broadside. Finally, a prototype is implemented as verification of the presented antenna. Results of the simulations and measurements agree well with each other, indicating the elimination of the open-stop band effect and the horizontal radiation beams. The fabricated antenna exhibits a beam range from −62° to +34°, and provides a maximum measured gain about 14.6 dBi at 10 GHz.
Poisson Multi-Bernoulli Mixture Filter for Heavy-tailed Process and Measurement Noises
ZHU Jiangbo, XIE Wexin, LIU Zongxiang, WANG Xiaoli
, Available online  , doi: 10.23919/cje.2022.00.325
Abstract(133) HTML (65) PDF(20)
Abstract:
A novel Poisson multi-Bernoulli mixture (PMBM) filter is proposed to track multiple targets in the presence of heavy-tailed process and measurement noises. Unlike the standard PMBM filter that requires the Gaussian process and measurement noises, the proposed filter uses the Student’s t distribution to model the heavy-tailed noise feature. It propagates Student’s t-based PMBM posterior in the closed-form recursion. The introduction of the moment matching method enables the proposed filter to deal with the process and measurement noises with different heavy-tailed degrees to some extent. Simulation results demonstrate that the overall performance of the proposed filter is better than the existing heavy-tailed noise filters in various scenarios.
High Power GaN Doubler with High Duty Cycle Pulse Based on Local Non-Reflection Design
DONG Yazhou, ZHOU Tianchi, LIANG Shixiong, GU Guodong, ZHOU Hongji, YU Jianghua, GUO Hailong, ZHANG Yaxin
, Available online  , doi: 10.23919/cje.2023.00.179
Abstract(137) HTML (69) PDF(23)
Abstract:
The study focuses on the development of gallium nitride (GaN) Schottky barrier diode (SBD) frequency doublers for terahertz technology. The low conversion efficiency of these doublers limits their practical applications. To address this challenge, the paper proposes a multi-objective local no-reflection design method based on a three-dimensional electromagnetic structure. The method aims to improve the coupling efficiency of input power and reduce the reflection of power output. Experimental results indicate that the proposed method significantly improves the performance of GaN SBD frequency doublers, achieving an efficiency of 16.9% and a peak output power of 160 mW at 175 GHz. These results suggest that the method can contribute to the further development of GaN SBD frequency doublers for terahertz technology.
An Efficient and Fast Area Optimization Approach for Mixed Polarity Reed-Muller Logic Circuits
Yuhao ZHOU, Zhenxue HE, Jianhui JIANG, Xiaojun ZHAO, Fan ZHANG, Limin XIAO, Xiang WANG
, Available online  , doi: 10.23919/cje.2022.00.407
Abstract(231) HTML (115) PDF(39)
Abstract:
At present, area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller (MPRM) circuits have poor optimization effect and efficiency. Since the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm (WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. In addition, we propose a fast polarity conversion algorithm (FPCA) due to the low conversion efficiency of existing polarity conversion approaches. Finally, we propose an MPRM circuits area optimization approach (MAOA), which uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. The experimental results show that MAOA is effective and can be used as a promising EDA tool.
An Algorithm of Deformation Image Correction Based on Spatial Mapping
DENG Xiangyu, ZHANG Aijia, YE Jinhong
, Available online  , doi: 10.23919/cje.2022.00.443
Abstract(174) HTML (86) PDF(32)
Abstract:
The original image undergoes geometric deformation in terms of position, shape, size, and orientation due to the shooting angle or capturing process during image acquisition. This brings about inconveniences and significant challenges in various image processing fields such as image fusion, denoising, recognition, and segmentation. To enhance the processing ability and recognition accuracy of deformation images, an adaptive image deformity correction algorithm is proposed for quadrilaterals and triangles. The deformation image undergoes preprocessing, and the contour of the image edge is extracted. Discrete points on the image edge are identified to accurately locate the edges. The deformation of the quadrilateral or triangle is transformed into a standard rectangular or equilateral triangular image using the proposed three-dimensional homography transformation algorithm. This effectively completes the conversion from an irregular image to a regular image in an adaptive manner. Numerous experiments demonstrate that the proposed algorithm surpasses traditional methods like Hough transform and Radon transform. It improves the effectiveness of correcting deformation in images, effectively addresses the issue of geometric deformation, and provides a new technical method for processing deformation images.
Hybrid ITÖ Algorithm for Large-scale Colored Traveling Salesman Problem
DONG Xueshi
, Available online  , doi: 10.23919/cje.2023.00.040
Abstract(312) HTML (154) PDF(32)
Abstract:
In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem (CTSP). However, when solving large-scale CTSP with a scale of more than 1000 dimensions, their convergence speed and the quality of their solutions are limited. Therefore, this paper proposes a new hybrid ITÖ (HITÖ) algorithm, which integrates two new strategies, crossover operator and mutation strategy, into the standard ITÖ. In the iteration process of HITÖ, the feasible solution of CTSP is represented by the double chromosome coding, and the random drift and wave operators are used to explore and develop new unknown regions. In this process, the drift operator is executed by the improved crossover operator, and the wave operator is performed by the optimized mutation strategy. Experiments show that HITÖ is superior to the known comparison algorithms in term of the quality solution.
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
WANG Zhiwei, ZHU Qiuchi, ZHANG Zhenqi
, Available online  , doi: 10.23919/cje.2022.00.257
Abstract(320) HTML (157) PDF(19)
Abstract:
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a WiFi fingerprint localization system based on Paillier encryption, which is claimed to protect both client $C$’s location privacy and service provider $S$’s database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain $S$’s database. In this paper, we propose a novel WiFi fingerprint localization system based on CL encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.’s attack, the system requires that $S$ selects only the locations from its database that can receive the nonzero signals from all the available APs in $C$’s nonzero fingerprint in order to determine $C$’s location. Security analysis shows that our scheme is secure under Li et al.’s threat model. Furthermore, to enhance the security level of PriWFLCL, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in $C$’s encrypted localization queries.
XPull: A Relay-based Blockchain Intercommunication Framework Achieving Cross-chain State Pulling
LIANG Xinyu, CHEN Jing, DU Ruiying
, Available online  , doi: 10.23919/cje.2023.00.004
Abstract(259) HTML (129) PDF(43)
Abstract:
Cross-chain technology, which enables different blockchains to intercommunicate with one another, is challenging. Many existing cross-chain platforms, such as Polkadot and Cosmos, generally adopt a relay-based scheme: a relaychain (relay blockchain) receives and records the state information from every parachain (parallel blockchain), and publish the information on the platform, by which parachains are able to efficiently acquire the state information from one another. However, in the condition when parachain is consortium blockchain, the cross-chain platform cannot work properly. On the one hand, whether state information is submitted to relaychain is completely decided by the internal decision of parachain. The timeliness of state information cannot be guaranteed. On the other hand, the transfer of state information will be interrupted due to the failure of parachain or relaychain-parachain connection. In this paper, we propose a relay-based blockchain intercommunication framework, called XPull. Specifically, to ensure the timeliness of state information, we propose a cross-chain state pulling scheme based on cosigned state pulling agreement. To solve the interruption of state transfer, we propose a random scheduling scheme to resume the transfer, or confirm the failure of parachain. The security analysis and experimental results demonstrate that XPull is secure and efficient.
Unintended Interference Suppression Based on Decision Feedback Adaptive Cancellation for DSSS Satellite Communication
LIU Jiancheng, ZHANG Jingtao, LI Tian, ZHOU Yu, WANG Yanpeng
, Available online  , doi: 10.23919/cje.2023.00.398
Abstract(10) HTML (5) PDF(0)
Abstract:
Considering the non-spread spectrum interference with overlapping frequency domain for direct-sequence spread spectrum satellite communication, the unintended strong interference suppression method based on adaptive cancellation with decision feedback is proposed. Firstly, the model of adaptive cancellation with decision feedback is built by making the best of interference modulation mode and bandwidth. Secondly, the adaptive cancellation based on polynomial nonlinear reconstruction model is analyzed in theory, and the mathematical expression of interference suppression ratio is derived. Finally, the proposed method is simulated under different parameters. The theory analysis and simulation results both show that this method can achieve more than 4.5dB transmission link processing gain to efficiently suppress the overlapping unintended interference.
Multi-level Queue Security in Switches: Adversarial Inference and Differential Privacy Protection in SDN
DONG Xuewen, XUE Lingtao, ZHANG Tao, YOU Zhichao, LI Guangxia, SHEN Yulong
, Available online  , doi: 10.23919/cje.2022.00.373
Abstract(10) HTML (5) PDF(0)
Abstract:
Network switches are critical elements in any network infrastructure for traffic forwarding and packet priority scheduling, which naturally become a target of network adversaries. Most attacks on switches focus on purposely forwarding packets to the wrong network nodes or generating flooding. However, potential privacy leakage in the multi-level priority queue of switches has not been considered. In this paper, we are the first to discuss the multi-level priority queue security and privacy protection problem in switches. Observing that packet leaving order from a queue is strongly correlated to its priority, we introduce a policy inference attack that exploits specific priority-mapping rules between different packet priorities and priority sub-queues in the multi-level queues. Next, based on the policy inference result and the built-in traffic shaping strategy, a capacity inference attack with the error probability decaying exponentially in the number of attacks is presented. In addition, we propose a differentially private priority scheduling mechanism to defend against the above attacks in OpenFlow Switches. Theoretical analysis proves that our proposed mechanism can satisfy ?-differential privacy. Extensive evaluation results show that our mechanism can defend against inference attacks well and achieves up to 2.7 times priority process efficiency than a random priority scheduling strategy.
Threshold-bad-scenario-set Robust Energy Trading Decisions for Interconnected Microgrids under Uncertain Electricity Price
WANG Xiaozhi, WANG Bing, HU Hengdu, QI Baomin, PAN Quanke
, Available online  , doi: 10.23919/cje.2023.00.364
Abstract(16) HTML (8) PDF(1)
Abstract:
Microgrids can be cost-effective by reducing transmission and distribution losses, and enabling energy trading between microgrids can further optimize economic benefits. This paper discusses the energy trading decision problem of interconnected microgrids under uncertain electricity price between any microgrid and the main grid. The uncertain energy trading price is described by discrete scenarios. The interests of individual microgrids and the share benefits generated from the cooperation among microgrids are considered. Based on the threshold-bad-scenario (TBS) set concept proposed by our previous work, we propose a robust energy trading model. The TBS-set robust energy trading problem actually consists of a family of robust energy trading problems. Each robust energy trading problem is decomposed into two subproblems of social robust cost minimization and trading payment. The alternating direction method of multipliers (ADMM) is applied to develop a distributed algorithm to solve the problem. The computational results show that the robust energy trading strategy could reduce the total cost of the society by 8.89% and the robust cost of individual microgrid can be reduced by 12.34% at most. The proposed robust energy trading model could obtain various robust solutions with different degrees of tradeoff between robustness and optimality. The robustness prices of robust solutions obtained are discussed to indicate that the impact of the values of threshold on the robustness prices.
Dispersion Compensation and Demultiplexing Using a Cascaded CFBG Structure in a 150 km Long DWDM Optical Network
Baseerat Gul, Faroze Ahmad
, Available online  , doi: 10.23919/cje.2022.00.416
Abstract(243) HTML (117) PDF(38)
Abstract:
This paper proposes the design of a 150 km dense wavelength division multiplexed (DWDM) optical network with a capacity of 8×10 Gbps. To mitigate system dispersion, a cost-effective hybrid dispersion compensator is implemented using chirped fiber Bragg gratings (CFBG) and a pair of 5 km long dispersion compensation fibers (DCF). The novelty of the work is the use of CFBG for multiple functions, including operating as a demultiplexer and providing dispersion compensation. The proposed network design uses 140 km long conventional single-mode fiber (CSMF) and a 10 km long DCF in a symmetrical compensation mode. Without the CFBG structure, a 33 km long DCF would be needed to compensate for total channel dispersion, costing around 3$/m. However, by adding the CFBG structure, the design only requires a 10 km long DCF, reducing the DCF length by more than 65% and lowering the system cost. The CFBG integration also eliminates the need for an additional demultiplexer in the receiver section, reducing system complexity and cost. The system performance is evaluated analytically in terms of Q-factor, bit-error rate (BER), eye-diagram, and optical signal-to-noise ratio (OSNR). The average Q-factor and BER values achieved per channel are 16.5 and 8.38×10−56, respectively, and for all receiver channels, the eye-openings are good enough with commendable OSNR values. The proposed design achieves good performance characteristics despite using shorter-length DCF when compared with previously reported works.
RFID-Based WSN Communication System with ESPAR Array Antenna for SIR Improvement
Md. Moklesur RAHMAN, Heung-Gyoon RYU
, Available online  , doi: 10.23919/cje.2022.00.213
Abstract(485) HTML (236) PDF(68)
Abstract:
To improve the received signal strength (RSS) and signal-to-interference and noise ratio (SINR), electronically steerable parasitic array radiator (ESPAR) array antennas are designed for the ultra-high frequency (UHF) radio frequency identification (RFID) communication systems that can provide very low power consumption in sensor tag edge. Higher gain, appropriate radiation pattern, and most power-efficient array antennas are completely essential in these sensor network systems. As a result, it is suggested that ESPAR array antennas be used on the RFID reader side to reduce interference, multipath fading, and extend communication range. Additionally, a system architecture for UHF- RFID wireless sensor network (WSN) communication is put forth in order to prevent interference from antenna nulling technology, in which ESPAR array antennas could be capable of generating nulls. The array antennas within the system demonstrate high efficiency, appropriate radiation patterns, and gains (9.63 dBi, 10.2 dBi, and 12 dBi) from one array to other arrays. The nulling technique using the proposed array antennas also provides better SINR values (31.63 dB, 33.2 dB, and 36 dB). Finally, the nulling space matrix is studied in relation to the channel modeling. Therefore, the suggested approach might offer better communications in sensor networking systems.
Levy Flight Adopted Particle Swarm Optimization-based Resource Allocation Strategy in Fog Computing
Sharmila Patil(Karpe), Brahmananda S H
, Available online  , doi: 10.23919/cje.2022.00.212
Abstract(488) HTML (244) PDF(49)
Abstract:
The prevalence of the Internet of Things (IoT) is unsteady in the context of cloud computing, it is difficult to identify fog and cloud resource scheduling policies that will satisfy users’ QoS need. As a result, it increases the efficiency of resource usage and boosts user and resource supplier profit. This research intends to introduce a novel strategy for computing fog via emergency-oriented resource allotment, which aims and determines the effective process under different parameters. The modeling of a non-linear functionality that is subjected to an objective function and incorporates needs or factors like Service response rate, Execution efficiency, and Reboot rate allows for the resource allocation of cloud to fog computing in this work. Apart from this, the proposed system considers the resource allocation in emergency priority situations that must cope-up with the immediate resource allocation as well. Security in resource allocation is also taken into consideration with this strategy. Thus the multi-objective function considers 3 objectives such as Service response rate, Execution efficiency, and Reboot rate. All these strategies in resource allocation are fulfilled by Levy Flight adopted Particle Swarm Optimization (LF-PSO). Finally, the evaluation is performed to determine whether the developed strategy is superior to numerous traditional schemes. However, the cost function attained by the adopted technique is 120, which is 19.17%, 5%, and 2.5% greater than the conventional schemes like GWSO, EHO, and PSO, when the number of iterations is 50.
Security Analysis for SCKHA Algorithm: Stream Cipher Algorithm Based on Key Hashing Technique
Souror Samia, El-Fishawy Nawal, Badawy Mohammed
, Available online  , doi: 10.23919/cje.2021.00.383
Abstract(1527) HTML (759) PDF(54)
Abstract:

The strength of any cryptographic algorithm is mostly based on the difficulty of its encryption key.However, the larger size of the shared key the more computational operations and processing time for cryptographic algorithms. To avoid increasing the key size and keep its secrecy, we must hide it. The authors proposed a stream cipher algorithm that can hide the symmetric key[1] through hashing and splitting techniques. This paper aims to measure security analysis and performance assessment for this algorithm. This algorithm is compared with three of the commonly used stream cipher algorithms: RC4, Rabbit, and Salsa20 in terms of execution time and throughput. This comparison has been conducted with different data types as audio, image, text, docs, and pdf. Experiments proved the superiority of SCKHA algorithm over both Salsa20 and Rabbit algorithms. Also, results proved the difficulty to recover the secret key for SCKHA algorithm. Although RC4 has a lower encryption time than SCKHA, it is not recommended for use because of its vulnerabilities. Security factors that affect the performance as avalanche effect, correlation analysis, histogram analysis, and Shannon information entropy are highlighted. Also, the ciphertext format of the algorithm gives it the ability to search over encrypted data.

Multi-scale Global Retrieval and Temporal-Spatial Consistency Matching based long-term Tracking Network
SANG Haifeng, LI Gongming, ZHAO Ziyu
, Available online  , doi: 10.23919/cje.2021.00.195
Abstract(407) HTML (204) PDF(40)
Abstract:

Compared with the traditional short-term object tracking task based on temporal-spatial consistency, the long-term object tracking task faces the challenges of object disappearance, dramatic changes in object scale, and object appearance. To address these challenges and problems, in this paper we propose a Multi-scale Global Retrieval and Temporal-Spatial Consistency Matching based long-term Tracking Network (MTTNet). MTTNet regards the long-term tracking task as a single sample object detection task and takes full advantage of the temporal-spatial consistency assumption between adjacent video frames to improve the tracking accuracy. MTTNet utilizes the information of single sample as guidance to perform full-image multi-scale retrieval on any instance and does not require online learning and trajectory refinement. Any type of error generated during the detection process will not affect its performance on subsequent video frames. This can overcome the accumulation of errors in the tracking process of traditional object tracking networks. We introduce Atrous Spatial Pyramid Pooling to address the challenge of dramatic changes in the scale and the appearance of the object. On the experimental results, MTTNet can achieve better performance than composite processing methods on two large datasets.

Robust Beamforming Design for IRS-Aided Cognitive Radio Networks with Bounded CSI Errors
ZHANG Lei, WANG Yu, SHANG Yulong, TIAN Jianjie, JIA Ziyan
, Available online  , doi: 10.23919/cje.2021.00.254
Abstract(482) HTML (240) PDF(49)
Abstract:

In this paper, intelligent reflecting surface (IRS) is introduced to enhance the performance of cognitive radio (CR) systems. The robust beamforming is designed based on combined bounded channel state information (CSI) error for primary user (PU) related channels. The transmit precoding at the secondary user (SU) transmitter and phase shifts at the IRS are jointly optimized to minimize the SU's total transmit power subject to the quality of service of SUs, the limited interference imposed on the PU and unit-modulus of the reflective beamforming. Simulation results verify the efficiency of the proposed algorithm and reveal that the number of phase shifts at IRS should be carefully chosen to obtain a tradeoff between the total minimum transmit power and the feasibility rate of the optimization problem.

Design and Implementation of a Novel Self-bias S-band Broadband GaN Power Amplifier
ZHANG Luchuan, ZHONG Shichang, CHEN Yue
, Available online  , doi: 10.23919/cje.2021.00.118
Abstract(510) HTML (253) PDF(50)
Abstract:

In this paper, a 3.6 mm gate width GaN HEMT with 0.35 μm gate length process and input and output matching circuits of Nanjing Electronic Devices Institute are used for broadband design respectively, and a novel high-power and high-efficiency self-bias S-band broadband continuous wave GaN power amplifier is realized. Under the working conditions of 2.2 GHz to 2.6 GHz and 32 V drain power supply, the continuous wave output power of the amplifier is more than 20 W, the power gain is more than 15 dB, and the max power added efficiency is more than 65%. The self-bias amplifier simplifies the circuit structure and realizes excellent circuit performance.

Two Jacobi-like algorithms for the general joint diagonalization problem with applications to blind source separation
CHENG Guanghui, MIAO Jifei, LI Wenrui
, Available online  , doi: 10.23919/cje.2019.00.102
Abstract(731) HTML (349) PDF(52)
Abstract:

We consider the general problem of the approximate joint diagonalization of a set of non-Hermitian matrices. This problem mainly arises in the data model of the joint blind source separation for two datasets. Based on a special parameterization of the two diagonalizing matrices and on adapted approximations of the classical cost function, we establish two Jacobi-like algorithms. They may serve for the canonical polyadic decomposition (CPD) of a third-order tensor, and in some scenarios they can outperform traditional CPD methods. Simulation results demonstrate the competitive performance of the proposed algorithms.

Original ariticle
A High-Quality and Efficient Bus-Aware Global Router
LIU Genggeng, WEI Ling, YU Yantao, XU Ning
, Available online  , doi: 10.23919/cje.2023.00.061
Abstract(10) HTML (5) PDF(0)
Abstract:
As advanced technology nodes enter the nanometer era, the complexity of integrated circuit (IC) design is increasing, and the proportion of bus in the net is increasing. The bus routing has become a key factor affecting the performance of the chip. In addition, the existing research does not distinguish between buses and non-buses in the complete global routing process, which directly leads to the expansion of bus deviation and the degradation of chip performance. In order to solve these problems, we propose a high-quality and efficient bus-aware global router, which includes the following key strategies: 1) By introducing the routing density graph, we propose a routing model that can simultaneously consider the routability of non-buses and the deviation value of buses. 2) A dynamic routing resource adjustment algorithm is proposed to optimize the bus deviation and wirelength simultaneously, which can effectively reduce the bus deviation. 3) We propose a layer assignment algorithm consider deviation to significantly reduce the bus deviation of the 3D routing solution. 4) A DFS-based algorithm is proposed to obtain multiple routing solutions, from which the routing result with the lowest deviation is selected. Experimental results show that the proposed algorithm can effectively reduce bus deviation with the existing algorithms, so as to obtain high-quality 2D and 3D routing solutions considering bus deviation.
ARTIFICIAL INTELLIGENCE
FMR-GNet: Forward Mix-Hop Spatial-Temporal Residual Graph Network for 3D Pose Estimation
YANG Honghong, LIU Hongxi, ZHANG Yumei, WU Xiaojun
, Available online  , doi: 10.23919/cje.2022.00.365
Abstract(285) HTML (140) PDF(44)
Abstract:
Graph convolutional networks (GCNs) that leverage spatial-temporal information from skeletal data have emerged as a popular approach for 3D human pose estimation. However, comprehensively modeling of consist spatial-temporal dependencies among the body joints remains a challenging task. Current approaches are limited by performing graph convolutions solely on immediate neighbors, deploying separate spatial or temporal modules, and utilizing single-pass feedforward architectures. To solve these limitations, we propose FMR-GNet, a Forward Multi-Scale Residual Graph Convolutional Network for 3D pose estimation from monocular video. Firstly, we introduce a mix-hop spatial-temporal attention graph convolution layer that effectively aggregates neighboring features with learnable weights over large receptive fields. The attention mechanism enables dynamically computing edge weights at each layer. Second, we devise a cross-domain spatial-temporal residual (CSTR) module to fuse multi-scale spatial-temporal convolutional features through residual connections, explicitly modeling interdependencies across spatial and temporal domains. Third, we integrate a forward dense connection block to propagate spatial-temporal representations across network layers, enabling high-level semantic skeleton information to enrich lower-level features. Comprehensive experiments conducted on two challenging 3D human pose estimation benchmarks, Human3.6M and MPI-INF-3DHP, demonstrate that the proposed FMR-GNet achieves superior performance, surpassing most state-of-the-art (SOTA) methods.
CIRCUITS AND SYSTEMS
A 5 mW 1-to-5 GHz Multiband Ladder CMOS Mixer Employing Transconductance Tuning Mechanism Achieving IIP3 of 27 dBm
PRAVINAH Shasidharan, SELVAKUMAR Mariappan, JIA XIN Lim, JAGADHESWARAN Rajendran, NARENDRA KUMAR Aridas
, Available online  , doi: 10.23919/cje.2022.00.028
Abstract(276) HTML (140) PDF(22)
Abstract:
This paper presents a CMOS mixer employing a transconductance tuning (TCT) mechanism to achieve wideband, low power, high gain, and high linearity. The ladder CMOS mixer consists of one current source, one differential amplifier and two differential low noise switching stage. The TCT technique optimizes the optimum drain current requirement and the output voltage at the voltage control oscillator node and the RF output node, thus producing a balance linearity performance with low power consumption for 4 GHz operating bandwidth. The wideband linearity performance is achieved without inductors, thus reducing the size of the chip significantly to 0.5 mm2. Designed in 180-nm CMOS, the TCT mixer operates from 1 GHz to 5 GHz with a 1.2 V supply voltage, resulting in a highest measured result performances of the third-order input intercept point (IIP3) of 35.97 dBm across the local oscillator (LO) input power and 27.2 dBm across the RF input power. The highest measured conversion gain (CG) encapsulated around 29.17 dB under RF input power whereas 22.27 dB across the LO input power at center frequency of 3 GHz. The TCT mixer provides full mixing operation which achieves the measured noise figure (NF) below 5 dB across the IF output frequency. Moreover, the port-to-port isolation less than −30 dB has also been achieved across the RF operating bandwidth. The total power consumption, PDC of the TCT chip is 5 mW. The operating bandwidth of the TCT mixer qualifies it to be integrated into a multiband 5G New Radio receiver system.