Just Accepted

Just Accepted Papers are peer-reviewed and accepted for publication. They will soon (normally in 1–3 weeks) transform into Typeset Proofs when initial checks such as language editing and reference cross-validation are completed and typesettings of the papers are done. Note that for both types of papers under this directory, they are posted online prior to technical editing and author proofing. Please use with caution.
Display Method:

Coming soon.....

Research Article
Antenna Selection Method for Distributed Dual-function Radar Communication in MIMO System
ZHAO Haitao, DING Zhongzheng, WANG Qin, XIA Wenchao, Bo XU, ZHU Hongbo
, Available online  , doi: 10.23919/cje.2023.00.270
Abstract(2) HTML (1) PDF(0)
Abstract:
Distributed dual-function radar systems are an emerging trend in next-generation wireless systems, offering the possibility of improved parameter estimation for target localization as well as improved communication performance. With sufficient resource allocation, the achievable minimum estimated mean square error (MSE) and maximum total communication rate of localization may exceed the intended performance metrics of the system, which may consume an excessive number of antennas as well as antenna costs. In order to avoid resource wastage, this paper proposes a distributed dual-function radar communication (DFRC) MIMO system capable of performing radar and communication tasks simultaneously. The distributed system achieves the desired MSE performance metrics and communication performance metrics by efficiently selecting a subset of antennas, and minimizing the number of transmitting antennas and receiving antennas used in the system as well as the cost. In this paper, the problem is modeled as a Knapsack Problem (KP) where the objective is to obtain the maximal MSE performance and the maximal total communication rate performance at the lowest cost, for which we design a heuristic antenna selection algorithm. The designed algorithm is effective in reducing the time complexity as well as reducing the cost of antenna and minimizing the number of antennas required.
An Improved Z-buffer Accelerated PO Method for EM Scattering from Electrically Large Targets
BAI Jiangfei, YANG Shunchuan, SU Donglin
, Available online  , doi: 10.23919/cje.2024.00.025
Abstract(8) HTML (4) PDF(2)
Abstract:
The physical optical (PO) method is widely used to solve the electromagnetic scattering problems involved electrically large structures, in which each surface element is required to determine whether it is blocked by others. It may suffer from the computational efficiency issue through elementwise shadowing testing. In this paper, an efficient Z-buffer based shadowing testing method is proposed to accelerate this procedure. In the proposed method, all triangular facets are first mapped to a grid plane as the Z-buffer method, and for each grid cell, all projected triangles intersecting it are recorded. Then, rigorous shadowing testing is made for all facets recorded in the grid where the centroid of each triangle is projected. It can avoid a large number of redundant operations for pairs of triangles with no occlusion relation, which lead to the same accuracy as the traditional rigorous shadowing testing method with significantly efficiency improvement. Three numerical examples are carried out to validate its accuracy and efficiency.
Ultralow Ohmic Contact in Recess-Free Ultrathin Barrier AlGaN/GaN Heterostructures Across a Wide Temperature Range
WANG Yuhao, HUANG Sen, JIANG Qimeng, WANG Xinhua, FAN Jie, YIN Haibo, WEI Ke, ZHENG Yingkui, LIU Xinyu
, Available online  , doi: 10.23919/cje.2023.00.309
Abstract(1) HTML (1) PDF(0)
Abstract:
‘Ohmic-before-passivation’ process was implemented on ultrathin-barrier (UTB) AlGaN (<6 nm)/GaN heterostructure to further reduce the ohmic contact resistance (Rc). In this process, alloyed Ti/Al/Ni/Au ohmic metal was formed first, followed by AlN/SiNx passivation contributed to restore 2-D Electron Gas (2DEG) in the access region. Due to the sharp change in the concentration of 2DEG at the metal edge, a reduced transfer length (LT) consisted with lower Rc are achieved compared to that of ohmic contact on AlGaN (~20 nm)/GaN heterostructure with pre-ohmic recess process. Temperature-dependent current voltage measurements demonstrate that the carrier transport mechanism is dominated by thermionic field emission above 200 K and by field emission below 200 K. The ‘ohmic-before-passivation’ process enables the relative stability of ohmic contacts between 50~475 K and significantly improves the DC characteristics of GaN-MISHEMTs, offering a promising means for scaling down and enabling the utilization of low-voltage GaN-based power devices in extreme environmental conditions.
Design of Differential Multi-point feeding Dual-Polarized SISL Antenna Based on CM Analysis
TANG Bin, MA Kaixue, MORO Eric newton, LUO Yu
, Available online  , doi: 10.23919/cje.2022.00.251
Abstract(2) HTML (1) PDF(0)
Abstract:
Based on characteristic mode analysis (CMA), a five-patch substrate integrated suspended line (SISL) antenna with suppressed unwanted higher-order modes (HOMs) achieves an enhanced bandwidth by using differential multi-point feeding (MPF) systems. The bandwidth of the proposed dual-polarized SISL antenna with the MPF system is 1.87 times wider than that of the single point feeding (SPF) system. The proposed SISL feeding system consists of two pairs of differentially-fed branch line feed structures. A prototype of the proposed differential-fed antenna is fabricated and measured. The simulated and measured results are in good agreement. The proposed dual-polarization SISL antenna can achieve realized gain from 8.1 – 10.8 dBi within a working frequency from 3.17 to 3.61 GHz (12.98%). Furthermore, the proposed SISL antenna uses low-cost substrates and has the potential for 5G applications.
Performance Analysis of Spatial Modulation Aided UAV Communication Systems in Cooperative Relay Networks
YU Xiangbin, XIE Mingfeng, LI Ning, PAN Cuimin
, Available online  , doi: 10.23919/cje.2021.00.369
Abstract(4) HTML (2) PDF(1)
Abstract:
In this paper, by introducing the spatial modulation (SM) scheme into the unmanned aerial vehicle (UAV) relaying system, a SM-aided UAV (SM-UAV) cooperative relay network is presented. The performance of the SM-UAV relay network is investigated over Nakagami-m fading channels, where the UAV remains stationary over a given area. According to the performance analysis, using the amplify-and-forward (AF) protocol, the effective signal-to-noise ratio (SNR) and the corresponding probability density function and moment generating function are, respectively, derived. With these results, the average bit error rate (BER) is further deduced, and resultant approximate closed-form expression is achieved. Based on the approximate BER, we derive the asymptotic BER to characterize the error performance of the system at high SNR. With this asymptotic BER, the diversity gain of the system is derived, and the resulting diversity order is attained. Simulation results illustrate the effectiveness of the performance analysis. Namely, approximate BER has the value close to the simulated one, and asymptotic BER can match the corresponding simulation well at high SNR. Thus, the BER performance of the system can be effectively assessed in theory, and conventional simulation will be avoided. Besides, the impacts of the antenna number, modulation order, fading parameter and UAV position on the system performance are also analyzed. The results indicate that the BER performance is increased with the increases of Nakagami parameter m and/or receive antenna and/or the decrease of modulation order.
PriChain: Efficient Privacy-Preserving Fine-grained Redactable Blockchains in Decentralized Settings
GUO Hongchen, GAN Weilin, ZHAO Mingyang, ZHANG Chuan, WU Tong, ZHU Liehuang, XUE Jingfeng
, Available online  , doi: 10.23919/cje.2023.00.305
Abstract(19) HTML (10) PDF(5)
Abstract:
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data redaction. However, the development of redactable blockchain is now obstructed by three limitations, which are data privacy breaches, high communication overhead, and low searching efficiency, respectively. In this paper, we propose PriChain, the first efficient privacy-preserving fine-grained redactable blockchain in decentralized settings. PriChain provides data owners with rights to control who can read and redact on-chain data while maintaining downward compatibility, ensuring the one who can redact will be able to read. Specifically, inspired by the concept of multi-authority attribute-based encryption, we utilize the isomorphism of the access control tree, realizing fine-grained redaction mechanism, downward compatibility, and collusion resistance. With the newly designed structure, PriChain can realize ${\cal{O}}(n) $ communication and storage overhead compared to prior ${\cal{O}}(n^2) $ schemes. Furthermore, we integrate multiple access trees into a tree-based dictionary, optimizing searching efficiency. Theoretical analysis proves that PriChain is secure against the chosen-plaintext attack and has competitive complexity. The experimental evaluations show that PriChain realizes 10× efficiency improvement of searching and 100× lower communication and storage overhead on average compared with existing schemes.
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
QIU Yuhang, ZHAO Gongming, XU Hongli, LI Long, HUANG He, HUANG Liusheng
, Available online  , doi: 10.23919/cje.2023.00.387
Abstract:
The Virtual Private Cloud (VPC) service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessive communication and computational resources in such large-scale cloud environments, and suffer from poor timeliness. To address these issues, we propose a lightweight consistency validation mechanism that includes real-time incremental validation and periodic full-scale validation. The former leverages message layer aggregation to enable tenants to swiftly determine the success of their requests on hosts with minimal communication overhead. The latter utilizes lightweight validation checksums to compare the expected and actual states of hosts locally, while efficiently managing the checksums of various host entries using inverted indexing. This approach enables us to efficiently validate the complete local configurations within the limited memory of hosts. In summary, our proposed mechanism achieves closed-loop implementation for new requests and ensures their long-term effectiveness.
Magnetic Shutter Mechanical Antenna for Cross-Media Communication
LI Na, SHAN Yuyu, BAO Jianqiang, FENG Hongzhang, ZHANG Yiqun, LIU Guo
, Available online  , doi: 10.23919/cje.2023.00.132
Abstract(5) HTML (2) PDF(1)
Abstract:
In low-frequency cross-media communication systems, traditional mechanical antennas have problems such as limiting the upper limit of operating frequency due to motor speed, waveform distortion, and limiting transmission rate due to modulation methods. Then, we designed a new magnetic shutter type mechanical antenna. It is designed based on the radiation equation of a rotating magnetic dipole, combined with the principle of relative motion between the magnetic dipole and the high permeability shutter material. By relying on the shutter structure rotation, the magnetic field of the spherical permanent magnet array is intermittently shielded, generating a low-frequency magnetic induction signal that is multiplied by the motor speed.The entire antenna system uses a cross array of spherical permanent magnets with two evenly distributed magnetic poles and a two-dimensional signal modulation method that combines frequency modulation and amplitude modulation, so it has high radiation intensity and transmission rate in the ultra-low frequency band. Experimental results show that when the motor speed is n r/s, the operating frequency of the mechanical antenna can reach 4nHz, and the signal amplitude measured at 5 m is 50 mV, which is about 3.5 nT. Compared with the current mechanical antenna of the same volume, its signal radiation intensity is stronger.
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
YAN Xueqing, LI Yongming, LI Sanjiang
, Available online  , doi: 10.23919/cje.2022.00.259
Abstract(27) HTML (13) PDF(3)
Abstract:
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tiles in turn until they complete a winning hand. An important notion in Mahjong is the deficiency number (a.k.a. shanten number in Japanese Mahjong) of a hand, which estimates how many tile changes are necessary to complete the hand into a winning hand. The deficiency number plays an essential role in major decision-making tasks such as selecting a tile to discard. This paper proposes a fast algorithm for computing the deficiency number of a Mahjong hand. Compared with the baseline algorithm, the new algorithm is usually 100 times faster and, more importantly, respects the agent’s knowledge about available tiles. The algorithm can be used as a basic procedure in all Mahjong variants by both rule-based and machine learning-based Mahjong AI.
Dynamic Sitting Posture Recognition System Using Passive RFID Tags in Internet of Things
SU Jian, CHEN Shijie
, Available online  , doi: 10.23919/cje.2023.00.354
Abstract(46) HTML (21) PDF(5)
Abstract:
The rapidly developing Internet of Things (IoT) technology is gradually being used to monitor people’s unhealthy behaviors. Sedentary and wrong sitting posture are common health issues which can detrimentally impact the physical and psychological health of teenagers. An effective way to promptly rectify improper sitting postures among teenagers is to use equipment to monitor and recognize the alterations of sitting posture. The majority of conventional sitting posture recognition methods rely on cameras or sensors to recognize sitting posture. However, the employment of cameras will violate user’s privacy, and the utilization of sensors will increase the cost of implementation. In this article, a dynamic sitting posture recognition system based on commodity off-the-shelf (COTS) radio frequency identification (RFID) devices is proposed. This system can recognize six common erroneous sitting postures by simply sticking five passive RFID tags on the user’s back. We collect phase and RSSI data of passive RFID tags, then transform them into Doppler shift and RSSI difference data respectively, and finally input them into the established deep residual neural network for the classification of sitting postures. The experiment results show that our system achieves an average recognition accuracy of 99.17% with six sitting postures and is highly robust to different users and different usage environments.
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
WANG Yuanyuan, ZHANG Xing, CHU Zhiguang, SHI Wei, LI Xiang
, Available online  , doi: 10.23919/cje.2023.00.276
Abstract(11) HTML (6) PDF(1)
Abstract:
As people become increasingly reliant on the internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highly challenging problem. Although current research has addressed the issue of identity disclosure, there are still two challenges: first, the privacy protection for large-scale datasets is not yet comprehensive; second, it is difficult to simultaneously protect the privacy of nodes, edges, and attributes in social networks. To address these issues, this paper proposes a ($k$, $t$)-graph anonymity algorithm based on enhanced clustering. The algorithm uses $k$-means++ clustering for $k$-anonymity and $t$-closeness to improve $k$-anonymity. We evaluated the privacy and efficiency of this method on two datasets and achieved good results. This research is of great significance for addressing the problem of privacy breaches that may arise from the publication of graph data.
A study of Epileptogenic Foci Localization Algorithm Based on Automatic Detection of Comprehensive Feature HFOs and RF-LR
DU Yuxiao, LI Gaoming
, Available online  , doi: 10.23919/cje.2023.00.213
Abstract(15) HTML (8) PDF(3)
Abstract:
Studies have shown that fast ripples of 250-500 HZ in epileptic EEG signals are more pathological and closer to the epileptogenic focus itself compared to ripples of 80-250 HZ. However, artifacts of fast ripples and HFOs are easily confused and difficult to discriminate, and manual visual screening is both time-consuming and unable to avoid subjectivity. To this end, this paper presents a method for localizing epileptogenic foci based on the automatic detection of integrated feature HFOs and RF-LR. In this paper, we first extract multivariate features from the preprocessed epileptic EEG signals, and use the random forest algorithm to filter out three features with high importance, based on which, suspicious leads containing HFOs are identified. Then, wavelet time-frequency maps were used for the primary screening of suspected leads to improve the signal calibration efficiency and further localize HFOs in time and frequency. Finally, a logistic regression model was used to automatically classify and identify ripples and fast ripples in HFOs. The results show that the sensitivity, specificity, and accuracy of the model for detecting ripple are 89.37%, 88.26% and 90.1%, respectively; the sensitivity, specificity, and accuracy for detecting fast ripple are 94.31%, 94.83% and 93.46%, respectively. Compared with single features, the multivariate features in this paper more comprehensively characterize the complex epileptic EEG signals and provide more accurate information for the localization of epileptogenic foci. The automatic detection algorithm of HFOs proposed in this paper can analyze a large amount of data in a short time and has a good detection performance, which can help clinicians accurately determine the region of epileptogenic foci.
Asynchronous Consensus Algorithm Integrating Dynamic Weight Sharding Strategy
XIONG Ao, ZHANG Wang, SONG Yu, WANG Dong, LI Da, GUO Qinglei, BAI Desheng
, Available online  , doi: 10.23919/cje.2023.00.313
Abstract(15) HTML (8) PDF(1)
Abstract:
Blockchain technology has broad application prospects in many fields due to its unique characteristics such as decentralization, traceability, and non-tampering, and has become a research hotspot in recent years. As a key component of blockchain technology, the consensus algorithm is one of the important factors affecting blockchain performance. However, many consensus algorithms currently used in consortium chains are based on time assumptions and lack horizontal expansion capabilities. That is to say, the consensus algorithm cannot reach a consensus in an asynchronous network where the receiving time of network packets is uncertain, and its efficiency will decrease as the number of nodes increases, which hinders the large-scale application of the alliance chain. In order to solve the above problems, this paper proposes the DS-Dumbo algorithm, an asynchronous consensus algorithm that integrates dynamic sharding strategies, based on the currently excellent DumboBFT asynchronous consensus algorithm. The main work of this paper revolves around how to fragment and optimize the consensus process. First of all, this paper designs a node asynchronous sharding model based on multi-dimensional weights, so that the re-sharding work of each blockchain node can be executed concurrently with the asynchronous consensus algorithm, reducing the conflict between blockchain sharding and asynchronous consensus algorithms. In addition, we also designed an intelligent transaction placement strategy, which calculates the relevance score of each transaction for all shards to determine which shard the transaction is processed in order to reduce the number of complex cross-shard transactions. Finally, we optimized the execution process of the DumboBFT algorithm, converted its internal synchronous working mode to an asynchronous working mode, and reduced the consumption of consensus work to a certain extent. The experimental evaluation shows that the DS-Dumbo algorithm has higher throughput and lower delay than the DumboBFT algorithm, can increase the throughput with the increase of nodes, and has the ability of horizontal expansion.
Priority Encoder Based on DNA Strand Displacement
WANG Fang, ZHANG Xinjian, CHEN Xin, LV Shuying, CHEN Congzhou, SHI Xiaolong
, Available online  , doi: 10.23919/cje.2022.00.042
Abstract(8) HTML (4) PDF(1)
Abstract:
The slow development of traditional computing has prompted a search for new materials to replace silicon-based computers. Bio-computers, which use molecules as the basis of computation, are highly parallel and information capable, attracting a lot of attention. In this study, we designed a NAND logic gate based on the DNA strand displacement mechanism. Further, we assembled a molecular calculation model, a 4-wire-2-wire priority encoder logic circuit, by cascading the proposed NAND gates. Different concentrations of input DNA chains were added into the system, resulting in corresponding output, through DNA hybridization and strand displacement. Therefore, it achieved the function of a priority encoder. Simulation results verify the effectiveness and accuracy of the molecular NAND logic gate and the priority coding system presented in this study. The unique point of this proposed circuit is that we cascaded only one kind of logic gate, which provides a beneficial exploration for the subsequent development of complex DNA cascade circuits and the realization of the logical coding function of information.
A Local Differential Privacy Hybrid Data Clustering Iterative Algorithm for Edge Computing
ZHOU Yousheng, WANG Zhonghan, LIU Yuanni
, Available online  , doi: 10.23919/cje.2023.00.332
Abstract(24) HTML (12) PDF(10)
Abstract:
As a new computing method, edge computing not only improves the computing efficiency and processing power of data, but also reduces the transmission delay of data. However, due to the wide variety of edge devices and the increasing amount of terminal data, third-party data centers are unable to ensure that user privacy data leaked. To solve these problems, this paper proposes an iterative clustering algorithm (LDPIA) based on localized differential privacy, which implements LDP local differential privacy. To address the problem of uncertainty in numerical types of mixed data, random perturbation is applied to the user data at the attribute category level. The server then performs clustering on the perturbed data, and density threshold and disturbance probability are introduced to update the cluster point set iteratively.In addition, a new distance calculation formula is defined in combination with attribute weights to ensure the availability of data. The experimental results show that LDPIA algorithm achieves better privacy protection and availability simultaneously.
Confidential Image Super-resolution with Privacy Protection
HAN Yiran, LIU Jianwei, DENG Xin, JING Junpeng, ZHANG Yanting
, Available online  , doi: 10.23919/cje.2023.00.034
Abstract(33) HTML (17) PDF(10)
Abstract:
Nowadays, people are getting used to upload images to a third-party for post-processing, such as image denoising and super-resolution. However, this may easily lead to the disclosure of the privacy in the confidential images. One possible solution is to encrypt the image before sending it to the third party, however, the encrypted image can be easily detected by a malicious attacker in the transmission channel. In this paper, we propose a confidential image super-resolution method namely HSR-Net, which firstly hide the secret image and then super-resolve it in the hidden domain. The HSR-Net is composed of three important modules: image hiding module (IHM), image super-resolution module (ISM), and image revealing module (IRM). The IHM aims to encode secret image and hide it into a cover image to generate the stego image. The stego image looks similar to the cover image but contains the information of the secret image. Then, the third party uses the ISM to perform image super-resolution on the stego image. After that, the user can reveal the super-resolved secret image from the stego image. Our HSR-Net has two advantages. Firstly, it ensures that the third party cannot not directly operate on the secret image to protect the user’s privacy. In addition, due to the similarity between the stego image and cover image, we can reduce the attacker’s suspicion to further improve the image security. The experimental results on various datasets, including DIV2K dataset and Flickr2K dataset. The PSNR of IHM is 38.81dB, the PSNR of ISM is 28.91 dB, and the PSNR of IRM is 23.51 dB, which verify that our HSR-Net is able to achieve image super-resolution and protect user’s privacy simultaneouly.
Service Migration Algorithm Based on Markov Decision Process with Multiple Service Types and Multiple System Factors
MA Anhua, PAN Su, ZHOU Weiwei
, Available online  , doi: 10.23919/cje.2022.00.128
Abstract(22) HTML (11)
Abstract:
This paper proposes a Markov decision process based service migration algorithm to satisfy Quality of Service(QoS) requirements when the terminals leave the original server. Services were divided into real-time services and non-real-time services, each type of them has different requirements on transmission bandwidth and latency, which were considered in the revenue function. Different values were assigned to the weight coefficients of QoS parameters for different service types in the revenue and cost functions so as to distinguish the differences between the two service types. The overall revenue was used for migration decisions, rather than fixed threshold or instant revenue. The Markov decision process was used to maximize the overall revenue of the system. Simulation results show that the proposed algorithm obtained more revenue compared with the existing works.
Secure Fine-grained Multi-keyword Ciphertext Search Supporting Cloud-edge-end Collaboration in IoT
ZHENG Kaifa, ZHOU Ziyu, LIU Jianwei, YU Beiyuan
, Available online  , doi: 10.23919/cje.2023.00.244
Abstract(130) HTML (65) PDF(10)
Abstract:
The massive terminals access the Internet of Things (IoT) through edge nodes, bringing forth new security and privacy challenges in ciphertext search and data sharing. Meanwhile, existing ciphertext search schemes often overlook lightweight computing paradigms and pay little attention to the search requirements of multiple data owners/data users. To address these issues, we propose a secure fine-grained multi-keyword ciphertext search scheme with cloud-edge-end collaboration computing (SFMS-CC). This SFMS-CC scheme focuses on the efficiency of end users and employs a cloud-edge-end collaborative computing paradigm, effectively offloading the incremental overhead from terminals and achieving low-cost constant overhead for the first time on the DO/DU side. Furthermore, based on public-key cryptography, a ciphertext search framework supporting multi-keyword is presented systematically. Each user is assigned an exclusive search Tok to enhance the user experience. Additionally, by integrating Attribute-Based Encryption (ABE), a multi-DOs/multi-DUs model is constructed, seamlessly embedding entity private keys and public keys into encryption, search, decryption, and other steps, ensuring high privacy and security of this scheme. Security analysis demonstrates that the SFMS-CC scheme withstands choose plaintext attack (CPA), providing privacy-preserving for outsourced data and user information. Simulation results indicate that the SFMS-CC scheme is efficient and feasible in practice.
Study on the Impact of Imbalance between Transmission Lines on Crosstalk: a Novel Perspective of Displacement Current
LU Xiaozhu, SONG Lingnan, XU Hui, SU Donglin
, Available online  , doi: 10.23919/cje.2024.00.049
Abstract(23) HTML (11) PDF(1)
Abstract:
This paper systematically studies the impact of imbalances between adjacent lines and effects on crosstalk. A novel perspective of displacement current is introduced to analyze and explain the simulated observations. The imbalances caused by coupling between single-single, single-differential, and differential-differential lines are studied and analyzed by considering the near-field coupling through the generated displacement currents. Measurements are conducted for various cases of coupled adjacent lines. An equivalent model considering the variation of displacement current with geometrical parameters is also proposed, and the corresponding coupling coefficients are extracted based on simulations to characterize the impact of imbalances. The methods and results presented in this paper provide useful guidelines for designing high-speed circuit layouts with closely spaced transmission lines.
Research on Low-frequency Multi-directional Piezoelectric Energy Harvester with Combined Cantilever Beam
REN Qingying, LIU Yuxuan, WANG Debo
, Available online  , doi: 10.23919/cje.2023.00.351
Abstract(20) HTML (10) PDF(1)
Abstract:
In order to realize the collection and utilization of low-frequency vibration energy, a multi-directional piezoelectric energy harvester is proposed, which consists of a lower circular arc beam and an upper L-shaped beam. Both the lower and upper beams can achieve multi-directional energy harvesting, and the upper L-shaped beam can also act as a mass block to reduce the resonant frequency. The structure of this energy harvester is optimized. Four different structures are studied with varying combination angles between the upper and lower layers to acquire data related to resonant frequency, vibration shape, stress distribution, open-circuit voltage and output power. Additionally, the performance of each structure is comprehensively prepared and measured to verify its effectiveness. The optimal structure achieved a resonant frequency of 11 Hz and an output power of 57.1 μW at the optimal load resistance of 201 kΩ. Consequently, this work provides valuable reference for the study of low-frequency vibration energy harvesting technology.
14-bit SAR ADC with On-Chip Digital Bubble Sorting Calibration Technology
FAN Hua, CHEN Zhuorui, XU Tongrui, Maloberti Franco, WEI Qi, FENG Quanyuan
, Available online  , doi: 10.23919/cje.2023.00.307
Abstract(41) HTML (21) PDF(8)
Abstract:
This article designs a 14-bit successive approximation register analog-to-digital converter (SAR ADC). A novel digital bubble sorting calibration method is proposed and applied to eliminate the effect of capacitor mismatch on the linearity of the SAR ADC. To reduce the number of capacitors, a hybrid architecture of a high 8-bit binary-weighted capacitor array and a low 6-bit resistor array is adopted by the DAC. The $ \rm V_{CM} $-based switching scheme is chosen to reduce the switching energy and area of the DAC. The time-domain comparator is employed to obtain lower power consumption. Sampling is performed through a gate voltage bootstrapped switch to reduce the nonlinear errors introduced when sampling the input signal. Moreover, the SAR logic and the whole calibration is totally implemented on-chip through digital IC tools such as Design Compiler (DC), IC compiler (ICC), etc. Finally, a prototype is designed and implemented using 0.18 μm BCD 1.8 V Complementary Metal Oxide Semiconductor (CMOS) technology. The measurement results show that the SAR ADC with on-chip bubble sorting calibration method achieves the signal-to-noise-and-distortion ratio (SNDR) of 69.75 dB and the spurious-free dynamic range (SFDR) of 83.77 dB.
Model Parameter Extraction for InGaN/GaN Multiple Quantum Well-based Solar Cells using Dynamic Programming
SHAN Hengsheng, LI Chengke, LI Xiaoya, LI Minghui, SONG Yifan, MA Shufang, XU Bingshe
, Available online  , doi: 10.23919/cje.2023.00.337
Abstract(38) HTML (19) PDF(4)
Abstract:
A dynamic programming (DP) algorithm is proposed for parameter extraction of the single-diode model (SDM). Five parameters of SDM are extracted from current-voltage (I-V) curves of InGaN/GaN Multi-quantum wells solar cells (SCs) under AM1.5 standard sunlight conditions, with indium (In) compositions of 7% and 18%. Firstly, the range of series resistance (Rs) of the device is adaptively selected and its value is randomly determined. Next, after the series resistance and the range of ideal factors are planned the parameters of SDM are iteratively solved using the root mean square error (RMSE) of the I-V curve and the photoelectric conversion efficiency (η). Due to this approach, the proposed algorithm is fast and accurate compared with other conventional algorithms. Additionally, the obtained RMSE value is controlled within 1.2e-5, and the calculated fill factor (FF) and η are consistent with the measured values. This study provides a reference for power optimization of advanced semiconductor photovoltaic cell systems.
Research on Object Detection and Combination Clustering for Railway Switch Machine Gap Detection
FENG Qingsheng, XIAO Shuai, LIU Wangyang, LI Hong
, Available online  , doi: 10.23919/cje.2023.00.268
Abstract(39) HTML (19) PDF(10)
Abstract:
Turnouts and switch machines play a crucial role in facilitating train line operations and establishing routes, making them vital for ensuring the safety and efficiency of railway transportation. Through the gap detection system of switch machines, the real-time working status of turnouts and switch machines on railway sites can be quickly known. However, due to the challenging working environment and demanding conversion tasks of switch machines, the current gap detection system has often experienced the issues of fault detection. To address this, this study proposes an automatic gap detection method for railway switch machines based on object detection and combination clustering. Firstly, a lightweight object detection network, specifically the MobileNetV3-YOLOv5s model, is used to accurately locate and extract the focal area. Subsequently, the extracted image undergoes preprocessing and is then fed into a combination clustering algorithm (SLIC-Canopy-KFCM) to achieve precise segmentation of the gap area and background. Finally, the Fisher optimal segmentation criterion is utilized to divide the data sequence of pixel values, determine the classification nodes and calculate the gap size. The experimental results obtained from switch machine gap images captured in various scenes demonstrate that the proposed method is capable of accurately locating focal areas, efficiently completing gap image segmentation with a segmentation accuracy of 93.55%, and swiftly calculating the gap size with a correct rate of 98.57%. Notably, the method achieves precise detection of gap sizes even after slight deflection of the acquisition camera, aligning it more closely with the actual conditions encountered on railway sites.
Multimodal Cross-Attention Mechanism-Based Algorithm for Elderly Behavior Monitoring and Recognition
LIU Hao, FENG Zhiquan, GUO Qingbei
, Available online  , doi: 10.23919/cje.2023.00.263
Abstract(37) HTML (18) PDF(6)
Abstract:
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly more challenging. Hence, this study proposes a multi-modal perception-based solution for an elderly safety monitoring recognition system. The proposed approach introduces a recognition algorithm based on multi-modal cross-attention mechanism, innovatively incorporating complex information such as scene context and voice to achieve more accurate behavior recognition. By fusing four modalities, namely image, skeleton, sensor data, and audio, we further enhance the accuracy of recognition. Additionally, we introduce a novel human-robot interaction mode, where the system associates directly recognized intentions with robotic actions without explicit commands, delivering a more natural and efficient elderly assistance paradigm. This mode not only elevates the level of safety monitoring for the elderly but also facilitates a more natural and efficient caregiving approach. Experimental results demonstrate significant improvement in recognition accuracy for 11 typical elderly behaviors compared to existing methods.
Wideband Millimeter Wave Antenna with Cavity Backed Slotted Patch and Magneto-Electric Dipole
CHENG Yang, DONG Yuandan
, Available online  , doi: 10.23919/cje.2023.00.064
Abstract(52) HTML (25) PDF(6)
Abstract:
This paper proposes a wideband cavity-backed slotted patch antenna, loaded with a magneto-electric (ME) dipole and fed by a microstrip line, for millimeter wave (mm-Wave) applications. The coupled-feed cavity-backed slotted patch antenna is loaded with the ME-dipole. The slotted patch antenna serves both as a radiator and a ground for the ME-dipole. The combination of the ME-dipole antenna and the slotted patch antenna realizes a -10dB impedance bandwidth covering over 22.86-44.35GHz (63.9%). The pattern of the antenna element remains stable throughout this bandwidth. The proposed broadband antenna unit not only realizes single linearly polarized (LP) radiation but also can be designed for dual-LP radiation. The dual-polarized radiation can be achieved by changing the slot of the patch antenna to a crossed slot and altering the ME-dipole antenna to a dual-polarization form. A 2×2 dual-polarized array has been designed, fabricated, and tested. A novel dual-polarized feeding network is proposed. To achieve higher isolation, broadband in-phase feed and differential feed are adopted, respectively. A low-loss single to the differential structure is proposed for differential feeding. The simulated isolation of the array is higher than 40 dB. Measured results show that the dual-polarized 2×2 array has an overlapping bandwidth of 52.3% (|S11|<−10 dB and |S21|<−30 dB) with a peak gain of 14 dBi. The proposed antenna, featuring a wide overall bandwidth, low cost, and good radiation performance, is well suited for mm-Wave applications.
TE101 Substrate Integrated Waveguide Filter With Wide Stopband Up to TE10(2n-1) and Coplanar Ports
CHU Peng, FENG Jianguo, GUO Lei, ZHU Fang, KONG Wei-Bin, LIU Leilei, LUO Guo Qing, WU Ke
, Available online  , doi: 10.23919/cje.2023.00.225
Abstract(36) HTML (18) PDF(2)
Abstract:
This article presents a new method for substrate integrated waveguide (SIW) filters to achieve wide stopbands. Using the proposed staggered inter-coupling structures, double-layer SIW filters working at the fundamental mode TE101 (f0) can have wide stopbands up to TE10(2n-1), where n is the order of the filter. They can break the upper limit of the stopband extension and have coplanar ports suitable for planar circuits and systems in comparison to their multilayer counterparts, and they can further extend the stopbands and have shielding structures suitable for high-performance and high-frequency applications in comparison to their hybrid counterparts. Three examples are provided. The measured results show that they respectively achieve wide stopbands up to 3.97 f0, 5.22 f0, and 6.53 f0. The proposed technique should be effective for developing wide stopband SIW filters for microwave circuits and systems.
Study on Static Deflection Model of MEMS Capacitive Microwave Power Sensors
JIN Ye, WANG Debo
, Available online  , doi: 10.23919/cje.2023.00.087
Abstract(46) HTML (23) PDF(8)
Abstract:
In this paper, a static deflection model of MEMS cantilever beam is proposed, which can better study the force deformation of MEMS cantilever beam and the output characteristics of capacitive microwave power sensor. The deflection curve is used to describe the deformation of the cantilever beam and then the overload power and sensitivity of this power sensor is derived. It is found that the overload power decreases with the beam length, and increases with the initial height of beam. The sensitivity increases with the beam length, and has a linear growth relationship with the measuring electrode width. A MEMS dual-channel microwave power sensor is designed, fabricated and measured. At a microwave signal frequency of 10 GHz, the sensitivity of the sensor is measured to be 0.11 V/W for the thermoelectric detection channel and 65.17 fF/W for the capacitive detection channel. The sensitivity calculated by the lumped model is 92.93 fF/W, by the pivot model is 50.88 fF/W, by the deflection model proposed in this work is 75.21 fF/W. Therefore, the theoretical result of the static deflection model is more consistent with the measured result and has better accuracy than the traditional lumped model and pivot model.
A Microstrip Leaky-Wave Antenna with Scanning Beams Horizontal to the Antenna Plane
Henghui WANG, Peiyao CHEN, Sheng SUN
, Available online  , doi: 10.23919/cje.2023.00.033
Abstract(90) HTML (46) PDF(15)
Abstract:
A leaky-wave antenna with horizontal scanning beams and broadside radiation is presented on the periodically modulated microstrip. The horizontal radiation is realized by periodically etching a set of resonant open-ended slots on the ground plane. Dispersion diagrams and Bloch impedance are first analyzed to investigate the propagation and radiation characteristics of the periodic structure. Subsequently, shunt matching stubs are installed aiming to obtain seamless beam scanning property through the broadside. Finally, a prototype is implemented as verification of the presented antenna. Results of the simulations and measurements agree well with each other, indicating the elimination of the open-stop band effect and the horizontal radiation beams. The fabricated antenna exhibits a beam range from −62° to +34°, and provides a maximum measured gain about 14.6 dBi at 10 GHz.
A General Authentication and Key Agreement Framework for Industrial Control System
Gao Shan, Chen Junjie, Zhang Bingsheng, Ren Kui, Ye Xiaohua, Shen Yongsheng
, Available online  , doi: 10.23919/cje.2023.00.192
Abstract(56) HTML (28) PDF(2)
Abstract:
In modern Industrial Control Systems (ICSs), when user retrieving the data stored in field device like smart sensor, There are two main problems. Firstly, the identification of user and field device should be verified. Secondly, to protect the privacy of sensitive data transmitted over the network, user and field device should exchange a key to encrypt data. In this study, we propose a comprehensive authentication and key agreement framework that enables all connected devices in an ICS to mutually authenticate each other and establish a peer-to-peer session key. The framework combines two types of protocols for authentication and session key agreement: the first one is an asymmetric cryptographic key agreement protocol based on TLS handshake protocol used for Internet access, while the second one is a newly designed lightweight symmetric cryptographic key agreement protocol specifically for field devices. This proposed lightweight protocol imposes very light computational load and merely employs simple operations like one-way hash function and exclusive-or (XOR) operation. In comparison to other lightweight protocols, our protocol requires the field device to perform fewer computational operations during the authentication phase. The simulation results obtained using OpenSSL demonstrates that each authentication and key agreement process in the lightweight protocol requires only 0.005ms. Additionally, our lightweight key agreement protocol satisfies several essential security features, including session key secrecy, identity anonymity, untraceability, integrity, forward secrecy, and mutual authentication. Furthermore, it is capable of resisting impersonation, Man-in-the-Middle (MitM), and replay attacks. We have employed the GNY logic and AVISPA tool to verify the security of our symmetric cryptographic key agreement protocol.
BAD-FM: Backdoor Attacks Against Factorization-Machine Based Neural Network for Tabular Data Prediction
MENG Lingshuo, GONG Xueluan, CHEN Yanjiao
, Available online  , doi: 10.23919/cje.2023.00.041
Abstract(74) HTML (37) PDF(12)
Abstract:
Backdoor attacks pose great threats to deep neural network (DNN) models. However, all existing backdoor attacks are designed for unstructured data (image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate (CTR) prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Moreover, tabular data prediction models do not solely rely on deep networks but combine shallow components (e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e., HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100% at a poison ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.
Model Checking Computation Tree Logic over Multi-valued Decision Processes and Its Reduction Techniques
LIU Wuniu, WANG Junmei, HE Qing, LI Yongming
, Available online  , doi: 10.23919/cje.2021.00.333
Abstract(236) HTML (118) PDF(10)
Abstract:
Model checking computation tree logic (CTL) based on multi-valued possibility measures has been studied by Li et al. in 2019. However, the previous work did not consider the nondeterministic choices inherent in systems represented by multi-valued Kripke structures (MvKSs). This nondeterminism is crucial for accurate system modeling, decision making, and control capabilities. To address this limitation, we draw inspiration from the generalization of Markov chains (MCs) to Markov decision processes (MDPs) in probabilistic systems. By integrating nondeterminism into MvKS, we introduce multi-valued decision processes (MvDPs) as a framework for modeling MvKSs with nondeterministic choices. Additionally, we investigate the challenges of model checking over MvDPs. In our approach, verifying properties are expressed by using multi-valued computation tree logic (MvCTL) based on schedulers. Our primary objective is to leverage fixpoint techniques to determine the maximum and minimum possibilities of the system satisfying temporal properties. This allows us to identify the optimal or worst-case schedulers for decision making or control purposes. Furthermore, we aim to develop reduction techniques that enhance the efficiency of model checking, thereby reducing the associated time complexity.
Efficient nonnegative tensor decomposition using alternating direction proximal method of multipliers
WANG Deqing, HU Guoqiang
, Available online  , doi: 10.23919/cje.2023.00.035
Abstract(261) HTML (130) PDF(37)
Abstract:
Nonnegative CANDECOMP/PARAFAC (NCP) tensor decomposition is a powerful tool for multiway signal processing. The optimization algorithm alternating direction method of multipliers (ADMM) has become increasingly popular for solving tensor decomposition problems in the block coordinate descent framework. However, the ADMM-based NCP suffers from rank deficiency and slow convergence for some large-scale and highly sparse tensor data. The proximal algorithm is preferred to enhance optimization algorithms and improve convergence properties. In this study, we propose a novel NCP algorithm using the alternating direction proximal method of multipliers (ADPMM) that consists of the proximal algorithm. The proposed NCP algorithm can guarantee convergence and overcome the rank deficiency. Moreover, we implement the proposed NCP using an inexact scheme that alternatively optimizes the subproblems. Each subproblem is optimized by a finite number of inner iterations yielding fast computation speed. Our NCP algorithm is a hybrid of alternating optimization and ADPMM and is named A2DPMM. The experimental results on synthetic and real-world tensors demonstrate the effectiveness and efficiency of our proposed algorithm.
Wideband Circularly Polarized Substrate-Integrated Waveguide Aperture-Coupled Metasurface Antenna Array for Millimeter-Wave Applications
LIAN Jiwei, GENG Chun, LU Xue, DING Dazhi
, Available online  , doi: 10.23919/cje.2023.00.029
Abstract(157) HTML (77) PDF(19)
Abstract:
A wideband circularly polarized (CP) aperture-coupled metasurface antenna operating at millimeter-wave frequency spectrum in substrate-integrated waveguide (SIW) technology is proposed. Such a proposed metasurface antenna is composed of two substrates. The first substrate contains an end-shorted SIW section with a slot etched. The introduced metasurface is printed on the top of the second substrate. The metasurface is comprised of 3 × 3 unit cells, each of which contains two interconnected patches and two parasitic patches. The working mechanism of the proposed metasurface antenna is illustrated in details. The proposed metasurface antenna has wide impedance bandwidth and axial ratio (AR) bandwidth, which are 66.7% and 40%, respectively. Using the proposed metasurface antenna, a 4 × 4 CP metasurface antenna array with an impedance bandwidth of 24%, an AR bandwidth of 30%, and a peak gain of 18.7 dBic in simulation is developed in this paper for millimeter-wave applications.
Poisson Multi-Bernoulli Mixture Filter for Heavy-tailed Process and Measurement Noises
ZHU Jiangbo, XIE Wexin, LIU Zongxiang, WANG Xiaoli
, Available online  , doi: 10.23919/cje.2022.00.325
Abstract(107) HTML (53) PDF(15)
Abstract:
A novel Poisson multi-Bernoulli mixture (PMBM) filter is proposed to track multiple targets in the presence of heavy-tailed process and measurement noises. Unlike the standard PMBM filter that requires the Gaussian process and measurement noises, the proposed filter uses the Student’s t distribution to model the heavy-tailed noise feature. It propagates Student’s t-based PMBM posterior in the closed-form recursion. The introduction of the moment matching method enables the proposed filter to deal with the process and measurement noises with different heavy-tailed degrees to some extent. Simulation results demonstrate that the overall performance of the proposed filter is better than the existing heavy-tailed noise filters in various scenarios.
High Power GaN Doubler with High Duty Cycle Pulse Based on Local Non-Reflection Design
DONG Yazhou, ZHOU Tianchi, LIANG Shixiong, GU Guodong, ZHOU Hongji, YU Jianghua, GUO Hailong, ZHANG Yaxin
, Available online  , doi: 10.23919/cje.2023.00.179
Abstract(84) HTML (42) PDF(13)
Abstract:
The study focuses on the development of gallium nitride (GaN) Schottky barrier diode (SBD) frequency doublers for terahertz technology. The low conversion efficiency of these doublers limits their practical applications. To address this challenge, the paper proposes a multi-objective local no-reflection design method based on a three-dimensional electromagnetic structure. The method aims to improve the coupling efficiency of input power and reduce the reflection of power output. Experimental results indicate that the proposed method significantly improves the performance of GaN SBD frequency doublers, achieving an efficiency of 16.9% and a peak output power of 160 mW at 175 GHz. These results suggest that the method can contribute to the further development of GaN SBD frequency doublers for terahertz technology.
FMR-GNet: Forward Mix-hop spatial-temporal Residual Graph Network for 3D Pose estimation
YANG Honghong, LIU Hongxi, ZHANG Yumei, WU Xiaojun
, Available online  , doi: 10.23919/cje.2022.00.365
Abstract(156) HTML (75) PDF(27)
Abstract:
With the powerful representative ability of learning spatial-temporal information from skeleton data, the spatial-temporal graph convolution network (ST-GCN) has been a popular baseline for 3D human pose estimation (HPE). However, how to comprehensively model coherent spatial-temporal joints information of skeleton is still a challenging task. Existing methods have limitations in performing graph convolutions only on the one-hop neighbors of each node, simply deploy interleaving spatial graph convolution network (S-GCN) only or temporal graph convolution network (T-GCN) only modules, and traditional graph convolution network (GCN) is single-pass feedforward network. To address the above issues, a forward mix-hop spatial-temporal residual graph convolutional network (FMR-GNet) is devised for 3D HPE in this paper. Firstly, a mix-hop spatial temporal attention graph convolution layer is designed to effectively gather the neighbor features in a weighted way from large spatial-temporal receptive field. With the attention mechanism introduced into the mix-hop feature aggregation, the attention weighted neighbor matrix is computed at each layer instead of sharing same adjacency matrix for all GCN layers. Then, a cross-domain spatial-temporal residual connection block was devised to fuse the multi-scale spatial-temporal convolution features in a residual connection manner, which directly models cross-spacetime joint dependencies. Finally, a forward dense connection block is introduced to transmit the spatial-temporal features from different layers of FMR-GNet, enabling the proposed model to transmit high-level semantic skeleton connectivity information to its features in low-level layers. Two challenging 3D human pose datasets are used for evaluating the effectiveness of the proposed model. Experimental results show that FMR-GNet achieves the state-of-the-art (SOTA) performance.
An Efficient and Fast Area Optimization Approach for Mixed Polarity Reed-Muller Logic Circuits
Yuhao ZHOU, Zhenxue HE, Jianhui JIANG, Xiaojun ZHAO, Fan ZHANG, Limin XIAO, Xiang WANG
, Available online  , doi: 10.23919/cje.2022.00.407
Abstract(162) HTML (80) PDF(23)
Abstract:
At present, area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller (MPRM) circuits have poor optimization effect and efficiency. Since the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm (WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. In addition, we propose a fast polarity conversion algorithm (FPCA) due to the low conversion efficiency of existing polarity conversion approaches. Finally, we propose an MPRM circuits area optimization approach (MAOA), which uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. The experimental results show that MAOA is effective and can be used as a promising EDA tool.
An Algorithm of Deformation Image Correction Based on Spatial Mapping
DENG Xiangyu, ZHANG Aijia, YE Jinhong
, Available online  , doi: 10.23919/cje.2022.00.443
Abstract(145) HTML (71) PDF(22)
Abstract:
The original image undergoes geometric deformation in terms of position, shape, size, and orientation due to the shooting angle or capturing process during image acquisition. This brings about inconveniences and significant challenges in various image processing fields such as image fusion, denoising, recognition, and segmentation. To enhance the processing ability and recognition accuracy of deformation images, an adaptive image deformity correction algorithm is proposed for quadrilaterals and triangles. The deformation image undergoes preprocessing, and the contour of the image edge is extracted. Discrete points on the image edge are identified to accurately locate the edges. The deformation of the quadrilateral or triangle is transformed into a standard rectangular or equilateral triangular image using the proposed three-dimensional homography transformation algorithm. This effectively completes the conversion from an irregular image to a regular image in an adaptive manner. Numerous experiments demonstrate that the proposed algorithm surpasses traditional methods like Hough transform and Radon transform. It improves the effectiveness of correcting deformation in images, effectively addresses the issue of geometric deformation, and provides a new technical method for processing deformation images.
Correlation-aware Multi-dimensional Service Quality Prediction and Recommendation with Privacy-preservation in IoT
QI Lianyong, ZHONG Weiyi, HU Chunhua, ZHOU Xiaokang, WANG Fan, LIU Yuwen, YAN Chao
, Available online  , doi: 10.23919/cje.2023.00.112
Abstract(183) HTML (94) PDF(26)
Abstract:
Benefiting from the low data transmission requirements from user clients to remote cloud centers, edge computing has emerged as a lightweight and cost-effective solution for various data-intensive IoT applications, including intelligent transportation and smart healthcare. However, integrating distributed IoT data from multiple edge servers to provide better services poses practical and valuable research challenges. First, data redundancy is possible in each edge server, which reduces IoT data processing and transmission efficiency significantly. Second, user privacy is probably breached when the IoT data stored in different edge servers are integrated together for comprehensive data analysis and mining. Third, IoT data are often multi-dimensional and correlated with each other, which places an obstacle to scientific and accurate data analysis and decision-making. To solve these challenges, we propose a multi-dimensional and correlation-aware service quality prediction and recommendation approach with privacy preservation for edge-assisted IoT applications, named TLTM. Specifically, our approach employs Truncated Singular Value Decomposition (TSVD) to remove data redundancy in each edge server, Locality-Sensitive Hashing (LSH) to secure user privacy during multi-source data integration, and Mahalanobis distance to minimize correlation among different data dimensions. Finally, the feasibility of our proposal is validated through experiments conducted on the well-known WS-DREAM dataset.
FGM-SPCL: Open-Set Recognition Network for Medical Images based on Fine-Grained data Mixture and Spatial Position Constraint Loss
ZHANG Ruru, E Haihong, YUAN Lifei, WANG Yanhui, WANG Lifei, SONG Meina
, Available online  , doi: 10.23919/cje.2023.00.081
Abstract(241) HTML (120) PDF(17)
Abstract:
The current intelligent auxiliary diagnosis models all follow the closed-set recognition setting. After the model is deployed online, the input data is often not completely controlled. Diagnosing an untrained disease as a known category would lead to serious medical malpractice. Therefore, realizing the open set recognition is significant to the safe operation of the intelligent auxiliary diagnosis model. Currently, most open-set recognition models are studied for natural images, and it is very challenging to obtain clear and concise decision boundaries be-tween known and unknown classes when applied to fine-grained medical images. Therefore, we propose an Open-Set Recognition Network for Medical Images based on Fine-Grained data Mixture and Spatial Position Constraint Loss (FGM-SPCL) in this work. First, considering the fine graininess of medical images and the diversity of unknown samples, we propose a fine-grained data Mixture (FGM) method to simulate unknown data by performing a mixing operation on known data to expand the coverage of unknown data difficulty levels. Secondly, in order to obtain a concise and clear decision boundary, we propose a Spatial Position Constraint Loss (SPCL) to control the position distribution of prototypes and samples in the feature space and maximize the distance between known classes and unknown classes. Finally, we validate on a private ophthalmic OCT dataset, and extensive experiments and analyses demonstrate that FGM-SPCL outperforms state-of-the-art models.
Hybrid ITÖ Algorithm for Large-scale Colored Traveling Salesman Problem
DONG Xueshi
, Available online  , doi: 10.23919/cje.2023.00.040
Abstract(261) HTML (129) PDF(20)
Abstract:
In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem (CTSP). However, when solving large-scale CTSP with a scale of more than 1000 dimensions, their convergence speed and the quality of their solutions are limited. Therefore, this paper proposes a new hybrid ITÖ (HITÖ) algorithm, which integrates two new strategies, crossover operator and mutation strategy, into the standard ITÖ. In the iteration process of HITÖ, the feasible solution of CTSP is represented by the double chromosome coding, and the random drift and wave operators are used to explore and develop new unknown regions. In this process, the drift operator is executed by the improved crossover operator, and the wave operator is performed by the optimized mutation strategy. Experiments show that HITÖ is superior to the known comparison algorithms in term of the quality solution.
Long Short-Term Memory Spiking Neural Networks for Classification of Snoring and Non-Snoring Sound Events
ZHANG Rulin, LI Ruixue, LIANG Jiakai, YUE Keqiang, LI Wenjun, LI Yilin
, Available online  , doi: 10.23919/cje.2022.00.210
Abstract(234) HTML (115) PDF(31)
Abstract:
Snoring is a widespread occurrence that impacts human sleep quality. It is also one of the earliest symptoms of many sleep disorders. Snoring is accurately detected, making further screening and diagnosis of sleep problems easier. However, snoring is frequently ignored because of its underrated and costly detection costs. As a result, this research offered an alternative method for snoring detection based on a Long Short-Term Memory based Spiking Neural Network (LSTM-SNN) that is appropriate for large-scale home detection for snoring. In this paper, We designed acquisition equipment to collect the sleep recordings of 54 subjects and constructed the sleep sound database in the home environment. And Mel Frequency Cepstral Coefficients (MFCCs) were extracted from these sound signals and encoded into spike trains by a threshold encoding approach. Then, they were classified automatically as non-snoring or snoring sounds by our LSTM-SNN model. We used the backpropagation algorithm based on an alternative gradient in the LSTM-SNN to complete the parameter update. The categorization percentage reached an impressive 93.4%, accompanied by a remarkable 36.9% reduction in computer power compared to the regular LSTM model.
DeepLogic: Priority Testing of Deep Learning through Interpretable Logic Units
LIN Chenhao, ZHANG Xingliang, SHEN Chao
, Available online  , doi: 10.23919/cje.2022.00.451
Abstract(167) HTML (84) PDF(20)
Abstract:
With the increasing deployment of deep learning-based systems in various scenes, it is becoming important to conduct sufficient testing and evaluation of deep learning models to improve their interpretability and robustness. Recent studies have proposed different testing criteria and strategies for deep neural network (DNN) testing. However, they rarely conduct effective testing on the robustness of DNN models and lack interpretability. This paper proposes priority testing criteria called DeepLogic, to analyze the robustness of the DNN models from the perspective of model interpretability. Specifically, we first define the neural units in DNN with the highest average activation probability as “interpretable logic units.” Then we analyze the changes in these units to evaluate the model's robustness by conducting adversarial attacks. After that, the interpretable logic units of the inputs are taken as context attributes, and the probability distribution of the softmax layer in the model is taken as internal attributes to establish a comprehensive test prioritization framework. Finally, the weight fusion of context and internal factors is carried out, and the test cases are sorted according to this priority. The experimental results on 4 popular DNN models using 8 testing metrics show that our DeepLogic significantly outperforms existing state-of-the-art methods.
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
WANG Zhiwei, ZHU Qiuchi, ZHANG Zhenqi
, Available online  , doi: 10.23919/cje.2022.00.257
Abstract(222) HTML (111) PDF(14)
Abstract:
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a WiFi fingerprint localization system based on Paillier encryption, which is claimed to protect both client $C$’s location privacy and service provider $S$’s database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain $S$’s database. In this paper, we propose a novel WiFi fingerprint localization system based on CL encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.’s attack, the system requires that $S$ selects only the locations from its database that can receive the nonzero signals from all the available APs in $C$’s nonzero fingerprint in order to determine $C$’s location. Security analysis shows that our scheme is secure under Li et al.’s threat model. Furthermore, to enhance the security level of PriWFLCL, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in $C$’s encrypted localization queries.
Joint Communication-Caching-Computing Resource Allocation for Bidirectional Data Computation in IRS-Assisted Hybrid UAV-Terrestrial Network
LIAO Yangzhe, LIU Lin, SONG Yuanyan, XU Ning
, Available online  , doi: 10.23919/cje.2023.00.089
Abstract(521) HTML (256) PDF(61)
Abstract:
Joint communication-caching-computing resource allocation in wireless inland waterway communications enables resource-constrained unmanned surface vehicles (USVs) to provision computation-intensive and latency-sensitive tasks forward B5G and 6G era. However, the power of such resource allocation cannot be fully studied unless bidirectional data computation is properly managed. In this paper, a novel IRS-assisted hybrid UAV-terrestrial network architecture is proposed with bidirectional tasks. The sum of uplink and downlink bandwidth minimization problem is formulated by jointly considering link quality, task execution mode selection, UAVs trajectory and task execution latency constraints. A heuristic algorithm is proposed to solve the formulated challenging problem. We divide the original challenging problem into two subproblems, i.e., the joint optimization problem of USVs offloading decision, caching decision and task execution mode selection, and the joint optimization problem of UAVs trajectory and IRS phase shift-vector design. The Karush–Kuhn–Tucker conditions are utilized to solve the first subproblem and the enhanced differential evolution algorithm is proposed to solve the latter one. The results show that the proposed solution can significantly decrease bandwidth consumption in comparison with the selected advanced algorithms. The results also prove that the sum of bandwidth can be remarkably decreased by implementing a higher number of IRS elements.
XPull: A Relay-based Blockchain Intercommunication Framework Achieving Cross-chain State Pulling
LIANG Xinyu, CHEN Jing, DU Ruiying
, Available online  , doi: 10.23919/cje.2023.00.004
Abstract(157) HTML (79) PDF(29)
Abstract:
Cross-chain technology, which enables different blockchains to intercommunicate with one another, is challenging. Many existing cross-chain platforms, such as Polkadot and Cosmos, generally adopt a relay-based scheme: a relaychain (relay blockchain) receives and records the state information from every parachain (parallel blockchain), and publish the information on the platform, by which parachains are able to efficiently acquire the state information from one another. However, in the condition when parachain is consortium blockchain, the cross-chain platform cannot work properly. On the one hand, whether state information is submitted to relaychain is completely decided by the internal decision of parachain. The timeliness of state information cannot be guaranteed. On the other hand, the transfer of state information will be interrupted due to the failure of parachain or relaychain-parachain connection. In this paper, we propose a relay-based blockchain intercommunication framework, called XPull. Specifically, to ensure the timeliness of state information, we propose a cross-chain state pulling scheme based on cosigned state pulling agreement. To solve the interruption of state transfer, we propose a random scheduling scheme to resume the transfer, or confirm the failure of parachain. The security analysis and experimental results demonstrate that XPull is secure and efficient.
An Efficient Task Scheduling Algorithm in the Cloud and Edge Collaborative Environment
LONG Saiqin, WANG Cong, LONG Weifan, LIU Haolin, DENG Qingyong, LI Zhetao
, Available online  , doi: 10.23919/cje.2022.00.223
Abstract(258) HTML (130) PDF(24)
Abstract:
With the advent of the 5G era and the accelerated development of edge computing and Internet of Things technologies, the number of tasks to be processed by mobile devices continues to increase. Edge nodes become incapable of facing massive tasks due to their own limited computing capabilities, and thus the cloud and edge collaborative environment is produced. In order to complete as many tasks as possible while meeting the deadline constraints, we consider the task scheduling problem in the cloud-edge and edge-edge collaboration scenarios. As the number of tasks on edge nodes increases, the solution space becomes larger. Considering that each edge node has its own communication range, we design an edge node based clustering algorithm (ENCA), which can reduce the feasible region while dividing the edge node set. Subsequently, we transform the edge nodes inside the cluster into a bipartite graph, and then propose a task scheduling algorithm based on maximum matching (SAMM). Finally, our ENCA and SAMM are used to solve the task scheduling problem. Compared with the other benchmark algorithms, experimental results show that our algorithms increase the number of tasks which can be completed and that meet the latest deadline constraints by 32%-47.2% under high load conditions.
The Squeeze & Excitation Normalization based nnU-Net for Segmenting Head & Neck Tumors
XIE Juanying, PENG Ying, WANG Mingzhao
, Available online  , doi: 10.23919/cje.2022.00.306
Abstract(351) HTML (173) PDF(27)
Abstract:
Head and neck cancer is one of the most common malignancies in the world. We propose SE-nnU-Net by adapting SE (Squeeze and Excitation) normalization into nnU-Net, so as to segment head and neck tumors in PET/CT images by combining advantages of SE capturing features of interest regions and nnU-Net configuring itself for a specific task. The basic module referred to convolution-ReLU-SE is designed for SE-nnU-Net. In the encoder it is combined with residual structure while in the decoder without residual structure. The loss function combines Dice loss and Focal loss. The specific data preprocessing and augmentation techniques are developed, and specific network architecture is designed. Furthermore, the deep supervised mechanism is introduced to calculate the loss function using the last four layers of the decoder of SE-nnU-Net. This SE-nnU-net is applied to HECKTOR 2020 and HECKTOR 2021 challenges, respectively, using different experimental design. The experimental results show that SE-nnU-Net for HECKTOR 2020 obtained 0.745, 0.821, and 0.725 in terms of Dice, Precision, and Recall, respectively, while the SE-nnU-Net for HECKTOR 2021 obtains 0.778 and 3.088 in terms of Dice and median HD95, respectively. This SE-nnU-Net for segmenting head and neck tumors can provide auxiliary opinions for doctors’ diagnoses.
TCM2023+Characteristic Mode Analysis for Pattern Diversity and Beamforming: A Survey
ZHANG Qianyun, WU Biyi
, Available online  , doi: 10.23919/cje.2022.00.255
Abstract(1) HTML (1) PDF(0)
Abstract:
With the rapid development of space-air-ground integrated communications, diverse requirements have been imposed on antenna radiation patterns. In addition, increasingly compact platforms brings significant challenges to the deployment of antenna arrays normally used for beamforming. This article comprehensively surveys characteristic mode analysis (CMA)-based pattern diversity realizations in past years. Specifically, exciting multiple characteristic modes independently achieves pattern reconfigurability and element-reduced multiple-input and multiple-output (MIMO) systems. We furthermore overview a series of works on modes superposition. Various methods have been explored for modal weights decision, and therefore specific patterns are synthesized. The weighted modal combination also fulfills single-element beamforming. A recent study on an antenna design for electrically small unmanned aerial vehicles (UAVs) is summarized, and the desired reconfigurable radiation patterns of the conformal radiator are realized based on CMA. Moreover, a formation-based beamforming technique, which takes advantages of the electromagnetic coupling among conformal radiators and the agility of UAVs, is introduced.
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing
QU Yuben, WEI Zhenhua, QIN Zhen, WU Tao, MA Jinghao, DAI Haipeng, DONG Chao
, Available online  , doi: 10.23919/cje.2021.00.323
Abstract(4) HTML (2) PDF(0)
Abstract:
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) has been generally recognized as a potential technology to efficiently and flexibly cope with latency-sensitive and computation-intensive tasks in fifth generation (5G) and beyond. In this work, we study the problem of Collaborative Service Provisioning for UAV-assisted MEC (CSP). Specifically, our aim is to minimize the total energy consumption of all terrestrial user equipments (UEs) with task latency and other resource constraints, by jointly optimizing service placement, UAV movement trajectory, task offloading, and computation resource allocation. The CSP problem is naturally a non-convex mixed integer nonlinear programming (MINLP) problem, owing to the non-convexity of CSP and complex coupling of mixed integral variables. To address CSP, we propose an alternating optimization-based suboptimal solution with convergence guarantee as follows. We iteratively solve the integral joint service placement and task offloading subproblem, and UAV movement trajectory subproblem, by Branch and Bound (BnB) and successive convex approximation (SCA), respectively, while the closed form of the optimal computation resource allocation can be efficiently obtained. Extensive simulations validate the effectiveness of the proposed algorithm compared to three baselines.
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
JI Feiyan, ZHANG Heng, XING Xiuqiong, LU Wenjun, ZHU Lei
, Available online  , doi: 10.23919/cje.2023.00.032
Abstract(103) HTML (52) PDF(8)
Abstract:
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under wideband dual-mode resonant operation. As theoretically predicted by the two resonant modes TE3/5,1 and TE9/5,1 within a 150° radiator, the operation principle is revealed at first. As have been numerically demonstrated and experimentally validated at 2.4-GHz band, the designed antenna exhibits a wide impedance bandwidth over 90.1%(i.e., 2.06-5.44 GHz), in which the stable gain bandwidth in the backfire, -$ x $-direction ($ \theta $ = 90°, $ \varphi $ = 180°) with peak value of 3.2 dBi and fluctuation less than 3 dB is up to 45.3% (i.e., 3.74-5.44 GHz). It is concluded that the stable wideband backfire gain frequency response should be owing to the high-order resonant mode in the unique sectorial monopole antennas.
Dispersion Compensation and Demultiplexing Using a Cascaded CFBG Structure in a 150 km Long DWDM Optical Network
Baseerat Gul, Faroze Ahmad
, Available online  , doi: 10.23919/cje.2022.00.416
Abstract(189) HTML (91) PDF(20)
Abstract:
This paper proposes the design of a 150 km dense wavelength division multiplexed (DWDM) optical network with a capacity of 8×10 Gbps. To mitigate system dispersion, a cost-effective hybrid dispersion compensator is implemented using chirped fiber Bragg gratings (CFBG) and a pair of 5 km long dispersion compensation fibers (DCF). The novelty of the work is the use of CFBG for multiple functions, including operating as a demultiplexer and providing dispersion compensation. The proposed network design uses 140 km long conventional single-mode fiber (CSMF) and a 10 km long DCF in a symmetrical compensation mode. Without the CFBG structure, a 33 km long DCF would be needed to compensate for total channel dispersion, costing around 3$/m. However, by adding the CFBG structure, the design only requires a 10 km long DCF, reducing the DCF length by more than 65% and lowering the system cost. The CFBG integration also eliminates the need for an additional demultiplexer in the receiver section, reducing system complexity and cost. The system performance is evaluated analytically in terms of Q-factor, bit-error rate (BER), eye-diagram, and optical signal-to-noise ratio (OSNR). The average Q-factor and BER values achieved per channel are 16.5 and 8.38×10−56, respectively, and for all receiver channels, the eye-openings are good enough with commendable OSNR values. The proposed design achieves good performance characteristics despite using shorter-length DCF when compared with previously reported works.
QoS-Aware Computation Offloading in LEO Satellite Edge Computing for IoT: A Game-Theoretical Approach
CHEN Ying, HU Jintao, ZHAO Jie, MIN Geyong
, Available online  , doi: 10.23919/cje.2022.00.412
Abstract(785) HTML (389) PDF(124)
Abstract:
Low earth orbit (LEO) satellite edge computing can overcome communication difficulties in harsh environments, which lack the support of terrestrial communication infrastructure. It is an indispensable option for achieving worldwide wireless communication coverage in the future. To improve the Quality-of-Service (QoS) for IoT devices, we combine LEO satellite edge computing and ground communication systems to provide network services for IoT devices in harsh environments. We study the QoS-aware computation offloading (QCO) problem for IoT devices in LEO satellite edge computing. Then we investigate the computation offloading strategy for IoT devices that can minimize the total QoS cost of all devices while satisfying multiple constraints, such as the computing resource constraint, delay constraint, and energy consumption constraint. We formulate the QoS-aware computation offloading problem as a game model named QCO game based on the non-cooperative competition game among IoT devices. We analyze the finite improvement property of the QCO game and prove that there is a Nash equilibrium for the QCO game. Finally, we propose a distributed QoS-aware computation offloading (DQCO) algorithm for the QCO game. Experimental results show that the DQCO algorithm can effectively reduce the total QoS cost of IoT devices.
RFID-Based WSN Communication System with ESPAR Array Antenna for SIR Improvement
Md. Moklesur RAHMAN, Heung-Gyoon RYU
, Available online  , doi: 10.23919/cje.2022.00.213
Abstract(406) HTML (199) PDF(49)
Abstract:
To improve the received signal strength (RSS) and signal-to-interference and noise ratio (SINR), electronically steerable parasitic array radiator (ESPAR) array antennas are designed for the ultra-high frequency (UHF) radio frequency identification (RFID) communication systems that can provide very low power consumption in sensor tag edge. Higher gain, appropriate radiation pattern, and most power-efficient array antennas are completely essential in these sensor network systems. As a result, it is suggested that ESPAR array antennas be used on the RFID reader side to reduce interference, multipath fading, and extend communication range. Additionally, a system architecture for UHF- RFID wireless sensor network (WSN) communication is put forth in order to prevent interference from antenna nulling technology, in which ESPAR array antennas could be capable of generating nulls. The array antennas within the system demonstrate high efficiency, appropriate radiation patterns, and gains (9.63 dBi, 10.2 dBi, and 12 dBi) from one array to other arrays. The nulling technique using the proposed array antennas also provides better SINR values (31.63 dB, 33.2 dB, and 36 dB). Finally, the nulling space matrix is studied in relation to the channel modeling. Therefore, the suggested approach might offer better communications in sensor networking systems.
Levy Flight Adopted Particle Swarm Optimization-based Resource Allocation Strategy in Fog Computing
Sharmila Patil(Karpe), Brahmananda S H
, Available online  , doi: 10.23919/cje.2022.00.212
Abstract(407) HTML (203) PDF(42)
Abstract:
The prevalence of the Internet of Things (IoT) is unsteady in the context of cloud computing, it is difficult to identify fog and cloud resource scheduling policies that will satisfy users’ QoS need. As a result, it increases the efficiency of resource usage and boosts user and resource supplier profit. This research intends to introduce a novel strategy for computing fog via emergency-oriented resource allotment, which aims and determines the effective process under different parameters. The modeling of a non-linear functionality that is subjected to an objective function and incorporates needs or factors like Service response rate, Execution efficiency, and Reboot rate allows for the resource allocation of cloud to fog computing in this work. Apart from this, the proposed system considers the resource allocation in emergency priority situations that must cope-up with the immediate resource allocation as well. Security in resource allocation is also taken into consideration with this strategy. Thus the multi-objective function considers 3 objectives such as Service response rate, Execution efficiency, and Reboot rate. All these strategies in resource allocation are fulfilled by Levy Flight adopted Particle Swarm Optimization (LF-PSO). Finally, the evaluation is performed to determine whether the developed strategy is superior to numerous traditional schemes. However, the cost function attained by the adopted technique is 120, which is 19.17%, 5%, and 2.5% greater than the conventional schemes like GWSO, EHO, and PSO, when the number of iterations is 50.
Security Analysis for SCKHA Algorithm: Stream Cipher Algorithm Based on Key Hashing Technique
Souror Samia, El-Fishawy Nawal, Badawy Mohammed
, Available online  , doi: 10.23919/cje.2021.00.383
Abstract(1327) HTML (659) PDF(48)
Abstract:

The strength of any cryptographic algorithm is mostly based on the difficulty of its encryption key.However, the larger size of the shared key the more computational operations and processing time for cryptographic algorithms. To avoid increasing the key size and keep its secrecy, we must hide it. The authors proposed a stream cipher algorithm that can hide the symmetric key[1] through hashing and splitting techniques. This paper aims to measure security analysis and performance assessment for this algorithm. This algorithm is compared with three of the commonly used stream cipher algorithms: RC4, Rabbit, and Salsa20 in terms of execution time and throughput. This comparison has been conducted with different data types as audio, image, text, docs, and pdf. Experiments proved the superiority of SCKHA algorithm over both Salsa20 and Rabbit algorithms. Also, results proved the difficulty to recover the secret key for SCKHA algorithm. Although RC4 has a lower encryption time than SCKHA, it is not recommended for use because of its vulnerabilities. Security factors that affect the performance as avalanche effect, correlation analysis, histogram analysis, and Shannon information entropy are highlighted. Also, the ciphertext format of the algorithm gives it the ability to search over encrypted data.

Multi-scale Global Retrieval and Temporal-Spatial Consistency Matching based long-term Tracking Network
SANG Haifeng, LI Gongming, ZHAO Ziyu
, Available online  , doi: 10.23919/cje.2021.00.195
Abstract(365) HTML (184) PDF(30)
Abstract:

Compared with the traditional short-term object tracking task based on temporal-spatial consistency, the long-term object tracking task faces the challenges of object disappearance, dramatic changes in object scale, and object appearance. To address these challenges and problems, in this paper we propose a Multi-scale Global Retrieval and Temporal-Spatial Consistency Matching based long-term Tracking Network (MTTNet). MTTNet regards the long-term tracking task as a single sample object detection task and takes full advantage of the temporal-spatial consistency assumption between adjacent video frames to improve the tracking accuracy. MTTNet utilizes the information of single sample as guidance to perform full-image multi-scale retrieval on any instance and does not require online learning and trajectory refinement. Any type of error generated during the detection process will not affect its performance on subsequent video frames. This can overcome the accumulation of errors in the tracking process of traditional object tracking networks. We introduce Atrous Spatial Pyramid Pooling to address the challenge of dramatic changes in the scale and the appearance of the object. On the experimental results, MTTNet can achieve better performance than composite processing methods on two large datasets.

Robust Beamforming Design for IRS-Aided Cognitive Radio Networks with Bounded CSI Errors
ZHANG Lei, WANG Yu, SHANG Yulong, TIAN Jianjie, JIA Ziyan
, Available online  , doi: 10.23919/cje.2021.00.254
Abstract(431) HTML (215) PDF(42)
Abstract:

In this paper, intelligent reflecting surface (IRS) is introduced to enhance the performance of cognitive radio (CR) systems. The robust beamforming is designed based on combined bounded channel state information (CSI) error for primary user (PU) related channels. The transmit precoding at the secondary user (SU) transmitter and phase shifts at the IRS are jointly optimized to minimize the SU's total transmit power subject to the quality of service of SUs, the limited interference imposed on the PU and unit-modulus of the reflective beamforming. Simulation results verify the efficiency of the proposed algorithm and reveal that the number of phase shifts at IRS should be carefully chosen to obtain a tradeoff between the total minimum transmit power and the feasibility rate of the optimization problem.

Design and Implementation of a Novel Self-bias S-band Broadband GaN Power Amplifier
ZHANG Luchuan, ZHONG Shichang, CHEN Yue
, Available online  , doi: 10.23919/cje.2021.00.118
Abstract(424) HTML (211) PDF(37)
Abstract:

In this paper, a 3.6 mm gate width GaN HEMT with 0.35 μm gate length process and input and output matching circuits of Nanjing Electronic Devices Institute are used for broadband design respectively, and a novel high-power and high-efficiency self-bias S-band broadband continuous wave GaN power amplifier is realized. Under the working conditions of 2.2 GHz to 2.6 GHz and 32 V drain power supply, the continuous wave output power of the amplifier is more than 20 W, the power gain is more than 15 dB, and the max power added efficiency is more than 65%. The self-bias amplifier simplifies the circuit structure and realizes excellent circuit performance.

Two Jacobi-like algorithms for the general joint diagonalization problem with applications to blind source separation
CHENG Guanghui, MIAO Jifei, LI Wenrui
, Available online  , doi: 10.23919/cje.2019.00.102
Abstract(644) HTML (306) PDF(38)
Abstract:

We consider the general problem of the approximate joint diagonalization of a set of non-Hermitian matrices. This problem mainly arises in the data model of the joint blind source separation for two datasets. Based on a special parameterization of the two diagonalizing matrices and on adapted approximations of the classical cost function, we establish two Jacobi-like algorithms. They may serve for the canonical polyadic decomposition (CPD) of a third-order tensor, and in some scenarios they can outperform traditional CPD methods. Simulation results demonstrate the competitive performance of the proposed algorithms.

Original ariticle
The Optimization of Binary Randomized Response Based on Lanke Privacy and Utility Analysis
ZHOU Yihui, WANG Wenli, YAN Jun, WU Zhenqiang, LU Laifeng
, Available online  , doi: 10.23919/cje.2023.00.272
Abstract(16) HTML (8) PDF(4)
Abstract:
Currently, it has become a consensus to enhance privacy protection. Randomized response (RR) technique, as the mainstream perturbation mechanism for local differential privacy, has been widely studied. However, most of the research in literature managed to modify existing RR schemes and propose new mechanisms with better privacy protection and utility, which are illustrated only by numerical experiments. We study the properties of generalized binary randomized response mechanisms from the perspectives of Lanke privacy and utility. The mathematical expressions of privacy and utility for the binary RR mechanism are given respectively. Moreover, the comparison principle for privacy and utility of any two mechanisms is proved. Finally, the optimization problem of the binary RR mechanism is discussed. Our work is based on a rigorous mathematical proof of privacy and utility for the general binary RR mechanism, and numerical verification illustrates the correctness of the conclusions. It can provide theoretical support for the design of binary RR mechanism and can be applied in data collection, analysis and publishing.
Review Article
A Review of Terahertz Solid-state Electronic/Optoelectronic Devices and Communication Systems
LI Wenbo, ZENG Hongxin, HUANG Lin, GONG Sen, CAO Haoyi, WANG Weipeng, WANG Zheng, ZHOU Hongji, LIANG Shixiong, YANG Ziqiang, ZHANG Yaxin
, Available online  , doi: 10.23919/cje.2023.00.282
Abstract(126) HTML (62) PDF(25)
Abstract:
With the rapid development of modern communication technology, spectrum resources have become non-renewable and precious resources, and the terahertz frequency band has entered people’s vision. Nowadays, terahertz communication technology has become one of the core technologies for future high-capacity and high-rate communication. This paper discusses and analyzes the core technologies related to the field of terahertz communication. We introduce the characteristics, domestic and international comparisons and development trends of the core devices for terahertz communication, and also introduce and discuss the terahertz solid-state frequency mixing communication system, terahertz direct modulation communication system, and terahertz optoelectronic communication system. Finally, we summarize the development of terahertz communication technology and the outlook of future applications.
A Survey on Graph Neural Network Acceleration: A Hardware Perspective
CHEN Shi, LIU Jingyu, SHEN Li
, Available online  , doi: 10.23919/cje.2023.00.135
Abstract(240) HTML (119) PDF(38)
Abstract:
Graph neural networks (GNNs) have emerged as powerful approaches to learn knowledge about graphs and vertices. The rapid employment of GNNs poses requirements for processing efficiency. Due to incompatibility of general platforms, dedicated hardware devices and platforms are developed to efficiently accelerate training and inference of GNNs. In the article, we conduct a survey on hardware acceleration for GNNs. We first include and introduce recent advances of the domain, and provide a methodology of categorization to classify existing works into three categories. Secondly, we discuss optimization techniques adopted at different levels. Finally, we propose suggestions on future directions to facilitate further works.
A Review of Intelligent Configuration and Its Security for Complex Networks
ZHAO Yue, YANG Bin, TENG Fei, NIU Xianhua, HU Ning, TIAN Bo
, Available online  , doi: 10.23919/cje.2023.00.001
Abstract(244) HTML (122) PDF(100)
Abstract:
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. However, there is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation, and so on. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
ARTIFICIAL INTELLIGENCE
Extracting Integrated Features of Electronic Medical Records Big Data for Mortality and Phenotype Prediction
LI Fei, CHEN Yiqiang, GU Yang, WANG Yaowei
, Available online  , doi: 10.23919/cje.2023.00.181
Abstract(164) HTML (81) PDF(34)
Abstract:
The key to synthesizing the features of electronic medical records (EMR) big data and using them for specific medical purposes, such as mortality and phenotype prediction, is to integrate the individual medical event and the overall multivariate time series feature extraction automatically, as well as to alleviate data imbalance problems. This paper provides a general feature extraction method to reduce manual intervention and automatically process large-scale data. The processing uses two variational auto-encoder (VAEs) to automatically extract individual and global features. It avoids the well-known posterior collapse problem of Transformer VAE through a uniquely designed “proportional and stabilizing” mechanism and forms a unique means to alleviate the data imbalance problem. We conducted experiments using ICU-STAY patients’ data from the MIMIC-III database and compared them with mainstream EMR time series processing methods. The results show that the method extracts visible and comprehensive features, alleviates data imbalance problems and improves the accuracy in specific predicting tasks.
ENABLING TECHNOLOGIES FOR VEHICLE-TO-EVERYTHING COMMUNICATIONS TOWARDS 6G ERA
Cellular V2X-Based Integrated Sensing and Communication System: Feasibility and Performance Analysis
LI Yibo, ZHAO Junhui, LIAO Jieyu, HU Fajin
, Available online  , doi: 10.23919/cje.2022.00.340
Abstract(321) HTML (159) PDF(40)
Abstract:
Communication and sensing are basically required in intelligent transportation. The combination of two functions can provide a viable way in alleviating concerns about resource limitations. To achieve this, we propose an integrated sensing and communication (ISAC) system based on cellular vehicle-to-everything (C-V2X). We first analyze the feasibility of new radio (NR) waveform for ISAC system. We discuss the possibility of reusing NR waveform for sensing based on current NR-V2X standards. Ambiguity function is calculated to investigate the sensing performance limitation of NR waveform. A C-V2X-based ISAC system is then designed to realize the two tasks in vehicular network simultaneously. We formulate an integrated framework of vehicular communication and automotive sensing using the already-existing NR-V2X network. Based on the proposed ISAC framework, we develop a receiver algorithm for target detection/estimation and communication with minor modifications. We evaluate the performance of the proposed ISAC system with communication throughput, detection probability and range/velocity estimation accuracy. Simulations show that the proposed system achieves high reliability communication with 99.9999% throughput and high accuracy sensing with errors below 1m and 1m/s in vehicle scenarios.
CIRCUITS AND SYSTEMS
A 5 mW 1-to-5 GHz Multiband Ladder CMOS Mixer Employing Transconductance Tuning Mechanism Achieving IIP3 of 27 dBm
PRAVINAH Shasidharan, SELVAKUMAR Mariappan, JIA XIN Lim, JAGADHESWARAN Rajendran, NARENDRA KUMAR Aridas
, Available online  , doi: 10.23919/cje.2022.00.028
Abstract(210) HTML (107) PDF(16)
Abstract:
This paper presents a CMOS mixer employing a transconductance tuning (TCT) mechanism to achieve wideband, low power, high gain, and high linearity. The ladder CMOS mixer consists of one current source, one differential amplifier and two differential low noise switching stage. The TCT technique optimizes the optimum drain current requirement and the output voltage at the voltage control oscillator node and the RF output node, thus producing a balance linearity performance with low power consumption for 4 GHz operating bandwidth. The wideband linearity performance is achieved without inductors, thus reducing the size of the chip significantly to 0.5 mm2. Designed in 180-nm CMOS, the TCT mixer operates from 1 GHz to 5 GHz with a 1.2 V supply voltage, resulting in a highest measured result performances of the third-order input intercept point (IIP3) of 35.97 dBm across the local oscillator (LO) input power and 27.2 dBm across the RF input power. The highest measured conversion gain (CG) encapsulated around 29.17 dB under RF input power whereas 22.27 dB across the LO input power at center frequency of 3 GHz. The TCT mixer provides full mixing operation which achieves the measured noise figure (NF) below 5 dB across the IF output frequency. Moreover, the port-to-port isolation less than −30 dB has also been achieved across the RF operating bandwidth. The total power consumption, PDC of the TCT chip is 5 mW. The operating bandwidth of the TCT mixer qualifies it to be integrated into a multiband 5G New Radio receiver system.