## Just Accepted

Just Accepted Papers are peer-reviewed and accepted for publication. They will soon (normally in 1–3 weeks) transform into Typeset Proofs when initial checks such as language editing and reference cross-validation are completed and typesettings of the papers are done. Note that for both types of papers under this directory, they are posted online prior to technical editing and author proofing. Please use with caution.
Display Method:

### Coming soon.....

, Available online  , doi: 10.23919/cje.2021.00.343
Abstract(17) HTML (8) PDF(8)
Abstract:
Background: Increasing attention has been given to microwave tomographic imaging in the time domain due to its high resolution, which is urgently required for the early-stage detection of small breast tumors. In recent years, three similar versions of time-domain inverse scattering (TDIS) algorithms have been proposed for the successful estimation of the dispersive dielectric properties of several single-pole Debye media. However, for practical applications in common biomedical engineering, these algorithms are not without their shortcomings, such as the lack of regularization, unfitness for multiple-pole Debye dispersive media, and inconvenience caused by the simultaneous reconstruction of overall Debye model parameters. Methods: In this paper, an improved TDIS algorithm is explicitly derived to provide a more versatile algorithm for the microwave tomographic imaging of biological tissues. Its three improvements are as follows. First, the number of poles for Debye models is extended from one to a positive integer W. The second improvement is the extension of unknowns from three to 2W + 2 for each discretized cell. The third improvement is the adoption of the first-order Tikhonov regularization scheme. Results: Based on the four classes (mostly fatty, scattered fibroglandular, heterogeneously dense, and very dense) of 2-D anatomically realistic numerical phantoms with two-pole Debye dispersion from the University of Wisconsin Computational Electromagnetics Laboratory (UWCEM) database, the performance of the developed algorithm for the detection of a 3-mm-diameter tumor implanted in the four types of breast models was investigated for three scenarios. Conclusion: The obtained results preliminarily indicate that the modified technique is feasible and promising for breast cancer screening or the quantitative reconstruction of the internal breast composition, especially for sparse breast tissues.
, Available online  , doi: 10.23919/cje.2021.00.428
Abstract(14) HTML (7) PDF(3)
Abstract:
The pressure data of the train air braking system is of great significance to accurately evaluate its operation state. In order to overcome the influence of sensor fault on the pressure data of train air braking system, it is necessary to design a set of sensor fault-tolerant voting mechanism to ensure that in the case of a pressure sensor fault, the system can accurately identify and locate the position of the faulty sensor, and estimate the fault data according to other normal data. In this paper, a fault-tolerant mechanism based on multi classification support vector machine (MSVM) and adaptive network-based fuzzy inference system (ANFIS) is introduced. Specifically, MSVM is used to identify and locate the system fault state, and ANFIS is used to estimate the real data of the fault sensor. After estimation, the system will compare the real data of the fault sensor with the ANFIS estimated data. If it is similar, the system will recognize that there is a false alarm and record it. Then the paper tests the whole mechanism based on the real data. The test shows that the system can identify the fault samples and reduce the occurrence of false alarms.
, Available online  , doi: 10.23919/cje.2022.00.106
Abstract(10) HTML (5) PDF(3)
Abstract:
In the Industrial Internet of Things (IIoT), various applications generate a large number of interactions and are vulnerable to various attacks, which are difficult to be monitored in a sophisticated way by traditional network architectures. Therefore, deploying software-defined networks (sdn) in the industrial IoT is essential to defend against various attacks. However, sdn has a drawback: there is a security problem of distributed denial-of-service attacks (DDoS) at the control layer. This paper proposes an effective solution: DDoS detection within the domain using tri-entropy in information theory. The detected attacks are then uploaded to a smart contract in the blockchain, so that the attacks can be quickly cut off even if the same attack occurs in different domains. Experimental validation was conducted under different attack strengths and multiple identical attacks, and the results show that the method has better detection ability under different attack strengths and can quickly block the same attacks.
, Available online  , doi: 10.23919/cje.2022.00.134
Abstract(22) HTML (11) PDF(2)
Abstract:
Resonance is a common physical phenomenon in real world, and the modal analysis is a useful tool. Within the regime of electromagnetics, characteristic mode theory is established in frequency domain (FD), and it is doubtful that whether we can find similar modes in time domain (TD). In this paper, resonating modes of a vibrating string are briefly reviewed. Special attentions are paid to the time domain behaviors of the resonating modes, by following which a temporal modal analysis is proposed. Additionally, a narrow plate is selected as an example since it has a similar structure as the vibrating string. Temporal modal behaviors of the plate are presented and discussed. To further demonstrate this concept, a rigorous analysis of a sphere is provided. A frequency-independent condition is discussed and verified for small objects, and it results in a band-limited constraint. In addition, the temporal modal analysis with excitations is presented, and its potential applications is discussed with emphasis on the analyzing and optimizing transient behaviors of antennas. This work expands largely the field of characteristic mode and may find applications for scattering and antennas.
, Available online  , doi: 10.23919/cje.2022.00.310
Abstract(10) HTML (5) PDF(1)
Abstract:
Nowadays, since the many third parties involved in IC manufacturing, hardware Trojans (HT) malicious implantation have become a threat to the integrated circuit (IC) industry. Therefore, varieties of reliable hardware Trojan detection methods are need. Since electromagnetic radiation is an inherent phenomenon of electronic devices, there are significant differences in the electromagnetic radiated characteristics for circuits with different structures and operating states. In this paper, a novel hardware Trojan detection method is proposed, which considers the electromagnetic radiation differences caused by hardware Trojan implantation. Experiments of detecting hardware Trojan in FPGA show that the proposed method can effectively distinguish the ICs with Trojan from the ones without Trojan by the radiated emission.
, Available online  , doi: 10.23919/cje.2022.00.076
Abstract(8) HTML (4) PDF(0)
Abstract:
The rating prediction task plays an important role in the recommendation model. Most existing methods predict ratings by extracting user and items characteristics from historical review data. However, the recommended strategies in historical review data are often based on partial observational data, which has the problems of unbalanced distribution, lack of robustness, and inability to obtain unbiased prediction results. Therefore, a novel rating prediction model based on causal inference debiasing method (CID) is proposed. The model can mitigate the negative effects of context bias and improve the robustness by studying the causal relationship between review information and user ratings. The proposed CID rating prediction model is plug-and-play and is not limited to one baseline prediction method. The proposed method is tested on four open datasets. The results show that the proposed method is feasible. Compared with the most advanced models, the prediction accuracy of the CID rating prediction model has been further improved. The experimental results show the debiasing effectiveness of the CID rating prediction model.
, Available online  , doi: 10.23919/cje.2022.00.246
Abstract(6) HTML (3) PDF(0)
Abstract:
When the dielectric sheet is electrically thin in the normal direction, the conventional volume integral equation (VIE) can be approximately simplified to the surface one. On this basis, a novel surface integral equation-based formulation is presented for analyzing characteristic mode (CM) of thin dielectric sheets. The resultant CMs are expressed with tangential and normal components of electric volume currents, which are more intuitive than the conventional VIE-based one. Due to the application of volume equivalence principle, the proposed formulation is immune to non-physical modes. The CMs of typical thin dielectric bodies, including the dielectric substrate and radome, are analyzed to show that the proposed formulation is computationally efficient with encouraging accuracy.
, Available online  , doi: 10.23919/cje.2022.00.242
Abstract(12) HTML (6) PDF(2)
Abstract:
In this paper, a characteristic mode (CM) design of dual-band reconfigurable frequency selective surface (RFSS) with transmission/reflection band is presented. Through the visualization of modal behavior, the theory of characteristic modes (TCM) is used to guide design from a physical perspective. At first, the dominant modes of two basic structures that have a major impact on reflection are clarified by observing the modal behaviors. The appropriate combination of the two structures forms an initial element with bandpass properties. Then, the positive-intrinsic-negative (PIN) diode is placed in the middle of the microstrip line and as the state shifts from ON to OFF, the dominant mode resonant frequency of the microstrip line shifts upward. Such a feature can be used to design the transmission/reflection RFSS. Experimentally, a dual-band RFSS operating at 8.8 GHz and 10.4 GHz is designed and fabricated. The measured results that agree with the full-wave simulation validate the proposed TCM-based design.
, Available online  , doi: 10.23919/cje.2022.00.188
Abstract(8) HTML (4) PDF(1)
Abstract:
In dual-band shared-aperture base station antennas, the secondary radiation (SR) field caused by cross-band couplings always leads to radiation pattern distortion. In this work, the SR field caused by the coupling is attributed to the excitation of the target high-order modes from the perspective of the characteristic mode. To effectively suppress the target modes, L-shaped slots are proposed to load the arms of the radiator and altering the current paths. As compared with conventional dipoles without L-shaped slots, the proposed antenna generates less SR field. Therefore, the radiation pattern of the high-band antennas keeps stable in a dual-band shared-aperture antenna array environment. Prototype of a dual-band antenna array consisting of the proposed low-band (LB) antenna and a 4 × 4 high-band (HB) antenna array is fabricated. Simulated and measured results show that the designed dual-band array operates at both 0.74-0.82 GHz and 3.30-3.80 GHz. The experimental results verify that the cross-band decoupling has been achieved with the high-order mode suppression.
, Available online  , doi: 10.23919/cje.2022.00.309
Abstract(47) HTML (23) PDF(7)
Abstract:
Benefiting from the ultra-wide bandwidth, terahertz (THz) communication is considered one of the core technologies of the 6th generation (6G) mobile communication. However, high path loss is a severe issue for THz band, which needs to be solved by the ultra-massive multiple-input multiple-output (MIMO) technology. For the sake of reducing the hardware cost and power comsumption, the hybrid beamforming technology is required, which has been adopted in the 5th generation communication. In the hybrid beamforming for the THz wideband system, the enormous antenna and ultra-wide bandwidth cause the spatial- and frequency-wideband effect, resulting in acute beam squint. Eliminating beam squint is the key to the engineering realization of ultra massive MIMO for the THz band. To circumvent this issue, this paper presents a comprehensive overview of the hybrid beamforming technology including the channel model, the traditional phase shifter based and the true time delay (TTD) based architectures, the 3D hybrid beamforming for the uniform planar array, open issues and potential challenges.
, Available online  , doi: 10.23919/cje.2022.00.093
Abstract(53) HTML (26) PDF(8)
Abstract:
Vehicles on the road exchange data with base station (BS) frequently through vehicle to infrastructure (V2I) communications to ensure the normal use of vehicular applications, where the IEEE 802.11 distributed coordination function (DCF) is employed to allocate a minimum contention window (MCW) for channel access. Each vehicle may change its MCW to achieve more access opportunities at the expense of others, which results in unfair communication performance. Moreover, the key access parameters MCW is the privacy information and each vehicle are not willing to share it with other vehicles. In this uncertain setting, age of information (AoI) is an important communication metric to measure the freshness of data, we design an intelligent vehicular node to learn the dynamic environment and predict the optimal MCW which can make it achieve age fairness. In order to allocate the optimal MCW for the vehicular node, we employ a learning algorithm to make a desirable decision by learning from replay history data. In particular, the algorithm is proposed by extending the traditional DQN training and testing method. Finally, by comparing with other methods, it is proved that the proposed DQN method can significantly improve the age fairness of the intelligent node.
, Available online  , doi: 10.23919/cje.2022.00.064
Abstract(14) HTML (7) PDF(1)
Abstract:

Carrier behavior in halide perovskite is a critical factor impacting on the properties of material, and finally determines the performance of perovskite photovoltaic and luminescent devices. It is necessary to clarify the mechanism of carrier relaxation and migration at extremely microscopic time scale. Time-resolved spectroscopy provides a powerful means for the detection of ultrafast processes, which has been an indispensable technique in research on perovskites. In this review, we will elaborate the basic principle and system implementation of time-resolved spectroscopy, and introduce the applications for carrier dynamics in perovskite.

, Available online  , doi: 10.23919/cje.2021.00.455
Abstract(81) HTML (41) PDF(7)
Abstract:

With the rapid growth of multimedia data, cross-media hashing has become an important technology for fast cross-media retrieval. Because the manual annotations are difficult to obtain in real-world application, unsupervised cross-media hashing is studied to address the hashing learning without manual annotations. Existing unsupervised cross-media hashing methods generally focus on calculating the similarities through the features of multimedia data, while the learned hashing code cannot reflect the semantic relationship among the multimedia data, which hinders the accuracy in the cross-media retrieval. When humans try to understand multimedia data, the knowledge of concept relations in our brain plays an important role in obtaining high-level semantic. Inspired by this, we propose a Knowledge Guided Unsupervised Cross-media Hashing (KGUCH) approach, which applies the knowledge graph to construct high-level semantic correlations for unsupervised cross-media hash learning. Our contributions in this paper can be summarized as follows: 1) The knowledge graph is introduced as auxiliary knowledge to construct the semantic graph for the concepts in each image and text instance, which can bridge the multimedia data with high-level semantic correlations to improve the accuracy of learned hash codes for cross-media retrieval. 2) The proposed KGUCH approach constructs correlation of the multimedia data from both the semantic and the feature aspects, which can exploit complementary information to promote the unsupervised cross-media hash learning. The experiments are conducted on two widely-used datasets, which verify the effectiveness of our proposed KGUCH approach.

, Available online  , doi: 10.23919/cje.2022.00.112
Abstract(32) HTML (16) PDF(4)
Abstract:
For a sub-connected hybrid multiple-input multiple-output (MIMO) receiver with $K$ subarrays and $N$ antennas, there exists a challenging problem of how to rapidly remove phase ambiguity in only single time-slot. First, a DOA estimator of maximizing received power (Max-RP) is proposed to find the maximum value of $K$-subarray output powers, where each subarray is in charge of one sector, and the center angle of the sector corresponding to the maximum output is the estimated true DOA. To make an enhancement on precision, Max-RP plus quadratic interpolation (Max-RP-QI) method is designed. In the proposed Max-RP-QI, a quadratic interpolation scheme is adopted to interpolate the three DOA values corresponding to the largest three receive powers of Max-RP. Finally, to achieve the CRLB, a Root-MUSIC plus Max-RP-QI scheme is developed. Simulation results show that the proposed three methods eliminate the phase ambiguity during one time-slot and also show low-computational-complexities. In particular, the proposed Root-MUSIC plus Max-RP-QI scheme can reach the CRLB, and the proposed Max-RP and Max-RP-QI are still some performance losses 2dB~4dB compared to the CRLB.
, Available online  , doi: 10.23919/cje.2022.00.079
Abstract(99) HTML (51) PDF(8)
Abstract:
This paper focuses on an optimized Fractional Order Proportional Integral (FOPI) Controller for enhancing the power quality of three-phase hybrid energy storage system integrated with Unified Power Quality Conditioner (UPQC). With a view to providing continuous electricity, Renewable Energy Sources (RES) like Photovoltaic (PV) array, Battery Energy Storage System (BESS) and wind energy are modeled. To ease the grid's power quality issues and the harmonics injected by non-linear loads there endures the UPQC model with series and shunt active filter compensator. Furthermore, PV, wind, and BESS integrated UPQC are capable of solving power quality issues in the event of long voltage interruptions. The shunt compensator of UPQC extracts the power from the hybrid energy systems whereas the load is protected by the series compensator from the grid related power quality issues. Hence, to regulate the voltage of the DC link at the desired level, this paper intends to develop a FOPI controller that exhibits iso-damping properties. Particularly, the gain of the FOPI controller is optimally tuned by a novel hybrid algorithm known as Enhanced Seagull with Rooster Update (ES-RU) algorithm that hybrid the concepts of Seagull Optimization Algorithm (SOA) and Chicken Swarm Optimization (CSO). At last, the proposed method was validated during voltage sag/swell, concerning the total harmonic distortion.
, Available online  , doi: 10.23919/cje.2022.00.178
Abstract(71) HTML (36) PDF(14)
Abstract:

Deep forest [

1

] is a tree-based deep model made up of non-differentiable modules that are trained without backpropagation. Despite the fact that deep forests have achieved considerable success in a variety of tasks, feature concatenation, the ingredient for forest representation learning still lacks theoretical understanding. In this paper, we aim to understand the influence of feature concatenation on predictive performance. To enable such theoretical studies, we present the first mathematical formula of feature concatenation based on the two-stage structure, which regards the splits along new features and raw features as a region selector and a region classifier respectively. Furthermore, we prove a region-based generalization bound for feature concatenation, which reveals the trade-off between Rademacher complexities of the two-stage structure and the fraction of instances that are correctly classified in the selected region. As a consequence, we show that compared with the prediction-based feature concatenation (PFC), the advantage of interaction-based feature concatenation (IFC) is that it obtains more abundant regions through distributed representation and alleviates the overfitting risk in local regions. Experiments confirm the correctness of our theoretical results.

, Available online  , doi: 10.23919/cje.2022.00.162
Abstract(79) HTML (40) PDF(6)
Abstract:

Surface defect recognition on Train wheelset is crucial for the safe operation of a train wheel system. However, existing algorithms find it difficult to make rapid and accurate recognitions, due to the diversity and complexity of such defects. Targeting this issue, a train wheelset tread defect recognition method based on an improved spiking neural network (ISNN) is proposed. Specifically, a hybrid convolutional encoding module is first designed to conduct image-to-spike conversions and to create multi-scaled sparse representations of the features. Second, a residual spiking convolutional neural network is implemented to extract spiking features optimally, and a multi-scale structure is adopted to enhance the SNN’s ability to handle the details. A channel attention module is then incorporated to re-calibrate the weights of four-dimensional spiking feature maps. Finally, effective spiking features are obtained based on which the recognition decisions is made. The experimental results showed that the proposed method improved the accuracy of defect recognition. The recognition time of a single image is only 0.0195 s on average. The overall performance of the proposed method is noticeably superior to current mainstream algorithms.

, Available online  , doi: 10.23919/cje.2021.00.172
Abstract(72) HTML (37) PDF(4)
Abstract:

Recommendation algorithms, from the perspective of real-time, can be classified as offline recommendation algorithms and online recommendation algorithms. To improve music recommendation accuracy, especially the new music (users have no historic listening records on it) recommendation accuracy, and real-time recommendation ability, and solve the “interest drift” problem, we propose a hybrid music recommendation model (HMRM) based on personalized measurement and game theory, which can be separated into two parts: an offline recommendation part (OFFLRP) and an online recommendation part (ONLRP). In OFFLRP, we emphasize users personalization. We introduce two metrics: User-Pursue-Novel-Degree (UPND) and Music Popularity (MP) to improve the traditional items-based collaborative filtering algorithm. In ONLRP, we try to solve the “interest drift” problem, which is a thorny problem in OFFLRP. We propose a novel online recommendation algorithm based on game theory. Experiments verify that the hybrid music recommendation model has a higher new music recommendation accuracy, a decent dynamical personalized recommendation ability, and real-time recommendation capability, and substantially mitigating the problem of interest drift.

, Available online  , doi: 10.23919/cje.2022.00.132
Abstract(45) HTML (23) PDF(0)
Abstract:

Type-II generalized Feistel network (GFN) has attracted a lot of attention for its simplicity and high parallelism. Impossible differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Feistel-like ciphers. In this paper, we deduce the impossible differential of Type-II GFN by analyzing the Boolean function in the middle round. The main idea is to investigate the expression with the variable representing the plaintext (ciphertext) difference words for the internal state words. By adopting the miss-in-the-middle approach, we can construct the impossible differential of Type-II GFN. As an illustration, we apply this approach to

$\mathtt{WARP}$

. The structure of

$\mathtt{WARP}$

is a 32-branch Type-II GFN. Therefore, we find two 21-round truncated impossible differentials and implement a 32-round key recovery attack on

$\mathtt{WARP}$

. For the 32-round key recovery attack on

$\mathtt{WARP}$

, some observations are used to mount an effective attack. Taking the advantage of the early abort technique, the data, time, and memory complexities are

$2^{125.69}$

chosen plaintexts,

$2^{126.68}$

32-round encryptions, and

$2^{100}$

-bit. To the best of our knowledge, this is the best attack on

$\mathtt{WARP}$

in the single-key scenario.

, Available online  , doi: 10.23919/cje.2021.00.293
Abstract(61) HTML (33) PDF(6)
Abstract:

A two-element dual-band flexible MIMO antenna which can be used for wearable applications is proposed in this paper. The antenna consists of two radiating elements fed by coplanar waveguide (CPW), and a shielding layer, which are all made of flexible conductive cloth MKKTN260. Each radiating element composes of two coupled split ring-shaped bending strips. The proposed antenna shows two measured impedance bandwidth (S11 < −10 dB) of 2.39-2.48 GHz and 5.72-5.88 GHz, so that it can be used for 2.4 GHz and 5.8 GHz ISM applications. The two coupled split rings form a self-isolation enhancement structure and can realize polarization diversity at 2.4 GHz band and radiation shielding at 5.8 GHz band, respectively. High isolation (>30 dB) has been achieved for both the bands. Other characteristics for wearable applications like gain, efficiency, SAR, and bending performances were also studied.

, Available online  , doi: 10.23919/cje.2022.00.007
Abstract(52) HTML (28) PDF(12)
Abstract:

The spectrum resources are scarce to support the increasing throughput demands in vehicular networks. It is urgent to make full use of spectrum bands in mobile network. To get the availability of spectrum bands, users should sense wireless channels and cooperate with others. The spectrum sensing data are always related to users’ privacy, such as location. In this paper, we first introduce sensing trajectory inference attack (STIA) in cognitive vehicular networks (CVN), and then propose a data confusion-based privacy-preserving algorithm (DCPPA) and a cryptonym array-based privacy-preserving aggregation (CAPPA) scheme for spectrum sensing in CVN. Unlike existing methods, the proposed schemes transmit confused data during aggregation process. It is almost impossible to infer users’ location from the data transmitted. Analysis demonstrates that the proposed scheme are resilient to STIA

, Available online  , doi: 10.23919/cje.2022.00.165
Abstract(112) HTML (57) PDF(14)
Abstract:

Clustering by fast search and find of density peaks (CFSFDP) has the advantages of a novel idea, easy implementation, and efficient clustering. It has been widely recognized in various fields since it was proposed in Science in 2014. The CFSFDP algorithm also has certain limitations, such as non-unified sample density metrics defined by cutoff distance, the “Domino Effect” for the assignment of remaining samples triggered by unstable assignment strategy, and the phenomenon of picking wrong density peaks as cluster centers. We propose reverse-nearest-neighbor-based clustering by fast search and find of density peaks (RNN-CFSFDP) to avoid these shortcomings. We redesign and unify the sample density metric by introducing reverse nearest neighbor. The newly defined local density metric and the K-nearest neighbors of each sample are combined to make the assignment process more robust and alleviate the “Domino Effect”. Specifically, a cluster fusion algorithm is proposed, which further alleviates the “Domino Effect” and effectively avoids the phenomenon of picking wrong density peaks as cluster centers. Experimental results on publicly available synthetic data sets and real-world data sets show that in most cases, the proposed algorithm is superior to or at least equivalent to the comparative methods in clustering performance. Especially, the proposed algorithm works better on manifold data sets and uneven density data sets.

, Available online  , doi: 10.23919/cje.2022.00.139
Abstract(132) HTML (70) PDF(12)
Abstract:

In Unsupervised Video Object Segmentation (UVOS), the whole video might segment the wrong target due to the initial prior is missing. Also, in Semi-supervised Video Object Segmentation (SVOS), the initial video frame with a fine-grained pixel-level mask is essential to good segmentation accuracy. However, it is expensive and laborious to provide the accurate pixel-level masks for each training sequence. To address this issue, in this paper, we present a weak user interactive UVOS approach guided by a simple human-made rectangle annotation in the initial frame. Specifically, we first interactively draw the region of interest by a rectangle, and then we leverage the Mask RCNN method to generate a set of coarse reference labels for subsequent mask propagations. Second, to establish the temporal correspondence between the coherent frames, we further design two novel temporal modulation modules to enhance the target representations. Then, we compute the earth mover’s distance (EMD)-based similarity between coherent frames to mine the co-occurrent objects in the two images, which is used to modulate the target representation to highlight the foreground target. Furthermore, we design a cross-squeeze temporal modulation module to emphasize the co-occurrent features across frames, which further helps to enhance the foreground target representation. Finally, we augment the temporally modulated representations with the original representation and obtain the compositive spatio-temporal information, producing a more accurate VOS model. The experimental results on both UVOS and SVOS datasets including Davis2016, FBMS, Youtube-VOS, and Davis2017, show that the presented approach yields good balance between accuracy and complexity against the state-of-the-art solutions. The related code will be released at

https://github.com/liyuwang2016/RectVOS

.

, Available online  , doi: 10.23919/cje.2021.00.385
Abstract(68) HTML (32) PDF(4)
Abstract:

In order to avoid the damage of electromagnetic wave to human tissue, a structural optimization scheme of human tissue surface is designed, main absorbing material-graphite was calculated under different concentrations of electromagnetic parameters, the reflection coefficient calculated by the equivalent transmission line theory, and finally through the establishment of reflection coefficient

\begin{document}$\digamma$\end{document}

objective function and the genetic algorithm to optimize the absorbing device design. The experimental results show that when the material thickness error is within ±0.005 mm, the microwave absorption performance error of the multilayer absorber is about 5%, and the concentration and thickness of the graphite layer in the absorber have a great influence on the performance of the absorber, while the sensitivity of the other four layers is low. The performance of multi-layer absorber is successfully optimized, so that it can not only have a wide frequency band, but also ensure low reflectivity.

, Available online  , doi: 10.23919/cje.2022.00.003
Abstract(58) HTML (30) PDF(8)
Abstract:

In this paper, a Backward wave oscillator (BWO) with parallel multiple beams and multi-pin Slow-wave structure (SWS) operating at the frequency above 500 GHz is studied. Both the cold-cavity dispersion characteristics and CST Particle Studio (PIC) simulation results reveal that there are obvious mode competition problems in this kind of terahertz source. Considering that the structure of the multi-pin SWS is similar to that of two-dimensional Photonic crystals (PC), we introduce the defects of photonic crystal with the property of filtering into the SWS to suppress high-order modes. Furthermore, a detailed study of the effect of suppressing higher-order modes is carried out in the process of changing location and arrangement pattern of the point defects. The stable, single-mode operation of the terahertz source is realized. The simulation results show that the ratio of the output peak power of the higher-order modes to that of the fundamental mode is less than 1.9%. Also, the source can provide the output peak power of 44.8 mW at the frequency of 502.2 GHz in the case of low beam voltage of 4.7 kV.

, Available online  , doi: 10.23919/cje.2021.00.346
Abstract(71) HTML (39) PDF(4)
Abstract:

With the demand for Internet connectivity for remote areas, the Space-air-ground integrated network (SAGIN) was proposed to achieve ubiquitous coverage and enhance service capabilities of extant terrestrial networks. The paradigm of virtual Network element placement (NEP) is applied into SAGIN. It can save energy and operating costs when placing specific Network elements (NEs) in SAGIN network architectures. In addition, it helps to provide services in end-to-end networks with its ability to allocate and manage resources flexibly. However, NEP faces some challenges in SAGIN. The network topologies can be dynamic, and links such as the satellite-to-ground and air-to-ground ones are prone to fail. These will make NEP management more complicated. Moreover, time varying traffic is challenging for the existing static NEP scheme. This expression is unusual and it might be more readable saying “In this context”, “In this regard”. All this sentence needs to be rewritten, it's hard to read. In this regard, this work explains the NEP in SAGIN from three aspects, i.e., the Network function virtualization (NFV) enabled SAGIN Radio Access network (RAN), the NFV enabled SAGIN Core network (CN) and the software defined network (SDN)/NFV based SAGIN Barrier network (BN), which refers to end-to-end network in this paper. First, the physical and networking architectures of SAGIN are introduced. Then the status of the network element placement and corresponding challenges are described from these two aspects. Finally, this paper discusses future research directions and key technical challenges.

, Available online  , doi: 10.23919/cje.2022.00.209
Abstract(58) HTML (29) PDF(7)
Abstract:

As an extension of PE, coded permutation entropy (CPE) improves the performance of PE by making a secondary division for ordinal patterns defined in PE. In this study, we provide an exploration of the statistical properties of CPE using a finite length Gaussian white noise time series theoretically. By means of the Taylor series expansion, the approximate expressions of the expected value and variance of CPE are deduced and the Cramér-Rao Low Bound (CRLB) is obtained to evaluate the performance of the CPE estimator. The results indicate that CPE is a biased estimator, but the bias only depends on relevant parameters of CPE and it can be easily corrected for an arbitrary time series. The variance of CPE is related to the encoding patterns distribution, and the value converges to the CRLB of the CPE estimator when the time series length is large enough. For a finite-length Gaussian white noise time series model, the predicted values can match well with the actual values, which further validates the statistic theory of CPE. Using the theoretical expressions of CPE, it is possible to better understand the behavior of CPE for most of the time series.

, Available online  , doi: 10.23919/cje.2022.00.071
Abstract(171) HTML (86) PDF(38)
Abstract:

With the development of the mobile communication and intelligent information technologies, the intelligent transportation systems (ITS) driven by the sixth generation (6G) has many opportunities to achieve ultra-low latency and higher data transmission rate. Nonetheless, it also faces the great challenges of spectral resource shortage and large-scale connection. To solve the above problems, non-orthogonal multiple access (NOMA) and cognitive radio (CR) technologies have been proposed. In this regard, we study the reliable and ergodic performance of CR-NOMA assisted ITS networks in the presence of imperfect successive interference cancellation (ipSIC) and non-ideal channel state information (CSI). Specifically, the analytical expressions of the outage probability (OP) and ergodic sum rate (ESR) are derived through a string of calculations. In order to gain more insights, the asymptotic expressions for OP and ESR at high signal-to-noise ratio (SNR) regimes are discussed. We verify the accuracy of the analysis by Monte Carlo simulations, and the results show: i) ipSIC and channel estimation errors (CEEs) have negative impacts on the OP and ESR; ii) The OP decreases with the SNR increasing until convergence to a fixed constant at high SNR regions; iii) The ESR increases with increasing SNR and there exists a ceiling in the high SNR region.

, Available online  , doi: 10.23919/cje.2021.00.370
Abstract(170) HTML (86) PDF(18)
Abstract:

In federated learning, a parameter server may actively infer sensitive data of users and a user may arbitrarily drop out of a learning process. Bonawitz et al. propose a secure aggregation protocol for federated learning against a semi-honest adversary and a security enhancement method against an active adversary. The purpose of this paper is to analyze their security enhancement method and to design an alternative. We point out that their security enhancement method has the risk of Eclipse attack and that the consistency check round in their method could be removed. We give an new efficient security enhancement method by redesigning an authentication message and by adjusting the authentication timing. The new method produces an aggregation protocol secure against an active adversary with less communication and computation costs.

, Available online  , doi: 10.23919/cje.2021.00.215
Abstract(82) HTML (41) PDF(8)
Abstract:

Based on an arbitrarily-chosen binary Golay complementary pair (BGCP)

\begin{document}$({\boldsymbol{c}},{\boldsymbol{d}})$\end{document}

of even length

${\boldsymbol{N}}$

, first of all, construct quadriphase sequences

${\boldsymbol{a}}$

and

${\boldsymbol{b}}$

of length

${\boldsymbol{N}}$

by weighting addition and difference of the aforementioned pair with different weights, respectively. Secondly, new quadriphase sequence

${\boldsymbol{u}}$

is given by interleaving three sequences

${\boldsymbol{d}}$

,

${\boldsymbol{a}}$

, and

$-{\boldsymbol{c}}$

, and similarly, the sequence

${\boldsymbol{v}}$

is acquired from three sequences

${\boldsymbol{d}}$

,

${\boldsymbol{b}}$

, and

${\boldsymbol{c}}$

. Thus, the resultant pair

$({\boldsymbol{u}},{\boldsymbol{v}})$

is the quadriphase Golay complementary pair (QGCP) of length

${\boldsymbol{3N}}$

. The QGCPs play a fairly important role in communications, radar, and so on.

, Available online  , doi: 10.23919/cje.2022.00.075
Abstract(126) HTML (63) PDF(20)
Abstract:

As one of the most important railway signaling equipment, railway point machines undertake the major task of ensuring train operation safety. Thus fault diagnosis for railway point machines becomes a hot topic. Considering the advantage of the anti-interference characteristics of vibration signals, this paper proposes an novel intelligent fault diagnosis method for railway point machines based on vibration signals. A feature extraction method combining variational mode decomposition (VMD) and multiscale fluctuation-based dispersion entropy (MFDE) is developed, which is verified a more effective tool for feature selection. Then, a two-stage feature selection method based on Fisher discrimination and ReliefF is proposed, which is validated more powerful than signle feature selection methods. Finally, support vector machine (SVM) is utilized for fault diagnosis. Experiment comparisons show that the proposed method performs best. The diagnosis accuracies of normal-reverse and reverse-normal switching processes reach 100% and 96.57% respectively. Especially, it is a try to use new means for fault diagnosis on railway point machines, which can also provide references for similar fields.

, Available online  , doi: 10.23919/cje.2021.00.451
Abstract(139) HTML (70) PDF(14)
Abstract:

The development of smart mobile devices not only brings convenience to people’s lives but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system APIs to perform its malicious actions, there has been a variety of API-based detection approaches. Most of them do not consider the relationship between APIs. We contribute a new approach based on Enhanced API Order for Android malware detection, named EAODroid. EAODroid learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.

, Available online  , doi: 10.23919/cje.2021.00.429
Abstract(136) HTML (69) PDF(11)
Abstract:

A novel Wilkinson pulse combiner(WPC) is proposed for the combination of Gaussian pulse signals. The WPC requires a very wide bandwidth, small size and high port isolation. To improve the operating bandwidth, the design adopts the form of eight-section WPC. Eight capacitors are connected in series with the isolating resistors of each section. After capacitive loading, isolation between WPC input ports is significantly improved at low frequency. Consequently, the operating bandwidth of WPC has been increased from 13:1 to 31:1. Compared with the conventional Wilkinson combiner with the same bandwidth, the proposed WPC reduces the size by 40%. In addition, all the ports are well impedance matched and the insertion loss in the operating frequency band is less than 0.5dB. To verify the feasibility of the design, a prototype was fabricated and measured. Experiment shows that the novel WPC is more advantageous to generate dual-Gaussian pulse signals.

, Available online  , doi: 10.23919/cje.2021.00.393
Abstract(90) HTML (48) PDF(6)
Abstract:

Parallel simulation generally needs efficient, reliable and order-preserving communication. In this article, a zero-copy, reliable and order-preserving intra-node message passing approach ZeROshm is proposed, and it partitions shared memory into segments assigned to processes for receiving messages. Each segment consists of two levels of index L1 and L2 that recordes the order of messages in the host segment, and the processes also read from and write to the segments directly according to the indexes, thereby eliminating allocating and copying buffers. As experimental results show, ZeROshm exhibits nearly equivalent performance to MPI for small message and superior performance for large message - ZeROshm costs less time by 43%, 40% and 55% respectively in pure communication, communication with contention and real Phold simulation within a single node. In hybrid environment, the combination of ZeROshm and MPI also shorten the execution time of Phold simulation by about 42% compared to pure MPI.

, Available online  , doi: 10.23919/cje.2021.00.383
Abstract(265) HTML (134) PDF(13)
Abstract:

The strength of any cryptographic algorithm is mostly based on the difficulty of its encryption key.However, the larger size of the shared key the more computational operations and processing time for cryptographic algorithms. To avoid increasing the key size and keep its secrecy, we must hide it. The authors proposed a stream cipher algorithm that can hide the symmetric key[1] through hashing and splitting techniques. This paper aims to measure security analysis and performance assessment for this algorithm. This algorithm is compared with three of the commonly used stream cipher algorithms: RC4, Rabbit, and Salsa20 in terms of execution time and throughput. This comparison has been conducted with different data types as audio, image, text, docs, and pdf. Experiments proved the superiority of SCKHA algorithm over both Salsa20 and Rabbit algorithms. Also, results proved the difficulty to recover the secret key for SCKHA algorithm. Although RC4 has a lower encryption time than SCKHA, it is not recommended for use because of its vulnerabilities. Security factors that affect the performance as avalanche effect, correlation analysis, histogram analysis, and Shannon information entropy are highlighted. Also, the ciphertext format of the algorithm gives it the ability to search over encrypted data.

, Available online  , doi: 10.23919/cje.2022.00.047
Abstract(128) HTML (66) PDF(16)
Abstract:

While the internet of things brings convenience to people’s lives, it will also bring people hidden worries about data security. As an important barrier to protect data security, identity authentication is widely used in the internet of things. However, it is necessary to protect users' identity privacy while authenticating their identity. Anonymous authentication technology is often used to solve the contradiction between legitimacy and privacy in the authentication process. The existing anonymous authentication scheme has many problems in practical application such as the inability to achieve complete anonymity, the high computational complexity of the algorithm, and the corruption of the central authority. Aiming at the privacy of authentication, we propose Zero-Cerd, a self-blindable anonymous authentication system based on blockchain and dynamic accumulator. The self-blinding properties of the credential enable the users themselves to generate a new validly pseudonymous credential. With the help of zero-knowledge proof technology, users can prove the validity of their credentials without disclosing any information. Security analysis shows that our scheme has achieved the expected security objectives. Compared with the existing schemes, our scheme has the advantages of complete anonymity and high efficiency, and is more suitable for IoT applications with privacy protection requirements.

, Available online  , doi: 10.23919/cje.2021.00.326
Abstract(132) HTML (65) PDF(20)
Abstract:

Unmanned aerial vehicles (UAVs) can be effectively used as serving stations in emergency communications because of their free movements, strong flexibility, and dynamic coverage. In this paper, we propose a coordinated multiple points (CoMP) based UAV deployment framework to improve system average ergodic rate, by using the fuzzy C-means (FCM) algorithm to cluster the ground users and considering exclusive forest channel models for the two cases, i.e., associated with a broken base station (BS) or an available one. In addition, we derive the upper bound of the average ergodic rate to reduce computational complexity. Since deep reinforcement learning (DRL) can deal with the complex forest environment while the large action and state space of UAVs leads to slow convergence, we use a ratio cut method to divide UAVs into groups and propose a hierarchical clustering DRL (HC-DRL) approach with quick convergence to optimize the UAV deployment. Simulation results show that the proposed framework can effectively reduce the complexity, and outperforms the counterparts in accelerating the convergence speed.

, Available online  , doi: 10.23919/cje.2021.00.195
Abstract(141) HTML (73) PDF(16)
Abstract:

Compared with the traditional short-term object tracking task based on temporal-spatial consistency, the long-term object tracking task faces the challenges of object disappearance, dramatic changes in object scale, and object appearance. To address these challenges and problems, in this paper we propose a Multi-scale Global Retrieval and Temporal-Spatial Consistency Matching based long-term Tracking Network (MTTNet). MTTNet regards the long-term tracking task as a single sample object detection task and takes full advantage of the temporal-spatial consistency assumption between adjacent video frames to improve the tracking accuracy. MTTNet utilizes the information of single sample as guidance to perform full-image multi-scale retrieval on any instance and does not require online learning and trajectory refinement. Any type of error generated during the detection process will not affect its performance on subsequent video frames. This can overcome the accumulation of errors in the tracking process of traditional object tracking networks. We introduce Atrous Spatial Pyramid Pooling to address the challenge of dramatic changes in the scale and the appearance of the object. On the experimental results, MTTNet can achieve better performance than composite processing methods on two large datasets.

, Available online  , doi: 10.23919/cje.2021.00.254
Abstract(136) HTML (66) PDF(18)
Abstract:

In this paper, intelligent reflecting surface (IRS) is introduced to enhance the performance of cognitive radio (CR) systems. The robust beamforming is designed based on combined bounded channel state information (CSI) error for primary user (PU) related channels. The transmit precoding at the secondary user (SU) transmitter and phase shifts at the IRS are jointly optimized to minimize the SU's total transmit power subject to the quality of service of SUs, the limited interference imposed on the PU and unit-modulus of the reflective beamforming. Simulation results verify the efficiency of the proposed algorithm and reveal that the number of phase shifts at IRS should be carefully chosen to obtain a tradeoff between the total minimum transmit power and the feasibility rate of the optimization problem.

, Available online  , doi: 10.23919/cje.2021.00.338
Abstract(274) HTML (137) PDF(29)
Abstract:

There are many kinds of linear canonical transform (LCT)-based Wigner distributions (WDs), which are both very effective in detecting noisy linear frequency-modulated (LFM) signals. Among WDs in LCT domains, the instantaneous cross-correlation function type of Wigner distribution (ICFWD) attracts much attention from scholars, because it achieves not only low computational complexity but also good detection performance. However, the existing LCT free parameters selection strategy, a solution of the expectation-based output signal-to-noise ratio (SNR) optimization model, is not unique. In this paper, by introducing the variance-based output SNR optimization model, a multiobjective optimization model is established. Then the existence and uniqueness of the optimal parameters of ICFWD are investigated. The solution of the multiobjective optimization model with respect to one-component LFM signal added with zero-mean stationary circular Gaussian noise is derived. A comparison of the unique parameters selection strategy and the previous one is carried out. The theoretical results are also verified by numerical simulations.

, Available online  , doi: 10.23919/cje.2021.00.280
Abstract(179) HTML (90) PDF(11)
Abstract:

Phase filtering is an essential step in interferometric synthetic aperture radar (InSAR). For interferograms with complicated and changeable terrain, the increasing resolution of InSAR images makes it even more difficult. In this paper, a novel adaptive InSAR phase filtering method based on complexity factors is proposed. Firstly, three complexity factors based on the noise distribution and terrain slope information of the interferogram are selected. The complexity indicator composed of three complexity factors is used to guide the adaptive selection of the most suitable and effective filtering strategies for different areas. Then, the complexity scalar is calculated, which can guide the adaptive local fringe frequency (LFF) estimation and adaptive parameters calculation in different filter methods. Finally, validations are performed on the simulated and real data. The performance comparison between the other three representative phase filtering method and the proposed method have validated the effectiveness and superiority of the proposed method.

, Available online  , doi: 10.23919/cje.2022.00.032
Abstract(98) HTML (51) PDF(9)
Abstract:

In this paper, we propose a terahertz radiation source over the R-band (220-325 GHz) based on metamaterials (MTMs) structure and parallel multiple beams. The effective permittivity and permeability of the slow-wave structure (SWS) can be obtained through the S-parameter retrieval approach, using numerical simulation. Additionally, the electromagnetic properties of the MTMs structure are analyzed, including the dispersion and the coupling impedance. Furthermore, we simulate the beam-wave interaction of the backward oscillator (BWO) with MTMs structure and parallel multiple beams by 3-D particle-in-cell (PIC) code. It is observed that parallel multiple beams can highly enhance the beam-wave interaction and greatly enlarge the output power. These results indicate that the saturated (peak) output power is approximately 63W with the efficiency of roughly 6% at the operating frequency of 231 GHz, under the beam voltage of 35 kV and total current of 30 mA (6-beam) respectively. Meanwhile, the BWO can generate power of 10 W-80 W in the tunable frequency of 220 GHz-240 GHz.

, Available online  , doi: 10.23919/cje.2021.00.118
Abstract(112) HTML (55) PDF(12)
Abstract:

In this paper, a 3.6 mm gate width GaN HEMT with 0.35 μm gate length process and input and output matching circuits of Nanjing Electronic Devices Institute are used for broadband design respectively, and a novel high-power and high-efficiency self-bias S-band broadband continuous wave GaN power amplifier is realized. Under the working conditions of 2.2 GHz to 2.6 GHz and 32 V drain power supply, the continuous wave output power of the amplifier is more than 20 W, the power gain is more than 15 dB, and the max power added efficiency is more than 65%. The self-bias amplifier simplifies the circuit structure and realizes excellent circuit performance.

, Available online  , doi: 10.23919/cje.2021.00.347
Abstract(210) HTML (102) PDF(23)
Abstract:

Feature-based (FB) algorithms are widely used in modulation classification due to their low complexity. As a prerequisite step of FB, feature selection can reduce the computational complexity without significant performance loss. In this paper, according to the linear separability of cumulant features, the hyperplane of the support vector machine is used to classify modulation types, and the contribution of different features is ranked through the weight vector. Then, cumulant features are selected using recursive feature elimination (RFE) to identify the modulation type employed at the transmitter. We compare the performance of the proposed algorithm with existing feature selection algorithms and analyze the complexity of all the mentioned algorithms. Simulation results verify that the proposed RFE algorithm can optimize the selection of the features to realize modulation recognition and improve identification efficiency.

, Available online  , doi: 10.23919/cje.2021.00.149
Abstract(209) HTML (102) PDF(35)
Abstract:

Soluble sugar is an important index to determine the quality of jujube, and also an important factor to influence the taste of jujube. The soluble sugar content of jujube mainly depends on manual chemical measurement, which is time-consuming and labor-intensive. In this study, the feasibility of multi-spectral imaging combined with deep learning for rapid nondestructive testing of fruit internal quality was analyzed. Support vector machine regression model, partial least squares regression model and convolutional neural networks (CNNs) model were established by multi-spectral imaging method to predict the soluble sugar content of the whole jujube fruit, and the optimal model was selected to predict the content of three kinds of soluble sugar. The study showed that the sucrose prediction model of the whole jujube had the best performance after CNNs training, and the correlation coefficient of verification set was 0.88, which proved the feasibility of using CNNs for prediction of the soluble sugar content of jujube fruits.

, Available online  , doi: 10.23919/cje.2021.00.372
Abstract(140) HTML (68) PDF(18)
Abstract:

This paper presents a Ku-Band fully differential 4-element phased-array transceiver using a standard 180-nm CMOS process. Each transceiver is integrated with a 5-bit phase shifter and 4-bit attenuator for high-resolution radiation manipulation. The front-end system adopts time-division mode, and hence two low-loss T/R switches are included in each channel. At room temperature, the measured root-mean-square (RMS) phase error is less than 5.5°. Furthermore, the temperature influence on passive switched phase shifters is analyzed. Meanwhile, an extra phase-shifting cell is developed to calibrate phase error varying with the operating temperatures. With the calibration, the RMS phase error is reduced by 7° at −45 ℃, and 5.4° at 85 ℃. The RMS amplitude error is less than 0.92 dB at 15~18 GHz. In the RX mode, the tested gain is 9.6±1.1 dB at 16.5 GHz with a noise figure of 10.9 dB, and the input P1dB is −15 dBm, while the single-channel’s gain and output P1dB in the TX mode are 11.3 ± 0.4 dB and 9.4 dBm at 16.1 GHz, respectively. The whole chip occupies an area of 5 × 4.2 mm2 and the measured isolation between each two adjacent channels is lower than −23.1 dB.

, Available online  , doi: 10.23919/cje.2021.00.219
Abstract(252) HTML (122) PDF(26)
Abstract:

In this article, a design approach to a radial-resonant wide beamwidth circular sector patch antenna is advanced. As properly evolved from a U-shaped dipole, a prototype magnetic dipole can be fit in the radial direction of a circular sector patch radiator, with its length set as the positive odd-integer multiples of one-quarter wavelength. In this way, multiple TM0m (m = 1, 2, …) modes resonant circular sector patch antenna with short-circuited circumference and widened E-plane beamwidth can be realized by proper excitation and perturbations. Prototype antennas are then designed and fabricated to validate the design approach. Experimental results reveal that the E-plane beamwidth of a dual-resonant antenna fabricated on air/Teflon substrate can be effectively broadened to 128°/120°, with an impedance bandwidth of 17.4%/7.1%, respectively. In both cases, the antenna heights are strictly limited to no more than 0.03-guided wavelength. It is evidently validated that the proposed approach can effectively enhance the operational bandwidth and beamwidth of a microstrip patch antenna while maintaining its inherent low profile merit.

, Available online  , doi: 10.23919/cje.2021.00.198
Abstract(361) HTML (197) PDF(46)
Abstract:

Speech keyword spotting system is a critical component of human-computer interfaces. And Connectionist temporal classifier (CTC) has been proven to be an effective tool for that task. However, the standard training process of speech keyword spotting faces a data imbalance issue where positive samples are usually far less than negative samples. Numerous easy-training negative examples overwhelm the training, resulting in a degenerated model. To deal with it, this paper tries to reshape the standard CTC loss and proposes a novel re-weighted CTC loss. It evaluates the sample importance by its number of detection errors during training and automatically down-weights the contribution of easy examples, the majorities of which are negatives, making the training focus on samples deserving more training. The proposed method can alleviate the imbalance naturally and make use of all available data efficiently. Evaluation on several sets of keywords selected from AISHELL-1 and AISHELL-2 achieves 16%—38% relative reductions in false rejection rates over standard CTC loss at 0.5 false alarms per keyword per hour in experiments.

, Available online  , doi: 10.23919/cje.2021.00.368
Abstract(117) HTML (63) PDF(9)
Abstract:

Recently, a new cryptographic primitive has been proposed called

\begin{document}$\texttt{Forkciphers}$\end{document}

. This paper aims at proposing new generic cryptanalysis against such constructions. We give a generic method to apply existing decompositions againt the underlying block cipher

${\cal{{E}}}^r$

on the forking variant

$\texttt{Fork}{\cal{E}}$

-(r-1)-r

$_0$

-(r+1-r

$_0$

). As application, we consider the security of

$\texttt{ForkSPN}$

and

$\texttt{ForkFN}$

with secret inner functions. We provide a generic attack against

$\texttt{ForkSPN}$

-2-r

$_0$

-(4-r

$_0$

), which is based on the decomposition of

$\texttt{SASAS}$

. Also we extend the decomposition of Biryukov et al. against Feistel networks to get all the unknown round functions in

$\texttt{ForkFN}$

-r-r

$_0$

-r

$_1$

for r

$\leq$

6 and r

$_0$

+r

$_1$$\leq$

8. Therefore, compared with the original block cipher, the forking version requires more iteration rounds to resist the recovery attack.

, Available online  , doi: 10.23919/cje.2019.00.102
Abstract(362) HTML (166) PDF(21)
Abstract:

We consider the general problem of the approximate joint diagonalization of a set of non-Hermitian matrices. This problem mainly arises in the data model of the joint blind source separation for two datasets. Based on a special parameterization of the two diagonalizing matrices and on adapted approximations of the classical cost function, we establish two Jacobi-like algorithms. They may serve for the canonical polyadic decomposition (CPD) of a third-order tensor, and in some scenarios they can outperform traditional CPD methods. Simulation results demonstrate the competitive performance of the proposed algorithms.

, Available online  , doi: 10.23919/cje.2022.00.085
Abstract(8) HTML (4) PDF(0)
Abstract:
The solution of large matrix eigenvalues and complex linear equations limits the Fourier Modal Method (FMM) application in ultrathin metallic gratings (UMG) analysis. This paper proposes an efficient and explicit FMM method for analyzing UMG. The proposed method avoids solving complex linear equations and eigenvalues of eigenmatrix in the conventional method by simplifying the implementation equations. Two numerical examples then verify the reliability of the proposed method compared with CST simulations and the conventional method. The proposed method is proven efficient in decreasing the CPU time by over 80% and demanding significantly less memory.
, Available online  , doi: 10.23919/cje.2022.00.146
Abstract(45) HTML (23) PDF(4)
Abstract:

The demand for a high transmission data rate in 5G leads to the wide application of the multi-input, multi-output (MIMO) technique. However, the narrow design space in mobile phone causes severe unexpected coupling between antenna units and deteriorate the system performance dramatically. In this paper, we focus on the antenna coupling within the MIMO system. Some decoupling techniques are summarized, such as neutralization line, decoupling network, common/differential mode cancellation, etc. Finally, new decoupling research developments of modal currents cancellation based on the theory of characteristic mode are elaborated. Two design examples are shown to validate the benefit of the proposed decoupling method. The −6 dB impedance bandwidth of the head-to-head antenna pair can cover 3.4-3.6 GHz. The isolation level is improved from more than 3.7 dB to more than 13 dB. The tail-to-tail antenna pair can cover 3.3-5 GHz and the isolation level is improved from more than 5 dB to more than 10 dB in the whole operating bandwidth. Both antenna pairs can achieve a envelop correlation coefficient of less than 0.2 and the antenna efficiencies are more than 40%.

, Available online  , doi: 10.23919/cje.2022.00.115
Abstract(39) HTML (20) PDF(4)
Abstract:

Vortex electromagnetic waves can carry orbital angular momentum (OAM) modes of different order number, which are mutually orthogonal. Communication technologies multiplexing different OAM topological charges have attracted extensive attention in improving spectrum utilization. In this regard, the efficient generation of OAM modes becomes a key issue. However, it is difficult to generate high-order OAM modes by using a microstrip antenna with a simple structure, and the mode purity is usually not high. Methodologically, the OAM wave of a microstrip antenna is mostly achieved by synthesizing degenerate eigenmodes. In this paper, combined with eigenmode analysis, the construction of high-order and high-purity OAM mode microstrip antennas is carried out from the perspectives of radiating element, ground plane, and structural symmetry. For a regular hexagonal patch antenna of the 4th-order OAM mode, the mode purity is improved from about 40% to over 80% by removing the inner conductor of the patch layer, using a circular ground plane, and adding lug patches on the outside. This method of improving mode purity through the analysis of mode significance and characteristic current distribution also has guiding significance for the design of other high-order OAM mode patch antennas.

, Available online  , doi: 10.23919/cje.2021.00.226
Abstract(19) HTML (9) PDF(2)
Abstract:
Instance segmentation is an important task in computer vision. In order to enhance the multi-level features expression ability of the segmentation networks, a novel module is proposed in this paper. Firstly, we design a weighted bi-directional feature fusion way by improving the weight distribution function of bi-directional feature pyramid network. Secondly, we propose a joint attention mechanism to effectively filter different levels of feature information by adopting serial and parallel ways to combine the channel attention and spatial attention modules with modifying the original convolution. At the same time, the module uses dynamic convolution to stabilize the calculation speed while improve the 6.7% mean average precision (mAP) of segmentation. The experiments on the COCO dataset demonstrate that the module can effectively improve the performance of the existing instance segmentation networks.
, Available online  , doi: 10.23919/cje.2021.00.081
Abstract(191) HTML (94) PDF(20)
Abstract:

Constrained by physics, the spatial resolution of hyperspectral images (HSI) is low. Hyperspectral image super-resolution (HSI SR) is a task to obtain high-resolution hyperspectral images (HR HSI) from low-resolution hyperspectral images (LR HSI). Existing algorithms have the problem of losing important spectral information while improving spatial resolution. To handle this problem, a spatial-spectral feature extraction network (SSFEN) for HSI SR is proposed in this paper. It enhances the spatial resolution of the HSI while preserving the spectral information. The SSFEN is composed of three parts: spatial-spectral mapping network (SSMN), spatial reconstruction network (SRN), and spatial-spectral fusing network (SSFN). And a joint loss function with spatial and spectral constraints is designed to guide the training of the SSFEN. Experiment results show that the proposed method improves the spatial resolution of the HSI and effectively preserves the spectral information coinstantaneously.

, Available online  , doi: 10.23919/cje.2021.00.411
Abstract(275) HTML (133) PDF(15)
Abstract:

A growing amount of data containing the sensitive information of users is being collected by emerging smart connected devices to the center server in Internet of Things (IoT) era, which raises serious privacy concerns for millions of users. However, existing perturbation methods are not effective because of increased disclosure risk and reduced data utility, especially for small data sets. To overcome this issue, we propose a new edge perturbation mechanism based on the concept of global sensitivity to protect the sensitive information in IoT data collection. The edge server is used to mask users’ sensitive data, which can not only avoid the data leakage caused by centralized perturbation, but also achieve better data utility than local perturbation. In addition, we present a global noise generation algorithm based on edge perturbation. Each edge server utilizes the global noise generated by the center server to perturb users’ sensitive data. It can minimize the disclosure risk while ensuring that the results of commonly performed statistical analyses are identical and equal for both the raw and the perturbed data. Finally, theoretical and experimental evaluations indicate that the proposed mechanism is private and accurate for small data sets.

, Available online  , doi: 10.23919/cje.2021.00.365
Abstract(16) HTML (8) PDF(3)
Abstract:
This paper investigates the multi-sensor fused localization of moving targets in a Wireless Sensor Network (WSN). Each UWB sensor is assigned a stability weight according to its survival time prediction. The measurement accuracy of each sensor into the constraints of the weight distribution based on the IMM method, a double weight distribution algorithm that considers measurement accuracy and stability is proposed. Based on the double weight algorithm, the measurement information of each UWB sensor, the IMU-based state vector and the UWB-based state vector by federated kalman filter(FKF) are integrated to realize the correction of the IMU. Finally, several numerical simulations are performed to show that the proposed algorithm can effectively suppress the measurement dropout when tracking moving targets in a WSN, and it can also automatically adjust the weight of each sensor based on the measurement error covariance to improve the tracking accuracy.
, Available online  , doi: 10.23919/cje.2022.00.161
Abstract(20) HTML (10) PDF(2)
Abstract:
Visible-light indoor positioning is a new generation of positioning technology that can be integrated into smart lighting and optical communications. The current received signal strength (RSS)-based visible-light positioning systems struggle to overcome the interferences of background and indoor-reflected noise. Meanwhile, when ensuring the lighting, it is impossible to use the superposition of each light source to accurately distinguish light source information; furthermore, it is difficult to achieve accurate positioning in complex indoor environments. This study proposes an indoor positioning method based on a combination of power spectral density (PSD) detection and a neural network. The system integrates the mechanism for visible-light radiation detection with RSS theory, to build a back propagation neural network model fitting for multiple reflection channels. Different frequency signals are loaded to different light sources at the beacon end, and the characteristic frequency and power vectors are obtained at the location end using the Pisarenko harmonic decomposition method. Then, a complete fingerprint database is established to train the neural network model and conduct location tests. Finally, the location effectiveness of the proposed algorithm is verified via actual positioning experiments. The simulation results show that, when four groups of sinusoidal waves with different frequencies are superimposed with white noise, the maximum frequency error is 0.104 Hz and the maximum power error is 0.0362 W. For the measured positioning stage, a 0.8 m × 0.8 m × 0.8 m solid wood stereoscopic positioning model is constructed, and the average error is 4.28 cm. This study provides an effective method for separating multi-source signal energies, overcoming background noise, and improving indoor visible-light positioning accuracies.
, Available online  , doi: 10.23919/cje.2022.00.110
Abstract(31) HTML (16) PDF(5)
Abstract:
Monaural speech separation is a significant research field in speech signal processing. To achieve a better separation performance, we propose three novel joint-constraint loss functions and a multiple joint-constraint loss function for monaural speech separation based on dual-output deep neural network (DNN). The multiple joint-constraint loss function for DNN separation model not only restricts the ideal ratio mask (IRM) errors of the two outputs, but also constrains the relationship of the estimated IRMs and the magnitude spectrograms of the clean speech signals, the relationship of the estimated IRMs of the two outputs, and the relationship of the estimated IRMs and the magnitude spectrogram of the mixed signal. The constraint strength is adjusted through three parameters to improve the accuracy of the speech separation model. Furthermore, we solve the optimal weighting coefficients of the multiple joint-constraint loss function based on the optimization idea, which further improves the performance of the separation system. We conduct a series of speech separation experiments on the GRID corpus to validate the superiority performance of the proposed method. The results show that using perceptual evaluation of speech quality, the short-time objective intelligibility, source to distortion ratio, signal to interference ratio and source to artifact ratio as the evaluation metrics, the proposed method outperforms the conventional DNN separation model. Taking the gender into consideration, we carry out experiments among Female-Female, Male-Male and Male-Female cases, which show that our method improves the robustness and performance of the separation system compared with some previous approaches.
, Available online  , doi: 10.23919/cje.2022.00.053
Abstract(295) HTML (149) PDF(18)
Abstract:

Essential proteins with biological functions are necessary for the survival of organisms. Computational recognition methods of essential proteins can reduce the workload and provide candidate proteins for biologists. However, existing methods fail to efficiently identify essential proteins, and generally do not fully use amino acid sequence information to improve the performance of essential protein recognition. In this work, we proposed an end-to-end deep contextual representation learning framework called DeepIEP to automatically learn biological discriminative features without prior knowledge based on protein network heterogeneous information. Specifically, the model attaches amino acid sequences as the attributes of each protein node in the protein interaction network, and then automatically learns topological features from protein interaction networks by graph embedding algorithms. Next, multi-scale convolutions and gated recurrent unit networks are used to extract contextual features from gene expression profiles. The extensive experiments confirm that our DeepIEP is an effective and efficient feature learning framework for identifying essential proteins and contextual features of protein sequences can improve the recognition performance of essential proteins.

, Available online  , doi: 10.23919/cje.2021.00.124
Abstract(149) HTML (75) PDF(17)
Abstract:

Vehicles equipped with 5th Generation(5G) wireless communication devices can exchange information with infrastructure(Vehicle to Infrastructure, V2I) to improve positioning accuracy. Vehicle location has great research value due to the problems of multipath environment and lack of Global Navigation Satellite System(GNSS) signals. This paper proposes a multi-frequency ranging method and positioning algorithm for 5G Orthogonal Frequency Division Multiplexing(OFDM) communication system. It selects specific subcarriers in the OFDM communication system to be used for transmitting ranging frames and delay observations without affecting other subcarriers used for communication. With almost no impact on communication capacity, several specific subcarriers of OFDM are used for ranging and positioning. It introduces the ranging subcarriers’ selection method and the format of the ranging frame carried by the subcarriers. The Cramero Lower Bound(CRLB) of this ranging positioning system is proved. Ranging positioning accuracy meets the requirements of vehicle location applications. The experimental simulation compares the performance with other positioning methods and proves the superiority of this system. The theory proves and simulates the relationship between ranging accuracy and channel parameters in a multipath environment. The simulation results show that the positioning accuracy about 5 cm can be achieved under the conditions of 5 GHz frequency and high signal-to-noise ratio(SNR).

, Available online  , doi: 10.23919/cje.2021.00.233
Abstract(177) HTML (88) PDF(9)
Abstract:

An innovative design of bandpass (BP) negative group delay (NGD) passive circuit based on defect ground structure (DGS) is developed in the present paper. The NGD DGS topology is originally built with notched cells associated with self-matched substrate waveguide elements. The DGS design method is introduced as a function of the geometrical notched and substrate integrated waveguide via elements. Then, parametric analyses based on full wave 3-D electromagnetic S-parameter simulations were considered to investigate the influence of DGS physical size effects. The design method feasibility study is validated with fully distributed microstrip circuit prototype. Significant BP NGD function performances were validated with 3-D simulations and measurements with −1.69 ns NGD value around 2 GHz center frequency over 33.7 MHz NGD bandwidth with insertion loss better than 4 dB and reflection loss better than 40 dB.

, Available online  , doi: 10.23919/cje.2021.00.170
Abstract(173) HTML (64) PDF(23)
Abstract:

With the recent advances in the field of deep learning, an increasing number of deep neural networks have been applied to business process prediction tasks, remaining time prediction, to obtain more accurate predictive results. However, existing time prediction methods based on deep learning have poor interpretability, an explainable business process remaining time prediction method is proposed using reachability graph, which consists of prediction model construction and visualization. For prediction models, a Petri net is mined and the reachability graph is constructed to obtain the transition occurrence vector. Then, prefixes and corresponding suffixes are generated to cluster into different transition partitions according to transition occurrence vector. Next, the bidirectional recurrent neural network with attention is applied to each transition partition to encode the (trace) prefixes, and the deep transfer learning between different transition partitions is performed. For the visualization of prediction models, the evaluation values are added to the sub-processes of Petri net to realize the visualization of the prediction models. Finally, the proposed method is validated by publicly available event logs.

, Available online  , doi: 10.23919/cje.2021.00.230
Abstract(194) HTML (102) PDF(18)
Abstract:

Weakly supervised semantic segmentation using just image-level labels is critical since it alleviates the need for expensive pixel-level labels. Most cutting-edge methods adopt two-step solutions that learn to produce pseudo-ground-truth using only image-level labels and then train off-the-shelf fully supervised semantic segmentation network with these pseudo labels. Although these methods have made significant progress, they also increase the complexity of the model and training. In this paper, we propose a one-step approach for weakly supervised image semantic segmentation—Attention guided enhancement network (AGEN), which produces pseudo-pixel-level labels under the supervision of image-level labels and trains the network to generate segmentation masks in an end-to-end manner. Particularly, we employ Class activation maps (CAM) produced by different layers of the classification branch to guide the segmentation branch to learn spatial and semantic information. However, the CAM produced by the lower layer can capture the complete object region but with many noises. Thus, the self-attention module is proposed to enhance object regions adaptively and suppress irrelevant object regions, further boosting the segmentation performance. Experiments on the Pascal VOC 2012 dataset show that the performance of AGEN outperforms other state-of-art weakly supervised semantic segmentation with only image-level labels.

, Available online  , doi: 10.23919/cje.2021.00.415
Abstract(193) HTML (129) PDF(22)
Abstract:

Differential cryptanalysis is one of the most critical analysis methods to evaluate the security strength of cryptographic algorithms. This paper first applies the genetic algorithm to search for differential characteristics in differential cryptanalysis. A new algorithm is proposed as the fitness function to generate a high-probability differential characteristic from a given input difference. Based on the differential of the differential characteristic found by genetic algorithm, Boolean satisfiability (SAT) is used to search all its differential characteristics to calculate the exact differential probability. In addition, a penalty-like function is also proposed to guide the search direction for the application of the stochastic algorithm to differential cryptanalysis. Our new automated cryptanalysis method is applied to SPECK32 and SPECK48. As a result, the 10-round differential probability of SPECK32 is improved to 2−30.34, and a 12-round differential of SPECK48 with differential probability 2−46.78 is achieved. Furthermore, the corresponding differential attacks are also performed. The experimental results show our method’s validity and outstanding performance in differential cryptanalysis.

, Available online  , doi: 10.23919/cje.2021.00.401
Abstract(105) HTML (41) PDF(9)
Abstract:

The shuffle operations are the bottleneck when mapping the FFT-like algorithms to the vector SIMD architectures. We propose six (three pairs) innovative vector memory-access shuffle fused instructions,which have been proved mathematically. Together with the proposed modified binary-exchange method,the innovative instructions can efficiently address the bottleneck problem for DIF/DIT radix-2/4 FFT-like algorithms,reach a performance improvement by 17.9%~111.2% and reduce the code size by 5.4%~39.8%.Besides,the proposed instructions fit some hybrid-radix FFTs and are suitable for the terms of the initial or result data placement for general algorithms. The software and hardware cost of the proposed instructions is moderate.

, Available online  , doi: 10.23919/cje.2021.00.140
Abstract(233) HTML (108) PDF(27)
Abstract:

Assuming unknown knowledge of Target impulse response (TIR), this paper deals with the joint design of Multiple-input multiple-output (MIMO) Space-time transmit code (STTC) and Space-time receive filter (STRF) for the detection of extended targets in the presence of signal-dependent interference. To enhance the detection performance of extended targets for MIMO radar, we consider transmit-receive system optimization to maximize the worst-case Signal to interference plus noise ratio (SINR) at the output of the STRF array. The problem is formulated in terms of a non-convex max-min quadratic fractional optimization program. Relying on an appropriate reformulation, we present an alternate optimization technique which monotonically increases the SINR value and converges to a stationary point. All iterations of the procedure, involve both a convex and a max-min quadratic fractional programming problem which is globally solved resorting to the generalized Dinkelbachos process with a polynomial computational complexity. In addition, resorting to several mathematical manipulations, the original problem is transformed into an equivalent convex problem, which can also be globally solved via interior-point methods. Finally, the effectiveness of two optimization design procedures is demonstrated through experimental results, underlining the performance enhancement offered by robust joint design methods.