Advanced Search

2020 Vol. 42, No. 12

contents
2020, (12): 1-4.
Abstract:
Overview
A Survey on Personality in Cyberspace Security
Tong WU, Kangfeng ZHENG, Chunhua WU, Xiujuan WANG, Heci ZHENG
2020, 42(12): 2827-2840. doi: 10.11999/JEIT190806
Abstract:
Cyberspace is a collection of all information systems, which refers to the information environment for human survival. Cyberspace security has expanded from physical and information domain security to human-centered social and cognitive domain security. The research on human security has become an inevitable trend of Cyberspace security. The characteristics of human are complex and changeable. The personality, as a stable psychological characteristic, is an appropriate breakthrough point for human security research. This paper investigates and untangles relevant personality research in Cyberspace security. The concepts of Cyberspace security and personality are introduced concisely. A research framework of personality in Cyberspace security is proposed, including theoretical research, technological research and technological application. The technological research mainly includes three parts: personality measurement, personality vulnerability and protection methods in Cyber security. Additionally, this paper discusses the current research status and problems of personality in Cyber security in detail. Finally, the future research directions and development trends of personality in Cyber security are explored.
Papers
A Selective Forwarding Attack Detection Method Based on Simplified Cloud and K/N Voting Model
Rongrong YIN, Wenyuan ZHANG, Chouchou YANG, Xida LI
2020, 42(12): 2841-2848. doi: 10.11999/JEIT190274
Abstract:

For the selective forwarding attack behavior generated by malicious nodes in wireless sensor networks, an efficient detection method is proposed. The simplified cloud model is introduced into the trust evaluation model, and the improved K/N voting algorithm is used to obtain the trust value of the target node. Then, the trust value of the target node is compared with the trust threshold to identify the attack node. The simulation results show that when the trust threshold is 0.8 and after 5 time periods, the proposed method can effectively detect the selective forwarding attack nodes, and it has high detection rate and low fault rate.

Cyberspace Security
Minimal Coverage Model for Fault-Tolerant Controller Placement in Software Defined Networks
Qi WU, Hongchang CHEN
2020, 42(12): 2849-2856. doi: 10.11999/JEIT190972
Abstract:

In order to deploy fault-tolerant Software-Defined Networks(SDN), many controllers must be physically distributed among different network devices. However, a large number of controllers bring huge costs, which limits severely the application of the fault-tolerant control plane to the real networks. In order to solve the above problems, the fault-tolerant control plane is analyzed and a mathematical model that covers all switches using the least number of controllers is constructed. Then, a heuristic controller placement algorithm based on the local search strategy is proposed to avoid the local optimal solution. The experimental results show that compared with other algorithms, the proposed algorithm can effectively reduce the number of required controllers while ensuring network fault tolerance requirements in different scale networks.

An Branch Obfuscation Research on Path Branch Which Formed by Floating-point Comparison
Pu GENG, Yuefei ZHU
2020, 42(12): 2857-2864. doi: 10.11999/JEIT190743
Abstract:

For the faultiness that the recent branch obfuscation method is only efficient on branch condition formed by integer comparison. The relations between the binary representation and big or small comparison of floats are analyzed. The idea that the floats in float interval has prefix matching relation with the prefix set which comes from the binary representation interval of the floats is proved. By protecting the prefix set with Hash function, and based on the comparison of prefix-Hash, a new branch obfuscation method which works well on the branch formed by float number comparison is proposed. The new obfuscation method is powerful on symbolic execution combating and obfuscation recovery combating. At last, the obfuscation proposed in this paper is confirmed to be practical, and is useful to be against symbolic execution and obfuscation recovery.

Multi-index Prediction Model of Wheat Quality Based on Long Short-Term Memory and Generative Adversarial Network
Huawei JIANG, Lei ZHANG
2020, 42(12): 2865-2872. doi: 10.11999/JEIT190802
Abstract:

The change trend of multi-index of wheat reflects the deterioration state of storage quality, while the predicted multi-index data will produce large errors due to its correlation and interaction. For this reason, an improved Long Short-Term Memory and Generative Adversarial Network(LSTM-GAN) model is proposed. The deterioration trend of different time series data of multi-index is predicted by Long Short-Term Memory(LSTM) network, and the improved model may reduce comprehensive prediction error by using Generative Adversarial Network(GAN) according to the correlation of multi-index. Finally, the prediction results obtained by optimizing the objective function and model structure. The experimental analysis shows that the training sequence length and structural parameters of the optimization model can effectively reduce the error of the prediction result. The deterioration of wheat quality under certain conditions will increase the prediction error of multi-index. Therefore, the influence of environmental changes during storage period on multi-index data should be fully considered. The comprehensive error of the LSTM-GAN model is reduced by 9.745% compared with the LSTM prediction and lower than multiple comparison models, which can improve the prediction of wheat quality indexes.

Provable Security Certificateless Authentication Scheme for Vehicular Ad hoc Network
Ping ZENG, Ruifang GUO, Yingjie MA, Yuan GAO, Geng ZHAO
2020, 42(12): 2873-2881. doi: 10.11999/JEIT190883
Abstract:

The design of authentication protocol is a hot topic in the field of the security of Vehicular Ad hoc NETwork (VANET). There are security problems caused by key escrow in the existing authentication schemes. In order to solve this problem and achieve secure and efficient verification, an efficient pairing-free certificateless authentication  scheme with batch verification is proposed, in which the key of the vehicle is generated by the vehicle itself and a key generation center, which solves the problem that the key needs to be managed to the third party for maintenance. The bilinear pairing operation, one of the most complex operations in modern cryptography, is not used in the generation of vehicle’s signatures to reduce the computation cost of message verification. Unforgebility of the schemes against adaptively chosen-message and identity attack is proved under the difficulty of computing the discrete logarithm problem in the random oracle model to guarantee resistancy against modification and impersonation attacks, and has the characteristics of anonymity and traceability. Compared to the existing schemes, the proposed scheme is more efficient.

Research on the Collaborative Beamforming Technique Based on the Node Selection for Satellite Internet of Things
Bo XI, Tao HONG, Gengxin ZHANG
2020, 42(12): 2882-2890. doi: 10.11999/JEIT190707
Abstract:

The transmission performance of nodes in the satellite Internet of Things(IoT) is limited due to the long-distance transmission and the power-constrained terminal. A collaborative beamforming technique is proposed based on the node selection algorithm to improve the transmission performance of nodes. An average far-field beampattern for collaborative beamforming is derived by considering the location information error in practical scenario. Furthermore, the difference between average beampattern and instantaneous beampattern is analyzed by the system parameters. On this basis, a node selection algorithm is proposed based on region grouping not only to meet the requirement of satellite link, but also to suppress the sidelobe. Simulation results show better performance of the proposed algorithm compared with the traditional node selection algorithms in the actural error model.

A Distributed Heterogeneous Task Offloading Methodology for Mobile Edge Computing
Shichao XIA, Zhixiu YAO, Yongju XIAN, Yun LI
2020, 42(12): 2891-2898. doi: 10.11999/JEIT190728
Abstract:

With the rapid development of the Internet of Things (IoT), Mobile Edge Computing (MEC) becomes increasingly effective in improving processing capacity and providing low-latency computing services. However, in the time-varying MEC-IoT environment, heterogeneous devices and applications cause serious challenges on efficient task offloading and resource allocation. A Distributed Dynamic Heterogeneous task offloading Methodology (D2HM) algorithm is proposed in this paper by exploiting game theory and Lyapunov optimization, which can achieves heterogeneous control and allocation of computation resources by dynamic quote price mechanism. Simulation results show that the proposed algorithm can meet the diverse computing needs of heterogeneous tasks and reduce the average delay of the system while ensuring network stability.

Handoff Algorithm Based on Location Prediction in Ultra-dense Heterogeneous Wireless Network
Bin MA, Mengxue WANG, Xianzhong XIE
2020, 42(12): 2899-2907. doi: 10.11999/JEIT190751
Abstract:

In the ultra-dense heterogeneous wireless network composed of heterogeneous cellular networks and wireless local area networks, vehicle terminals with variable speeds will face more frequent handovers, resulting in the deterioration of user’s Quality of Service (QoS). For the above problems, firstly, the Gauss Markov mobility model is used to predict the position of the vehicle terminal at the next moment, and the candidate network set that meets the terminal service quality is selected to make the intersection with the current candidate network set. Secondly, if the current access network is not in the intersection, the variable-step firefly algorithm is used to find the best network. Thirdly, the terminal that fails to switch due to the prediction error is migrated to the macro cellular to ensure the continuity of communication. Simulation results show that the proposed algorithm can reduce the frequent handoff phenomenon, such as ping pong handoff in the ultra-dense heterogeneous wireless network. Meanwhile, it can improve the user service quality and network throughput.

Security Transmission Scheme for Two-way Untrusted Relay Networks Based on Simultaneous Wireless Information and Power Transfer
Jinglan OU, Huanhuan YU, Haowei WU, Rui MA, Liubin WANG
2020, 42(12): 2908-2914. doi: 10.11999/JEIT200069
Abstract:

The physical-layer security transmission scheme based on Simultaneous Wireless Information and Power Transfer (SWIPT) and artificial noise-aided is proposed to solve the energy-constrained and information security issues upon the two-way untrusted relay networks. The Power Splitting (PS) strategy is adopted by the untrusted relay to assist the confidential communication, where a full-duplex jammer is assigned to send the artificial noise while harvesting energy, to ensure the system security. The PS factor is optimized to maximize the secrecy performance, and then the closed-form expressions of the secrecy sum-rate and optimal PS ratio are derived in the high signal-to-noise ratio regime. Besides, the impacts of the channel estimation error on the system security are analyzed for the imperfect channel state information. Simulation results validate the correctness of the theoretical derivation and demonstrate that the proposed transmission scheme based on PS strategy and friendly jammer outperforms that based on the Time Switching (TS) strategy or destination-aided jamming.

The Optimal Tradeoff between Energy Consumption and Transmission Success Probability in D2D Assisted Narrow Band-Internet of Things
Errong PEI, Xin YI, Bingguang DENG, Jinyan LI, Lei ZHANG
2020, 42(12): 2915-2922. doi: 10.11999/JEIT190786
Abstract:

In the Device-to-Device (D2D) communication assisted Narrow Band Internet of Things (NB-IoT), in order to maximize the transmission success probability, the D2D relay device needs to reserve more communication time slots (multiple retransmissions can be allowed to increase the transmission success probability). However, this increases significantly the power consumption of the User Equipment (UE), especially in the case of poor channel conditions or severe interference. An optimization problem based on the relay and energy consumption models is constructed to seek a compromise between transmission success probability and energy consumption, and a communication slot optimal configuration algorithm based on dichotomy is proposed in this paper. The numerical results show that the larger number of reserved time slots can lead to an excessive increase in energy consumption without significantly increasing the transmission success probability. Compared with other algorithms such as multi-relay transmission, random relay transmission and 100% successful transmission, the proposed reserved time slot optimal configuration algorithm can obtain the least energy consumption and almost the highest transmission success probability (it is only lower than that under 100% successful transmission scheme).

Joint Secure Routing and Power Optimization Algorithm for Wireless Ad Hoc Networks
Hui HUI, Xiaojing ZHANG
2020, 42(12): 2923-2930. doi: 10.11999/JEIT190909
Abstract:

A joint security routing and power optimization algorithm for wireless multi-hop Ad hoc network is proposed in an eavesdropping environment. Firstly, the Secrecy Outage Probability (SOP) and expressions of Connection Outage Probability (COP) are derived under the assumption that the distribution of the eavesdroppers follows the Poisson Cluster Process (PCP). Then, in view of minimizing COP with the constraint of SOP, the optimal transmission power of each hop is derived for any given path. Based on that, the optimal route from the source to the destination is obtained. The simulations on COP and SOP show that the derived theoretical results agree well with the Monte-Carlo simulations. It is also shown that the security performance of the proposed algorithm is close to that of exhaustive searching, and also outperforms the traditional method.

Reliable Deployment Algorithm of Service Function Chain Based on Deep Reinforcement Learning
Lun TANG, Rui CAO, Hao LIAO, Zhaokun WANG
2020, 42(12): 2931-2938. doi: 10.11999/JEIT190969
Abstract:

In view of the current deployment of the Service Function Chain (SFC), the failure importance of the Virtual Network Function (VNF) is not considered,an SFC reliable deployment algorithm based on deep reinforcement learning is proposed. Firstly, a reliable mapping model of VNF and virtual links is establised, high reliability requirements is set for important VNFs, and the reliability requirements of virtual links is ensured as much as possible through link deployment length restrictions. Secondly, taking load balancing as the resource coordination principle, joint optimization the VNF reliability is jointly optimized. Finally, the deep reinforcement learning is used to get the service function chain deployment strategy. In addition, node backup and link backup strategies based on importance are proposed to deal with situations where VNF/link reliability is difficult to meet during deployment. Simulation results show that the reliable deployment algorithm in this paper can effectively reduce the failure SFC loss on the basis of ensuring the reliability requirements, and at the same time make the virtual network more stable and reliable.

Research on Power Allocation Algorithm of Multi-to-One Multiplexing D2D Communication Underlaying Full Load Cellular Networks
Zhihong QIAN, Wujie MENG, Xue WANG, Liangshuai HU, Xin WANG
2020, 42(12): 2939-2945. doi: 10.11999/JEIT190974
Abstract:

Considering power allocation of D2D (Device to Device) communication in fully loaded cellular networks, a multi-to-one multiplexing D2D communication power allocation algorithm based on the Nash equilibrium solution of non-cooperative complete information game is proposed. The communication quality of cellular users and the access rate of D2D users are guaranteed first, and the uplink frame structure of D2D communication system is given. Then, the non-cooperative complete information game model is established. After that, the pricing mechanism is introduced into the power distribution game model, and the existence and uniqueness of the Nash equilibrium solution are analyzed. Finally, the paper gives a distributed iterative algorithm for the model. The simulation results show that with the increase of the number of D2D pairs, the algorithm not only improves the system throughput, but also controls the internal interference of the system effectively, reduces the total energy consumption of the system greatly.

Physical Layer Secure Transmission Scheme with Joint Polar Codes and Non-reconciliation Secret Keys
Kaizhi HUANG, Zheng WAN, Yangming LOU, Shuaifang XIAO, Xiaoming XU
2020, 42(12): 2946-2952. doi: 10.11999/JEIT190948
Abstract:

The existing key generation scheme requires additional key reconciliation protocol in a communication process, resulting in the limited application to the communication system, such as the Fifth-Generation mobile communication (5G). A physical layer secure transmission scheme with a joint polar code and non-reconciliation secret keys is proposed. Firstly, the non-reconciliation physical layer keys are extracted from the channel feature, and then the polar code is designed based on the equivalent channel, which is formed by the physical channel and the key encryption channel. Finally, the encoded sequence is simply modular plus encrypted and transmitted using the non-reconciliation physical layer key. Key differences and noise-induced bit errors are corrected through a targeted design of polarization codes to achieve reliable and secure transmission. The simulation shows that the polar code based on the equivalent channel can ensure the reliable transmission between two legitimate users at the optimal code rate.

Blind Identification Algorithm of Polarization Code Parameters Based on Null Space Matrix Matching
Tianqi ZHANG, Yanping HU, Jiaxin FENG, Xiaoyan ZHANG
2020, 42(12): 2953-2959. doi: 10.11999/JEIT190935
Abstract:

To solve the problem of blind identification of polar codes’ parameters, a blind recognition algorithm of polar codes based on zero space matrix matching is proposed. The construction of polar codes’ generation matrix is certain, and all the generation matrices are full rank square matrices, first the rows corresponding to the frozen bit codes are deleted by using the channel reliability estimation in the polar code encoding. Then, the null space matrix of this matrix in the binary field is found out as the supervision matrix under the code length. The code word is iteratively multipied by the supervision matrix of different code lengths, according to the proportion of "1" in the product result, the code length, number and position distribution of information bits of the code word are determined. The simulation results show that for the 200 groups of polar code with 64-code-length and 30-information-bits, the recognition rate can be kept above 80% when the maximum bit error rate is less than 0.06.

Sparsity-aware Ordered Successive Interference Cancellation Based Multi-user Detection for Uplink mMTC
Bin SHEN, Hebiao WU, Shufeng ZHAO, Taiping CUI
2020, 42(12): 2960-2968. doi: 10.11999/JEIT190994
Abstract:

In massive Machine-Type Communication (mMTC) systems, when the user activity is exploited as a priori information for the receiver, the Sparsity-aware Maximum A Posteriori probability (S-MAP) criterion can be used to recover the sparse multi-user vectors over the uplink mMTC systems. In order to reduce the computational complexity of S-MAP detection, based on interference cancellation mechanism, an Improved Activity-aware Sorted QR Decomposition (IA-SQRD) algorithm is proposed in this paper. The IA-SQRD algorithm utilizes the final solution of the A-SQRD algorithm as the initial solution and the iterative interference cancellation operation is performed to improve further the detection performance. Following the same philosophy in improving the A-SQRD algorithm, the conventional Sparsity-Aware Successive Interference Cancellation (SA-SIC), Sorted QR Decomposition (SQRD), and Data-Dependent Sorting and regularization (DDS) algorithms are modified to enhance the performance, respectively. Simulation results verify that compared with the A-SQRD algorithm, a 3 dB gain is achieved by the proposed IA-SQRD algorithm when the Bit Error Rate (BER) is

\begin{document}$2.5 \times {10^{ - 2}}$\end{document}

, without significantly increasing the computational complexity. In addition, given different system configurations in terms of active probability and the length of spread spectrum sequence, the proposed IA-SQRD also exhibits better performance than that of the other algorithms mentioned in this paper.

Energy Balance Algorithm for Wireless Ultraviolet Secret Communication in UAV Formation
Taifei ZHAO, Yaru LIN, Qianwen MA, Borui ZHENG
2020, 42(12): 2969-2975. doi: 10.11999/JEIT190965
Abstract:

In view of secret communication among unmanned aerial vehicles under the strong electromagnetic interference environment, this paper proposes the energy balance algorithm for wireless ultraviolet secret communication in Unmanned Aerial Vehicle (UAV) formation. The proposed algorithm combines the advantages of ultraviolet in non-line-of-sight and low eavesdropping, overcomes the disadvantage of the traditional radio, which can easily be monitored. It can provide reliable assurance for the leader to collect information of wingmen while balancing the energy consumption. The improved algorithm is proposeal based on cluster mechanism via introducing the priority function, which considers distance and residual energy. Adopting the improved algorithm to simulate under two scenarios in which UAVs are deployed randomly or UAVs are deployed in circle formation respectively, the simulation results show that the time of 50% death nodes occurring in UAV network is prolongal by 12% and 16% respectively under two types of deployment, and the improved algorithm can effectively balance the communication energy consumption of the network and prolong the survival time of UAV network.

Radar Signal Processing
A Compressed Sensing Method for Joint Radar and Communication System Based on OFDM-IM Signal
Jiajun ZUO, Ruijuan YANG, Xiaobai LI, Dongjin LI
2020, 42(12): 2976-2983. doi: 10.11999/JEIT190740
Abstract:
Considering the problems of low communication rate and poor reliability of Orthogonal Frequency Division Multiplexing (OFDM) signals in joint Radar and Communication (RadCom) system, a subcarrier Index Modulation (IM) based OFDM RadCom signal scheme (OFDM-IM) and a corresponding radar signal processing algorithm based on Compressed Sensing (CS) are proposed in this paper. In the scheme, IM modulation is adopted at the transmitting end to enhance the communication quality of OFDM signal, CS technology is adopted at the radar receiving end to obtain the range-velocity 2-D super resolution image of radar targets, and the method of rapid piecewise reconstruction and second phase-coherent accumulation are further adopted to reduce the computational complexity of the algorithm. Simulation results show that, compared with the traditional algorithm, this method can significantly improve the processing performance of OFDM-IM RadCom signal and realize ultra-low side lobe in distance, which means the proposed scheme is able to enhance the performance of radar and communication in the same time.
Overlapping Secondary Surveillance Radar Replies Separation Algorithm Based on MUSIC
Hai ZHANG, Xiaolong CHEN, Tao ZHANG, Caisheng ZHANG
2020, 42(12): 2984-2991. doi: 10.11999/JEIT190842
Abstract:
In order to improve the reception performance of Secondary Surveillance Radar (SSR) replies in high-density signal environment, a separation algorithm is proposed, which constructs the separating matrix with estimating the source number and the Direction Of Arrival (DOA) of signal. Firstly, the number of overlapping signals is determined with the eigenvalues distribution of the measurements. Secondly, the mixing matrix with the DOA of signals, which is estimated by peak value searching in MUSIC algorithm. Finally, the separating matrix is estimated by calculating the Moore-Penrose inverse of the reconstructed mixing matrix, achieving separation of overlapping signals. Simulation is done based on uniform linear array with 6 elements. The results show that the proposed separation algorithm can achieve more than 90% success rate to separate two short Mode S replies, and the separating performance is similar to the Independent Component Analysis (ICA) algorithm and is better than Projection Algorithm (PA). The amount of calculation is less than 10 percent of ICA algorithm, thus the proposed separation algorithm is easier to engineering application.
Recognition of Deception Jamming Based on Statistical Correlation Difference in a Multistatic Radar System
Minghong SUN, Chenwei DING, Shuqi ZHANG, Jiazhan LU, Pengfei SHAO
2020, 42(12): 2992-2998. doi: 10.11999/JEIT190634
Abstract:
In multistatic radar system, the real target echoes are independent of each other in different node radars under long-term baseline conditions, but the amplitudes of the deception jamming signals in different node radars are completely correlated because of the jamming signals generated from the same jammer. This paper uses the difference to realize the recognition of deception jamming in multistatic radar system on the stage of tracking. Correlation measurement and parameter estimation are carried out on the amplitude sequence of the received signals by different nodes, and the test statistic is constructed to realize the recognition of deception jamming under the given false alarm probability. The simulation results show that the proposed method has a good performance on the recognition of deception jamming. Compared to the Anderson-Darling (AD) test based on goodness-of-fit, the recognition probability increases by an average of 18.63%.
Graph theory and System Optimization
Vertex Distinguishing IE-total Coloring of K2,4,p
Xiang’en CHEN, Shuang ZHANG, Zepeng LI
2020, 42(12): 2999-3004. doi: 10.11999/JEIT190829
Abstract:
Vertex-distinguishing IE-total colorings of complete tripartite graphs K2,4,p are discussed by using the methods of distributing the color sets in advance, constructing the colorings and contradiction. The vertex-distinguishing IE-total chromatic numbers of K2,4,p are determined.
Image and Intelligent Information Processing
Ship Target Recognition Based on Highly Efficient Scalable Improved Residual Structure Neural Network
Zhequan FU, Shangsheng LI, Xiangping LI, Bo DAN, Xukun WANG
2020, 42(12): 3005-3012. doi: 10.11999/JEIT190913
Abstract:
The depth of neural network is positively correlated with the recognition effect in a certain range. In order to solve the problem that model recognition accuracy decreases when the number of network layers increases after exceeding the range. A neural network model with efficient micro internal blocks structure and residual network structure is proposed, which is used for recognition of ship targets based on High Range Resolution Profile (HRRP) data. In this method, the convolution module with a small scale convolution kernel is used to extract automatically the stable and separable features of target. And the intra-class distance of the target is constrained by the joint loss function to improve the recognition ability. Simulation results show that compared with other common network structures, this model has better recognition performance and stronger noise robustness with fewer model parameters.
Research of Track Resident Point Identification Algorithm Based on Signaling Data
Wanlin LI, Chao WANG, Guoliang XU, Jiangtao LUO, Xuan ZHANG
2020, 42(12): 3013-3020. doi: 10.11999/JEIT190914
Abstract:
For the problem that the density-based clustering algorithm can only identify clusters with similar density and high computational complexity, a Clustering by Fast Search and Find of Density Peaks based on Spatio-Temporal trajectory information in mobile phone signaling data, namely ST-CFSFDP, is proposed. Firstly, the low sampling density signaling data are pre-processed to eliminate the trajectory oscillation phenomenon in the data. Then, based on the Clustering by Fast Search and Find of Density Peaks(CFSFDP) algorithm, the time dimension limitation is explicitly increased, and the local density is extended from two-dimension to three-dimension. Moreover, in order to characterize the cluster center point in the time dimension, the concept of high-density time interval is defined. Secondly, the suitable cluster center screening strategy is developed to select automatically the appropriate cluster center. Finally, the resident points are identified in the travel trajectory of individual users over a period of time and the division of the travel chains is completed. The experimental results show that the algorithm is suitable for signaling data with low sampling density and poor positioning accuracy. It is more suitable for spatio-temporal data than CFSFDP algorithm. Compared with Density-Based Spatial Clustering of Applications with Noise based on Spatio-Temporal data (ST-DBSCAN) algorithm, the recall rate is improved by 14%, the accuracy rate is increased by 8%, and the computational complexity is also reduced.
Adaptive-Rate Compressive Sensing Using Energy Matching for Monitoring Video
Jianming WANG, Jianhua CHEN
2020, 42(12): 3021-3028. doi: 10.11999/JEIT190750
Abstract:
Signal sparsity is of great significance for the improvement of Compressive Sensing (CS) performance. However, it is difficult to estimate the sparsity when the whole signal is not captured and stored at the sampling side. Few existing mothed can achieve good balance in terms of the sparsity estimation performance and the computational complexity. For the monitoring video applications where the signal characteristics is unknown for sampling devices, a new Adaptive-Rate CS using Energy Matching (ARCS-EM) method is proposed. By observing the measurement results of a low-rate compressive sensing, the actual sparsity of the current frame is estimated and then the rate of measurement for the current frame is determined. Finally, supplementary measurements are performed to obtain the optimized compressive sensing result for the current frame. Experiment results show that the proposed method could allocate suitable measurement rate for each frame to adapt to the variation of sparsity in different frames. The quality of reconstructed videos is effectively improved without noticeably increasing computational complexity in the sampling side.
Aurora Image Classification and Retrieval Method Based on Deep Hashing Algorithm
Changhong CHEN, Tengfei PENG, Zongliang GAN
2020, 42(12): 3029-3036. doi: 10.11999/JEIT190984
Abstract:
It is of great significance to classify and retrieve the vast amount of aurora data with various forms and complex changes for the further study of the physical mechanism of the geomagnetic field and spatial information. In this paper, an end-to-end deep hashing algorithm for aurora image classification and retrieval is proposed based on the good performance of CNN in image feature extraction and the fact that hash coding can meet the retrieval time requirment of large-scale image retrieval. Firstly, Spatial Pyramidal Pooling(SPP) and Power Mean Transformtion(PMT) are embedded in Convolutional Neural Network (CNN) to extract multi-scale region information in the image. Secondly, a Hash layer is added between the fully connected layer to Mean Average Precision(MAP) the high-dimensional semantic information that can best represent the image into a compact binary Hash code, and the hamming distance is used to measure the similarity between the image pairs in the low-dimensional space. Finally, a multi-task learning mechanism is introduced to design the loss fuction by making full use of similarity informtion between the image label information and the image pairs. The loss of classification layer and Hash layer are combined as the optimization objective, so that a better semantic similarity between Hash code can be maintained, and the retrieval performance can be effectively improved. The results show that the proposed method outperforms the state-of-art retrieval algorithms on aurora dataset and CIFAR-10 datasets, and it can also be used in aurora image classification effectively.
Semantic Part Constraint for Person Re-identification
Ying CHEN, Qiaoyuan CHEN
2020, 42(12): 3037-3044. doi: 10.11999/JEIT190954
Abstract:
In order to alleviate the background clutter in pedestrian images, and make the network focus on pedestrian foreground to improve the utilization of human body parts in the foreground. In this paper, a person re-identification network is proposed that introduces Semantic Part Constraint(SPC). Firstly, the pedestrian image is input into the backbone network and the semantic part segmentation network at the same time, and the pedestrian feature map and the part segmentation label are obtained respectively. Secondly, the part segmentation label and the pedestrian feature maps are merged to obtain the semantic part feature. Thirdly, the pedestrian feature map is obtained and the global average pooling is used to gain global features. Finally, the network is trained using both identity constraint and semantic part constraint. Since the semantic part constraint makes the global features obtain the part information, only the backbone network can be used to extract the features of the pedestrian during the test. Experiments on large-scale datasets show that semantic part constraints can effectively make the network improve the ability to identify pedestrians and reduce the computational cost of inferring networks. Compared with the state of art, the proposed network can better resist background clutter and improve person re-identification performance.
Person Re-identification Based on Multi-scale Network Attention Fusion
Fenhua WANG, Bo ZHAO, Chao HUANG, Youqi YAN
2020, 42(12): 3045-3052. doi: 10.11999/JEIT190998
Abstract:
The key to person re-identification depends on the extraction of pedestrian characteristics. Convolutional neural networks have powerful feature extraction and expression capabilities. In view of the fact that different features can be observed at different scales, a pedestrian re-identification method based on Multi-Scale Attention Network(MSAN) fusion is proposed. This method samples the features at different depths of the network and fuses the sampled features to predict pedestrians. Feature maps of different depths have different expressive powers, enabling the network to learn more fine-grained features of pedestrians. At the same time, the attention module is embedded in the residual network, so that the network can pay more attention to some key information and enhance the network feature learning ability. The accuracy of the proposed method on the datasets such as Market1501, DukeMTMC-reID and MSMT17_V1 reaches 95.3%, 89.8% and 82.2%, respectively. Experiments show that the method makes full use of the information of different depths of the network and the key information of interest, so that the model has strong discriminating ability, and the average accuracy of the proposed model is better than most state-of-the-art algorithms.
Single-view 3D Reconstruction Algorithm Based on View-aware
Nian WANG, Xuyang HU, Fan ZHU, Jun TANG
2020, 42(12): 3053-3060. doi: 10.11999/JEIT190986
Abstract:
While projecting 3D shapes to 2D images is irreversible due to the abandoned dimension amid the projection process, there are rapidly growing interests across various vertical industries for 3D reconstruction techniques, from visualization purposes to computer aided geometric design. The traditional 3D reconstruction approaches based on depth map or RGB image can synthesize visually satisfactory 3D objects, while they generally suffer from several problems: (1)The 2D to 3D learning strategy is brutal-force; (2)Unable to solve the effects of differences in appearance from different viewpoints of objects; (3)Multiple images from distinctly different viewpoints are required. In this paper, an end-to-end View-Aware 3D (VA3D) reconstruction network is proposed to address the above problems. In particular, the VA3D includes a multi-neighbor-view synthesis sub-network and a 3D reconstruction sub-network. The multi-neighbor-view synthesis sub-network generates multiple neighboring viewpoint images based on the object source view, while the adaptive fusional module is added to resolve the blurry and distortion issues in viewpoint translation. The 3D reconstruction sub-network introduces a recurrent neural network to recover the object 3D shape from multi-view sequence. Extensive qualitative and quantitative experiments on the ShapeNet dataset show that the VA3D effectively improves the 3D reconstruction results based on single-view.
Correlation Filter Algorithm Based on Adaptive Context Selection and Multiple Detection Areas
Lei PU, Xinxi FENG, Zhiqiang HOU, Wangsheng YU
2020, 42(12): 3061-3067. doi: 10.11999/JEIT190931
Abstract:
In order to improve further the discrimination ability of the correlation filtering algorithm and the ability to deal with fast motion and occlusion, a tracking framework based on adaptive context selection and multiple detection areas is proposed. Firstly, the peak value of the detected response map is analyzed. When the response is single peak, four areas surrounding the target are extracted as negative samples to train the model. When the response is multi-peak, the peak value extraction technology and threshold selection are used to extract several larger peak areas as negative samples. In order to improve further the ability to deal with occlusion, a multi detection area search strategy is proposed. Combining the framework with the traditional correlation filter algorithm, the experimental results show that the proposed algorithm improves the accuracy by 6.9% and the success rate by 6.3%.
Circuit and System Design
Vertex-distinguishing IE-total Coloring of K4,4,p(p≥1008)
Xiang’en CHEN, Jingjing MA
2020, 42(12): 3068-3073. doi: 10.11999/SEIT190832
Abstract:
The vertex-distinguishing IE-total coloring of complete tripartite graphs K4,4,p (p≥1008) is discussed, by using of the methods of distributing the color sets in advance, constructing the colorings and contradiction. The vertex-distinguishing IE-total chromatic number of K4,4,p (p≥1008) is determined.
Research on Ka-band Solid-state Power Amplifier Module Packages Using a Lid of Nails
Jianjian SUN, Jianhua XU, Haifeng CHENG, Qinglin ZHU, Xu HAN
2020, 42(12): 3074-3080. doi: 10.11999/JEIT190791
Abstract:
In order to dampen the parallel plate modes and cavity modes within the frequency range of interest, and improve the stability of power amplifiers, a Ka-band solid-state power amplifier module, which is packaged with an Artificial Magnetic Conductors (AMC) boundary is presented in this paper. The AMC boundary is realized with Electromagnetic Band Gap (EBG) which is constructed by a period of metal nails in this paper. A Ka-band solid-state power amplifier module is designed, fabricated, assembled and measured. Performances of the packages are evaluated and discussed in detail on the basis of a series of S-parameter simulations and measurements. By compare with other packaging conditions, an improved module isolation and a suppressed cavity resonance are observed from passive measured results. Active measured results indicate that the package does not interfere with output power of the amplifier.