Advanced Search

2020 Vol. 42, No. 6

contents
contents
2020, 42(6): 1-4.
Abstract:
Special Topic on Biological Computer
DNA Data Storage
Xiuhai MAO, Fan LI, Xiaolei ZUO
2020, 42(6): 1303-1312. doi: 10.11999/JEIT190852
Abstract:
Molecular data storage has great potential as durable and high-density data-storage media, which will deal with the growing gap between produced information and the data storage ability. With storing data in molecular form, DNA can provide alternativ...
DNA Computing and DNA Nanotechnology
Junke WANG, Jue YIN, Renjie NIU, Shaokang REN, Jie CHAO
2020, 42(6): 1313-1325. doi: 10.11999/JEIT190826
Abstract:
With the arrival of the post-moore era, the development of traditional silicon-based computers has been on the verge of the limit, which pushes people to develop new computing technology to meet the needs of science and technology and life. Due to it...
DNA Storage and Its Research Progress
Peng XU, Gang FANG, Xiaolong SHI, Wenbin LIU
2020, 42(6): 1326-1331. doi: 10.11999/JEIT190863
Abstract:
DNA storage is a new kind of technique to store information by the biological molecules DNA. Compared with traditional electronic storage medium, DNA storage has the advantages such as massive storage capacity, high storage density and low energy con...
Basic Logic Gates Design Based on DNA and Restriction Endonuclease
Juan LIU, Wenbin XIE, Gaiying WANG, Minli TANG
2020, 42(6): 1332-1339. doi: 10.11999/JEIT190846
Abstract:
Due to the natural characteristics of specificity, high parallelism and miniaturization of DNA molecules, it exhibits strong parallel computing power and data storage capability in information processing. In this study, restriction endonuclease with ...
Drug Recommendation Based on Individual Specific Biomarkers
Wenbin LIU, Qian WU, Yugai DU, Gang FANG, Xiaolong SHI, Peng XU
2020, 42(6): 1340-1347. doi: 10.11999/JEIT190837
Abstract:
Drug recommendation research based on personalized markers can help to achieve personalized medicine and promote the development of precision medicine. In this paper, a method for calculating the weight of drugs on personalized markers is proposed, w...
Analysis of Breast Cancer Subtypes Prediction Based on Alternative Splicing Disorders
Peng XU, Bing WANG, Gang FANG, Xiaolong SHI, Wenbin LIU
2020, 42(6): 1348-1354. doi: 10.11999/JEIT190871
Abstract:
Alternative splicing is closely related to the occurrence and development of a variety of complex diseases, the emergence of various diseases including tumors is often accompanied by the occurrence of alternative splicing disorders. The existing anal...
NAND Gate Computational Model Based on the DNA Origami Template
Zhixiang YIN, Zhen TANG, Qiang ZHANG, Jianhong CUI, Jing YANG, Risheng WANG, Shouwei ZHAO, Juli ZHANG
2020, 42(6): 1355-1364. doi: 10.11999/JEIT190825
Abstract:
The essence of NAND gate is the superposition of AND gate and NOT gate. The AND gate operation is performed first, and then the NOT gate is performed. It is the basis of the DNA computer. In order to realize the computing of NAND gate, a NAND gate co...
A Multiobjective Evolution Strategy Algorithm for DNA Sequence Design
Kai ZHANG, Bin Chen, Zhiwei Xu
2020, 42(6): 1365-1373. doi: 10.11999/JEIT190869
Abstract:
It is important to design high-quality DNA sequences set, which can improve the reliability and efficiency of DNA computing. DNA sequence design problem is an multiobjective optimization problem that needs to satisfy multiple conflict objectives whic...
DNA Aptamer-based Fluorescence Biosensor
Yafei DONG, Wenxiao HU, Mengyao QIAN, Yue WANG
2020, 42(6): 1374-1382. doi: 10.11999/JEIT190860
Abstract:
In recent years, with the rapid development of DNA nanotechnology, fluorescence biosensors based on DNA as aptamer are studied and constructed by a large number of scholars in order to realize the sensitive and rapid detection of target materials. As...
Image Encryption Algorithm of Based on Variable Step Length Josephus Traversing and DNA Dynamic Coding
Ying NIU, Xuncai ZHANG
2020, 42(6): 1383-1391. doi: 10.11999/JEIT190849
Abstract:
The security of digital image transmission and storage has become a hotspot of information security research. An image encryption algorithm based on variable step length Josephus traversing and DNA dynamic coding is proposed. Firstly, through the tho...
Study on the Differential Analysis of Alternative Splicing Based on the Median Value Jensen-Shannon Divergence
Wenbin LIU, Bing WANG, Gang FANG, Xiaolong SHI, Peng XU
2020, 42(6): 1392-1400. doi: 10.11999/JEIT190941
Abstract:
Alternative splicing is an important mechanism of protein diversity in a wide range of organisms, which plays an important role in the fine regulation of cell proliferation, differentiation, development, apoptosis and a series of important biological...
Design of Three-cascade Combinatorial Molecular Logic Circuit Based on DNA Strand Displacement
Junwei SUN, Zhi LI, Yanfeng WANG
2020, 42(6): 1401-1409. doi: 10.11999/JEIT190847
Abstract:
The research content of DNA computing is various and complex. The construction of DNA complex logic circuit belongs to an important research branch of DNA computing, in which the construction of logic gate belongs to the basic research of DNA complex...
Logical Model Design and Controllability Verification Based on Graphene Oxide and Metal Ions
Luhui WANG, Yue WANG, Mengyao QIAN, Yafei DONG
2020, 42(6): 1410-1419. doi: 10.11999/JEIT190872
Abstract:
As a new subject born at the end of the 20th century, biological computing has become a hot spot of frontier scientific research. Similar to the electronic computer, the construction of biological computer needs a variety of molecular logic gates, an...
Prediction of Drug Synergy and Antagonism Based on Drug-Drug Interaction Network
Wenbin LIU, Jie CHEN, Gang FANG, Xiaolong SHI, Peng XU
2020, 42(6): 1420-1427. doi: 10.11999/JEIT190867
Abstract:
Accurately predicting the synergistic and antagonistic relationship of drugs is helpful to the safety of drug use and the development of drug combination. A method for predicting drug synergy and antagonistic is proposed, which based on the Drug-Drug...
Wireless Communication and Internet of Things
Dynamic Resource Allocation and Energy Management Algorithm for Hybrid Energy Supply in Heterogeneous Cloud Radio Access Networks
Qianbin CHEN, Qi TAN, Yannan WEI, Lanqin HE, Lun TANG
2020, 42(6): 1428-1435. doi: 10.11999/JEIT190499
Abstract:

Considering the dynamic resource allocation and energy management problem in the 5G Heterogeneous Cloud Radio Access Networks(H-CRANs) architecture for hybrid energy supply, a dynamic network resource allocation and energy management algorithm based ...

Error Correction of Lempel-Ziv-Welch Compressed Data
Gang WANG, Yanqing JIN, Hua PENG, Guangwei ZHANG
2020, 42(6): 1436-1443. doi: 10.11999/JEIT190520
Abstract:

Lossless data compression system is prone to bit error and causes error spread during communication transmission, which affects its application to file system and wireless communication. For the lossless data compression algorithm Lempel-Ziv-Welch (L...

The Mobility Management Strategies by Integrating Mobile Edge Computing and CDN in Vehicular Networks
Haibo ZHANG, Yan CHENG, Kaijian LIU, Xiaofan HE
2020, 42(6): 1444-1451. doi: 10.11999/JEIT190571
Abstract:

Due to the popularity of vehicle applications and the increase of the number of vehicles, the physical resources of roadside infrastructure are limited. When a large number of vehicles are connected to the vehicle networks, the energy consumption and...

Performance Prediction Based on Random Forest for the Stream Processing Checkpoint
Zheng CHU, Jiong YU
2020, 42(6): 1452-1459. doi: 10.11999/JEIT190552
Abstract:

Since real-time processing scenarios for ever-increasing amount and type of streaming data caused by the development of the Internet of Things (IoT) keep increasing, and strategies based on empirical knowledge for checkpoint configuration are deficie...

Online Anomaly Detection for Virtualized Network Slicing
Weili WANG, Qianbin CHEN, Lun TANG
2020, 42(6): 1460-1467. doi: 10.11999/JEIT190531
Abstract:

In virtualized network slicing scenario, one anomaly Physical Node (PN) or Physical Link (PL) in substrate networks will cause performance degradation of multiple network slices. For new measurements are achieved in each period, two online anomaly de...

Deep Reinforcement Learning-based Adaptive Wireless Resource Allocation Algorithm for Heterogeneous Cloud Wireless Access Network
Qianbin CHEN, Lingjin GUANG, Ziyu LI, Zhaokun WANG, Heng YANG, Lun TANG
2020, 42(6): 1468-1477. doi: 10.11999/JEIT190511
Abstract:

In order to meet the demand of the substantial increase of wireless data traffic, the resource optimization of the Heterogeneous Cloud Radio Access Network (H-CRAN) is still an important problem that needs to be solved urgently. In this paper, under ...

A Reliability-aware 5G Network Slice Reconfiguration and Embedding Algorithm
Guofan ZHAO, Lun TANG, Yanjuan HU, Peipei ZHAO, Qianbin CHEN
2020, 42(6): 1478-1485. doi: 10.11999/JEIT190500
Abstract:

Considering the problems of low resource utilization and poor reliability of traditional network slice embedding, a Reliability-aware Network Slice (NS) Reconfiguration and Embedding (RNSRE) strategy is proposed. Firstly, a utility function of reliab...

Pattern Recognition and Intelligent Information Processing
Occluded Pedestrian Detection Based on Joint Attention Mechanism of Channel-wise and Spatial Information
Yong CHEN, Xi LIU, Huanlin LIU
2020, 42(6): 1486-1493. doi: 10.11999/JEIT190606
Abstract:

Pedestrian detector performance is damaged because occlusion often leads to missed detection. In order to improve the detector's ability to detect pedestrian, a single-stage detector based on feature-guided attention mechanism is proposed. Firstly, a...

State View Based Efficient Hilbert Encoding and Decoding Algorithms
Lianyin JIA, Mingxian CHEN, Mengjuan LI, Jinguo YOU, Jiaman DING
2020, 42(6): 1494-1501. doi: 10.11999/JEIT190501
Abstract:

Hilbert curve is an important method for high-dimensional reduction to one-dimensional. It has good characteristics of spatial aggregation and spatial continuity and is widely used in geographic information system, spatial databases and information r...

Dynamic Programming of Emergency Evacuation Path Based on Dijkstra-ACO Hybrid Algorithm
Xianghong CAO, Xinyan LI, Xiaoge WEI, Sen LI, Mengxi HUANG, Donglu LI
2020, 42(6): 1502-1509. doi: 10.11999/JEIT190854
Abstract:

With an increasing diversity in modern architectural design, the inner structure of buildings is much more complex than before, which makes the traditional fire emergency escape indication system fail to provide people with real-time instructions bec...

Cryption and Information Security
A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks
Panpan LI, Zhengxia XIE, Zhigang ZHOU, Guangxue YUE, Shilian ZHENG, Xiaoniu YANG
2020, 42(6): 1510-1518. doi: 10.11999/JEIT190364
Abstract:

Source node location protection is critical to the Marine Wireless Sensor Networks (MWSNs), especially for unattended environment. However, due to most of the static deployment and the limitations in energy, storage and communication capabilities of ...

Differential Fault Attack on the Lightweight Block Cipher PUFFIN
Qingjun YUAN, Xuncheng ZHANG, Yang GAO, Yongjuan WANG
2020, 42(6): 1519-1525. doi: 10.11999/JEIT190506
Abstract:

The lightweight block cipher algorithm PUFFIN based on substitution-permutation network structure is widely used in resource-constrained hardware environments. Differential fault attack is a more effective attack method for hardware cryptographic alg...

A Connection-oriented Fast Multi-dimensional Packet Classification Algorithm
Bin ZHANG, Haoming WU
2020, 42(6): 1526-1533. doi: 10.11999/JEIT190434
Abstract:

In order to increase the classification speed of Aggregated Bit Vector (ABV) algorithm, an Improved Aggregated Bit Vector (IABV) algorithm is proposed, which is connection-oriented. Based on the characteristic that the packets which belong to the sam...

Shared Data Auditing Scheme for Efficient Revocation of Group Members via Multi-participation
Junfeng TIAN, Xuan JING
2020, 42(6): 1534-1541. doi: 10.11999/JEIT190468
Abstract:

In the view of the integrity verification problem of data sharing on the cloud platform, a Shared Data auditing scheme for efficient Revocation of group Members via multi-participation (SDRM) is proposed. First, through the Shamir secret sharing meth...

Radar System and Signal Processing
Joint Estimation Algorithm for Azimuth Velocity and Normal Velocity of Moving Targets in Airborne Multi-channel SAR
Wen JIANG, Jie NIU, Yirong WU, Xingdong LIANG
2020, 42(6): 1542-1548. doi: 10.11999/JEIT190672
Abstract:

Parameter estimation is essential for SAR imaging of moving targets. The existing algorithms mainly estimate the radial velocity and azimuth velocity of the moving target, but the normal velocity of the three-dimensional moving target can not be esti...

Modeling and Simulating of Microwave Humidity and Temperature Sounder Onboard the FY-3(D) Satellite
Yongqiang DUAN, Zhenzhan WANG, Shengwei ZHANG
2020, 42(6): 1549-1556. doi: 10.11999/JEIT190507
Abstract:

A simulation model of total power microwave radiometer is developed for the microwave humidity and temperature sounder onboard the FY-3 satellite. The key components such as mixer, low noise amplifier, local oscillator, filter and detector are parame...