Advanced Search

2021 Vol. 43, No. 1

contents
contents
2021, (1)
Abstract:
cover
cover
2021, 43(1)
Abstract:
Special Topic on Information Theory and Signal Processing for 6G
Survey of Optimization Design for Robust Data Link over Non-stationary Channels-chaotic Transmission Systems over Band-limited Environments
Meiyuan MIAO, Dan SONG, Weikai XU, Jia ZHAN, Lin WANG
2021, 43(1): 1-12. doi: 10.11999/JEIT200311
Abstract:
Recently 6G based on Internet of Things (IoT) is attracted much attention from research units, universities and industries. There are some important problems leaved for us to resolve. One of the most important problems is how to keep robust transmitting through band-limited non-stationary channels with low cost. In this overview, one low complexity, low power consumption modulation and demodulation transmitting technique, namely, Differential Chaos Shift Keying (DCSK) with its modified ways, is introduced in wireless and wired transmission environment. Their properties and advantages of the models under traditional and non-standard transmission environments are described and analyzed. Meanwhile some new coded M-ary Differential Chaos Shift Keying (MDCSK) schemes to enhance their quality of the system transmitting over band-limited transmission environments are provided, which are beneficial to improve the robust transmitting over networks with low power consumption and low cost, particularly, over non-stationary channels. The results show that the optimization work improves the system performance significantly. After that, the optimization and adaptive mechanics of the system parameters for the non-stationary channel characteristics will become a future research hotspot.
High Resolution Wireless Channel Simulation and Localization Technique for 6G Network
Yuanjie LI, Chao DONG, kai NIU
2021, 43(1): 13-20. doi: 10.11999/JEIT200348
Abstract:
In order to cope with the challenges brought by the fractional delay and synchronization error in 6G wireless channel of positioning systems, this paper proposes a high resolution channel simulation method based on frequency domain equivalent and a high resolution positioning technology exploiting Angle Of Arrival (AOA) information. The former achieves high resolution while reducing the high complexity brought by time domain method due to converting channel tap delays to frequency domain to process, providing solid foundation for accurate simulation of delay information in localization; the later achieves high positioning resolution under synchronization error by combining iterative channel estimation, AOA estimation algorithm based on first arrival path detection and position estimation algorithm with AOA information input. The numerical simulation results show that they both achieve optimized performance in corresponding practical scenarios.
A Distributed Decoding Algorithm for 6G Internet-of-Things Networks
Weijie YUAN, Shuangyang LI, Ruoxi CHONG, Baoming BAI, NG D W K
2021, 43(1): 21-27. doi: 10.11999/JEIT200343
Abstract:
With the standardization and the commercialization of 5G, the research on 6G technology is started. The Internet-of-Things (IoT) draws substantial interests in recent years due to its great potential for several applications in 6G wireless communication systems. As massive access and explosive data transmission are expected, the robustness and scalability are two key aspects for 6G IoT networks. In IoT networks, the said “things” (users) can collect environmental data in real time by adopting various multi-functional wireless sensors. Conventionally, the collected data are feedback to a central unit for further processing. However, the performance of this scheme relies on the normal operation of the central unit, which is not robust to the malfunction of central unit. This paper proposes a distributed decoding algorithm that the decoding is done at local users by enabling the cooperation and information exchange between users. As a result, each user achieves a decoding performance similar to that of the centralized approach which improves the robustness and the scalability of the network. Meanwhile, compared to the conventional distributed decoding approach, the proposed algorithm does not require that each user has the perfect knowledge of the network topology. Therefore, the proposed algorithm lays the foundation of 6G IoT networks.
Wireless Transmission Technology of Satellite-terrestrial Integration for 6G Mobile Communication
Changzhi XU, Yi JIN, Li LI, Xuejiao ZHANG, Tianjiao XIE, Xiaoyan WANG, Mingyu LI, Zhenxin CAO
2021, 43(1): 28-36. doi: 10.11999/JEIT200363
Abstract:
With the commercialization of 5G mobile communication networks, researches on the development vision, capability requirements and key technologies of the new generation mobile communication systems (6G) are becoming new hotspots. Firstly, the key technical fields are summarized that may be involved in the future 6G communication, including the deep satellite-terrestrial integration, the new spectrum communication, the distributed cooperative MIMO and intelligent communication. The Space-Ground Integration Network (SGIN) based on the deep satellite-terrestrial integration is discussed further. Secondly, for the two possible network topologies, the characteristics and technical requirements of the interstellar high-speed link, the satellite-terrestrial feeder links and the user links are analyzed. The progress of high-speed communication applied to three different types of transmission links is summarized. In the end, the key technologies which are urgently needed to break through in the SGIN are analyzed and prospected, such as the multiple-access based on optical phased array, the high-efficiency satellite-terrestrial laser communication and the optoelectronic hybrid networking, and the directions are pointed out for the subsequent related researches.
Reliable Multi Carrier Differential Chaos Shift Keying Receiver Based on Low Rank Approximation of Matrices Estimation
Lin ZHANG, Bingjun CHEN, Zhiqiang WU
2021, 43(1): 37-44. doi: 10.11999/JEIT200349
Abstract:
In Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) systems, after transmitted over wireless channels, the transmission errors in the reference chaotic signal will degrade the detection performances of the information-bearing signals at the receiver. In order to address this issue, in this paper, a Low Rank Approximation of Matrices (LRAM) aided MC-DCSK receiver is proposed based on the low rank characteristics of the information-bearing chaotic modulated signals sharing the same reference chaotic signal, with the aim to enhance the reliability performances. In the design, the received signal matrix is evaluated by the sum of a rank one matrix and a Gaussian noise matrix, and then the LRAM method is applied to derive the estimates of received signals to attain the optimal estimate of the reference chaotic sequence, which is subsequently used to recover the user data, thereby improving the reliability performances of MC-DCSK systems. Subsequently, the proposed LRAM detection is proved that is equivalent to the maximum likelihood estimation detection, then the theoretical security performances in terms of the information leakage is analyzed. The analysis shows that the security performances of the proposed system keep the same as those of the benchmark MC-DCSK systems. Simulation results demonstrate the superior Bit Error Rate (BER) performances of the proposed LRAM aided MC-DCSK systems over Additive White Gaussian Noise (AWGN) and multipath fading channels.
Edge Spreading Optimization for Terminated Protograph-based Low-Density Parity-Check Convolutional Codes
Shaohua HONG, Wenzhuo MA, Lin WANG
2021, 43(1): 45-50. doi: 10.11999/JEIT200350
Abstract:
Terminated Protograph-based Low-Density Parity-Check (LDPC) Convolutional Codes (Terminated P-LDPC-CCs), which combine the characteristics of Protograph-based LDPC (P-LDPC) codes and convolutional codes, have variable encoding constructed schemes, excellent error-correcting performance, and high-speed coding characteristics. As the key step of constructing Terminated P-LDPC-CCs, edge spreading is an important factor to determine the performance. In this paper, an edge spreading optimization method is proposed. In the proposed method, the differential evolution algorithm is introduced to search the best edge spreading mode based on the decoding threshold calculated by Protograph-based EXtrinsic Information Transfer (P-EXIT) analysis. Both P-EXIT analysis and simulation results indicate that the proposed edge spreading optimization method can achieve better performance.
Two Low-complexity Symbol Flipping Decoding Algorithms for Non-binary LDPC Codes
Haiqiang CHEN, Yaoling WANG, Wenjuan WEI, Bingxu JIANG, Youming SUN, Xiangcheng LI, Tuanfa QIN
2021, 43(1): 51-59. doi: 10.11999/JEIT191008
Abstract:
Two low-complexity symbol flipping decoding algorithms, the Improved weighted-Algorithm B algorithm (Iwtd-AlgB) and the Truncation-based Distance-Symbol-Flipping-Decoding with Prediction (TD-SFDP) algorithm, are presented for non-binary Low Density Parity Check (LDPC) codes. For the Iwtd-AlgB algorithm, the scaling factor of the flipping metric can be replaced by the simple sums of the extrinsic information and the distance-based parameter, which can avoid the multiplication operations in the iterations and thus can reduce the decoding complexity. For the presented TD-SFDP algorithm, the variable nodes and the finite field symbols are truncated and classified based on the extrinsic information frequency and the flipping function. Only those nodes/symbols that satisfy the designed conditions can be involved in the message updating process. Simulations and numeric results show that, the presented two decoding algorithms can reduce the computational complexity at each iteration with a controllable performance degradation, thus can make efficient trade-offs between performance and complexity.
A Candidate Waveform Scheme for High-Frequency Scenarios
Xiangyang DUAN, Yu XIN, Tong BAO, Jian HUA
2021, 43(1): 60-67. doi: 10.11999/JEIT200236
Abstract:
A candidate waveform scheme is designed to deal with the main problems in the high-frequency scenarios (>52.6 GHz) such as relatively large path loss, low efficiency of power amplifier and high phase noise. This candidate waveform scheme designs the enhanced fundamental symbol structure, the enhanced transmitter and the receiver structure, and tail sequence length variable schemes. Compared with the 5G waveform DFT-s-OFDM, the proposed candidate waveform scheme improves the spectrum efficiency. The simulation results show that the candidate waveform scheme has lower peak-to-average power ratio, better phase noise estimation and compensation effect, and lower out-of-band leakage.
Low-complexity Joint Channel Estimation and Decoding for LDPC Codes Via Sliding-Window Belief-Propagation over Non-stationary Channels
Yang YANG, Yong FANG, Bowei SHAN
2021, 43(1): 68-76. doi: 10.11999/JEIT200406
Abstract:
With the continuous increase of possible usage scenarios of mobile networks, non-stationary channels become more and more common transmission environments, and reliable transmission over non-stationary channels relies on accurate channel estimation. Based on the Sliding-Window Belief-Propagation (SWBP) algorithm used to cope with source parameter estimation and source correlation estimation, a Joint Channel Estimation and Decoding (JCED) algorithm for LDPC codes over non-stationary channels is proposed. Two fast algorithms to set adaptively the window size in each JCED iteration are also proposed based on cross entropy and Discrete Fourier Transform (DFT), respectively. Simulation results reveal that, without the aid of pilots, the performance of the proposed algorithm approaches that of Belief-Propagation (BP) decoding under ideal channel estimation, and has the advantages of high efficiency, low complexity, strong robustness and not incurring error-floor.
Low-complexity Early Stopping Criterion for Belief Propagation Decoding of Polar Codes
Xiaojun ZHANG, Na LI, Yanfei DONG, Jianming CUI, Hua GUO
2021, 43(1): 77-84. doi: 10.11999/JEIT200355
Abstract:
Considering the high decoding latency of polar code, an early stopping criterion for belief propagation is presented, which terminates the decoding by monitoring the convergence of codeword estimate \begin{document}$\hat x$\end{document}. In this paper, Gaussian approximation is used to analyze and select Q bit with low error probability to construct the comparison space. Because the number of bit to be compared is small and only XOR and OR operation is used, the computational complexity is low. Different from other criteria based on \begin{document}$\hat u$\end{document}, the proposed criterion does not lead to additional latency for it has been completed before calculating \begin{document}$\hat u$\end{document}. Simulation and FPGA Synthesis results show that compared with G-matrix, Worst Information Bit (WIB) and Frozen Bit Error Rate (FBER), this criterion can effectively save hardware resource.When the maximum iteration number is set to 40, compared with the G-matrix criterion, the average iteration time is increased by 29.98% at 3.5 dB, and the average iteration times are reduced by 39.44% and 27.67% respectively compared with the WIB and FBER schemes.
Construction of Low-rank Circulant Matrices and Their Associated Nonbinary LDPC Codes
Hengzhou XU, Hai ZHU, Dan FENG, Bo ZHANG, Manjie ZHOU
2021, 43(1): 85-91. doi: 10.11999/JEIT200351
Abstract:
In image processing, the redundant information of low-rank matrices can be used for image recovery and image feature extraction, and redundant rows of the parity-check matrices can accelerate the convergence rate in iterative decoding. A class of low-rank circulant matrices with easy hardware implementation is studied. Circulant matrices are first converted into position sets, the search space of position sets is pruned based on isomorphism theory, and then construction of circulant matrices is proposed based on the bit shift method. Considering the relationship between the column assignment of non-zero field elements and the matrix rank, circulant matrices whose Tanner graphs have no cycles of length 4 are chosen, and according to the column assignment of non-zero field elements, construction of nonbinary LDPC codes over various finite fields and with different code rates is presented. Numerical simulation results show that, compared with binary LDPC codes constructed based on the PEG algorithm, the proposed nonbinary LDPC codes have 0.9 dB gain at Word Error Rate (WER) of 10-5 when the modulation is BPSK, and the performance gap becomes large by combining with high order modulations. Furthermore, the performance gap of the proposed codes between 5 iterations and 50 iterations is negligible, and it provides a promising coding scheme for low-latency and high-reliability communications.
Wireless Communication and Internet of Things
Machine Learning Based Primary User Transmit Mode Classification for Spectrum Sensing in Cellular Cognitive Radio Network
Bin SHEN, Xin WANG, Siji CHEN, Taiping CUI
2021, 43(1): 92-100. doi: 10.11999/JEIT191012
Abstract:

In recent years, Machine Learning (ML) based spectrum sensing technology has provided a new solution in spectrum status identification for cognitive radio systems. Based on the large amount of spectrum observations captured by the Secondary User Equipment (SUE) in the Cellular Cognitive Radio Network (CCRN), this paper proposes a spectrum sensing scheme based on the Primary User (PU) transmission mode classification. Firstly, based on a variety of typical ML classification algorithms, the proposed scheme classifies the transmission mode of multiple Primary User Transmitters (PUTs) in the CCRN, and determines the joint operating state of all the PUTs in the CCRN. Subsequently, the SUE evaluates the possibility of accessing the licensed spectrum in the currently determined PUT transmission mode according to its geographical location or spectrum observation data. Since the actual locations of the PUTs in the network may be readily known in advance or unaware of at all, the proposed scheme solves the problem in three different methods. Theoretical derivation and experimental results show that compared with the traditional energy detection scheme, the proposed scheme not only remarkably improves the spectrum sensing performance, but also significantly increases the opportunities of dynamic accessing to the licensed spectrum for the SUEs. The proposed scheme can be used as an efficient and practical spectrum sensing solution in the CCRN.

Indoor Three-dimensional Positioning System Based on Visible Light Communication Using Improved Immune PSO Algorithm
Yong CHEN, Han ZHENG, Qixiang SHEN, Huanlin LIU
2021, 43(1): 101-107. doi: 10.11999/JEIT190936
Abstract:

For the problem that the three-dimensional positioning accuracy is not high and the positioning time is too long in indoor Visible Light Communication(VLC). An indoor visible light three-dimensional positioning system based on Improved IMmune Particle Swarm Optimization(IIMPSO) algorithm is proposed. By analyzing the indoor multipath effects, the fitter Field Of View (FOV) is selected to reduce the influence of the reflection. Meanwhile, the positioning model under the tilt state is improved. The Kalman filter algorithm is used to reduce the impact of environmental interference on the received power. On the basis, it is integrated with the improved immune particle swarm algorithm. Simulation results show the average positioning error of the indoor three-dimensional positioning system is 0.031 m, and the positioning time is 2.3 s in the indoor of 5 m × 5 m × 3 m. Compared with the existing three-dimensional positioning system, the positioning accuracy and convergence speed are significantly improved.

Channel’s Price-based Resource Allocation for Wireless Virtual Network: A Hierarchical Matching/ Stackelberg Game Approach
Juling ZENG, Chunlei ZHANG, Lisi JIANG, Ling XIA
2021, 43(1): 108-115. doi: 10.11999/JEIT191032
Abstract:

For the low iteration convergence rate and the disability to track the change of channels in hierarchical matching game, a new resource allocation strategy for wireless virtual networks, i.e., the channel’s price-based hierarchical matching/Stackelberg game is proposed in this paper. A three-level joint optimization model is established on each layer reward function based on stream’s bandwidth-based user’s satisfaction, the system’s bandwidth and the slice’s power. The hierarchical matching/Stackelberg game is adopted to solve the optimizing problem. In the lower layer of the hierarchical game, the

\begin{document}${m_n}$\end{document}

is defined to present Mobile Virtual Network Operator(MVNO) m-InPn and one-to-one matching game between it and UEs is constructed to displace the many-to-one matching game between UEs and MVNOs, where a price based on the global information of channels is given to speed up the identical convergence between the upper and the lower layer and make UEs select the optimal

adapting the channel. After proving the existing of equilibrium, the rejecting-receiving algorithm for one-to-one matching game is proposed. In the upper layer of the hierarchical game, a Stackelberg game between the InPs and many

is formed based on the connection between those users and

, and an optimized power pricing and allocation strategy based on local information of channel are given, which makes the optimal system utility and resource utilization based on channels. Finally, the process for the two-tier cycling is given and the stability of the hierarchical game is characterized. Simulation results show that the channel’s price-based hierarchical matching/Stackelberg game strategy outperforms the random pricing hierarchical matching/Stackelberg game and the conventional hierarchical matching game in the aspect of tracking channel’s changing and spectrum efficiency and system’s utility.

Research on Anti-interference Ability of Direct Sequence Spread Spectrum System
Zhendong LI, Weifeng TAN, Chengbin KANG, Jingshuang CHENG
2021, 43(1): 116-123. doi: 10.11999/JEIT191007
Abstract:

When designing a spread spectrum system, it is sometimes necessary to analyze the anti-interference ability of the system. However, the existing literature on the anti-wideband interference capability and the ability to resist partial frequency band interference of the Direct Sequence Spread Spectrum (DSSS) system are different, and the Bit Error Rate (BER) formulas provided are different, the general BER formula of direct sequence spread spectrum system under wideband interference and partial frequency band interference is given by theoretical derivation. The correctness of the formula is verified by computer simulation. Finally, the performance of the DSSS system with the interference frequency and the interference bandwidth is analyzed using the formula given in this paper.

Prediction of Passive Intermodulation Level Based on Chaos Method
Chunjiang BAI, Wanzhao CUI, Jun LI
2021, 43(1): 124-130. doi: 10.11999/JEIT190977
Abstract:

Passive InterModulation (PIM) products are spurious frequency signals which occur in microwave and radio frequency communication system. And it is noticed that PIM levels have the characteristic of changing with time. In order to find out the relationship between PIM level and time, as the typical microwave component which more often causes PIM in communication system, coaxial connector is chosen and analyzed using chaotic method. Firstly, the third order PIM level time series of coaxial connector is obtained by PIM measurement system. Based on the experimental data, the phase space is reconstructed and the optimal embedding dimension m and delay time τ are confirmed. Secondly, the largest Lyapunov exponent is calculated by the method named the small data sets with embedding dimension m and delay time τ. And from the qualitative and quantitative perspective, it is verified that the passive intermodulation level time series have the characteristic of chaos. Lastly, the prediction of PIM level with chaotic method is performed on the basis of the largest Lyapunov exponent. And the maximum error between the theoretical prediction value and the experimental value is 2.61% within the maximum predictable scale, indicating that the chaotic prediction is an effective way. The method that predicts the PIM level of microwave components in the communication system discussed in this paper provides a new way of studying the PIM mitigation technique for communication system and provides a new idea for improving the performance of the communication system.

Radar Signal Processing
A Coherent 3-D Imaging Method for Multi-circular SAR Based on an Improved 3-D Back Projection Algorithm
Dong HAN, Liangjiang ZHOU, Zekun JIAO, Yirong WU
2021, 43(1): 131-137. doi: 10.11999/JEIT190945
Abstract:

Circular SAR (CSAR) has the ability of 3-D imaging due to its special curve trajectory. Single-pass CSAR can theoretically obtain the resolution of the sub-wavelength level on the distance-azimuth plane, but its resolution at the elevation direction is very low. At the same time, CSAR 3-D imaging with Back Projection(BP) has high algorithm complexity and low imaging efficiency. A coherent 3-D imaging method for multi-circular SAR based on an improved 3-D back projection algorithm is proposed. For the problem of high time complexity of the imaging algorithm, an improved 3-D BP algorithm for CSAR based on constructing geometric interpolation kernel is proposed. 3-D interpolation operations are transformed into 1-D interpolation operations and distance vector searching operations. The final imaging result is obtained by coherently accumulating the improved 3-D BP results of multi-circular SAR. The proposed method solves effectively the problem of low elevation resolution of single-pass CSAR, improves 3-D imaging details, and reduces greatly the time of CSAR 3-D imaging simultaneously. The simulated 3-D imaging results of the conical target and GOTCHA data set from the US Air Force Laboratory verify the effectiveness of the proposed method.

A Robust Heterogeneous Clutter Suppression Method for Airborne Planar Array Radar
Hao XIAO, Tong WANG, Cai WEN, Cheng LIU
2021, 43(1): 138-144. doi: 10.11999/JEIT191051
Abstract:

Due to lack of enough Independent Identically Distributed (IID) training samples, it seriously degrades the clutter suppression performance of the traditional Space-Time Adaptive Processing (STAP) algorithms in heterogeneous clutter and target rich environment. To solve the problem, a heterogeneous clutter suppression method for the airborne plane array radar is proposed, which is robust to the array error. Firstly, the clutter representation basis matrix is constructed by the radar system parameters priori knowledge. Next, with the consideration of array error, it estimates iteratively the clutter representation coefficient and array error by the least square criterion. Finally, the clutter cancellation is conducted by the obtained optimal clutter representation coefficient and array error in element-pulse domain. The proposed method does not need to estimate the statistical properties of cell under test and has no aperture loss. In addition, it does not need any training sample and can suppress effectively the heterogeneous clutter of airborne planar array radar echo data in rich target environment even if range ambiguity exists. Simulation results verify the validity of the proposed method.

Frequency Domain 2.5D GPR Forward Modeling
Shikun DAI, Zhenchong OUYANG, Yinming ZHOU, Qianjiang ZHANG, Kun LI, Dongdong ZHAO, Qingrui CHEN, Jiaxuan LING
2021, 43(1): 145-153. doi: 10.11999/JEIT190988
Abstract:

Based on the governing equations satisfied by the electromagnetic method of the frequency domain, the finite element method is used to realize the forward simulation of 2.5-Dimensional a (2.5D) Ground Penetrating Radar (GPR) in the frequency domain. The law of the electromagnetic field spectrum in the wavenumber domain with the relative permittivity and the transmission and reception distance is analyzed in detail. The selection of the wave number in the 2.5D GPR forward modeling simulation is discussed. Based on the comparison of the computational efficiency of the Open MP parallel algorithm and the serial algorithm, the results show that the 2.5D GPR numerical simulation method in the frequency domain has the characteristics of high efficiency, high precision, and high parallelism. It provides important theoretical reference and technical support for radar forward modeling, and provides an important foundation for GPR full waveform inversion.

Image and Intelligent Information Processing
Image Blind Deblurring Algorithm Based on Deep Multi-level Wavelet Transform
Shuzhen CHEN, Shipeng CAO, Meiyue CUI, Qiusheng LIAN
2021, 43(1): 154-161. doi: 10.11999/JEIT190947
Abstract:

In recent years, convolutional neural networks are widely used in single image deblurring problems. The receptive field size and network depth of convolutional neural networks can affect the performance of image deblurring algorithms. In order to improve the performance of image deblurring algorithm by increasing the receptive field, an image blind deblurring algorithm based on deep multi-level wavelet transform is proposed. Embedding the wavelet transform into the encoder-decoder architecture enhances the sparsity of the image features while increasing the receptive field. In order to reconstruct high-quality images in the wavelet domain, the paper leverges to multi-scale dilated dense block to extract multi-scale information of images, and introduces feature fusion blocks to fuse adaptively features between encoder and decoder. In addition, due to the difference in representation of image information between the wavelet domain and the spatial domain, in order to fuse these different feature representations, the spatial domain reconstruction module is used to improve further the quality of the reconstructed image in the spatial domain. The experimental results show that the proposed method has better performance on Structural SIMilarity index (SSIM) and Peak Signal-to-Noise Ratio, and has better visual effects on real blurred images.

Deepfake Videos Detection Based on Image Segmentation with Deep Neural Networks
Yongjian HU, Yifei GAO, Beibei LIU, Guangjun LIAO
2021, 43(1): 162-170. doi: 10.11999/JEIT200077
Abstract:

With the rapid development of deep learning technology, videos with changed faces generated by deep neural networks (i.e., Deepfake videos) become more and more indistinguishable. As a result, the threat raised by Deepfake videos becomes greater and greater. In literature, there are some convolutional neural networks-based detection algorithms for fake face videos. Although those algorithms perform well when the training set and the testing set are from the same dataset, their performance could deteriorate dramatically in cross-dataset scenario where the training and the testing sets are from different sources. Motivated by the fabrication course of fake face videos, this article attempts to solve the problem of fake faces detection with the way of image splicing detection. A neural network borrowed from image segmentation is adopted for predicting  the tampered face area from which a tampering mask is obtained through denoising and thresholding the probability map. Using the prior knowledge of face tampering that the changing of face mainly happens in face region, a new way is proposed to determine the Face-Intersection over Union (Face-IoU) and to further improve the ratio calculation method. The Face-Intersection over Union with Penalty (Face-IoUP) is used as the classification criterion for deepfake video detection. The proposed method is impletmented using three basic image segmentation neural networks separately and is tested them on datasets of TIMIT, FaceForensics++, Fake Face in the Wild(FFW). Compared with current methods in literature, the HTER (Half Total Error Rate) in cross-dataset test decreases significantly while the detection accuracy in intra-dataset test keeps high. For the Deep Fake Detection(DFD) dataset with higher synthesis quality, the proposed method still performs very well. Experimental results validate the proposed method and demonstrate its good generality.

Fuzzy C-Means Clustering with Fast and Adaptive Non-local Spatial Constraint and Membership Linking for Noise Image Segmentation
Xiaopeng WANG, Qingsheng WANG, Jianjun JIAO, Jincheng LIANG
2021, 43(1): 171-178. doi: 10.11999/JEIT191016
Abstract:

Considering the problem of the low anti-noise performance when Fuzzy C-Means clustering (FCM) algorithm is applied to image segmentation, a FCM clustering algorithm with fast and adaptive non-local spatial constraint and membership linking is proposed in this paper. Firstly, in order to increase the computing speed of non-local spatial term, a fast method is proposed by modifying the loop based on all pixels in an image into a loop based on search window and by utilising spatial shift image and recursive Gaussian filter. Next, the squared difference between original image and non-local spatial term is calculated as adaptive weight of non-local information term. The squared difference is reciprocally transformed as adaptive weight of the original image. Finally, the membership linking is established to reduce the iteration steps before convergence by adding the square of the sum of all the membership degrees in every cluster in logarithmic form as the denominator of the objectvie function. Experiments on noisy artificial and natural images prove that this proposed algorithm has superior performance in terms of Segmentation accuracy, mean intersection over union, normalized mutual information, running time and iteration steps.

DenseNet-siamese Network with Global Context Feature Module for Object Tracking
Jianhao TAN, Wang YIN, Liming LIU, Yaonan WANG
2021, 43(1): 179-186. doi: 10.11999/JEIT190788
Abstract:

In recent years, the method of extracting depth features from siamese networks has become one of the hotspots in visual tracking because of its balanced in accuracy and speed. However, the traditional siamese network does not extract the deeper features of the target to maintain generalization performance, and most siamese architecture networks usually process one local neighborhood at a time, which makes the appearance model local and non-robust to appearance changes. In view of this problem, a densenet-siamese network with global context feature module for object tracking algorithm is proposed. This paper innovatively takes densenet network as the backbone of siamese network, adopts a new design scheme of dense feature reuse connection network, which reduces the parameters between layers while constructing deeper network, and enhances the generalization performance of the algorithm. In addition, in order to cope with the appearance changes in the process of object tracking, the Global Context feature Module (GC-Model) is embedded in the siamese network branches to improve the tracking accuracy. The experimental results on the VOT2017 and OTB50 datasets show that comparing with the current mainstream tracking algorithms, the Tracker has obvious advantages in tracking accuracy and robustness, and has good tracking effect in scale change, low resolution, occlusion and so on.

Flight Delay Propagation Prediction Model Based on CBAM-CondenseNet
Renbiao WU, Yaqian ZHAO, Jingyi QU, Aiguo GAO, Wenxiu CHEN
2021, 43(1): 187-195. doi: 10.11999/JEIT190794
Abstract:

For the problem of flight delay propagation caused by flight delay, a flight delay wave prediction model based on CBAM-CondenseNet is presented. Firstly, by analyzing the delays propagation in the aviation network caused by flight delays, the flight chain affected by the pre-order delays is determined; Secondly, the selected flight chain data is cleaned and the flight information and airport information are fused; Finally, an improved CBAM-CondenseNet algorithm is proposed to extract the number of fused flights. According to feature extraction, a Softmax classifier is constructed to predict the delays of the first departure flights and the subsequent flights. The CBAM-CondenseNet algorithm proposed in this paper combines the advantages of CondenseNet and CBAM, and uses channel and spatial attention mechanism to enhance the transmission of deep information in network structure. The experimental results show that the improved algorithm can effectively improve the network performance, and the prediction accuracy can reach 97.55%.

Multichannel MI-EEG Feature Decoding Based on Deep Learning
Jun YANG, Zhengmin MA, Tao SHEN, Zhuangfei CHEN, Yaolian SONG
2021, 43(1): 196-203. doi: 10.11999/JEIT190300
Abstract:

Regarding as the measure of the electrical fields produced by the active brain, ElectroEncephaloGraphy (EEG) is a brain mapping and neuroimaging technique widely used inside and outside of the clinical domain, which is also widely used in Brain–Computer Interfaces (BCI). However, low spatial resolution is regarded as the deficiency of EEG signified from researches, which can fortunately be made up by synthetic analysis of data from different channels. In order to efficiently obtain subspace features with discriminant characteristics from EEG channel information, a Multi-Channel Convolutional Neural Networks (MC-CNN) model is proposed for MI-EEG decoding. Firstly input data is pre-processed form selected multi-channel signals, then the time-spatial features are extracted using a novel 2D Convolutional Neural Networks (CNN). Finally, these features are transformed to discriminant sub-space of information with Auto-Encoder (AE) to guide the identification network. The experimental results show that the proposed multi-channel spatial feature extraction method has certain advantages in recognition performance and efficiency.

A Median Filtering Scheme for Quantum Images
Ya ZHAO, Jiahui GUO, Panchi LI
2021, 43(1): 204-211. doi: 10.11999/JEIT191038
Abstract:

Median filtering is the basic filtering method in classical image processing. However, the corresponding models are still rare in quantum image processing. To address the median filtering of quantum images, a new method based on quantum median calculation is proposed. The method uses an iterative comparison method to sort the target pixels to obtain a median value. Firstly, the quantum circuits of various basic modules needed to implement median filtering are introduced. Then the quantum implementation method of median calculation is presented in detail. Finally, the overall circuit frame of quantum image median filtering is given. The complexity analysis shows that the method has exponential acceleration for its classical counterpart. The simulation results on the classical computer verify the validity and feasibility of the proposed method.

Cryption and Information Security
Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
Yutao DU, Wansu BAO, Tan LI
2021, 43(1): 212-217. doi: 10.11999/JEIT190901
Abstract:

To solve the problem that Quantum Secret Sharing (QSS) protocol is difficult to resist inner-cheating attack, by utilizing the method of secret message authentication to present a general model of verifiable quantum secret sharing protocols, a new verification algorithm is proposed based on the two-particle transform of Bell states, and then a new verifiable quantum secret sharing protocol is proposed. Compared with the verification algorithms of the existing verifiable quantum secret sharing protocol, the new verification algorithm can not only resist effectively the typical attack strategies such as the inner-cheating attack, but also improves greatly the efficiency of the protocol, and has good scalability which can be combined with the existing quantum secret sharing protocols.

Verifiable Attribute-based Keyword Search Scheme with Privacy Preservation
Xueyan LIU, Tingting LU, Xiaotao YANG
2021, 43(1): 218-225. doi: 10.11999/JEIT190817
Abstract:

To address the problems of the leakage of access structure, high computation of user side and lack of integrity verification in current Attribute-Based Keyword Search (ABKS) scheme, a verifiable attribute-based keyword search scheme with privacy preservation is proposed. The scheme adopts the ordered multi-valued attribute access structure and ordered multi-valued attribute set, and fixes the position of each attribute to reduce the parameters and related computation cost and to improve the efficiency of the scheme, while in key generation, the Hash values of specific attributes are calculated to distinguish the different values of multi-valued attributes. At the same time, Hash and pair operation are used to hide the access structure and prevent the disclosure of the access structure. The inverted index structure and Merkle tree are used to establish the data authentication tree, which can verify the correctness of the document returned by the cloud server provider and the result of outsourced decryption. In addition, outsourced decryption is used to reduce the computation cost on the user side. Finally, formal proofs and experimental results show that the scheme achieve verifiability of shared data in the cloud, keyword undistinguishable and keyword unlinkable, and is efficient.

VCP4: Virtualization of the Programmable Data Plane for Security Protocol
Xianwei ZHU, Chaowen CHANG, Xi QIN, Zhibin ZUO
2021, 43(1): 226-233. doi: 10.11999/JEIT190720
Abstract:

With the development of network security technology, network security protocol emerges one by one, which requires functional support from network forwarding devices. Due to the independence of protocols, the programmable data plane enables rapid deployment of security protocols. However, the current programmable data plane has the problem that the header is parsed multiple times, the exclusive data plane and the cryptographic algorithm are difficult to implement. In view of the above problems, VCP4(Virtualization Cryptogram P4) as a virtualized programmable data plane for security protocols is proposed, which reduces the number of parsing times and improves the header parsing efficiency by introducing a description header. The control flow queue generator and the dynamic mapping table are used to achieve the virtualization of the programmable data plane, thereby realizing the isolation of the data plane under the multi-tenant and solving the problem of the exclusive data plane. A cryptographic algorithm primitive is added to the VCP4 language compiler to implement a cryptographic algorithm that can be reused. Finally, the VCP4 resource utilization, virtualization performance and security protocol performance are evaluated. The results show that the implementation of VCP4 brings less performance loss, and the code amount can be reduced by 50%.

Study on the Physical Unclonable Function of the Reliable Information Entropy Extracted by the Frequency Characteristic of Oscillating Ring
Ziwen SUN, Qiao YE
2021, 43(1): 234-241. doi: 10.11999/JEIT191013
Abstract:

Considering the problem of information entropy being low and easily disturbed by environmental factors in the traditional Physical Unclonable Function (PUF), a PUF scheme is designed to generate multiple stable information entropy. By analyzing the frequency data generated by the ring oscillator on the FPGA, the feature bits representing the characteristics of the ring are extracted from each ring as information entropy. By studying the temperature characteristics of the inverter, a new oscillating ring is formed by the current hungry inverter and the conventional inverter to reduce the influence of temperature on the reliability of the generated information entropy. Through Cadence IC simulation and experiments on zynq7000 series FPGA development platform, the results show that the improved PUF structure can generate more information entropy with the same number of oscillatory rings, and its reliability and uniqueness are improved.

Circuit and System Design
Time Domain Analysis Method for the Coupling Problem of Transmission Lines Terminated with Complex Circuits
Zhihong YE, Dan GOU, Xiaolin WU, Jianjian ZHOU
2021, 43(1): 242-248. doi: 10.11999/JEIT191026
Abstract:

An efficient time domain hybrid method is presented consisting of Finite-Difference Time-Domain (FDTD) method, Transmission Line (TL) equations, and Ngspice software to be well applied to the coupling analysis of transmission lines terminated with complex circuits excited by space electromagnetic fields. The significant features of this presented method are that it can realize the co-calculation of electromagnetic field radiation and transient responses on the lines and complex circuits, and avoid modeling the structures of transmission lines and circuits directly. Firstly, the complex circuits are replaced by the characteristic impedances of corresponding transmission lines, and then the FDTD method combined with TL equations is adopted to solve the incident currents on these impedances. Secondly, the incident currents are introduced into the complex circuits as excitation sources at each time step of FDTD simulation, which are combined with the circuits to form the netlist files. Finally, transient responses on the elements of circuits are obtained by using the Ngspice software. Numerical simulations are utilized to verify the correctness and efficiency of this hybrid method by comparing with the electromagnetic software CST in simulation results and consumptions of memories and computation time.

2021, 43(1): 249-254.
Abstract: