Advanced Search

2023 Vol. 45, No. 1

Cover
Cover
2023, 45(1): -1-0.
Abstract:
Contents
Contents
2023, 45(1): .
Abstract:
Special Topic on Disruptive IC Technology in the Post Moore Era
A Survey on FPGA Electronic Design Automation Technology Based on Machine Learning
TIAN Chunsheng, CHEN Lei, WANG Yuan, WANG Shuo, ZHOU Jing, PANG Yongjiang, DU Zhong
2023, 45(1): 1-13. doi: 10.11999/JEIT220183
Abstract:
With the advent of the post-Moore era, Field Programmable Gate Array (FPGA) is widely used in various fields such as Internet of Things (IoTs), 5G communication, aerospace, weapons and equipment because of its flexible repetitive programmable charact...
Survey on Exact Logic Synthesis Based on Boolean SATisfiability
CHU Zhufei, PAN Hongyang
2023, 45(1): 14-23. doi: 10.11999/JEIT220391
Abstract:
Logic synthesis is a critical step in the Electronic Design Automation(EDA). Traditional global heuristic-based logic synthesis has many challenges as computing power keeps increasing and new computing paradigms emerge. There is a problem with heuris...
Multi-core Chip Dynamic Power Management Framework Based on Reinforcement Learning
ZHUO Cheng, ZENG Xudong, CHEN Yufei, SUN Songyu, LUO Guojie, HE Qing, YIN Xunzhao
2023, 45(1): 24-32. doi: 10.11999/JEIT220350
Abstract:
Multi-core chips can provide mighty computing capability for mobile intelligent terminals, but their performance is constraint by thermal and power issues. For this problem, this paper proposes a multi-core chip dynamic power management framework bas...
Design of Hybrid Multimode Convolutional Neural Network Accelerator for Electrocardiogram Detection
LIU Dongsheng, WEI Lai, ZOU Xuecheng, LU Jiahao, CHENG Xuan, HU Ang, LI Dejian, ZHAO Xu, JIANG Quming
2023, 45(1): 33-41. doi: 10.11999/JEIT220534
Abstract:
With the increasing scarcity of medical resources and the aging of the population, cardiovascular disease has posed a great threat to human health. Portable devices with ElectroCardioGram (ECG) detection can effectively reduce the threat of cardiovas...
Low-cost PUF Circuit Based on Sub-threshold Current Array
CUI Yijun, ZHANG Hu, YAN Chenggang, WANG Chenghua, LIU Weiqiang
2023, 45(1): 42-48. doi: 10.11999/JEIT211272
Abstract:
The Physical Unclonable Function (PUF) can extract the process error of the integrated circuit during the processing and convert it into a key for security authentication. It is often used in occasions where resources and power consumption are limite...
Side Channel Analysis Optimization Method Based on Data Preprocessing
ZHAO Yiqiang, WANG Qingya, MA Haocheng, ZHANG Qizhi, YE Mao, WANG Hanning, HE Jiaji
2023, 45(1): 49-58. doi: 10.11999/JEIT211462
Abstract:
The electromagnetic side channel information has the characteristics of complexity, disorder and low signal-to-noise ratio, which has a great impact on the results of side channel analysis. Based on the characteristics of electromagnetic data, in thi...
Linear Discriminant Analysis Algorithm for Detecting Hardware Trojans Delay
SONG Tai, HUANG Zhengfeng, XU Hui
2023, 45(1): 59-67. doi: 10.11999/JEIT220389
Abstract:
To solve the security problems of long chip production chain, poor security and low reliability, leading to prevent Hardware Trojan (HT) detection, an HT detection method based on bypass signal analysis is proposed, by means of Linear Discriminant An...
Research on Highly Portable Lightweight Physical Unclonable Functions Using Multiplexer Entropy Sources
YAO Liang, LIANG Huaguo, YANG Shihao, ZHANG Hong, LU Yingchun
2023, 45(1): 68-77. doi: 10.11999/JEIT221263
Abstract:
SR Latches Physical Unclonable Functions (PUFs) are the most popular FPGA-based cryptographic applications and have a broad market in lightweight IoT devices. To realize a symmetric unbiased SR latch PUF, different implementation methods that increas...
A Hybrid Granularity Parallel Arithmetical Unit for Stream Cipher
QU Tongzhou, DAI Zibin, CHEN Lin, LIU Yanjiang
2023, 45(1): 78-86. doi: 10.11999/JEIT211579
Abstract:
For stream cipher algorithms of different granularity, reconfigurable cryptographic processors have poor compatibility and low implementation performance. In this paper, the multi-level parallelism of stream cipher algorithms is analyzed and a pre-ex...
Design of High Precision Low Power Approximate Floating-point Multiplier Based on Partial Product Probability Analysis
YAN Chenggang, ZHAO Xuan, XU Chenyu, CHEN Ke, GE Jipeng, WANG Chenghua, LIU Weiqiang
2023, 45(1): 87-95. doi: 10.11999/JEIT211485
Abstract:
Floating-point multipliers are the key operational units in High Dynamic Range(HDR) image processing and wireless communication systems. Compared to the fixed-point multipliers, floating-point multipliers have a higher dynamic range and also higher c...
A Novel Logic-obfuscation Method to Resist Netlist-reverse Attack Based on Genetic Algorithm
ZHAO Yiqiang, KUAI Jun, MA Haocheng, ZHANG Qizhi, GAO Ya, YE Mao, HE Jiaji
2023, 45(1): 96-105. doi: 10.11999/JEIT220059
Abstract:
As the Integrated Circuit (IC) industry enters the post-Moore era, the cost of one-time chip design is getting higher and higher, and threats of reverse engineering to recover the original design increase continually. In order to resist the reverse a...
Design of Graph Convolutional Network Accelerator Based on Resistive Random Access Memory
LI Bing, WU Kangjun, WANG Jing, LI Sen, GAO Lan, ZHANG Weigong, NI Tianming
2023, 45(1): 106-115. doi: 10.11999/JEIT211435
Abstract:
Graph Convolutional Networks (GCNs) have superior performance in tasks such as social networking, ecommerce, molecular structure reasoning relative to traditional artificial intelligence algorithms, and have gained intensive attention in recent years...
An Analog Neuron Circuit for Spiking Convolutional Neural Networks Based on Flash Array
GU Xiaofeng, LIU Yanhang, YU Zhiguo, ZHONG Xiaoyu, CHEN Xuan, SUN Yi, PAN Hongbing
2023, 45(1): 116-124. doi: 10.11999/JEIT211249
Abstract:
In this paper, an Integrate-and-Fire (IF) analog readout neuron circuit is proposed for Spiking Convolutional Neural Network (SCNN) based on flash array. The circuit realizes the following functions: bit line voltage clamping, current readout, curren...
Circuit and Sensor Design
A List Scheduling Algorithm for Heterogeneous Computing Systems Using Improved Predict Cost Matrix for Task Prioritizing
YAO Yu, SONG Yukun, YANG Guowei, HUANG Ying, ZHANG Duoli
2023, 45(1): 125-133. doi: 10.11999/JEIT211150
Abstract:
The improvement of application efficiency of heterogeneous computing systems is highly dependent on effective scheduling algorithms. A new list scheduling algorithm called Improved Predict Priority and Optimistic processor Selection Scheduling (IPPOS...
Discussion on Improving the Third Order Intersection Point of Radio Frequency Low Noise Amplifier
ZHAO Jinxiang, WANG Feng, YU Hanchao, WANG Kuisong, ZHANG Shengli, LIANG Xiaoxin, YAN Yuepeng
2023, 45(1): 134-149. doi: 10.11999/JEIT211164
Abstract:
With the progress of modern communication technology, especially the rapid development of 4G, 5G and other wireless mobile communications, modulation methods with high spectrum efficiency such as multi-Quadrature Amplitude Modulation (QAM) have been ...
Research on MEMS Electric Field Sensor with Low Driving Voltage Based on Lead Zirconate Titanate
LEI Hucheng, XIA Shanhong, PENG Chunrong, WU Zhengwei, ZHANG Zhouwei, LIU Jun, PENG Simin, LIU Xiangming, GAO Yahao
2023, 45(1): 150-157. doi: 10.11999/JEIT211144
Abstract:
A Micro-Electro-Mechanical System (MEMS) electric field sensor with low driving voltage based on Lead Zirconate Titanate (PZT) is proposed. Based on the charge-induction principle, the sensitive units are composed of fixed electrodes and movable elec...
Antenna and Array Signal Processing
Research on the Design Method of UHF Antenna under the Condition of Changing Tag Distribution Density
ZUO Lei, CAO Xuebing, ZHU Liangshuai, DING Yuqing, SUN Mengting
2023, 45(1): 158-167. doi: 10.11999/JEIT211281
Abstract:
In view of the problem that the change of the density of the label distribution will lead to the change of the impedance matching relationship between the antenna and the load, and then affect the system performance. Based on the theory of electromag...
Gap Waveguide Technology and its Space Applications
CHEN Xiang, SUN Dongquan, CUI Wanzhao
2023, 45(1): 168-180. doi: 10.11999/JEIT211291
Abstract:
Gap Waveguide (GW) is a new kind of artificial ElectroMagnetic (EM) material based on contactless Electromagnetic Band Gap(EBG) structure. The unique contactless structure and wide EM forbidden band of GW show great advantages and flexibility in deve...
Beamforming Research for Near-field Linear Sparse Array Based on Unmanned Aerial Vehicle Swarm
ZHANG Yinan, WANG Guangxue, PENG Shirui, LENG Yi
2023, 45(1): 181-190. doi: 10.11999/JEIT211452
Abstract:
The antenna array composed of UAVs (Unmanned Aerial Vehicle Swarm) often presents near-field and sparse characteristics, which can not be adapted by the classical beamforming theory. Therefore, the near-field uniform linear array signal model is firs...
Sensor Control Based on Multiple Feature Optimization in Multiple Extended Targets Tracking
CHEN Hui, WEI Fengqi, HAN Chongzhao
2023, 45(1): 191-199. doi: 10.11999/JEIT211244
Abstract:
Focusing on the optimal tracking problem of multiple extended targets, a sensor control method is proposed, which can comprehensively optimize the tracking performance of multiple extended targets in the framework of FInite Set STatistics (FISST). Fi...
Design of Antenna Structure and Analysis of Beam Split Effect in Ultra-BandWidth Terahertz Communications
HAO Wanming, YOU Xiaobei, SUN Gangcan, ZHU Zhengyu
2023, 45(1): 200-207. doi: 10.11999/JEIT211290
Abstract:
To overcome the beam split effect in ultra-bandwidth terahertz communications, the True Time Delay (TTD)-based large array antenna structures have been designed, while the power consumption and the hardware complexity both are high. To solve this pro...
Wireless Communication and Internet of Things
Massive MIMO Signal Detection Based on Interference Cancellation Assisted Sparsely Connected Neural Network
SHEN Bin, YANG Jian, ZENG Xiangzhi, CUI Taiping
2023, 45(1): 208-217. doi: 10.11999/JEIT211276
Abstract:
In recent years, deep learning has become one of the key technologies in the field of wireless communication. In a series of MIMO signal detection algorithms based on deep learning, most of them do not fully consider the interference cancellation pro...
Video Request Prediction and Cooperative Caching Strategy Based on Federated Learning in Mobile Edge Computing
LI Guanghui, LI Yijing, HU Shihong
2023, 45(1): 218-226. doi: 10.11999/JEIT211287
Abstract:
With the rise of Internet social platforms and the popularization of mobile smart terminal devices, people's demand for high-quality and real-time data has risen sharply, especially for video services such as short videos and live streams. At the sam...
Research on Efficient Federated Learning Communication Mechanism Based on Adaptive Gradient Compression
TANG Lun, WANG Zhiping, PU Hao, WU Zhuang, CHEN Qianbin
2023, 45(1): 227-234. doi: 10.11999/JEIT211262
Abstract:
Considering the non-negligible communication cost problem caused by redundant gradient interactive communication between a large number of device nodes in the Federated Learning(FL) process in the Internet of Things (IoTs) scenario, gradient communic...
Research on Resource Allocation Algorithm Based on Service Heterogeneity in V2V Communication in C-V2X
LI Yibing, WANG Ningxin, LÜ Wei
2023, 45(1): 235-242. doi: 10.11999/JEIT211160
Abstract:
In a cellular network scenario that supports direct Vehicle-to-Vehicle(V2V) communication, the resource allocation problem of the uplink of multiple Vehicle-to-Infrastructure (V2I) in a dense environment is used. Under the interference of V2V, the sl...
Robust Secure Resource Allocation Algorithm for Heterogeneous Networks with Hardware Impairments
XU Yongjun, CAO Qi, WAN Yangliang, ZHOU Jihua, ZHAO Tao, CHEN Qianbin
2023, 45(1): 243-253. doi: 10.11999/JEIT211123
Abstract:
To solve the problems of signal distortion at the transceivers, information leakage and transmission interruption of users in multi-cell multi-user heterogeneous networks, a robust secure resource allocation algorithm is proposed with distortion nois...
Research on Distributed Offloading Scheme Based on Energy Harvesting in Mobile Ad Hoc Cloud
XIAN Yongju, GUO Chenrong, XIA Shichao, LI Yun
2023, 45(1): 254-261. doi: 10.11999/JEIT211165
Abstract:
Driven by the rapid development of the Internet of Things, mobile Ad Hoc cloud computing and Energy Harvesting (EH) technologies meet the needs of data processing by sharing the idle resources of adjacent devices, and realize green communication. How...
Service Function Chain Anomaly Detection Based on Distributed Generative Adversarial Network in Network Slicing Scenario
TANG Lun, WANG Kai, ZHANG Yue, ZHOU Xinlong, CHEN Qianbin
2023, 45(1): 262-271. doi: 10.11999/JEIT211261
Abstract:
For the problem of Service Function Chain (SFC) anomalies due to hardware and software anomalies in network slicing scenarios, a Distributed Generative Adversarial Network (GAN)-based Time Series anomaly detection model (DTSGAN) is proposed. First, t...
Endogenous Security Mechanism of Vehicle Network Based on Dynamic Heterogeneous Redundancy
WANG Peng, ZHAI Bokun, LI Yufeng, ZHENG Qiusheng
2023, 45(1): 272-281. doi: 10.11999/JEIT211294
Abstract:
To address the problem that in-vehicle cyber communication messages are easily captured, an Endogenous Security Mechanism for in-Vehicle Networks (ESM-VN) based on Dynamic Heterogeneous Redundancy (DHR) architecture is proposed. Firstly, the model of...
Image and Intelligent Information Processing
Moving Ship Detection Method Based on Multi-scale Dual-neighborhood Saliency for GF-4 Satellite Remote Sensing Images
YU Wei, YOU Hongjian, HU Yuxin, LIU Rui
2023, 45(1): 282-290. doi: 10.11999/JEIT211107
Abstract:
The GEostationary Orbit(GEO) GF-4 satellite has the ability to observe continuously moving ships at sea. Ship targets are often weak in the optical remote sensing images of GF-4 satellite, making it difficult to detect directly. By analyzing the wake...
Method for High Dynamic Range Imaging Based on Deep Guided and Self-learning
ZHANG Junchao, YANG Feifan, SHI Wei, CHEN Jianlai, ZHAO Dangjun, YANG Degui
2023, 45(1): 291-299. doi: 10.11999/JEIT211188
Abstract:
Multi-exposure image fusion aims to fuse a series of images with different exposures for the same scene, and it is the main-stream method for high dynamic range imaging. To obtain more realistic results, a Multi-Exposure image Fusion Network(MEF-Net)...
Adaptive Video Frame Type Decision Algorithm Based on Local Luminance Histogram
LIU Pengyu, ZHANG Yue, JIA Kebin, DUAN Kun, LIU Chang, SUN Xuan, CUI Tenghe
2023, 45(1): 300-307. doi: 10.11999/JEIT211199
Abstract:
The video frame type decision is one of the key factors affecting the efficiency of video coding. This paper proposes an adaptive video frame type decision algorithm based on local luminance histogram to improve the x265 encoding performance. Firstly...
Specific Emitter Identification Based on Continuous Learning and Joint Feature Extraction
ZHANG Limin, TAN Kaiwen, YAN Wenjun, ZHANG Tingting, TANG Miao
2023, 45(1): 308-316. doi: 10.11999/JEIT211176
Abstract:
Considering the problem of low recognition accuracy of Specific Emitter Identification (SEI) and high cost of single training, an SEI scheme based on incremental learning is proposed in this paper, multiple Continuous Incremental Deep Extreme Learnin...
A Gene Feature Extraction Method Based on Across-view Similarity Order Preserving
SU Shuzhi, ZHANG Kaiyu, WANG Ziying, ZHANG Maoyan
2023, 45(1): 317-324. doi: 10.11999/JEIT211126
Abstract:
Gene expression data is usually characterized by high dimension, few samples and uneven classification distribution. How to extract the effective features of gene expression data is a critical problem of gene classification. With the help of correlat...
Multi-scale Cross-Modality Person Re-identification Method Based on Shared Subspace Features
WANG Fengsui, YAN Tao, LIU Furong, QIAN Yaping, XU Yue
2023, 45(1): 325-334. doi: 10.11999/JEIT211212
Abstract:
Cross-modal person Re-IDentification (Re-ID) is a challenging problem for intelligent surveillance systems, and existing cross-modal research approaches are mainly based on global or local learning representation of differentiated modal shared featur...
Occluded Object Segmentation Based on Bilayer Decoupling Strategy and Attention Mechanism
LÜ Yue, ZHOU Zhequan, LÜ Shujing
2023, 45(1): 335-343. doi: 10.11999/JEIT211288
Abstract:
Occluded object segmentation is a difficult problem in instance segmentation, but it has great practical value in many industrial applications such as stacked parcel segmentation on logistics automatic sorting. In this paper, an occluded object segme...
Cryption and Information Security
Related-Tweak Multiple Impossible Differential Attack for TweAES
JIANG Zilong, JIN Chenhui
2023, 45(1): 344-352. doi: 10.11999/JEIT211147
Abstract:
TweAES is one of the second-round candidates in the NIST Lightweight Cryptography Standardization competition. The related-tweak multiple impossible differentials attack of 8-round TweAES is presented. Firstly, two types of impossible differential di...
A Method for Constructing Ternary Linear Complementary Dual Codes
HUANG Shan, ZHU Shixin, LI Jin
2023, 45(1): 353-360. doi: 10.11999/JEIT211235
Abstract:
Linear Complementary Dual (LCD) codes have important applications to resisting side-channel analysis and fault-injection attacks. A method is proposed to construct ternary LCD codes by using linear codes over ring \begin{document}$ {\mathbb{F}_3} + u...
Overviews
A Review of Atom Recognition Strategies for Greedy Class Reconstruction Algorithms Based on Compressed Sensing
LIU Sujuan, CUI Chengkai, ZHENG Lili, JIANG Shuyang
2023, 45(1): 361-370. doi: 10.11999/JEIT211297
Abstract:
Among the Compressed Sensing(CS) reconstruction algorithms, greedy algorithm has been widely studied for its simple hardware implementation and excellent recovery accuracy. However, the diversity of algorithms also presents the problem of difficult a...
A Survey for Cloud Application Programming Interface Security: Threats and Protection
CHEN Zhen, QI Wenchao, HE Pengfei, LIU Linlin, SHEN Limin
2023, 45(1): 371-382. doi: 10.11999/JEIT211185
Abstract:
In the cloud era, cloud Application Programming Interface (API) is the best carrier for service delivery, capability replication and data output. However, cloud API increases the exposure and attack surface of cloud application while opening up servi...