Loading [MathJax]/jax/output/HTML-CSS/jax.js
Advanced Search

2023 Vol. 45, No. 5

Cover
2023, 45(5)
Abstract:
2023, 45(5): 1-4.
Abstract:
Special Topic on Graph Signal Processing
Typical Application of Graph Signal Processing in Hyperspectral Image Processing
LIU Na, LI Wei, TAO Ran
2023, 45(5): 1529-1540. doi: 10.11999/JEIT220887
Abstract:
HyperSpectral Image(HSI) has nanometer-level spectral discriminative ability, capturing the spectral and spatial information of the ground objects simultaneously, within the integration of three-dimensional image cube. The capability to finely sense ...
Semi-supervised SAR Ship Target Detection with Graph Attention Network
LÜ Jindong, WANG Tong, TANG Xiaobin
2023, 45(5): 1541-1549. doi: 10.11999/JEIT220139
Abstract:
Recently, ship target detection in Synthetic Aperture Radar (SAR) imagery based on deep learning has been widely developed. However, a large number of labeled samples are needed in traditionally supervised learning to train the network. Therefore, a ...
Semi-supervised Bearing Fault Diagnosis Using Improved Graph Attention Network under Time-varying Speeds
SHAO Haidong, YAN Shen, XIAO Yiming, LIU Yi
2023, 45(5): 1550-1558. doi: 10.11999/JEIT220303
Abstract:
Recent researches on semi-supervised bearing fault diagnosis based on Graph Neural Network (GNN) still have some problems, such as insufficient label information mining and relatively ideal diagnosis scenarios. In engineering practice, bearings are o...
A Novel Target Localization Method for Frequency Diverse Array Based on Graph Signal Processing
XIE Ningbo, OUYANG Shan, LIAO Kefei, WANG Haitao, JIANG Junzheng
2023, 45(5): 1559-1566. doi: 10.11999/JEIT220970
Abstract:
In most target localization applications, achieving high spatial resolution on angle and range is requested. Addressing this demand, a novel Graph Signal Processing (GSP) based target localization method for monostatic Frequency Diverse Array (FDA) i...
Small Target Detection Based on Frequency Domain Multichannel Graph Feature Perception on Sea Surface
XU Shuwen, JIAO Yinping, BAI Xiaohui, JIANG Junzheng
2023, 45(5): 1567-1574. doi: 10.11999/JEIT220188
Abstract:
The marine physical environment and electromagnetic environment are becoming increasingly complex, making the weak and slow small target detection in the sea clutter background be both emphasis and difficulty of radar target detection research. Due t...
Automatic Modulation Recognition Based on Single-channel Multi-scale Graph Neural Network
GUO Qiang, NIE Mengyun, QI Liangang, Kaliuzhnyi Mykola
2023, 45(5): 1575-1584. doi: 10.11999/JEIT220840
Abstract:
Considering the shortcomings of the Adaptive Visibility Graph (AVG) algorithm being too complex and the accuracy improvement is not significant, an Automatic Modulation Recognition(AMR) framework based on Single-channel Multi-scale Graph Neural Netwo...
Distributed Batch Reconstruction of Time-varying Graph Signals via Sobolev Smoothness on Cartesian Product Graph
ZHANG Yanhai, JIANG Junzheng
2023, 45(5): 1585-1592. doi: 10.11999/JEIT221194
Abstract:
For the reconstruction of large-scale network data, a Distributed Batch Reconstruction algorithm via Sobolev Smoothness on Cartesian product graph (DBR-SSC) is proposed, which is based on the Graph Signal Processing (GSP) theory. In the proposed algo...
A Universal Test Access Port Controller Circuit Design for Chiplet Testing
CAI Zhikuang, ZHOU Guopeng, SONG Jian, WANG Zixuan, GUO Yufeng
2023, 45(5): 1593-1601. doi: 10.11999/JEIT220854
Abstract:
In the post-Moore era, Chiplet is the most hottest integration technique for heterogeneous integrated circuit, which is characterized by complex multi-core stacked structures. In order to solve the post-bonding test problem of Chiplet in different st...
Radar, Electromagnetic Fields and Waves, Array Signal Processing
Detection of Small Targets on Sea Surface Based on 3-D Concave Hull Learning Algorithm
GUAN Jian, WU Xijie, DING Hao, LIU Ningbo, HUANG Yong, CAO Zheng, WEI Jiayu
2023, 45(5): 1602-1610. doi: 10.11999/JEIT220448
Abstract:
For radar maritime target detection method of feature class, the convex hull classification algorithm is usually used in existing three feature detectors to complete detection. It is found that the decision region generated by convex hull learning al...
Error Analysis and Processing Method of Non-stationary Airborne Fully Polarimetric SAR Quantitative Measurement
LIU Yabo, ZHOU Xiaojie, LU Min, YU Zhongjun
2023, 45(5): 1611-1618. doi: 10.11999/JEIT220475
Abstract:
Even though the internal and external SAR system calibration is very accurate, the accuracy of airborne fully polarimetric SAR measurement still changes to some extent under different flight conditions. In the condition of non-stationary and high fre...
Wireless Communication and Internet of Things
Digital Self-Interference Cancellation Based on Bounded Component Analysis for In-Band Full-Duplex
TANG Yanqun, MA Weifeng, CHU Jianjun, WEI Xizhang
2023, 45(5): 1619-1626. doi: 10.11999/JEIT220308
Abstract:
In-Band Full Duplex (IBFD) technique is expected to be the most potential scheme for modern wireless communication system, since it can prove the spectral efficiency. However, in the application process, it faces the great challenge of Self-Interfere...
A Multiple-downconversion Full-Duplex Transceiver Receiver Design for Phase Noise Suppression
QUAN Xin, LIU Ying, FAN Pingzhi, TANG Youxi
2023, 45(5): 1627-1634. doi: 10.11999/JEIT220464
Abstract:
Phase noise limits the cancellation capability of a Full-Duplex (FD) transceiver receiver and degrades the demodulation performance of the signal-of-interest, even for the transceiver receiver which deploy one common oscillator for its transmitter an...
Energy Consumption Optimization of Unmanned Aerial Vehicle Assisted Mobile Edge Computing Systems Based on Deep Reinforcement Learning
ZHANG Guangchi, HE Zinan, CUI Miao
2023, 45(5): 1635-1643. doi: 10.11999/JEIT220352
Abstract:
In recent years, the deployment of Unmanned Aerial Vehicles (UAVs) equipped with Mobile Edge Computing (MEC) servers to provide computing services for ground users has become an emerging method. Considering an UAV-assisted MEC system with multi-users...
UAV Trajectory Planning and Resource Joint Optimization Method Based on Content-aware
ZHU Xiaorong, ZHANG Wenjin, ZHAO Lingyu, LIU Xu, REN Wei
2023, 45(5): 1644-1650. doi: 10.11999/JEIT220761
Abstract:
In view of the surge in data traffic and the diversified needs of users in the future 6G network, using UAV to assist the cellular network can provide users with better services. This paper proposes a UAV trajectory planning and resource allocation j...
Collision Avoidance Algorithm for UAV Formation Reconfiguration under UV Non-uniform Virtual Potential Field
ZHAO Taifei, ZHANG Jianwei, RONG Kaixin, ZHANG Wen
2023, 45(5): 1651-1659. doi: 10.11999/JEIT220442
Abstract:
To address the path planning and inter-aircraft collision avoidance problems in Unmanned Aerial Vehicle (UAV) formation reconstruction in complex electromagnetic environment, the repulsion function is improved by using distance factor on the basis of...
A Hybrid Mapping Scheme to Improve Bit Error Rate Performance of Orthogonal Frequency Division Multiplexing with Index Modulation System
ZHU Yongjia, HE Yuyao, YAO Rugui, FAN Ye
2023, 45(5): 1660-1668. doi: 10.11999/JEIT220436
Abstract:
A hybrid mapping scheme is proposed in this paper to improve further the Bit Error Rate (BER) performance of Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM) system for high Signal-to-Noise Ratio (SNR). By taking advantage o...
Decentralized Group Key Management Scheme in Hierarchical Unmanned Aerial Vehicle Network
JIANG Qi, CAI Mingxin, CHENG Qingfeng, TIAN Youliang, MA Jianfeng
2023, 45(5): 1669-1677. doi: 10.11999/JEIT220347
Abstract:
To address the single point failure of group key management in the existing hierarchical Unmanned Aerial Vehicle (UAV) network, and the incapability of timely group key calculation and update caused by offline group members, a decentralized group key...
Cryption and Information Security
AccFed: Federated Learning Acceleration Based on Model Partitioning in Internet of Things
CAO Shaohua, CHEN Hui, CHEN Shu, ZHANG Hanqing, ZHANG Weishan
2023, 45(5): 1678-1687. doi: 10.11999/JEIT220240
Abstract:
With the rapid development of Internet of Things (IoT), the deep integration of Artificial Intelligence (AI) and Edge Computing (EC) has formed Edge AI. However, since IoT devices are computationally and communicationally constrained and these device...
Multiple Parameters Weighted-type FRactional Fourier Transform Secure Communication Method Based on Cosine Power-Activation Discrete Hyperchaotic Encryption
MENG Qingwei, WANG Xikang, QI Zisen, ZHANG Yue
2023, 45(5): 1688-1696. doi: 10.11999/JEIT220364
Abstract:
To improve the secure transmission performance of physical layer, a novel Multiple Parameters Weighted-type FRactional Fourier Transform (MP-WFRFT) secure communication method based on Two-Dimensional Cosine Power-Activation (2D-CPA) discrete hyperch...
Improved Particle Swarm Optimization Unmanned Aerial Vehicle-assisted Network Deployment Optimization Algorithm Based on Beetle Antennae Search
CHEN Jiamei, LI Shiang, LI Yufeng, WANG Yupeng, BIE Yuxia
2023, 45(5): 1697-1705. doi: 10.11999/JEIT220404
Abstract:
In the case of large gathering of users such as sports venues or sudden disasters, the ground base stations often face the problem of overloading or even paralysing. In this case, the multi-Unmanned Aerial Vehicle (UAV) auxiliary network system can p...
Cognitive Radio Multiple-Input Multiple-Output Wireless Secure Transmission with Reconfigurable Intelligent Surface
ZHANG Jun, XU Wenwan, HUANG Xiaojun
2023, 45(5): 1706-1713. doi: 10.11999/JEIT220466
Abstract:
A Reconfigurable Intelligent Surface (RIS)-assisted spectrum sharing Cognitive Radio (CR) Multiple-Input Multiple-Output (MIMO) wireless secure communication system is considered. In the case of eavesdropper, the secondary transmitter equippes with m...
Demodulation of Weighted Fractional Fourier Transform Encrypted Chaotic Direct Spread Signals over Multipath Fading Channels
YUAN Guogang, CHEN Zili, GAO Xijun
2023, 45(5): 1714-1721. doi: 10.11999/JEIT220426
Abstract:
To demodulate the Weighted FRactional Fourier Transform encrypted Chaotic Direct Sequence Spread Spectrum (WFRFT-CD3S) signal over multipath fading channels, a generalized channel differential demodulation algorithm is proposed. The transmitter of th...
Secure Computation of Two-party Multisets with Rational Numbers
WANG Weiqiong, XIE Qiong, XU Haojie, CUI Meng
2023, 45(5): 1722-1730. doi: 10.11999/JEIT220712
Abstract:
Secure Multiparty Computation (SMC) of sets has wide applications in joint data analysis, secure search over sensitive data, data security exchange. Based on geometric coding of rational numbers and the scalar product protocol, two secure computation...
A Construction Method of Quantum Error-correcting Codes over F2m
WANG Yu, KAI Xiaoshan, ZHU Shixin
2023, 45(5): 1731-1736. doi: 10.11999/JEIT221145
Abstract:
Constructing quantum codes with good parameters is an important part of quantum error-correcting codes research. In this paper, \begin{document}$ {2^m} $\end{document}-ary quantum codes are derived through Hermitian dual-containing constacyclic codes...
Image and Intelligent Information Processing
Multilevel Semantic Maps Based on Visual Simultaneous Localization and Mapping in Dynamic Scenarios
MEI Tiancan, QIN Yusheng, YANG Hong, GAO Zhi, LI Haoran
2023, 45(5): 1737-1746. doi: 10.11999/JEIT220153
Abstract:
To cope with the moving objects in dynamic environments and make the robots truly understand the surroundings, a visual Simultaneous Localization And Mapping (SLAM) system is proposed to estimate simultaneously trajectory and object-level dense 3D se...
Marine Boat Lights Detection Method Based on Sparse Representation for Low Light Remote Sensing Images During Night
XUE Chengcheng, GAO Caixia, HU Jian, QIU Shi, WANG Qi
2023, 45(5): 1747-1757. doi: 10.11999/JEIT220369
Abstract:
To address the problem of insufficient target feature mining in nighttime marine boat detection based on low light remote sensing images, a new sparsity index is designed to minimize the misclassification of boat lights samples and background noises ...
Multi-party Human-computer Interaction Dialogue Psychology Model Based on Stackelberg Game
HUANG Hongcheng, SU Meidan, KOU Lan, TAO Yang, HU Min
2023, 45(5): 1758-1765. doi: 10.11999/JEIT220441
Abstract:
Considering the problems of the existing in the process of multi-party human-computer interaction system, such as lack of propriety and low autonomy, a dialogue psychological model based on Stackelberg game is proposed in this paper. The multi-party ...
Efficient Photodetector Placement Using Linear Optimization Fuzzy C-Means and Artificial Neural Networks
SUN Kexue, QU Jiqing
2023, 45(5): 1766-1773. doi: 10.11999/JEIT220320
Abstract:
An efficient photodetector placement method using Linear Optimization Fuzzy C-Means (LOFCM) and Artificial Neural Networks (ANN) is proposed for the problem that the current photodetector placement method is computationally intensive, energy intensiv...
Segmentation Algorithm of Breast Tumor in Dynamic Contrast-Enhanced Magnetic Resonance Imaging Based on Network with Multi-scale Residuals and Dual-domain Attention
LIU Xia, LÜ Zhiwei, LI Bo, WANG Bo, WANG Di
2023, 45(5): 1774-1785. doi: 10.11999/JEIT220362
Abstract:
Considering the problems of breast tumor size and shape change, blurred boundary and severe class imbalance between foreground and background, a multi-scale residual dual-domain attention fusion network is proposed. In this network, multi-scale resid...
Deep Disease MicroRNA Association Prediction via Variational Gated Graph Autoencoders
GUO Yanbu, MA Huan, LI Chaoyang, ZHOU Dongming
2023, 45(5): 1786-1794. doi: 10.11999/JEIT220354
Abstract:
micro RiboNucleic Acid (miRNA) plays an important role in the process of gene expression and transcription, and is closely related to the production of diseases. Biological experimental methods for disease miRNA association prediction are costly and ...
Multi-resolution Fusion Input U-shaped Retinal Vessel Segmentation Algorithm
LIANG Liming, ZHAN Tao, LEI Kun, FENG Jun, TAN Lumin
2023, 45(5): 1795-1806. doi: 10.11999/JEIT220470
Abstract:
Considering the characteristics of irregular retinal blood vessel topology, complex morphology and diverse scale changes, a Multi-resolution Fusion Input U-Netword (MFIU-Net) is proposed to achieve accurate segmentation of retinal blood vessels. A ro...
C2 Transformer U-Net: A Medical Image Segmentation Model for Cross-modality and Contextual Semantics
ZHOU Tao, HOU Senbao, LU Huiling, LIU Yuncan, DANG Pei
2023, 45(5): 1807-1816. doi: 10.11999/JEIT220445
Abstract:
Cross-modal medical images can provide more semantic information at the same lesion. In view of the U-Net network uses mainly single-modal images for segmentation, the cross-modal and contextual semantic correlations are not fully considered. Therefo...
Biological Inspired Goal-oriented Navigation Model Based on Spatial Exploration and Construction of Cognitive Map
ZHOU Yang, WU Dewei, SONG Yi, DAI Chuanjin
2023, 45(5): 1817-1823. doi: 10.11999/JEIT220578
Abstract:
To realize the generation of the navigation knowledge and the running control driven by goal for the intelligent and autonomous vehicle, a biological inspired Goal-Oriented (GO) navigation model based on spatial exploration and construction of cognit...
A Fast Classification Method of Rolling Bearing State Under Different Loads Based on Improved Broad Model Transfer Learning
KANG Shouqiang, YANG Jiaxuan, WANG Yujing, WANG Qingyan, LIANG Xintao,
2023, 45(5): 1824-1832. doi: 10.11999/JEIT220401
Abstract:
For the training time of deep learning network is long, as well as larger distribution difference between source domain and target domain data of rolling bearings under different loads, a fast classification method of rolling bearing state based on i...
Crowded Pedestrian Detection Method Combining Anchor Free and Anchor Base Algorithm
XIE Minghong, KANG Bin, LI Huafeng, ZHANG Yafei
2023, 45(5): 1833-1841. doi: 10.11999/JEIT220444
Abstract:
Due to its relatively higher accuracy, the Anchor base algorithm has become a research hotspot for pedestrian detection in crowded scenes. However, the algorithm needs to design manually anchor boxes, which limits its generality. At the same time, a ...
Transferable Adversarial Example Generation Method For Face Verification
SUN Junmei, PAN Zhenxiong, LI Xiumei, YUAN Long, ZHANG Xin
2023, 45(5): 1842-1851. doi: 10.11999/JEIT220358
Abstract:
In the face verification task of the face recognition model, traditional adversarial attack methods can not quickly generate real and natural adversarial examples, and the adversarial examples generated for one model under the white-box setting perfo...
Circuit and System Design
Design of Quaternary Logic Current Mode CMOS Add-subtract Circuit Based on Comparator
YAO Maoqun, LIU Zhiqiang
2023, 45(5): 1852-1858. doi: 10.11999/JEIT220360
Abstract:
A multiple valued current mode comparator is introduced to control the threshold of current mode CMOS circuits. Compared with binary logic circuits, a single wire of multiple valued logic circuits allows more information transmission. Compared with v...
Overviews
A Survey of Multi-party Private Set Intersection
GAO Ying, WANG Wei
2023, 45(5): 1859-1872. doi: 10.11999/JEIT220664
Abstract:
With the rapid development of new technologies, such as the Internet and big data, more and more distributed data need to be processed by multiple parties. Therefore, privacy protection technology is facing greater challenges. Secure multi-party comp...
A Survey on User-centric Networks for 6G
SHI Jianfeng, YANG Zhaohui, HUANG Nuo, CHEN Xiao, ZHANG Yujie, CHEN Ming
2023, 45(5): 1873-1887. doi: 10.11999/JEIT220242
Abstract:
Compared with the Fifth Generation mobile network (5G), the Sixth Generation mobile network (6G) is expected to introduce new performance indicators and application scenarios. Global coverage, high spectrum/energy/cost efficiency, high level of intel...
Technology Developments and Applications of In-memory Computing Processors
GUO Xinjie, WANG Guangyao, WANG Shaodi
2023, 45(5): 1888-1898. doi: 10.11999/JEIT220420
Abstract:
Memory wall has become one of the key challenges in Von Neumann architecture, memory-centric computing architectures, such as In-Memory Computing (IMC) and Near-Memory Computing (NMC) are expected to break the Von-Neumann bottleneck, improving comput...
A Survey of Maintaining the Path Programmability in Software-Defined Wide Area Networks
GUO Zehua, DOU Songshi, QI Li, LAN Julong
2023, 45(5): 1899-1910. doi: 10.11999/JEIT220418
Abstract:
Software-Defined Networking (SDN) is the key technique of the next-generation network. Recently, SDN has become a hot spot in both academia and industry. Wide Area Network (WAN) is one of the primary application scenarios in the industry for SDN, whi...