通知公告
访问统计

总访问量

今日访问

在线人数

阅读排行

    一年内发表的文章 |  两年内 |  三年内 |  全部
    Please wait a minute...
    选择: 显示/隐藏图片
    1.
    Behavioral finance between the spot and futures markets based on multilayer network
    张思聪, 戴建卓, 黄文静, 糜欣平
    中国邮电高校学报(英文版)    2023, 30 (6): 82-88.   DOI: 10.19682/j.cnki.1005-8885.2023.1013
    摘要784)      PDF(pc) (3117KB)(51)    收藏
    In order to study the financial behavior of investors in the spot market, the transmission process of futures prices to spot prices is analyzed. Firstly, a coarse-graining method is proposed to construct a dual-layer coupled complex network of spot price and futures price. Then, to characterize the financial behavior of investors in the spot market, a price coupling strength indicator is introduced to capture investors' overreaction and underreaction behavior. The simulation results show that, despite the focus of researchers on arbitrage opportunities between futures and spot markets, investors in the spot market will not overreact or delay when the acceptance level of price fluctuations remains unchanged. On the contrary, when the stable coefficient of the price difference between the futures and spot markets remains unchanged, investors undergo a nonlinear process of overreaction followed by underreaction as their acceptance level of price fluctuations increases.
    相关文章 | 多维度评价
    2. Stability and Hopf bifurcation analysis in DCTCP congestion control
    程尊水, 姜景娜, 孙东晟
    中国邮电高校学报(英文版)    2023, 30 (6): 30-37.   DOI: 10.19682/j.cnki.1005-8885.2023.1015
    摘要607)      PDF(pc) (3657KB)(59)    收藏
    Traditional loss-based transports cannot meet the strict requirements of low latency and high throughput in data center networks (DCNs). Thus data center transmission control protocol (DCTCP) is proposed to better manage the congestion control in DCNs. To provide insight into improving the stability of the DCN, this paper focuses on the Hopf bifurcation analysis of a fluid model of DCTCP, and investigates the stability of the network. The round-trip time (RTT), being an effective congestion signal, is selected as the bifurcation parameter. And the network turns unstable and generates periodic solutions when the parameter is larger than the given critical value, which is given by explicit algorithms. The analytical results reveal the existence of Hopf bifurcation. Numerical simulations are performed to make a comparative analysis between the fluid model and the simplified model of DCTCP. The influence of other parameters on the DCN stability is also discussed.
    相关文章 | 多维度评价
    3.
    Dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems under directed weighted topology
    吴岳, 陈向勇, 邱建龙, 胡顺伟, 赵峰
    中国邮电高校学报(英文版)    2023, 30 (6): 3-10.   DOI: 10.19682/j.cnki.1005-8885.2023.1019
    摘要593)      PDF(pc) (1536KB)(194)    收藏
    This paper studies the dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems (MASs) under directed weighted graph containing a directed spanning tree, and also considers the effects of disturbances and leader of non-zero control inputs in the system. Firstly, a novel distributed control protocol is designed for uncertain disturbances and leader of non-zero control inputs in MASs. Secondly, a novel dynamic event-triggered control ( DETC) strategy is proposed, which eliminates the need for continuous communication between agents and reduces communication resources between agents. By introducing dynamic thresholds, the complexity of excluding Zeno behavior within the system is reduced. Finally, the effectiveness of the proposed theory is validated through numerical simulation.
    相关文章 | 多维度评价
    4.
    RB-SLAM: visual SLAM based on rotated BEBLID feature point description
    Fan Xinyue, Wu Kai, Chen Shuai
    中国邮电高校学报(英文版)    2023, 30 (3): 1-13.   DOI: 10.19682/j.cnki.1005-8885.2023.1002
    摘要581)      收藏
    The extraction and description of image features are very important for visual simultaneous localization and mapping (V-SLAM). A rotated boosted efficient binary local image descriptor ( BEBLID) SLAM ( RB-SLAM) algorithm based on improved oriented fast and rotated brief (ORB) feature description is proposed in this paper, which can solve the problems of low localization accuracy and time efficiency of the current ORB-SLAM3 algorithm. Firstly, it uses the BEBLID to replace the feature point description algorithm of the original ORB to enhance the expressiveness and description efficiency of the image. Secondly, it adds rotational invariance to the BEBLID using the orientation information of the feature points. It also selects the rotationally stable bits in the BEBLID to further enhance the rotational invariance of the BEBLID. Finally, it retrains the binary visual dictionary based on the BEBLID to reduce the cumulative error of V-SLAM and improve the loading speed of the visual dictionary. Experiments show that the dictionary loading efficiency is improved by more than 10 times. The RB-SLAM algorithm improves the trajectory accuracy by 24.75% on the TUM dataset and 26.25% on the EuRoC dataset compared to the ORB-SLAM3 algorithm.
    参考文献 | 相关文章 | 多维度评价
    5.
    Linear-quadratic optimal control for time-varying descriptor systems via space decompositions
    吕鹏超, 黄俊杰, 刘波
    中国邮电高校学报(英文版)    2023, 30 (6): 38-48.   DOI: 10.19682/j.cnki.1005-8885.2023.1011
    摘要571)      PDF(pc) (1663KB)(56)    收藏
    This paper aims at solving the linear-quadratic optimal control problems ( LQOCP) for time-varying descriptor systems in a real Hilbert space. By using the Moore-Penrose inverse theory and space decomposition technique, the descriptor system can be rewritten as a new differential-algebraic equation (DAE), and then some novel sufficient conditions for the solvability of LQOCP are obtained. Especially, the methods proposed in this work are simpler and easier to verify and compute, and can solve LQOCP without the range inclusion condition. In addition, some numerical examples are shown to verify the results obtained.
    相关文章 | 多维度评价
    6. Mainlobe interference suppression and beam pattern optimization methods
    杜晓娟 田斌
    中国邮电高校学报(英文版)    2023, 30 (2): 1-7.   DOI: 10.19682/j.cnki.1005-8885.2022.0024
    摘要555)      PDF(pc) (1575KB)(20)    收藏
    When the power of the mainlobe interference received by the receiver is at the same level as the power of the sidelobe interference power, the traditional eigen-projection interference suppression method has the problems of severe beam deformation and peak shift. Aiming at these problems, a beam pattern optimization method (BPOM) was proposed, which can suppress the interference well even when the mainlobe interference power is approximately equal to the sidelobe interference power. In the method, the mainlobe interference eigenvectors are firstly determined according to the correlation criterion. Then through the eigenvalue comparison, the sidelobe interference eigenvectors whose eigenvalues are approximately equal to the mainlobe interference eigenvalues are judged. After that, a projection matrix is constructed to filter out the mainlobe and sidelobe interference. Finally, the covariance matrix is reconstructed and the weight vector for beamforming is obtained. Simulation shows that BPOM has a better output performance than the existing algorithms in case that the power of the mainlobe interference is close to that of the sidelobe interference.

    参考文献 | 相关文章 | 多维度评价
    7.
    Node interdependent percolation of multiplex hypergraph with weak interdependence
    张俊杰, 刘彩霞, 刘树新, 臧韦菲, 李倩
    中国邮电高校学报(英文版)    2023, 30 (6): 49-59.   DOI: 10.19682/j.cnki.1005-8885.2023.1016
    摘要546)      PDF(pc) (3049KB)(62)    收藏
    In recent years, there has been considerable attention and research on the higher-order interactions that are prevalent in various real-world networks. Hypergraphs, especially in the study of complex systems, are proved effective in capturing these interactions. To better characterize the model in reality, this paper proposes a theoretical model of node interdependent percolation in multiplex hypergraphs, considering “ weak ” interdependence. The proposed model includes pairwise and higher-order interactions, where the removal of nodes triggers cascading failures. However, interdependent nodes connected to failed nodes experience partial loss of connections due to “ weak” interdependence, reflecting the self-sustaining capabilities of real-world systems. Percolation theory is applied to the analysis to investigate the properties of the percolation threshold and phase transition. Both analysis and simulation results show that as the strength of interdependence between nodes weakens, the network transitions from a discontinuous to a continuous phase, thereby increasing its robustness.
    相关文章 | 多维度评价
    8.
    Fairness optimization and power allocation in cognitive NOMA / OMA V2V network with imperfect SIC
    梁晓林, 刘千龙, 曹旺斌, 刘帅奇, 赵淑欢, 赵雄文
    中国邮电高校学报(英文版)    2023, 30 (6): 68-81.   DOI: 10.19682/j.cnki.1005-8885.2023.1020
    摘要532)      PDF(pc) (4592KB)(59)    收藏
    In order to improve the reliability and resource utilization efficiency of vehicle-to-vehicle (V2V) communication system, in this paper, the fairness optimization and power allocation for the cognitive V2V network that takes into account the realistic three-dimensional (3D) channel are investigated. Large-scale and small-scale fading are considered in the proposed channel model. An adaptive non-orthogonal multiple access ( NOMA) / orthogonal multiple access (OMA) scheme is proposed to reduce the complexity of successive-interference-cancellation (SIC) in decoding and improve spectrum utilization. Also, a fairness index that takes into account each user’s requirements is proposed to indicate the optimal point clearly. In the imperfect SIC, the optimization problem of maximizing user fairness is formulated. Then, a subgradient descent method is proposed to solve the optimization problem with customizable precision. And the computational complexity of the proposed method is analyzed. The achievable rate, outage probability and user fairness are analyzed. The results show that the proposed adaptive NOMA / OMA (A-NOMA / OMA) outperforms both NOMA and OMA. The simulation results are compared with validated analysis to confirm the theoretical analysis.
    相关文章 | 多维度评价
    9.
    Performance analysis of different coding schemes for wideband vehicle-to-vehicle MIMO systems
    梁晓林, 戎展毅, 曹旺斌, 刘帅奇, 赵雄文
    中国邮电高校学报(英文版)    2023, 30 (6): 89-98.   DOI: 10.19682/j.cnki.1005-8885.2023.1017
    摘要507)      PDF(pc) (2637KB)(78)    收藏
    The signal is subjected to lots of interferences in vehicle-to-vehicle (V2V) channel propagation, resulting in receiving error codes. Two-dimensional (2D) and three-dimensional (3D) geometrical channel models are used to depict the wideband V2V multiple-input multiple-output (MIMO) channels. Using the channel model, Turbo code and low-density parity-check (LDPC) code are investigated for wideband V2V MIMO system, and the encoding and the decoding schemes are investigated. The bit error rate (BER), channel capacity and outage probability of wideband V2V MIMO system using Turbo code and LDPC code are analyzed at different typical speeds. The results show that the performance of wideband V2V MIMO system using Turbo code outperform that using LDPC code. The performance is affected by transmitting and receiving speeds with the same coding scheme. And the channel capacity of the 3D channel is larger than that of 2D channel.
    相关文章 | 多维度评价
    10.
    Parameter optimization of complex network based on the change-point identification
    许杏桃, 陶加贵
    中国邮电高校学报(英文版)    2023, 30 (6): 22-29.   DOI: 10.19682/j.cnki.1005-8885.2023.1014
    摘要497)      PDF(pc) (6155KB)(64)    收藏
    This paper proposes a novel method for the parameter optimization of complex networks established through coarsening and phase space reconstruction. Firstly, we identify the change-points of the time series based on the cumulative sum ( CUSUM) control chart method. Then, we optimize the coarse-graining parameters and phase space embedding dimension based on the evolution analysis of the global topology index ( betweenness) at the mutation point. Finally, we conduct a simulation analysis based on real-time data of Chinese copper spot prices. The results show that the delay of the copper spot prices in Chinese spot market is 1 day, and the optimal embedding dimension of the phase space reconstruction is 3. The acceptance level of the investors towards the small fluctuations in copper spot prices is 0.2 times than the average level of price fluctuations, which means that an average price fluctuation of 0.2 times is the optimal coarse-graining parameter.
    相关文章 | 多维度评价
    11.
    Distributed consensus of Lurie multi-agent systems under directed topology: a contraction approach
    张晓娇, 吴祥
    中国邮电高校学报(英文版)    2023, 30 (6): 11-21.   DOI: 10.19682/j.cnki.1005-8885.2023.1018
    摘要493)      PDF(pc) (3622KB)(109)    收藏
    This paper is devoted to investigate the consensus problems for the multi-agent systems with Lurie nonlinear dynamics in directed topology. Under some assumptions, some sufficient conditions for the systems reaching leaderless consensus and tracking consensus are established by using contraction analysis theory. Compared with the existing results, there is no need to formulate the multi-agent networks in compact form. These conditions are only related to the individual agent in lower-dimensional case and the communication topology of the network. Additionally, a generalized nonlinear function is introduced. Finally, three numerical examples are demonstrated to illustrate the effectiveness of the theoretical results.
    相关文章 | 多维度评价
    12. Design of high parallel CNN accelerator based on FPGA for AIoT
    林志坚 高学伟 陈小培 祝志鹏 杜小勇 陈平平
    中国邮电高校学报(英文版)    2022, 29 (5): 1-9.   DOI: 10.19682/j.cnki.1005-8885.2022.0026
    摘要472)      PDF(pc) (3802KB)(57)    收藏

    To tackle the challenge of applying convolutional neural network (CNN) in field-programmable gate array (FPGA) due to its computational complexity, a high-performance CNN hardware accelerator based on Verilog hardware description language was designed, which utilizes a pipeline architecture with three parallel dimensions including input channels, output channels, and convolution kernels. Firstly, two multiply-and-accumulate (MAC) operations were packed into one digital signal processing (DSP) block of FPGA to double the computation rate of the CNN accelerator. Secondly, strategies of feature map block partitioning and special memory arrangement were proposed to optimize the total amount of off-chip access memory and reduce the pressure on FPGA bandwidth. Finally, an efficient computational array combining multiplicative-additive tree and Winograd fast convolution algorithm was designed to balance hardware resource consumption and computational performance. The high parallel CNN accelerator was deployed in ZU3EG of Alinx, using the YOLOv3-tiny algorithm as the test object. The average computing performance of the CNN accelerator is 127.5 giga operations per second (GOPS). The experimental results show that the hardware architecture effectively improves the computational power of CNN and provides better performance compared with other existing schemes in terms of power consumption and the efficiency of DSPs and block random access memory (BRAMs).

    参考文献 | 相关文章 | 多维度评价
    13. Performance analysis and low complexity receiver design for extra-large scale MIMO systems with residual hardware impairments
    路畅 方园 邱玲 梁晓雯
    中国邮电高校学报(英文版)    2023, 30 (2): 18-25.   DOI: 10. 19682/j.cnki.1005-8885.2023.0005
    摘要459)      PDF(pc) (1716KB)(12)    收藏

    The research purpose of this paper is focused on investigating the performance of extra-large scale massive multiple-input multiple-output ( XL-MIMO) systems with residual hardware impairments. The closed-form expression of the achievable rate under the match filter (MF) receiving strategy was derived and the influence of spatial non-stationarity and residual hardware impairments on the system performance was investigated. In order to maximize the signal-to-interference-plus-noise ratio ( SINR ) of the systems in the presence of hardware impairments, a hardware impairments-aware minimum mean squared error (HIA-MMSE) receiver was proposed. Furthermore, the stair Neumann series approximation was used to reduce the computational complexity of the HIA-MMSE receiver, which can avoid matrix inversion. Simulation results demonstrate the tightness of the derived

    analytical expressions and the effectiveness of the low complexity HIA-MMSE (LC-HIA-MMSE) receiver.

    参考文献 | 相关文章 | 多维度评价
    14.
    Characteristics and modeling of UAV-vehicle MIMO wideband channels
    梁晓林, 马佳旭, 曹旺斌, 徐建鹏, 刘帅奇, 赵雄文 ​
    中国邮电高校学报(英文版)    2023, 30 (6): 60-67.   DOI: 10.19682/j.cnki.1005-8885.2023.1012
    摘要456)      PDF(pc) (2101KB)(44)    收藏
    A geometry-based stochastic model ( GBSM) for unmanned aerial vehicle to vehicle ( UAV-V) multiple-input multiple-output (MIMO) wideband channel is proposed to investigate the characteristics of UAV-V channel. Based on the proposed model, a three-dimensional (3D) wideband channel matrix regarding channel numbers, time and delay is constructed. And some important channel characteristics parameters, such as power delay profile (PDP), root mean square ( RMS) delay spread, RMS Doppler spread, channel gain and Doppler power spectral density (PSD) are investigated with different vehicle velocities. It is much simpler and clearer compared with the complex analytical derivations. The results are compared with validated analysis to confirm the theoretical analysis.
    相关文章 | 多维度评价
    15.
    Encrypted traffic classification based on fusion of vision transformer and temporal features
    王岚婷 胡威 刘建毅 庞进 高雅婷 薛婧瑶 张婕
    中国邮电高校学报(英文版)    2023, 30 (2): 73-82.   DOI: 10.19682/j.cnki.1005-8885.2023.0002
    摘要454)      PDF(pc) (1598KB)(20)    收藏
    Aiming at the problem that the current encrypted traffic classification methods only use the single network framework such as CNN, RNN, and SAE, and only construct a shallow network to extract features, which leads to the low accuracy of encrypted traffic classification, we proposed an encrypted traffic classification framework based on the fusion of Vision Transformer and temporal features. The framework use BoTNet to extract spatial features and BiLSTM to extract temporal features, then use After the two sub-networks are parallelized, the framework uses the feature fusion method of early fusion to perform feature fusion after the two sub-networks parallelized, and finally identify encrypted traffic through the fused features. The experimental results show that the method in this paper can enhance the performance of encrypted traffic classification by fusing multi-dimensional features. The accuracy rate of VPN and non-VPN binary classification is as high as 99.9%, and the accuracy rate of fine-grained encrypted traffic twelve-classification can also reach more than 99%.
    参考文献 | 相关文章 | 多维度评价
    16. Dynamic multi-keyword fuzzy ranked search with leakage resilience over encrypted cloud data
    周由胜 黄妙 刘媛妮 陈自刚
    中国邮电高校学报(英文版)    2023, 30 (2): 83-95.   DOI: 10.19682/j.cnki.10058885.2022.0023
    摘要436)      PDF(pc) (2118KB)(13)    收藏
    To achieve the confidentiality and retrievability of outsourced data simultaneously, a dynamic multi-keyword fuzzy ranked search scheme (DMFRS) with leakage resilience over encrypted cloud data based on two-level index structure was proposed. The first level index adopts inverted index and orthogonal list, combined with 2-gram and location-sensitive Hashing (LSH) to realize a fuzzy match. The second level index achieves user search permission decision and search result ranking by combining coordinate matching with term frequency-inverse document frequency (TF-IDF). A verification token is generated within the results to verify the search results, which prevents the potential malicious tampering by cloud service providers (CSP). The semantic security of DMFRS is proved by the defined leakage function, and the performance is evaluated based on simulation experiments. The analysis results demonstrate that DMFRS gains certain advantages in security and performance against similar schemes, and it meets the needs of storage and privacy-preserving for outsourcing sensitive data.
    参考文献 | 相关文章 | 多维度评价
    17. Gain and phase errors active calibration method based on neural network for arrays with arbitrary geometry
    韩子文 张治 郭宇
    中国邮电高校学报(英文版)    2023, 30 (2): 8-17.   DOI: 10.19682/j.cnki.1005-8885.2022.0019
    摘要435)      PDF(pc) (2311KB)(28)    收藏

    The manifold matrix of the received signals can be destroyed when the array is with the gain and phase errors,which will affect the performance of the traditional direction of arrival (DOA) estimation approaches. In this paper,a novel active array calibration method for the gain and phase errors based on a cascaded neural network(GPECNN) was proposed. The cascaded neural network contains two parts: signal-to-noise ratio ( SNR) classification network and two sets of error estimation subnetworks. Error calibration subnetworks are activated according to the output of the SNR classification network, each of which consists of a gain error estimation network(GEEN) and a phase error estimation network (PEEN), respectively. The disadvantage of neural network topology architecture is changing when the number of array elements varies is addressed by the proposed group calibration strategy. Moreover, due to the data characteristics of the input vector, the cascaded neural network can be applied to arrays with arbitrary geometry without repetitive training. Simulation results demonstrate that the GPECNN not only achieves a better balance between calibration performance and calibration complexity than other methods but also can be applied to arrays with different numbers of sensors or different shapes without repetitive training.

    参考文献 | 相关文章 | 多维度评价
    18. Joint global constraint and Fisher discrimination based multi-layer dictionary learning for image classification
    彭宏 刘耀宗
    中国邮电高校学报(英文版)    2023, 30 (5): 1-10.   DOI: 10. 19682 / j. cnki. 1005-8885. 2023. 0010
    摘要419)      PDF(pc) (890KB)(201)    收藏
        A multi-layer dictionary learning algorithm that joints global constraints and Fisher discrimination (JGCFD-MDL) for image classification tasks was proposed. The algorithm reveals the manifold structure of the data by learning the global constraint dictionary and introduces the Fisher discriminative constraint dictionary to minimize the intra-class dispersion of samples and increase the inter-class dispersion. To further quantify the abstract features that characterize the data, a multi-layer dictionary learning framework is constructed to obtain high-level complex semantic structures and improve image classification performance. Finally, the algorithm is verified on the multi-label dataset of court costumes in the Ming Dynasty and Qing Dynasty, and better performance is obtained. Experiments show that compared with the local similarity algorithm, the average precision is improved by 3.34% . Compared with the single-layer dictionary learning algorithm, the one-error is improved by 1.00% , and the average precision is improved by 0.54% . Experiments also show that it has better performance on general datasets.
    参考文献 | 相关文章 | 多维度评价
    19. WBZUC: novel white-box ZUC-128 stream cipher
    杨亚涛, 张若菁, 董 辉, 马英杰, 张筱薇
    中国邮电高校学报(英文版)    2023, 30 (2): 96-106.   DOI: 10.19682/j.cnki.1005-8885.2022.0022
    摘要409)      PDF(pc) (925KB)(30)    收藏
    White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation. The stream cipher is a main dataflow encryption approach in mobile communication. However, the research work about white-box cryptographic implementation for stream cipher is rare. A new white-box Zu Chongzhi-128 (ZUC-128) cryptographic implementation algorithm named WBZUC was proposed. WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaos without changing the final encryption result. Thus, the WBZUC algorithm's security gets improved compared with the original ZUC-128 algorithm. As for the efficiency, a test experiment on WBZUC shows that average speed of key generation, encryption, and decryption can reach at 33.74 kbit/ s, 23.31 kbit/ s, 24.06 kbit/ s respectively. Despite its running speed is relative a bit lower than original ZUC-128 algorithm, WBZUC can provide better security and comprehensive performance in mobile communication system environment.
    参考文献 | 相关文章 | 多维度评价
    20. DRO-SLAM: Real-time object-aware SLAM for navigation robots and autonomous driving in dynamic environments
    Wang Zixian, Zhang Miao, Yan Danfeng
    中国邮电高校学报(英文版)    2023, 30 (3): 14-24.   DOI: 10.19682/j.cnki.1005-8885.2022.1011
    摘要394)      收藏
    Traditional simultaneous localization and mapping ( SLAM) mostly performs under the assumption of an ideal static environment, which is not suitable for dynamic environments in the real world. Dynamic real-time object-aware SLAM ( DRO-SLAM) is proposed in this paper, which is a visual SLAM that can realize simultaneous localizing and mapping and tracking of moving objects indoor and outdoor at the same time. It can use target recognition, oriented fast and rotated brief (ORB) feature points, and optical flow assistance to track multi-target dynamic objects and remove them during dense point cloud reconstruction while estimating their pose. By verifying the algorithm effect on the public dataset and comparing it with other methods, it can be obtained that the proposed algorithm has certain guarantees in real-time and accuracy, it also provides more functions. DRO-SLAM can provide the solution to automatic navigation which can realize lightweight deployment, provide more vehicles, pedestrians and other environmental information for navigation.
    参考文献 | 相关文章 | 多维度评价