通知公告
访问统计

总访问量

今日访问

在线人数

下载排行

    一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

    当前位置: 最近1个月下载排行
    Please wait a minute...
    选择: 显示/隐藏图片
    1. Analysis of 3D NAND technologies and comparison between charge-trap-based and floating-gate-based flash devices
    刘世军 邹雪城
    中国邮电高校学报(英文版)    2017, 24 (3): 75-82.   DOI: 10.1016/S1005-8885(17)60214-0
    摘要1101)      PDF(pc) (1498KB)(2661)    收藏
    NAND flash chips have been innovated from two-dimension (2D) design which is based on planar NAND cells to three-dimension (3D) design which is based on vertical NAND cells. Two types of NAND flash technologies–charge-trap (CT) and floating-gate (FG) are presented in this paper to introduce NAND flash designs in detail. The physical characteristics of CT-based and FG-based 3D NAND flashes are analyzed. Moreover, the advantages and disadvantages of these two technologies in architecture, manufacture, interference and reliability are studied and compared.
    参考文献 | 相关文章 | 多维度评价
    2. GrabCut image segmentation algorithm based on structure tensor
    张勇 袁家政 刘宏哲 李青
    中国邮电高校学报(英文版)    2017, 24 (2): 48-56.   DOI: 10.1016/S1005-8885(17)60197-3
    摘要789)      PDF(pc) (1932KB)(521)    收藏
    This paper attempts to present an interactive color natural images segmentation method. This method extracts the feature of images by using the nonlinear compact structure tensor (NCST) and then uses GrabCut method to obtain the segmentation. This method not only realizes the non-parametric fusion of texture information and color information, but also improves the efficiency of the calculation. Then, the improved GrabCut algorithm is used to evaluate the foreground target segmentation. In order to calculate the simplicity and efficiency, this paper also extends the Gaussian mixture model (GMM) constructed base on the GrabCut to the tensor space, and uses the Kullback-Leibler (KL) divergence instead of the usual Riemannian geometry. Lastly, an iteration convergence criterion is proposed to reduce the time of the iteration of GrabCut algorithm dramatically with satisfied segmentation accuracy. After conducting a large number of experiments on synthetic texture images and natural images, the results demonstrate that this method has a more accurate segmentation effect.
    参考文献 | 相关文章 | 多维度评价
    3. Low-complexity channel estimation for wideband mmWave massive MIMO systems with uniform planar arrays 
    王昊天 刘立洲 邱玲 张磊
    中国邮电高校学报(英文)    2025, 32 (1): 1-10.   DOI: 10.19682/j.cnki.1005-8885.2025.0005
    摘要69)      PDF(pc) (1465KB)(27)    收藏

    Millimeter-wave ( mmWave) and massive multiple-input multiple-output ( MIMO) are broadly recognized as key enabling technologies for the fifth generation (5G) communication systems. In this paper, a low-complexity angle- delay parameters estimation ( ADPE) algorithm was put forward for wideband mmWave systems with uniform planar arrays ( UPAs). In particular, the ADPE algorithm effectively decouples the angle-delay parameters and converts the angle-delay estimation problem into three independent subproblems. Accordingly, the ability to devise an off- grid method based on discrete Fourier transform ( DFT) with a closed-form solution for angle-delay estimation and potential path number acquisition can be realized. In actuality, only a limited number of potential paths are close to the true paths influenced by noise. Consequently, the removal of noise paths to acquire the corresponding true path gains through a sparsity adaptive path gains estimation ( APGE) algorithm is postulated. Finally, the simulation results substantiate the effectiveness of ADPE and APGE algorithms.

    参考文献 | 相关文章 | 多维度评价
    4. Fast Fourier transform convolutional neural network accelerator based on overlap addition
    游晨 李德建 冯曦 沈冲飞 魏继增 刘昱
    中国邮电高校学报(英文)    2024, 31 (5): 71-84.   DOI: 10.19682/j.cnki.1005-8885.2024.0015
    摘要170)      PDF(pc) (2872KB)(51)    PDF(mobile) (2872KB)(7)    收藏

    In convolutional neural networks ( CNNs), the floating-point computation in the traditional convolutional layer is enormous, and the execution speed of the network is limited by intensive computing, which makes it challenging to meet the real-time response requirements of complex applications. This work is based on the principle that the time domain convolution result equals the frequency domain point multiplication result to reduce the amount of floating- point calculations for convolution. The input feature map and the convolution kernel are converted to the frequency domain by the fast Fourier transform( FFT), and the corresponding point multiplication is performed. Then the frequency domain result is converted back to the time domain, and the output result of the convolution is obtained. In the shared CNN, the input feature map is much larger than the convolution kernel, resulting in many invalid operations. The overlap addition method is proposed to reduce invalid calculations and speed up network execution better. This work designs a hardware accelerator for frequency domain convolution and verifies its efficiency on the Xilinx Zynq UltraScale + MPSoC ZCU102 board. Comparing the calculation time of visual geometry group 16 ( VGG16 ) under the ImageNet dataset faster than the traditional time domain convolution, the hardware acceleration of frequency domain convolution is 8. 5 times.

    参考文献 | 相关文章 | 多维度评价
    5. Lateral control of autonomous vehicles based on learning driver behavior via cloud model
    高洪波 Xie Guotao Liu Hongzhe 张新钰 李德毅
    中国邮电高校学报(英文版)    2017, 24 (2): 10-17.   DOI: 10.1016/S1005-8885(17)60194-8
    摘要766)      PDF(pc) (1058KB)(459)    收藏
    In order to achieve the lateral control of the intelligent vehicle, use the bi-cognitive model based on cloud model and cloud reasoning, solve the decision problem of the qualitative and quantitative of the lateral control of the intelligent vehicle. Obtaining a number of experiment data by driving a vehicle, classify the data according to the concept of data and fix the input and output variables of the cloud controller, design the control rules of the cloud controller of intelligent vehicle, and clouded and fix the parameter of cloud controller: expectation, entropy and hyper entropy. In order to verify the effectiveness of the cloud controller, joint simulation platform based on Matlab/Simulink/CarSim is established. Experimental analysis shows that: driver’s lateral controller based on cloud model is able to achieve tracking of the desired angle, and achieve good control effect, it also verifies that a series of mental activities such as feeling, cognition, calculation, decision and so on are fuzzy and uncertain.
    参考文献 | 相关文章 | 多维度评价
    6. Black-box membership inference attacks based on shadow model
    Han Zhen, Zhou Wen'an, Han Xiaoxuan, Wu Jie
    中国邮电高校学报(英文)    2024, 31 (4): 1-16.   DOI: 10.19682/j.cnki.1005-8885.2024.1016
    摘要342)      PDF(pc) (3603KB)(167)    收藏
    Membership inference attacks on machine learning models have drawn significant attention. While current research primarily utilizes shadow modeling techniques, which require knowledge of the target model and training data, practical scenarios involve black-box access to the target model with no available information. Limited training data further complicate the implementation of these attacks. In this paper, we experimentally compare common data enhancement schemes and propose a data synthesis framework based on the variational autoencoder generative adversarial network (VAE-GAN) to extend the training data for shadow models. Meanwhile, this paper proposes a shadow model training algorithm based on adversarial training to improve the shadow model's ability to mimic the predicted behavior of the target model when the target model's information is unknown. By conducting attack experiments on different models under the black-box access setting, this paper verifies the effectiveness of the VAE-GAN-based data synthesis framework for improving the accuracy of membership inference attack. Furthermore, we verify that the shadow model, trained by using the adversarial training approach, effectively improves the degree of mimicking the predicted behavior of the target model. Compared with existing research methods, the method proposed in this paper achieves a 2% improvement in attack accuracy and delivers better attack performance.
    参考文献 | 相关文章 | 多维度评价
    7. Sentence segmentation for classical Chinese based on LSTM with radical embedding
    Han Xu, Wang Hongsu, Zhang Sanqian, Fu Qunchao, Liu Jun
    中国邮电高校学报(英文版)    2019, 26 (2): 1-8.   DOI: 10.19682/j.cnki.1005-8885.2019.1001
    摘要656)      PDF(pc) (1156KB)(367)    收藏
    A low-than character feature embedding called radical embedding is proposed, and applied on a long-short term memory (LSTM) model for sentence segmentation of pre-modern Chinese texts. The dataset includes over 150 classical Chinese books from 3 different dynasties and contains different literary styles. LSTM-conditional random fields (LSTM-CRF) model is a state-of-the-art method for the sequence labeling problem. This model adds a component of radical embedding, which leads to improved performances. Experimental results based on the aforementioned Chinese books demonstrate better accuracy than earlier methods on sentence segmentation, especial in Tang’s epitaph texts (achieving an F1-score of 81.34%).
    参考文献 | 相关文章 | 多维度评价
    8. Research on swarm intelligence optimization algorithm
    费炜 刘聪 胡胜
    中国邮电高校学报(英文版)    2020, 27 (3): 1-20.   DOI: 10.19682/j.cnki.1005-8885.2020.0012
    摘要922)      PDF(pc) (843KB)(605)    收藏
    The bionics-based swarm intelligence optimization algorithm is a typical natural heuristic algorithm whose goal is to find the global optimal solution of the optimization problem. It simulates the group behavior of various animals and uses the information exchange and cooperation between individuals to achieve optimal goals through simple and effective interaction with experienced and intelligent individuals. This paper first introduces the principles of various swarm intelligent optimization algorithms. Then, the typical application of these swarm intelligence optimization algorithms in various fields is listed. After that, the advantages and defects of all swarm intelligence optimization algorithms are summarized. Next, the improvement strategies of various swarm intelligence optimization algorithms are explained. Finally, the future development of various swarm intelligence optimization algorithms is prospected.
    参考文献 | 相关文章 | 多维度评价
    9.
    Linear-quadratic optimal control for time-varying descriptor systems via space decompositions
    吕鹏超, 黄俊杰, 刘波
    中国邮电高校学报(英文版)    2023, 30 (6): 38-48.   DOI: 10.19682/j.cnki.1005-8885.2023.1011
    摘要876)      PDF(pc) (1663KB)(173)    收藏
    This paper aims at solving the linear-quadratic optimal control problems ( LQOCP) for time-varying descriptor systems in a real Hilbert space. By using the Moore-Penrose inverse theory and space decomposition technique, the descriptor system can be rewritten as a new differential-algebraic equation (DAE), and then some novel sufficient conditions for the solvability of LQOCP are obtained. Especially, the methods proposed in this work are simpler and easier to verify and compute, and can solve LQOCP without the range inclusion condition. In addition, some numerical examples are shown to verify the results obtained.
    相关文章 | 多维度评价
    10. Dynamic resource allocation in cloud download service
    Tan Xiaoying, Huang Dan, Guo Yuchun, Chen Changjia
    中国邮电高校学报(英文版)    2017, 24 (5): 53-59.   DOI: 10.1016/S1005-8885(17)60233-4
    摘要474)      PDF(pc) (848KB)(322)    收藏

    Cloud download service, as a new application which downloads the requested content offline and reserves it in cloud storage until users retrieve it, has recently become a trend attracting millions of users in China. In the face of the dilemma between the growth of download requests and the limitation of storage resource, the cloud servers have to design an efficient resource allocation scheme to enhance the utilization of storage as well as to satisfy users’ needs like a short download time. When a user’s churn behavior is considered as a Markov chain process, it is found that a proper allocation of download speed can optimize the storage resource utilization. Accordingly, two dynamic resource allocation schemes including a speed switching (SS) scheme and a speed increasing (SI) scheme are proposed. Both theoretical analysis and simulation results prove that our schemes can effectively reduce the consumption of storage resource and keep the download time short enough for a good user experience.

    参考文献 | 相关文章 | 多维度评价
    11. Novel high-PSRR high-order curvature-compensated bandgap voltage reference
    周前能 闫凯 林金朝 庞宇 李国权 罗伟
    中国邮电高校学报(英文版)    2016, 23 (2): 66-72.  
    摘要2021)      PDF(pc) (452KB)(1527)    收藏

    This paper proposes a novel high-power supply rejection ratio (high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference (BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvature- corrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is /°C from 55 °C to 125 °C with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of 123.51 dB, 123.52 dB, 88.5 dB and 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively.

    参考文献 | 相关文章 | 多维度评价
    12. Cleaning RFID data streams based on K-means clustering method
    Lin Qiaomin, Fa Anqi, Pan Min, Xie Qiang, Du Kun, Sheng Michael
    中国邮电高校学报(英文版)    2020, 27 (2): 72-81.   DOI: 10.19682/j.cnki.1005-8885.2020.1009
    摘要473)      PDF(pc) (534KB)(246)    收藏
    Currentlyradio frequency identification (RFID) technology has been widely used in many kinds of applications. Store retailers use RFID readers with multiple antennas to monitor all tagged items. However, because of the interference from environment and limitations of the radio frequency technology, RFID tags are identified by more than one RFID antenna, leading to the false positive readings. To address this issue, we propose a RFID data stream cleaning method based on K-means to remove those false positive readings within sampling time. First, we formulate a new data stream model which adapts to our cleaning algorithm. Then we present the preprocessing method of the data stream model, including sliding window setting, feature extraction of data stream and normalization. Next, we introduce a novel way using K-means clustering algorithm to clean false positive readings. Last, the effectiveness and efficiency of the proposed method are verified by experiments. It achieves a good balance between performance and price.
    参考文献 | 相关文章 | 多维度评价
    13. Dynamic coverage of mobile multi-target in sensor networks based on virtual force
    黄庆东 王梅 韩壮 陈晨
    中国邮电高校学报(英文)    2024, 31 (4): 83-94.   DOI: 10.19682/j.cnki.1005-8885.2024.1006
    摘要258)      PDF(pc) (3233KB)(51)    收藏
    A new procedure of distributed self-control coverage for monitoring the dynamic targets with mobile sensor network is proposed. A special model is given for maintaining the nodes bi-connectivity and optimizing the coverage of the moving targets. The model consists of two parts, the virtual force model is proposed for motion control and the whale optimization algorithm is improved to further optimize the node positions and to reach the steady state quickly. The virtual resultant force stretches the network toward the uncovered targets by its multi-target attractive force, and maintains the network connectivity by its attractive force while network stretching, and avoids node collisions by its repulsive force while nodes moving. The operating mechanism of multi-target attractive force and other forces is also profoundly anatomized. The adjustment criteria for the model in different application scenarios are also given. Finally, the comparisons are shown to be significant advantages over other similar kinds.
    参考文献 | 相关文章 | 多维度评价
    14. Modular handover algorithm for 5G HetNets with comprehensive load index
    李丹阳 张治中 高依依
    中国邮电高校学报(英文版)    2017, 24 (2): 57-65.   DOI: 10.1016/S1005-8885(17)60199-7
    摘要792)      PDF(pc) (1419KB)(304)    收藏
    Most existing handover decision system (HDS) designs are monolithic, resulting in high computational cost and unbalance of overall network. A novel modular handover algorithm with a comprehensive load index for the 5th generation (5G) heterogeneous networks (HetNets) is proposed. In this paper, the handover parameters, serving as the basis for handover, are classified into network’s quality of service (QoS) module, user preference (UP) module and degree of satisfaction (DS) module according to the new modular HDS design. To optimize switching process, the comprehensive network load index is deduced by using triangle module fusion operator. With respect to the existing handover algorithm, the simulation results indicate that the proposed algorithm can reduce the handover frequency and maintain user satisfaction at a higher level. Meanwhile, due to its block calculation, it can bring about 1.4 s execution time improvement.
    参考文献 | 相关文章 | 多维度评价
    15. Remaining useful life prediction of lithium-ion batteries using a fusion method based on Wasserstein GAN
    周温丁 鲍士兼 许方敏 赵成林
    中国邮电高校学报(英文版)    2020, 27 (1): 1-9.   DOI: 10.19682/j.cnki.1005-8885.2020.0004
    摘要2728)      PDF(pc) (1567KB)(10525)    收藏
    Lithium-ion batteries are the main power supply equipment in many fields due to their advantages of no memory, high energy density, long cycle life and no pollution to the environment. Accurate prediction for the remaining useful life (RUL) of lithium-ion batteries can avoid serious economic and safety problems such as spontaneous combustion. At present, most of the RUL prediction studies ignore the lithium-ion battery capacity recovery phenomenon caused by the rest time between the charge and discharge cycles. In this paper, a fusion method based on Wasserstein generative adversarial network (GAN) is proposed. This method achieves a more reliable and accurate RUL prediction of lithium-ion batteries by combining the artificial neural network (ANN) model which takes the rest time between battery charging cycles into account and the empirical degradation models which provide the correct degradation trend. The weight of each model is calculated by the discriminator in the Wasserstein GAN model. Four data sets of lithium-ion battery provided by the National Aeronautics and Space Administration (NASA) Ames Research Center are used to prove the feasibility and accuracy of the proposed method.
    参考文献 | 相关文章 | 多维度评价
    16.

    Exo-LSTM: traffic flow prediction based on multifractal wavelet theory

    杨帆, 姜梦雅,
    中国邮电高校学报(英文版)    2021, 28 (5): 102-110.   DOI: 10.19682/j.cnki.1005-8885.2021.0027
    摘要454)      PDF(pc) (2021KB)(202)    收藏

    In order to predict traffic flow more accurately and improve network performance, based on the multifractal wavelet theory, a new traffic prediction model named exo-LSTM is proposed. Exo represents exogenous sequence used to provide a detailed sequence for the model, LSTM represents long short-term memory used to predict unstable traffic flow. Applying multifractal traffic flow to the exo-LSTM model and other existing models, the experiment result proves that exo-LSTM prediction model achieves better prediction accuracy.


    参考文献 | 相关文章 | 多维度评价
    17. Aerial edge computing for 6G
    Mao Sun, Zhang Yan
    中国邮电高校学报(英文)    2022, 29 (1): 50-63.   DOI: 10.19682/j.cnki.1005-8885.2022.2006
    摘要796)      PDF(pc) (3425KB)(166)    收藏
    In the 6th generation mobile communication system (6G) era, a large number of delay-sensitive and computation-intensive applications impose great pressure on resource-constrained Internet of things (IoT) devices. Aerial edge computing is envisioned as a promising and cost-effective solution, especially in hostile environments without terrestrial infrastructures. Therefore, this paper focuses on integrating aerial edge computing into 6G for providing ubiquitous computing services for IoT devices. This paper first presents the layered network architecture of aerial edge computing for 6G. The benefits, potential applications, and design challenges are also discussed in detail. Next, several key techniques like unmanned aerial vehicle (UAV) deployment, operation mode, offloading mode, caching policy, and resource management are highlighted to present how to integrated aerial edge computing into 6G. Then, the joint UAV deployment optimization and computation offloading method is designed to minimize the computing delay for a typical aerial edge computing network. Numerical results reveal the significant delay reduction of the proposed method compared with the other benchmark methods. Finally, several open issues for aerial edge computing in 6G are elaborated to provide some guidance for future research.
    参考文献 | 相关文章 | 多维度评价
    18. Collaborative filtering recommendation algorithm based on interactive data classification
    季一木, 李可, 刘尚东, 刘强, 尧海昌, 李奎
    中国邮电高校学报(英文版)    2020, 27 (5): 1-12.   DOI: 10.19682/j.cnki.1005-8885.2020.0024
    摘要859)      PDF(pc) (1589KB)(245)    收藏
    In the matrix factorization (MF) based collaborative filtering recommendation method, the most critical part is to deal with the interaction between the features of users and items. The mainstream approach is to use the inner product for MF to describe the user-item relationship. However, as a shallow model, MF has its limitations in describing the relationship between data. In addition, when the size of the data is large, the performance of MF is often poor due to data sparsity and noise. This paper presents a model called PIDC, short for potential interaction data clustering based deep learning recommendation. First, it uses classifiers to filter and cluster recommended items to solve the problem of sparse training data. Second, it combines MF and multi-layer perceptron (MLP) to optimize the prediction effect, and the limitation of inner product on the model expression ability is eliminated. The proposed model PIDC is tested on two datasets. The experimental results show that compared with the existing benchmark algorithm, the model improved the recommendation effect.
    相关文章 | 多维度评价
    19. Energy efficient data collection in UAV-assisted Internet of things: trajectory planning and aerodynamic-based attitude control
    王世宇 陈浩 胡楠 贾泽坤
    中国邮电高校学报(英文)    2022, 29 (2): 97-107.   DOI: 10.19682/j.cnki.1005-8885.2021.0024
    摘要576)      PDF(pc) (2454KB)(81)    收藏

    Due to its inherent characteristics of flexible mobility, unmanned aerial vehicle (UAV) is exploited as a cost-efficient mobile platform to assist remote data collection in the 5th generation or beyond the 5th generation (5G/ B5G) wireless systems. Compared with static terrestrial base stations, the line-of-sight (LoS) link between UAVs and ground nodes are stronger due to their flexibility in three-dimensional (3D) space. Due to the fact that flexible mobility of UAVs requires high propulsion power, the limited on-board energy constrains the performance of UAV-assisted data collection. It is worth noting that UAVs can be categorized into rotary-wing UAVs and fixed-wing UAVs, either has its own characteristics in propulsion energy consumption. In this article, a comprehensive review of state-of-art studies on trajectory design schemes for rotary-wing UAVs, as well as aerodynamic-aware attitude control strategies for fixed-wing UAVs was provided. Then, two case studies for energy-efficient data collection using rotary-wing UAVs and fixed-wing UAVs were presented, respectively. More specifically, an age-energy aware data collection scheme was demonstrated for rotary-wing UAVs to optimize the timeliness of collected data. Moreover, an aerodynamic-aware attitude control strategy for fixed-wing UAVs was also demonstrated under data collection requirements.

    参考文献 | 相关文章 | 多维度评价
    20. Hardware-friendly Cycle-GAN and reconfigurable design
    Xie Xiaoyan, Chai Miaomiao, Deng Junyong, Du Zhuolin, Yang Kun, Yin Shaorun
    中国邮电高校学报(英文)    2023, 30 (4): 10-20.   DOI: 10.19682/j.cnki.1005-8885.2023.2012
    摘要283)      PDF(pc) (4911KB)(80)    收藏
    As a kind of generative adversarial network (GAN), Cycle-GAN shows an apparent superiority in image style translation. The more complicated architectures with large number of parameters and huge computational complexities, cause a big challenge in deployment on resource-constrained platform. To make full use of the parallelism of hardware under guaranteed image quality, this paper improves the generator network to a hardware-friendly Inception module. The optimized framework is named simplified Cycle-GAN (S-CycleGAN), with greatly reduced parameters of convolution, while avoiding the degradation of image quality from structural compression. Testing with the apple2organge and horse2zebra datasets, the experiment results show that the images generated by S-CycleGAN outperform the baseline and other models. The number of parameters reduces by 19.54%, memory usage cuts down by 9.11%, theoretical amount of multiply-adds (Madds) decreases by 17.96%, and floating-point operations per second (FLOPS) diminishes by 18.91%. Finally, the S-CycleGAN was mapped on the dynamic programmable reconfigurable array processor ( DPRAP ), which calculate the convolution and deconvolution in a unified architecture, and support flexible runtime switching. The prototype systems are implemented on Xilinx field programmable gate array (FPGA) XC6 VLX550 T-FF1759. The synthesized results show that, with 150 MHz, the hardware resource consumption is reduced by 52% compared to the recent FPGA scheme.
    参考文献 | 相关文章 | 多维度评价