News

Most Down

Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 2 years
Please wait a minute...
For Selected: Toggle Thumbnails

Research on cross-chain and interoperability for blockchain system

李鸣 邱鸿霖 徐泉清 宋文鹏 Liu Baixiang
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 1-17.   DOI: 10.19682/j.cnki.1005-8885.2021.0029
Abstract535)      PDF(pc) (3984KB)(138)       Save

At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘ value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains.



Reference | Related Articles | Metrics
Human motion prediction using optimized sliding window polynomial fitting and recursive least squares
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 76-85.   DOI: 10.19682/j.cnki.1005-8885.2021.0009
Abstract379)      PDF(pc) (3709KB)(133)       Save

Human motion prediction is a critical issue in human-robot collaboration (HRC) tasks. In order to reduce thelocal error caused by the limitation of the capture range and sampling frequency of the depth sensor, a hybrid human motion prediction algorithm, optimized sliding window polynomial fitting and recursive least squares (OSWPF-RLS) was proposed. The OSWPF-RLS algorithm uses the human body joint data obtained under the HRC task as input, and uses recursive least squares (RLS) to predict the human movement trajectories within the time window. Then, the optimized sliding window polynomial fitting (OSWPF) is used to calculate the multi-step prediction value, and the increment of multi-step prediction value was appropriately constrained. Experimental results show that compared with the existing benchmark algorithms, the OSWPF-RLS algorithm improved the multi-

step prediction accuracy of human motion and enhanced the ability to respond to different human movements.  

Reference | Related Articles | Metrics
Real-time hand tracking based on YOLOv4 model and Kalman filter
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 86-94.   DOI: 10.19682/j.cnki.1005-8885.2021.0011
Abstract467)      PDF(pc) (6638KB)(112)       Save

Aiming at the shortcomings of current gesture tracking methods in accuracy and speed, based on deep learning You Only Look Once version 4 (YOLOv4) model, a new YOLOv4 model combined with Kalman filter rea-time hand tracking method was proposed. The new algorithm can address some problems existing in hand tracking technology such as detection speed, accuracy and stability. The convolutional neural network (CNN) model YOLOv4 is used to detect the target of current frame tracking and Kalman filter is applied to predict the next position and bounding box size of the target according to its current position. The detected target is tracked by comparing the estimated result with the detected target in the next frame and, finally, the real-time hand movement track is displayed. The experimental results validate the proposed algorithm with the overall success rate of 99.43%

at speed of 41.822 frame/ s, achieving superior results than other algorithms. 

Reference | Related Articles | Metrics
Design and implementation of labor arbitration system based on blockchain
Cui Hongyan CAI Ziyin Teng Shaokai
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 36-45.   DOI: 10.19682/j.cnki.1005-8885.2021.0032
Abstract299)      PDF(pc) (2975KB)(102)       Save

Data island and information opacity are two major problems in collaborative administration. Blockchain has the potential to provide a trustable and transparent environment encouraging data sharing among administration members. However, the blockchain only stores Hash values and transactions in blocks which makes it unable to store big data and trace their changes. In this paper, a labor arbitration scheme based on blockchain was proposed to share labor arbitration data. In the system, a collaborative administration scheme that provides a big data storage model combined blockchain and interplanetary file system ( IPFS) is designed. It can store big data and share these data among different parties. Moreover, a file version control mechanism based on blockchain is designed to manage the data changes in IPFS network. It creates a tracing chain that consists of many IPFS objects to track changes of stored data. The relationship of previous and current IPFS objects recorded by blockchain can describe the changes of administration data and trace the data operations. The proposed platform is used in Rizhao City in China, and the experiment result shows collaborative administration scheme achieves traceability with high throughput and is more efficient than traditional hypertext transfer protocol ( HTTP) way to share data.

Reference | Related Articles | Metrics
News recommendation based on time factor and word embedding
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 82-90.   DOI: 10.19682/j.cnki.1005-8885.2021.0026
Abstract239)      PDF(pc) (774KB)(94)       Save

Existing algorithms of news recommendations lack in depth analysis of news texts and timeliness. To address these issues, an algorithm for news recommendations based on time factor and word embedding ( TFWE) was proposed to improve the interpretability and precision of news recommendations. First, TFWE used term frequency- inverse document frequency ( TF-IDF ) to extract news feature words and used the bidirectional encoder representations from transformers ( BERT ) pre-training model to convert the feature words into vector representations. By calculating the distance between the vectors, TFWE analyzed the semantic similarity to construct a user interest model. Second, considering the timeliness of news, a method of calculating news popularity by integrating time factors into the similarity calculation was proposed. Finally, TFWE combined the similarity of news content with the similarity of collaborative filtering ( CF) and recommended some news with higher rankings to users. In addition, results of the experiments on real dataset showed that TFWE significantly improved precision, recall, and F1 score compared to the classic hybrid recommendation algorithm.



Reference | Related Articles | Metrics
Authentication scheme for industrial Internet of things based on DAG blockchain
Tang Fei, Dong Kun, Ye Zhangtao, Ling Guowei
The Journal of China Universities of Posts and Telecommunications    2021, 28 (6): 1-12.   DOI: 10.19682/j.cnki.1005-8885.2021.1020
Abstract360)      PDF(pc) (6273KB)(93)       Save
Internet of things ( IoT) can provide the function of product traceability for industrial systems. Emerging  blockchain technology can solve the problem that the current industrial Internet of things ( IIoT) system lacks  unified product data sharing services. Blockchain technology based on the directed acyclic graph (DAG) structure  is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage  of product data will cause authentication problems in data management. In response, IIoT based on DAG  blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG  blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based  on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show  that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the  new scheme is safe in theory and it is more efficient in engineering.
Reference | Related Articles | Metrics
Design and verification of on-chip debug circuit based on JTAG
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 95-101.   DOI: 10.19682/j.cnki.1005-8885.2021.0019
Abstract239)      PDF(pc) (4057KB)(93)       Save

Aiming at the shortcomings of current gesture tracking methods in accuracy and speed, based on deep learning You Only Look Once version 4 (YOLOv4) model, a new YOLOv4 model combined with Kalman filter rea-time hand tracking method was proposed. The new algorithm can address some problems existing in hand tracking technology such as detection speed, accuracy and stability. The convolutional neural network (CNN) model YOLOv4 is used to detect the target of current frame tracking and Kalman filter is applied to predict the next position and bounding box size of the target according to its current position. The detected target is tracked by comparing the estimated result with the detected target in the next frame and, finally, the real-time hand movement track is displayed. The experimental results validate the proposed algorithm with the overall success rate of 99.43%

at speed of 41.822 frame/ s, achieving superior results than other algorithms. 

Reference | Related Articles | Metrics
Distributed cooperative deployment strategy in multi-UAVs assisted heterogeneous networks
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 11-19.   DOI: 10.19682/j.cnki.1005-8885.2021.0015
Abstract410)      PDF(pc) (2933KB)(92)       Save


Unmanned aerial vehicle base stations ( UAV-BSs) can provide a fast network deployment scheme for heterogeneous networks. However, unmanned aerial vehicle (UAV) has limited capability and cannot assist the base station (BS) well. The ability of a UAV to assist the BSs is limited, and the cluster deployment relies on the leading UAV. The dispersive deployment of multiple UAVs (multi-UAVs) need a macro base station (MBS) to determine their positions to prevent collisions or interference. Therefore, a distributed cooperative deployment scheme is proposed for UAVs to solve this problem. The scheme can increase the ability of UAVs to assist users and reduce the pressure on BSs to deploy UAVs. Firstly, the randomly distributed users are pre-clustered. Then the placement problem was modeled as a circle expansion problem and a pre-clustering radius expansion algorithm was proposed. Under the constraint of users-data rates, it provides services for more users. Finally, the proposed algorithm was compared with the density-aware placement algorithm. The simulation results show that the proposed algorithm can provide services for more users and improve the coverage rate of users while ensuring the data rates.


Reference | Related Articles | Metrics

Multi-level sharded blockchain system for edge computing

刘巧 唐碧华 Chen Xue Fan Wu 范文浩
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 46-58.   DOI: 10.19682/j.cnki.1005-8885.2021.0031
Abstract311)      PDF(pc) (3905KB)(87)       Save

Blockchain technology is used in edge computing ( EC) systems to solve the security problems caused by single point of failure ( SPOF) due to data loss, task execution failure, or control by malicious nodes. However, the disadvantage of blockchain is high latency, which contradicts the strict latency requirements of EC services. The existing single-level sharded blockchain system ( SLSBS) cannot provide different quality of service for different tasks. To solve these problems, a multi-level sharded blockchain system ( MLSBS) based on genetic algorithm ( GA) is proposed. The shards are classified according to the delay of the service, and the parameters such as the shard size of different shards are different. Using the GA, the MLSBS obtains the optimal resource allocation strategy that achieves maximum security. Simulation results show that the proposed scheme outperforms SLSBS.


Reference | Related Articles | Metrics
User association and resource allocation in green mobile edge networks using deep reinforcement learning
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 1-10.   DOI: 10.19682/j.cnki.1005-8885.2021.0016
Abstract888)      PDF(pc) (1989KB)(86)       Save

In order to meet the emerging requirements for high computational complexity, low delay and energy consumption of the 5th generation wireless systems (5G) network, ultra-dense networks (UDNs) combined with multi-access edge computing ( MEC) can further improve network capacity and computing capability. In addition, the integration of green energy can effectively reduce the on-grid energy consumption of system and realize green computation. This paper studies the joint optimization of user association (UA) and resource allocation (RA) in MEC enabled UDNs under the green energy supply pattern, users need to perceive the green energy status of base stations (BSs) and choose the one with abundant resources to associate. To minimize the computation cost for all users, the optimization problem is formulated as a mixed integer nonlinear programming (MINLP) which is NP-hard. In order to solve the problem, a deep reinforcement learning ( DRL)-based association and optimized allocation (DAOA) scheme is designed to solve it in two stages. The simulation results show that the proposed scheme has good performance in terms of  computationcost and time out ratio, as well achieve load balancing potentially.

Reference | Related Articles | Metrics
TCL: a taxi trajectory prediction model combining time and space features
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 63-75.   DOI: 10.19682/j.cnki.1005-8885.2021.0010
Abstract337)      PDF(pc) (10995KB)(86)       Save

Vehicle trajectory modeling is an important foundation for urban intelligent services. Trajectory prediction of cars is a hot topic. A model including convolutional neural network (CNN) and long short-term memory (LSTM) was proposed, which is named trajectory-CNN-LSTM (TCL). CNN can extract the spatial features of the trajectory in the input image. Besides, LSTM can extract the time-series features of the input trajectory. After that, the model uses fully connected layers to merge the two features for the final predicting. The experiments on the Porto dataset of The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD) show that the average prediction error of TCL is reduced by 0.15 km, 0.42 km, and 0.39 km compared to the trajectory-convolution (T-CONV), multi-layer perceptron (MLP), and recurrent neural network (RNN) model, respectively.

Reference | Related Articles | Metrics
Covert communication based on transmission antenna selection in the downlink communication link
The Journal of China Universities of Posts and Telecommunications    2021, 28 (3): 20-27.   DOI: 10.19682/j.cnki.1005-8885.2021.0008
Abstract282)      PDF(pc) (1267KB)(85)       Save


A downlink covert communication model that consists of a base station and two legitimate users was considered. In addition to the general signals shared by the two users, the base station will send the covert signals only to one user in a certain time without wanting the other to detect this covert communication behavior. In order to achieve covert communication, two information transmission schemes are designed based on transmission antenna selection (TAS) with the help of artificial noise (AN) transmitted by the user receiving the covert signals, denoted as TAS-Ι and TAS-Πrespectively. Considering the best detection performance of the user only receiving the general signals, under the two schemes, the detection error probabilities and their average values, the connection probabilities, the system covert throughputs are separately calculated. In addition, on the premise of meeting the system’s covert conditions, an optimization scheme is proposed to maximize the covert system throughput. Finally, the simulation

results show that the proposed system can realize covert communication successfully, and the system covert performance under TAS-Ι is better than that under TAS-Π.


Reference | Related Articles | Metrics
Exo-LSTM: traffic flow prediction based on multifractal wavelet theory
杨帆, 姜梦雅,
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 102-110.   DOI: 10.19682/j.cnki.1005-8885.2021.0027
Abstract227)      PDF(pc) (2021KB)(79)       Save

In order to predict traffic flow more accurately and improve network performance, based on the multifractal wavelet theory, a new traffic prediction model named exo-LSTM is proposed. Exo represents exogenous sequence used to provide a detailed sequence for the model, LSTM represents long short-term memory used to predict unstable traffic flow. Applying multifractal traffic flow to the exo-LSTM model and other existing models, the experiment result proves that exo-LSTM prediction model achieves better prediction accuracy.

Reference | Related Articles | Metrics
Research on flame classification and recognition based on object detection and similarity fusion
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 59-67.   DOI: 10.19682/j.cnki.1005-8885.2021.0020
Abstract253)      PDF(pc) (3086KB)(76)       Save

The color, shape, and other appearance characteristics of the flame emitted by different flame engines are different. In order to make a preliminary judgment on the category of the device to which it belongs through studying exterior characteristics of the flame, this paper uses the flame of matches, lighters, and candles to simulate different types of flames. It is hoped that the flames can be located and classified by detecting the characteristics of flames using the object detection algorithm. First, different types of fire are collected for the dataset of experiments. The mmDetection toolbox is then used to build several different object detection frameworks, in which the dataset can be trained and tested. The object detection model suitable for this kind of problem is obtained through the evaluation index analysis. The model is ResNet50-based faster-region-convolutional neural network ( Faster R- CNN), whose mean average-precision ( mAP) is 93.6% . Besides, after clipping the detected flames through object detection, a similarity fusion algorithm is used to aggregate and classify the three types of flames. Finally, the color components are analyzed to obtain the red, green, blue ( RGB) color histograms of the three flames.


Reference | Related Articles | Metrics

Trusted data access and authorization protocol

The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 18-26.   DOI: 10.19682/j.cnki.1005-8885.2021.0028
Abstract349)      PDF(pc) (1270KB)(73)       Save

Threshold proxy re-encryption( PRE) authorizes the data access right of data subject to multiple proxies, who authorize the right again to delegatee to accomplish the end-to-end data encryption process from storage to authorization. Based on threshold PRE algorithm, in order to build a complete trusted data storage and authorization system, the four protocols, which are data access protocol, authorization proxy protocol, authorization proxy cancellation protocol and data reading authorization protocol, are defined completely. On that basis, an efficient data searching method is constructed by specifying the data delegatee. At last, to ensure the right to know of data, the audit log is processed with trusted data right confirmation based on distributed ledger technology. Meanwhile, a parallel data right confirmation processing method is defined based on hierarchical derivation algorithm of public and private key. In the end, the performance evaluation analysis of the protocol are given. Trusted data access and authorization protocol is convenient to build a complete data processing system on the premise of protecting data privacy based on public cloud storage system or distributed storage system.

Reference | Related Articles | Metrics
Resource allocation and hybrid prediction scheme for low-latency  visual feedbacks to support tactile Internet multimodal perceptions
Kang Mancong, Li Xi, Ji Hong, Zhang Heli
The Journal of China Universities of Posts and Telecommunications    2021, 28 (4): 13-28.   DOI: 10.19682/j.cnki.1005-8885.2021.2002
Abstract229)      PDF(pc) (3476KB)(72)       Save
Predicting user states in future and rendering visual feedbacks accordingly can effectively reduce the visual  experienced delay in the tactile Internet (TI). However, most works omit the fact that different parts in an image  may have distinct prediction requirements, based on which different prediction models can be used in the predicting  process, and then it can further improve predicting quality especially under resources-limited environment. In this  paper, a hybrid prediction scheme is proposed for the visual feedbacks in a typical TI scenario with mixed visuo- haptic interactions, in which haptic traffic needs sufficient wireless resources to meet its stringent communication  requirement, leaving less radio resources for the visual feedback. First, the minimum required number of radio  resources for haptic traffic is derived based on the haptic communication requirements, and wireless resources are  allocated to the haptic and visual traffics afterwards. Then, a grouping strategy is designed based on the deep neural  network (DNN) to allocate different parts from an image feedback into two groups to use different prediction  models, which jointly considers the prediction deviation thresholds, latency and reliability requirements, and the  bit sizes of different image parts. Simulations show that, the hybrid prediction scheme can further reduce the visual  experienced delay under haptic traffic requirements compared with existing strategies.
Reference | Related Articles | Metrics
Liveness detection of occluded face based on dual-modality convolutional neural network
Ming Yue, Li Wenmin, Xu Siya, Gao Lifang, Zhang Hua, Shao Sujie, Yang Huifeng
The Journal of China Universities of Posts and Telecommunications    2021, 28 (4): 1-12.   DOI: 10.19682/j.cnki.1005-8885.2021.2001
Abstract402)      PDF(pc) (3096KB)(70)       Save
Facial recognition has become the most common identity authentication technologies. However, problems such as  uneven light and occluded faces have increased the hardness of liveness detection. Nevertheless, there are a few  pieces of research on face liveness detection under occlusion conditions. This paper designs a face recognition  technique suitable for different degrees of facial occlusion, which employs the facial datasets of near-infrared (NIR)  images and visible (VIS) light images to examine the single-modality detection accuracy rate (experimental control  group) and the corresponding high-dimensional features through the residual network (ResNet). Based on the idea  of data fusion, we propose two feature fusion methods. The two methods extract and fuse the data of one and two  convolutional layers from two single-modality detectors respectively. The fusion of high-dimensional features apply a  new ResNet to get the dual-modality detection accuracy. And then, a new ResNet is applied to test the accuracy of  dual-modality detection. The experimental results show that the dual-modality face liveness detection model  improves face live detection accuracy and robustness compared with the single-modality. The fusion of two-layer  features from the single-modality detector can also improve face detection accuracy by utilizing the above-mentioned  dual-modality detector, and it doesn't increase the algorithm's complexity.
Reference | Related Articles | Metrics
S-RRT path planning based on slime mould biological model
You Yue, Li Qinghua, Chen Xiyuan, Zhang Zhao, Mu Yaqi, Feng Chao
The Journal of China Universities of Posts and Telecommunications    2021, 28 (6): 55-64.   DOI: 10.19682/j.cnki.1005-8885.2021.1011
Abstract260)      PDF(pc) (2483KB)(70)       Save
To improve the security and effectiveness of mobile robot path planning,a slime mould rapid-expansion random tree (S-RRT) algorithm is proposed. This path planning algorithm is designed based on a biological optimization model and a rapid-expansion random tree ( RRT) algorithm. S-RRT algorithm can use the function of optimal direction to constrain the generation of a new node. By controlling the generation direction of the new node, an optimized path can be achieved. Thus, the path oscillation is reduced and the planning time is shortened. It is proved that S-RRT algorithm overcomes the limitation of paths zigzag of RRT algorithm through theoretical analysis. Experiments show that S- RRT algorithm is superior to RRT algorithm in terms of safety and efficiency.
Reference | Related Articles | Metrics

Dynamic load balancing algorithm for distributed system

崔岩松 白春雨
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 91-101.   DOI: 10.19682/j.cnki.1005-8885.2021.0025
Abstract246)      PDF(pc) (1960KB)(69)       Save

In distributed systems, it is important to adjust load distribution dynamically based on server performance and load information. Meanwhile, gray release and rapid expansion are the basic requirements to ensure reliability and stability for systems with short version iteration cycles. The traditional Hash algorithm performs poorly in gray release, rapid expansion, and load distribution. To solve these problems, a novel Hash-based dynamic mapping (HDM) load balancing algorithm was proposed. On the one hand, this algorithm can adjust the load distribution dynamically based on server performance and load information. On the other hand, it implements gray release by controlling the ratio of requests assigned to the changed nodes. Additionally, HDM has a higher expansion efficiency. Experiments show that the HDM distributes the load more reasonably, provides a more stable gray release ratio, and has a higher expansion efficiency.


Reference | Related Articles | Metrics
Dual-CRC polar codes and dual-SCFlip decoding algorithm for cell search in 5G system
Li Xiaohui, Liu Shuaishuai, Fan Tao, Fang Kun
The Journal of China Universities of Posts and Telecommunications    2021, 28 (6): 82-90.   DOI: 10.19682/j.cnki.1005-8885.2021.1013
Abstract226)      PDF(pc) (2349KB)(69)       Save
Polar codes become the coding scheme for control channels of enhanced mobile broadband (eMBB) scenarios in the fifth generation (5G) communication system due to their excellent decoding performance. For the cell search procedure in 5G system, some common information bits ( CIBs) are transmitted in consecutive synchronization signal blocks ( SSBs). In this paper, a dual-cyclic redundancy check ( dual-CRC) aided encoding scheme is proposed, and the corresponding dual-successive cancellation flip ( dual-SCFlip) algorithm is given to further improve the performance of polar codes in the low signal-to-noise ratio ( SNR) environment. In dual-CRC aided encoding structure, the information bits of polar codes in different transmission blocks add cyclic redundancy check (CRC) sequences respectively according to CIBs and different information bits (DIBs). The structure enlarges the size of CIBs to improve the block error ratio ( BLER) performance of the system. The dual-SCFlip decoder can perform bit flip immediately once CIBs is decoded completely, and then decode DIBs or terminate decoding in  advance according to the CRC result, which reduces the delay of decoding and mitigates the error propagation effect. Simulation results show that the dual-CRC aided encoding scheme and dual-SCFlip decoder have significant performance improvement compared to other existing schemes with low SNR.
Reference | Related Articles | Metrics