News

Most Down

Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

Most Downloaded in Recent Month
Please wait a minute...
For Selected: Toggle Thumbnails
SNR-adaptive deep joint source-channel coding scheme for imagesemantic transmission with convolutional block attention module
Yang Yujia, Liu Yiming, Zhang Wenjia, Zhang Zhi
The Journal of China Universities of Posts and Telecommunications    2024, 31 (1): 1-11.   DOI: 10.19682/j.cnki.1005-8885.2024.2001
Abstract363)      PDF(pc) (2443KB)(41)       Save
With the development of deep learning (DL), joint source-channel coding (JSCC) solutions for end-to-end transmission have gained a lot of attention. Adaptive deep JSCC schemes support dynamically adjusting the rate according to different channel conditions during transmission, enhancing robustness in dynamic wireless environment. However, most of the existing adaptive JSCC schemes only consider different channel conditions, ignoring the different feature importance in the image processing and transmission. The uniform compression of different features in the image may result in the compromise of critical image details, particularly in low signal-to-noise ratio (SNR) scenarios. To address the above issues, in this paper, a dual attention mechanism is introduced and an SNR-adaptive deep JSCC mechanism with a convolutional block attention module (CBAM) is proposed, in which matrix operations are applied to features in spatial and channel dimensions respectively. The proposedsolution concatenates the pooling feature with the SNR level and passes it sequentially through the channel attention network and spatial attention network to obtain the importance evaluation result. Experiments show that the proposed solution outperforms other baseline schemes in terms of peak SNR (PSNR) and structural similarity (SSIM), particularly in low SNR scenarios or when dealing with complex image content.
Reference | Related Articles | Metrics
Analysis of 3D NAND technologies and comparison between charge-trap-based and floating-gate-based flash devices
JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM    2017, 24 (3): 75-82.   DOI: 10.1016/S1005-8885(17)60214-0
Abstract837)      PDF(pc) (1498KB)(1412)       Save
NAND flash chips have been innovated from two-dimension (2D) design which is based on planar NAND cells to three-dimension (3D) design which is based on vertical NAND cells. Two types of NAND flash technologies–charge-trap (CT) and floating-gate (FG) are presented in this paper to introduce NAND flash designs in detail. The physical characteristics of CT-based and FG-based 3D NAND flashes are analyzed. Moreover, the advantages and disadvantages of these two technologies in architecture, manufacture, interference and reliability are studied and compared.
Reference | Related Articles | Metrics
Meta-heuristic optimization inspired by proton-electron swarm
The Journal of China Universities of Posts and Telecommunications    2020, 27 (3): 42-52.   DOI: 10.19682/j.cnki.1005-8885.2020.0015
Abstract362)      PDF(pc) (4683KB)(365)       Save
While solving unimodal function problems, conventional meta-heuristic algorithms often suffer from low accuracy and slow convergence. Therefore, in this paper, a novel meta-heuristic optimization algorithm, named proton-electron swarm (PES), is proposed based on physical rules. This algorithm simulates the physical phenomena of like-charges repelling each other while opposite charges attracting in protons and electrons, and establishes a mathematical model to realize the optimization process. By balancing the global exploration and local exploitation ability, this algorithm achieves high accuracy and avoids falling into local optimum when solving target problem. In order to evaluate the effectiveness of this algorithm, 23 classical benchmark functions were selected for comparative experiments. Experimental results show that, compared with the contrast algorithms, the proposed algorithm cannot only obtain higher accuracy and convergence speed in solving unimodal function problems, but also maintain strong optimization ability in solving multimodal function problems.
Reference | Related Articles | Metrics
Energy-efficient computation offloading assisted by RIS-based UAV
Li Linpei, Zhao Chuan, Su Yu, Huo Jiahao, Huang Yao, Li Haojin
The Journal of China Universities of Posts and Telecommunications    2024, 31 (1): 37-48.   DOI: 10.19682/j.cnki.1005-8885.2024.2004
Abstract265)      PDF(pc) (1638KB)(27)       Save
The new applications surge with the rapid evolution of the mobile communications. The explosive growth of the data traffic aroused by the new applications has posed great computing pressure on the local side. It is essential to innovate the computation offloading methods to alleviate the local computing burden and improve the offloading efficiency. Mobile edge computing (MEC) assisted by reflecting intelligent surfaces (RIS)-based unmanned aerial vehicle (UAV) is a promising method to assist the users in executing the computation tasks in proximity at low cost. In this paper, we propose an energy-efficient MEC system assisted by RIS-based UAV, where the UAV with RIS mounted relays the computation tasks to the MEC server. The energy efficiency maximization problem is formulated by jointly optimizing the UAV's trajectory, the transmission power of all users, and the phase shifts of the reflecting elements placed on the UAV. Considering that the optimization problem is non-convex, we propose a deep deterministic policy gradient (DDPG)-based algorithm. By combining the DDPG algorithm with the energy efficiency maximization problem, the optimization problem can be resolved. Finally, the numerical results are illustrated to show the performance of the system and the superiority compared with the benchmark schemes.
Reference | Related Articles | Metrics
General digital rights management solution based on white-box cryptography
Liu Jun, Hu Yupu, Chen Jie
The Journal of China Universities of Posts and Telecommunications    2021, 28 (1): 52-63.   DOI: 10.19682/j.cnki.1005-8885.2021.0006
Abstract524)      PDF(pc) (809KB)(147)       Save

Digital rights management (DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.


Reference | Related Articles | Metrics
Polarization-based optimal detection scheme for digital self-interference cancellation in full-duplex system
The Journal of China Universities of Posts and Telecommunications    2020, 27 (3): 73-82.   DOI: 10.19682/j.cnki.1005-8885.2020.0018
Abstract385)      PDF(pc) (1433KB)(322)       Save
In order to detect and cancel the self-interference (SI) signal from desired binary phase-shift keying (BPSK) signal, the polarization-based optimal detection (POD) scheme for cancellation of digital SI in a full-duplex (FD) system is proposed. The POD scheme exploits the polarization domain to isolate the desired signal from the SI signal and then cancel the SI to obtain the interference-free desired signal at the receiver. In FD communication, after antenna and analog cancellation, the receiver still contains residual SI due to non-linearities of hardware imperfections. In POD scheme, a likelihood ratio expression is obtained, which isolates and detects SI bits from the desired bits. After isolation of these signal points, the POD scheme cancels the residual SI. As compared to the conventional schemes, the proposed POD scheme gives significantly low bit error rate (BER), a clear constellation diagram to obtain the boundary between desired and SI signal points, and increases the receiver's SI cancellation performance in low signal to interference ratio (SIR) environment.
Reference | Related Articles | Metrics
Wireless semantic communication based on semantic matching multiple access and intent bias multiplexing
Ren Chao, He Zongrui, Sun Chen, Li Haojin, Zhang Haijun
The Journal of China Universities of Posts and Telecommunications    2024, 31 (1): 26-36.   DOI: 10.19682/j.cnki.1005-8885.2024.2003
Abstract291)      PDF(pc) (1783KB)(23)       Save
This paper proposes a multi-access and multi-user semantic communication scheme based on semantic matching and intent deviation to address the increasing demand for wireless users and data. The scheme enables flexible management of long frames, allowing each unit of bandwidth to support a higher number of users. By leveraging semantic classification, different users can independently access the network through the transmission of long concatenated sequences without modifying the existing wireless communication architecture. To overcome the potential disadvantage of incomplete semantic database matching leading to semantic intent misunderstanding, the scheme proposes using intent deviation as an advantage. This allows different receivers to interpret the same semantic information differently, enabling multiplexing where one piece of information can serve multiple users with distinct purposes. Simulation results show that at a bit error rate (BER) of 0.1, it is possible to reduce the transmission by approximately 20 semantic basic units.
Reference | Related Articles | Metrics
GNN-based temporal knowledge reasoning for UAV mission planning systems
Chai Rong, Duan Xiaofang, Wang Lixuan
The Journal of China Universities of Posts and Telecommunications    2024, 31 (1): 12-25.   DOI: 10.19682/j.cnki.1005-8885.2024.2002
Abstract437)      PDF(pc) (2603KB)(22)       Save
Unmanned aerial vehicles (UAVs) are increasingly applied in various mission scenarios for their versatility, scalability and cost-effectiveness. In UAV mission planning systems (UMPSs), an efficient mission planning strategy is essential to meet the requirements of UAV missions. However, rapidly changing environments and unforeseen threats pose challenges to UMPSs, making efficient mission planning difficult. To address these challenges, knowledge graph technology can be utilized to manage the complex relations and constraints among UAVs, missions, and environments. This paper investigates knowledge graph application in UMPSs, exploring its modeling, representation, and storage concepts and methodologies. Subsequently, the construction of a specialized knowledge graph for UMPS is detailed. Furthermore, the paper delves into knowledge reasoning within UMPSs, emphasizing its significance in timely updates in the dynamic environment. A graph neural network (GNN)-based approach is proposed for knowledge reasoning, leveraging GNNs to capture structural information and accurately predict missing entities or relations in the knowledge graph. For relation reasoning, path information is also incorporated to improve the accuracy of inference. To account for the temporal dynamics of the environment in UMPS, the influence of timestamps is captured through the attention mechanism. The effectiveness and applicability of the proposed knowledge reasoning method are verified via simulations.
Reference | Related Articles | Metrics
Dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems under directed weighted topology
Wu Yue, Chen Xiangyong, Qiu Jianlong, Hu Shunwei, Zhao Feng
The Journal of China Universities of Posts and Telecommunications    2023, 30 (6): 3-10.   DOI: 10.19682/j.cnki.1005-8885.2023.1019
Abstract608)      PDF(pc) (1536KB)(197)       Save
This paper studies the dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems (MASs) under directed weighted graph containing a directed spanning tree, and also considers the effects of disturbances and leader of non-zero control inputs in the system. Firstly, a novel distributed control protocol is designed for uncertain disturbances and leader of non-zero control inputs in MASs. Secondly, a novel dynamic event-triggered control ( DETC) strategy is proposed, which eliminates the need for continuous communication between agents and reduces communication resources between agents. By introducing dynamic thresholds, the complexity of excluding Zeno behavior within the system is reduced. Finally, the effectiveness of the proposed theory is validated through numerical simulation.
Related Articles | Metrics
Surveys on the application of neural networks to event extraction
Duan Li, Chen Lin, Luo Bing
The Journal of China Universities of Posts and Telecommunications    2023, 30 (4): 43-54.   DOI: 10.19682/j.cnki.1005-8885.2023.2015
Abstract96)            Save
Event extraction (EE) is a significant part of natural language information extraction, and it is widely adopted in other natural language processing (NLP) tasks such as question answering and machine reading comprehension. With the development of the NLP field, numerous datasets and approaches for EE are promoted, raising the need for a comprehensive review. In this paper, the resources for EE are reviewed, and then the numerous neural network models currently employed in EE tasks are classified into three types: Word sequence-based methods, graph-based neural network methods, and external knowledge-based approaches. And then the methods are compared and contrasted in detail, and their flaws and difficulties are analyzed with existing research in this survey. Finally, the future research tendency is discussed for EE.
Reference | Related Articles | Metrics
Autonomous parking control for intelligent vehicles based on a novel algorithm
Hongbo Gao Guotao Xie Xin-Yu ZHANG Bo Cheng
JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM    2017, 24 (4): 51-56.   DOI: 10.1016/S1005-8885(17)60223-1
Abstract1324)      PDF(pc) (932KB)(1034)       Save
Along with the increasing number of vehicles, parking space becomes narrow gradually, safety parking puts forward higher requirements on the driver’s driving technology. How to safely, quickly and accurately park the vehiclo to parking space right? This paper presents an automatic parking scheme based on trajectory planning, which analyzing the mechanical model of the vehicle, establishing vehicle steering model and parking model, coming to the conclusion that it is the turning radius is independent of the vehicle speed at low speed. The Matlab simulation environment verifies the correctness and effectiveness of the proposed algorithm for parking. A class of the automatic parking problem of intelligent vehicles is solved.
Reference | Related Articles | Metrics
Cited: Baidu(2)
Design of high parallel CNN accelerator based on FPGA for AIoT
Lin Zhijian Gao Xuewei Chen Xiaopei Zhu Zhipeng Du Xiaoyong Chen Pingping
The Journal of China Universities of Posts and Telecommunications    2022, 29 (5): 1-9.   DOI: 10.19682/j.cnki.1005-8885.2022.0026
Abstract481)      PDF(pc) (3802KB)(58)       Save
To tackle the challenge of applying convolutional neural network (CNN) in field-programmable gate array (FPGA) due to its computational complexity, a high-performance CNN hardware accelerator based on Verilog hardware description language was designed, which utilizes a pipeline architecture with three parallel dimensions including input channels, output channels, and convolution kernels. Firstly, two multiply-and-accumulate (MAC) operations were packed into one digital signal processing (DSP) block of FPGA to double the computation rate of the CNN accelerator. Secondly, strategies of feature map block partitioning and special memory arrangement were proposed to optimize the total amount of off-chip access memory and reduce the pressure on FPGA bandwidth. Finally, an efficient computational array combining multiplicative-additive tree and Winograd fast convolution algorithm was designed to balance hardware resource consumption and computational performance. The high parallel CNN accelerator was deployed in ZU3EG of Alinx, using the YOLOv3-tiny algorithm as the test object. The average computing performance of the CNN accelerator is 127.5 giga operations per second (GOPS). The experimental results show that the hardware architecture effectively improves the computational power of CNN and provides better performance compared with other existing schemes in terms of power consumption and the efficiency of DSPs and block random access memory (BRAMs).
Reference | Related Articles | Metrics
GrabCut image segmentation algorithm based on structure tensor
JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM    2017, 24 (2): 48-56.   DOI: 10.1016/S1005-8885(17)60197-3
Abstract688)      PDF(pc) (1932KB)(431)       Save
This paper attempts to present an interactive color natural images segmentation method. This method extracts the feature of images by using the nonlinear compact structure tensor (NCST) and then uses GrabCut method to obtain the segmentation. This method not only realizes the non-parametric fusion of texture information and color information, but also improves the efficiency of the calculation. Then, the improved GrabCut algorithm is used to evaluate the foreground target segmentation. In order to calculate the simplicity and efficiency, this paper also extends the Gaussian mixture model (GMM) constructed base on the GrabCut to the tensor space, and uses the Kullback-Leibler (KL) divergence instead of the usual Riemannian geometry. Lastly, an iteration convergence criterion is proposed to reduce the time of the iteration of GrabCut algorithm dramatically with satisfied segmentation accuracy. After conducting a large number of experiments on synthetic texture images and natural images, the results demonstrate that this method has a more accurate segmentation effect.
Reference | Related Articles | Metrics
Remaining useful life prediction of lithium-ion batteries using a fusion method based on Wasserstein GAN
The Journal of China Universities of Posts and Telecommunications    2020, 27 (1): 1-9.   DOI: 10.19682/j.cnki.1005-8885.2020.0004
Abstract2373)      PDF(pc) (1567KB)(10424)       Save
Lithium-ion batteries are the main power supply equipment in many fields due to their advantages of no memory, high energy density, long cycle life and no pollution to the environment. Accurate prediction for the remaining useful life (RUL) of lithium-ion batteries can avoid serious economic and safety problems such as spontaneous combustion. At present, most of the RUL prediction studies ignore the lithium-ion battery capacity recovery phenomenon caused by the rest time between the charge and discharge cycles. In this paper, a fusion method based on wasserstein generative adversarial network (GAN) is proposed. This method achieves a more reliable and accurate RUL prediction of lithium-ion batteries by combining the artificial neural network (ANN) model which takes the rest time between battery charging cycles into account and the empirical degradation models which provide the correct degradation trend. The weight of each model is calculated by the discriminator in the wasserstein GAN model. Four data sets of lithium-ion battery provided by the NASA Ames Research Center are used to prove the feasibility and accuracy of the proposed method.
Reference | Related Articles | Metrics
Improved statistical sparse decomposition principle method for underdetermined blind source signal recovery
Wang Chuanchuan, Zeng Yonghu, Wang Liandong, Fu Weihong
The Journal of China Universities of Posts and Telecommunications    2019, 26 (6): 94-102.   DOI: 10.19682/j.cnki.1005-8885.2019.1030
Abstract303)      PDF(pc) (2513KB)(194)       Save
Aiming at the statistical sparse decomposition principle (SSDP) method for underdetermined blind source signal recovery with problem of requiring the number of active signals equal to that of the observed signals, which leading to the application bound of SSDP is very finite, an improved SSDP (ISSDP) method is proposed. Based on the principle of recovering the source signals by minimizing the correlation coefficients within a fixed time interval, the selection method of mixing matrix's column vectors used for signal recovery is modified, which enables the choose of mixing matrix's column vectors according to the number of active source signals self-adaptively. By simulation experiments, the proposed method is validated. The proposed method is applicable to the case where the number of active signals is equal to or less than that of observed signals, which is a new way for underdetermined blind source signal recovery.
Reference | Related Articles | Metrics

Research on cross-chain and interoperability for blockchain system

李鸣 邱鸿霖 徐泉清 宋文鹏 Liu Baixiang
The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 1-17.   DOI: 10.19682/j.cnki.1005-8885.2021.0029
Abstract687)      PDF(pc) (3984KB)(269)       Save

At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘ value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains.



Reference | Related Articles | Metrics
L2,1-norm robust regularized extreme learning machine for regression using CCCP method
Wu Qing, Wang Fan, Fan Jiulun, Hou Jing
The Journal of China Universities of Posts and Telecommunications    2023, 30 (2): 61-72.   DOI: 10.19682/j.cnki.1005-8885.2023.0004
Abstract175)      PDF(pc) (3180KB)(42)       Save

As a way of training a single hidden layer feedforward network (SLFN),extreme learning machine (ELM) is rapidly becoming popular due to its efficiency. However, ELM tends to overfitting, which makes the model sensitive to noise and outliers. To solve this problem, L2,1-norm is introduced to ELM and an L2,1-norm robust regularized ELM (L2,1-RRELM) was proposed. L2,1-RRELM gives constant penalties to outliers to reduce their adverse effects by replacing least square loss function with a non-convex loss function. In light of the non-convex feature of L2,1-RRELM, the concave-convex procedure (CCCP) is applied to solve its model. The convergence of L2,1-RRELM is also given to show its robustness. In order to further verify the effectiveness of L2,1-RRELM, it is compared with the three popular extreme learning algorithms based on the artificial dataset and University of California Irvine (UCI) datasets. And each algorithm in different noise environments is tested with two evaluation criterions root mean square error (RMSE) and fitness. The results of the simulation indicate that L2,1-RRELM has smaller RMSE and greater fitness under different noise settings. Numerical analysis shows that L2,1-RRELM has better generalization performance, stronger robustness, and higher anti-noise ability and fitness.

Reference | Related Articles | Metrics
Novel high-PSRR high-order curvature-compensated bandgap voltage reference
周前能 闫凯 林金朝 庞宇 李国权 罗伟
JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM    2016, 23 (2): 66-72.  
Abstract1962)      PDF(pc) (452KB)(471)       Save

This paper proposes a novel high-power supply rejection ratio (high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference (BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvature- corrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is /°C from 55 °C to 125 °C with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of 123.51 dB, 123.52 dB, 88.5 dB and 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively.

Reference | Related Articles | Metrics
Cited: Baidu(1)
Resource allocation and hybrid prediction scheme for low-latency  visual feedbacks to support tactile Internet multimodal perceptions
Kang Mancong, Li Xi, Ji Hong, Zhang Heli
The Journal of China Universities of Posts and Telecommunications    2021, 28 (4): 13-28.   DOI: 10.19682/j.cnki.1005-8885.2021.2002
Abstract349)      PDF(pc) (3476KB)(143)       Save
Predicting user states in future and rendering visual feedbacks accordingly can effectively reduce the visual  experienced delay in the tactile Internet (TI). However, most works omit the fact that different parts in an image  may have distinct prediction requirements, based on which different prediction models can be used in the predicting  process, and then it can further improve predicting quality especially under resources-limited environment. In this  paper, a hybrid prediction scheme is proposed for the visual feedbacks in a typical TI scenario with mixed visuo- haptic interactions, in which haptic traffic needs sufficient wireless resources to meet its stringent communication  requirement, leaving less radio resources for the visual feedback. First, the minimum required number of radio  resources for haptic traffic is derived based on the haptic communication requirements, and wireless resources are  allocated to the haptic and visual traffics afterwards. Then, a grouping strategy is designed based on the deep neural  network (DNN) to allocate different parts from an image feedback into two groups to use different prediction  models, which jointly considers the prediction deviation thresholds, latency and reliability requirements, and the  bit sizes of different image parts. Simulations show that, the hybrid prediction scheme can further reduce the visual  experienced delay under haptic traffic requirements compared with existing strategies.
Reference | Related Articles | Metrics
Distributed consensus of Lurie multi-agent systems under directed topology: a contraction approach
Zhang Xiaojiao, Wu Xiang
The Journal of China Universities of Posts and Telecommunications    2023, 30 (6): 11-21.   DOI: 10.19682/j.cnki.1005-8885.2023.1018
Abstract505)      PDF(pc) (3622KB)(111)       Save
This paper is devoted to investigate the consensus problems for the multi-agent systems with Lurie nonlinear dynamics in directed topology. Under some assumptions, some sufficient conditions for the systems reaching leaderless consensus and tracking consensus are established by using contraction analysis theory. Compared with the existing results, there is no need to formulate the multi-agent networks in compact form. These conditions are only related to the individual agent in lower-dimensional case and the communication topology of the network. Additionally, a generalized nonlinear function is introduced. Finally, three numerical examples are demonstrated to illustrate the effectiveness of the theoretical results.
Related Articles | Metrics