Please wait a minute...

Current Issue

    25 May 2020, Volume 41 Issue 5
    Papers
    Study on spectral representation and eigenexpansion based on eigen-operators
    Hongyu WANG,Tianshuang QIU
    2020, 41(5):  1-8.  doi:10.11959/j.issn.1000-436x.2020096
    Asbtract ( 307 )   HTML ( 67)   PDF (889KB) ( 429 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The spectral representation and expansion based on eigen-operators were deeply studied.The relations between Green’s function of characteristic differential equation and Hermitian differential and integral operators were given.The inverse relations between Hermitian differential operator and Hermitian integral operator were also studied.The spectral representation of Hermitian differential operators was given.It was also shown that the S-L eigen-equation cannot be used to realize the spectral representations of infinite dimensions in a finite interval.The method is much simpler and clearer than that of Neumann,and has advantages.The eigen-expansion (eigen-decomposition) of the Hermitian integral operator was given,which has the advantages of theoretical generality and comprehensiveness.The incorrect discussion in Wang et al<sup>[2]</sup>was correct that it is used to study the representation of characteristic spectrum.The physical and geometric meanings of naming for the long spherical wave function in optimal eigen-expansion were given.

    Polar codes and polar processing for 6G wireless systems
    Kai NIU,Jinchen DAI,Jinnan PIAO
    2020, 41(5):  9-17.  doi:10.11959/j.issn.1000-436x.2020090
    Asbtract ( 1380 )   HTML ( 163)   PDF (987KB) ( 1638 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the first type of channel code achieving the channel capacity,polar codes are an important candidate for the 6G data transmission.A polarized processing framework for the 6G systems was proposed.In this framework,in order to fulfill the requirement of ultra-reliable transmission,a high-performance coding scheme of concatenated polar code was designed to approach the channel capacity with finite-length.Then,the polar coded MIMO scheme was devised to match the requirement of the high spectrum efficiency.Finally,the scheme of polar coded non-orthogonal multiple access was investigated to improve the transmission capacity.All these schemes indicate that polar processing can dramatically boost the performance of 6G wireless transmission and become a promising direction.

    Endogenous security architecture of Ethernet switch based on mimic defense
    Ke SONE,Qinrang LIU,Shuai WEI,Wenjian ZHANG,Libo TAN
    2020, 41(5):  18-26.  doi:10.11959/j.issn.1000-436x.2020098
    Asbtract ( 729 )   HTML ( 95)   PDF (1020KB) ( 1209 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.

    Image defogging algorithm based on guided filtering and adaptive tolerance
    Xianli JIN,Wei ZHANG,Linfeng LIU
    2020, 41(5):  27-36.  doi:10.11959/j.issn.1000-436x.2020078
    Asbtract ( 390 )   HTML ( 54)   PDF (1407KB) ( 630 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of distortion of dark channel algorithm in defogging the sky region,an improved image defogging algorithm based on the guided filtering and adaptive tolerance mechanism was proposed.Firstly,the fitted transmissivity graphs were calculated for the windows with different sizes.Then,the transmissivity was further refined by the guided filtering technique.After that,the transmissivity in sky area was revised by an adaptive tolerance mechanism.Finally,the restored image was converted from RGB space to HSV space,and thus the brightness and contrast of the images could be color compensated.Experimental results show that the proposed algorithm restores the images effectively and obtain preferable defogging results with regard to the processing of bright areas such as the sky areas.

    Fast-flucos:malicious domain name detection method for Fast-flux based on DNS traffic
    Chunyu HAN,Yongzheng ZHANG,Yu ZHANG
    2020, 41(5):  37-47.  doi:10.11959/j.issn.1000-436x.2020094
    Asbtract ( 726 )   HTML ( 102)   PDF (1292KB) ( 1478 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are three weaknesses in previous Fast-flux domain name detection method on the aspects of stability,targeting,and applicability to common real-world DNS traffic environment.For this,a method based on DNS traffic,called Fast-flucos was proposed.Firstly,the traffic anomaly filtering and association matching algorithms were used for improving detection stability.Secondly,the features,quantified geographical width,country list,and time list,were applied for better targeting Fast-flux domains.Lastly,the feature extraction were finished by the more suitable samples for trying to adapt to common real-world DNS traffic.Several machine learning algorithms including deep learning are tried for determining the best classifier and feature combination.The experimental result based on real-world DNS traffic shows that Fast-flucos’ recall rate is 0.998 6,precision is 0.976 7,and ROC_AUC is 0.992 9,which are all better than the current main stream approaches,such as EXPOSURE,GRADE and AAGD.

    Causal consistency model for distributed data store based on shared graph and partial replication strategy
    Junfeng TIAN,Wanhe YANG,Ya’nan PANG,Juntao ZHANG
    2020, 41(5):  48-58.  doi:10.11959/j.issn.1000-436x.2020079
    Asbtract ( 312 )   HTML ( 28)   PDF (878KB) ( 453 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of metadata propagation overhead,operation delay and remote update visibility latency in the current causal consistency model,a causal consistency model for distributed data stores based on the shared graph and partial replication strategy was proposed.This model was based on the topology of the shared graph,and each data center stored an arbitrary subset of the data.At the same time,the global stabilization strategy combining shared stable vector and hybrid logical clocks was proposed to provide data consistency guarantees on the premise of ensuring causality.The theoretical analysis and experimental results show that the proposed model can effectively balance the remote update visibility and the metadata overhead compared with the existing models while reducing the operation delay.

    Multipath congestion control algorithm based on link capacity
    Zhu WANG,Qingyun YUAN,Fanfan HAO,Liang FANG,Fenghua LI
    2020, 41(5):  59-71.  doi:10.11959/j.issn.1000-436x.2020106
    Asbtract ( 637 )   HTML ( 63)   PDF (1122KB) ( 1363 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Factors such as link differences and TCP friendliness constraints lead to the problem of unfair bandwidth allocation when the TCP congestion control mechanism was applied directly to multi-path transmission.To address the problem,it was proposed that a multipath congestion control algorithm was based on link capacity.The proposed algorithm which was based on the concept of feedback regulation achieved multipath joint congestion control by establishing the M/M/1 cache queue model to adjust the throughput rate of senders.Experimental results show the proposed algorithm can improve the multipath transmission bandwidth utilization and the multipath congestion control algorithm responsiveness,and ensure the fairness of multipath transmission.

    Data access control policy of encrypted deduplication system
    Chunfu JIA,Guanxiong HA,Ruiqi LI
    2020, 41(5):  72-83.  doi:10.11959/j.issn.1000-436x.2020062
    Asbtract ( 287 )   HTML ( 33)   PDF (911KB) ( 581 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.

    Sparsity induced convex nonnegative matrix factorization algorithm with manifold regularization
    Feiyue QIU,Bowen CHEN,Tieming CHEN,Guodao ZHANG
    2020, 41(5):  84-95.  doi:10.11959/j.issn.1000-436x.2020064
    Asbtract ( 228 )   HTML ( 24)   PDF (959KB) ( 706 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address problems that the effectiveness of feature learned from real noisy data by classical nonnegative matrix factorization method,a novel sparsity induced manifold regularized convex nonnegative matrix factorization algorithm (SGCNMF) was proposed.Based on manifold regularization,the L<sub>2,1</sub>norm was introduced to the basis matrix of low dimensional subspace as sparse constraint.The multiplicative update rules were given and the convergence of the algorithm was analyzed.Clustering experiment was designed to verify the effectiveness of learned features within various of noisy environments.The empirical study based on K-means clustering shows that the sparse constraint reduces the representation of noisy features and the new method is better than the 8 similar algorithms with stronger robustness to a variable extent.

    High-roubustness keystroke recognition method based on acoustic spatial gradient
    Ying LIU,Kangkang HAN,Zhihong QIAN
    2020, 41(5):  96-103.  doi:10.11959/j.issn.1000-436x.2020095
    Asbtract ( 207 )   HTML ( 18)   PDF (1409KB) ( 247 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the fluctuation of CFCC caused by environmental noise is the main reason for the low accuracy of keystroke detection,the spatial characteristics of adjacent between CFCC were studied,and the spatial gradient structure of CFCC based on points was established.On this basis,the effect of CFCC spatial gradient on keystroke content recognition and the selection of precise neighborhood points were studied on training and testing.Finally,a high-robustness keystroke recognition algorithm based on acoustic signals was constructed.Extensive experiments in different environments demonstrate that the proposed CFCC spatial gradient sound feature achieves great performance and the recognition accuracy is 96.15%.

    Radar emitter identification based on unintentional phase modulation on pulse characteristic
    Xin QIN,Jie HUANG,Jiantao WANG,Shiwen CHEN
    2020, 41(5):  104-111.  doi:10.11959/j.issn.1000-436x.2020084
    Asbtract ( 444 )   HTML ( 30)   PDF (1204KB) ( 816 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of poor performance of the classification model in the case of unintentional phase modulation on pulse (UPMOP) to achieve radar specific emitter identification,a method for radar specific emitter identification with long and short-term memory and full convolutional networks (LSTM-FCN) was proposed.Firstly,a simplified observation model of the intrapulse signal phase considering the intentional modulation was presented,and the observation phase sequence was deramp to extract the noisy estimate of the UPMOP.Then Bezier curve was utilized to fit the UPMOP to reduce the influence of noise and obtain a more accurate description of UPMOP.Finally,the LSTM-FCN was used to extract the joint features of UPMOP sequence to realize the radar specific emitter automatic identification.Both the simulation experiments and the measured data experiments verify the feasibility and effectiveness of the proposed algorithm.Moreover,the proposed algorithm has high identification accuracy and short time consumption.

    Terminal battery status information based fairness-aware SWIPT strategy
    Zhirui HU
    2020, 41(5):  112-119.  doi:10.11959/j.issn.1000-436x.2020089
    Asbtract ( 194 )   HTML ( 18)   PDF (1012KB) ( 308 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the battery depletion problem,the terminals’ battery status information (BSI) was proposed to be taken into consideration in simultaneous wireless information and power transfer (SWIPT) strategies,and a SWIPT strategy to guarantee the rate fairness was provided.BSI determined the terminals’ sufferable received rate and harvested energy.The proposed scheme was formulated as an optimization problem to max-min user rate,with rate/energy requirement constraints and the sufferable rate/energy constraints.To solve optimization problem,the receivers were firstly classified with their battery level,then the optimal solutions were obtained by the proposed iteration optimization-based algorithm.With the proposed scheme,the transmit power and the power splitting factor would be controlled and the data rate at receivers,especially the receivers that with lower battery level would be restricted,avoiding the required battery consumption to exceed battery level.Simulation results reveal that the proposed scheme can prolong battery lifetime and avoid the battery depletion problem,and its fairness performance is strengthened with the difference decreasing among the receivers’ battery level.

    Infrared image segmentation algorithm based on distribution information intuitionistic fuzzy c-means clustering
    Xiaofei WANG,Fankui HU,Shuo HUANG
    2020, 41(5):  120-129.  doi:10.11959/j.issn.1000-436x.2020071
    Asbtract ( 282 )   HTML ( 21)   PDF (1232KB) ( 558 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the sensitivity of the traditional intuitionistic fuzzy c-means (IFCM) clustering algorithm to the clustering center in image segmentation,which resulted in the low clustering precision,poor retention of details,and large time complexity,an intuitionistic fuzzy c-means clustering algorithm was proposed based on spatial distribution information suitable for infrared image segmentation of power equipment.The non-target objects with high intensity and the non-uniformity of image intensity in the infrared image had strong interference to the image segmentation,which could be effectively suppressed by the proposed algorithm.Firstly,the Gaussian model was introduced into the global spatial distribution information of power equipment to improve the IFCM algorithm.Secondly,the membership function was optimized by local spatial operator to solve the problem of edge blur and image intensity inhomogeneity.The experiments conducted on Terravic motion IR database and the data set containing 300 infrared images of power equipment show that,the relative region error rate is about 10% and is less affected by the change of fuzzy factor m.The effectiveness and applicability of the proposed algorithm are superior to other comparison algorithms.

    Design for database access control mechanism based on blockchain
    Yonggui FU,Jianming ZHU
    2020, 41(5):  130-140.  doi:10.11959/j.issn.1000-436x.2020097
    Asbtract ( 792 )   HTML ( 124)   PDF (878KB) ( 1148 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the current problems of database access control,the thought of blockchain technology applied to database access control was proposed.The implementation mechanism of database access control based on blockchain was designed from several aspects as blockchain hierarchical structure,logical hierarchical structure of access control process,implementation principle of access control,consensus authentication principle of access control,and construction mechanism of access control blockchain system.The performance of database access control system based on blockchain was assessed.A complete framework was provided for blockchain applied in database access control.Through strengthening the authentication and supervision of visitor identity,access permission and access behavior,the database access control ability is improved effectively.

    Multi-constraints QoS routing optimization based on improved immune clonal shuffled frog leaping algorithm
    Yi LU,Mengying XU,Jie ZHOU
    2020, 41(5):  141-149.  doi:10.11959/j.issn.1000-436x.2020102
    Asbtract ( 248 )   HTML ( 22)   PDF (911KB) ( 571 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the multi-constraint routing problem,a mathematical model was designed,and an improved immune clonal shuffled frog leaping algorithm (IICSFLA) was proposed,which combined immune operator with traditional SFLA.Under the constraints of bandwidth,delay,packet loss rate,delay jitter and energy cost,total energy cost from the source node to the terminal node was computed.The proposed algorithm was used to find an optimal route with minimum energy cost.In the simulation,the performance of IICSFLA with adaptive genetic algorithm and adaptive ant colony optimization algorithm was compared.Experimental results show that IICSFLA solves the problem of multi-constraints QoS unicast routing optimization.The proposed algorithm avoids local optimum and effectively reduces energy loss of data on the transmission path in comparison with adaptive genetic algorithm and adaptive ant colony optimization algorithm.

    Research on orbital angular momentum communication technology
    Feng ZHENG,Yijian CHEN,Siwei JI,Gaoming DUAN,Guanghui YU
    2020, 41(5):  150-158.  doi:10.11959/j.issn.1000-436x.2020108
    Asbtract ( 665 )   HTML ( 72)   PDF (854KB) ( 1006 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the good orthogonality between the different modes of orbital angular momentum (OAM),the application of OAM technology in wireless communication has gained increasing popularity in recent years with great potential for capacity improvement.OAM-based wireless communication technology can effectively improve spectrum utilization,but also brings some challenges.Firstly,the research status and progress of OAM technology in the field of wireless communication were introduced and the relationship between OAM and MIMO technology was compared and analyzed combined with the basic principle of OAM.Moreover,the dispute “Does OAM provides a new dimension?” was concluded.Then,the generation and reception methods of OAM were summarized.The key techniques and application fields were overviewed.Finally,the challenges of the technology in practical application were analyzed and the future development trends and follow-up research directions were point out,which would provide a reference and help for the research in this field.

    Network real-time scheduling algorithm based on multi-feature dynamic priority
    Xun SU,Yanfang LI,Ning ZONG,Wei WEI,Juan LI,Ying DING
    2020, 41(5):  159-167.  doi:10.11959/j.issn.1000-436x.2020091
    Asbtract ( 382 )   HTML ( 44)   PDF (1346KB) ( 665 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Real-time task scheduling system structure and task model were proposed aiming at the network real-time scheduling problem.The task degree of urgency was defined by considering the deadline of task,execution time and interval time between works.The task degree of tightness was proposed based on service-level assurance,according to functional importance of different tasks in the real-time task scheduling system.The thrashing limit for avoiding task switching frequently was acquired through dynamic regulation to task priorities by degree of urgency and degree of tightness,which guaranteed the success rate of tasks execution and utilization ratio of client execution.Test simulation results suggest that the multi-feature dynamic priority scheduling strategy improves the success rate of task scheduling and shorten the average response time,which suggests it has obvious superiority compared with BE and EDF scheduling algorithm.

    Comprehensive Review
    Survey of terahertz communication technology
    Sha XIE,Haoran LI,Lingxiang LI,Zhi CHEN,Shaoqian LI
    2020, 41(5):  168-186.  doi:10.11959/j.issn.1000-436x.2020107
    Asbtract ( 2081 )   HTML ( 348)   PDF (2516KB) ( 4603 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are some challenges that need to be overcome before terahertz communication technology is widely applied,such as large propagation attenuation in the air and short transmission distance.Research progresses of terahertz channel,such as terahertz channel model,terahertz channel measurement and terahertz channel estimation,were first reviewed.Based on these characteristics of terahertz channel,the underlying problems in basic single-user communication scenarios and more complicated multi-user communication scenarios were respectively analyzed.For each scenario possible solutions were concluded.Last but not least,some prospect future research directions on terahertz communications were discussed.

    Correspondences
    Non-stationary signal combined analysis based fault diagnosis method
    Zhe CHEN,Yuqi HU,Shiqing TIAN,Huimin LU,Lizhong XU
    2020, 41(5):  187-195.  doi:10.11959/j.issn.1000-436x.2020099
    Asbtract ( 376 )   HTML ( 44)   PDF (2761KB) ( 655 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the complementarity between the deep learning,spectrum and time frequency analysis methods,a multi-stream framework was designed by combining the convolutional network,Fourier transform and wavelet package decomposition methods,with the aim to analyze the non-stationary signal.Accordingly,a none-stationary signal combined analysis based fault diagnosis method was proposed to extract features in difference aspects.The fault diagnosis experiments demonstrate that the combined analysis method can efficiently and stably depict the fault and significantly improve the performance of fault diagnosis.

    Self-corrected coefficient smoothing method based network security situation prediction
    Hongyu YANG,Xugao ZHANG
    2020, 41(5):  196-204.  doi:10.11959/j.issn.1000-436x.2020092
    Asbtract ( 226 )   HTML ( 27)   PDF (1893KB) ( 693 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of insufficient accuracy of current network security situation prediction methods,a new network security situation prediction model was proposed based on self-correcting coefficient smoothing.Firstly,a network security assessment quantification method was designed to transform the alarm information into situation real value time series based on the entropy correlation degree.Then,the adaptive solution of the static smoothing coefficient was calculated and the predicted initial value was obtained by using the variable domain space.Finally,based on the error category,the time-changing weighted Markov chain was built to modify the initial network situation prediction result and the prediction accuracy was further raised.The prediction model was tested with LL_DOS_1.0 dataset and the experimental results show that the proposed model has higher adaptability and prediction accuracy for network situation time series.

    Efficient and privacy-preserving online face authentication scheme
    Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI
    2020, 41(5):  205-214.  doi:10.11959/j.issn.1000-436x.2020087
    Asbtract ( 459 )   HTML ( 53)   PDF (29975KB) ( 229 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: