CIE Homepage  |  Join CIE  |  Login CIE  |  中文 

Most download

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • WU Xiang-yu, SHEN Ying, TANG You-xi
    Acta Electronica Sinica. 2015, 43(1): 1-6. https://doi.org/10.3969/j.issn.0372-2112.2015.01.001
    CSCD(8)

    Measurements and characterizations are rarely conducted about indoor self-interference channel of CCFD(Co-time Co-frequency full-duplex).An extensive self-interference channel measurement is performed at 2.6GHz under typical indoor environment with channel sounder based on vector network analyzer.By analyzing the measurement data,the empirical channel characteristics such as path loss exponent,RMS(root-mean-square)delay spread have been extracted.Results show that path loss exponent and RMS delay statistics are different according to antenna separation of transmitter-receiver.When the separation is larger than 1m,the path loss exponent is 1.86,and the RMS delay statistics follow lognormal distribution.When the separation is less than 1m,the path loss exponent is 1.52,and the RMS delay statistics at different antenna separation follow lognormal distribution whose mean and variance are linear functions of antenna distance respectively.

  • LI Xiao-xu, LI Rui-fan, FENG Fang-xiang, CAO Jie, WANG Xiao-jie
    Acta Electronica Sinica. 2014, 42(10): 2040-2044. https://doi.org/10.3969/j.issn.0372-2112.2014.10.026

    In the paper, we mainly focus on classifition on multi-view data.Considering that ensemble methods can combine weak classifiers to construct a strong classifier, and topic model can learn latent representations from complex data, we try to introduce ensemble idea to topic model, such that predictive latent representation could be obtained and multi-view classifier could be learned.We propose multi-view supervised latent Dirichlet allocation (multi-view sLDA) model by combining latent Dirichlet allocation model and the mixture of softmax model which is an ensemble classification model.Moreover, we derive a parameter estimation algorithm of the proposed model based on variational expectation maximization (EM) procedure.The experimental results on two real datasets show the effectiveness of the proposed model.

  • 综述评论
    QIAN Zhi-hong;WANG Yi-jun
    Acta Electronica Sinica. 2012, 40(5): 1023-1029. https://doi.org/10.3969/j.issn.0372-2112.2012.05.026
    CSCD(63)
    Based on analyzing IoT two basic concepts,architecture of IoT is proposed,which includes underlayer network distribution,convergence gateway access,inter-connected network integration and terminal user application.In the architecture,a protocol structure of IoT is given,which consists of network protocol layers,network control platform and application terminal platform,and the key technologies for IoT have been discussed concerning hardware and software.Six development conceptions of future IoT have been presented based on summarizing the existing problems of IoT in standards,technologies,security and application.
  • 综述评论
    SU Song-zhi;LI Shao-zi;CHEN Shu-yuan;CAI Guo-rong;;WU Yun-dong
    Acta Electronica Sinica. 2012, 40(4): 814-820. https://doi.org/10.3969/j.issn.0372-2112.2012.04.031
    CSCD(57)
    Pedestrian detection is an active area of research with challenge in computer vision.This study conducts a detailed survey on state-of-the-art pedestrian detection methods from 2005 to 2011,focusing on the two most important problems:feature extraction,the classification and localization.We divided these methods into different categories;pedestrian features are divided into three subcategories:low-level feature,learning-based feature and hybrid feature.On the other hand,classification and localization is also divided into two sub-categories:sliding window and beyond sliding window.According to the taxonomy,the pros and cons of different approaches are discussed.Finally,some experiences of how to construct a robust pedestrian detector are presented and future research trends are proposed.
  • 论文
    SHI Guang-ming;LIU Dan-hua;GAO Da-hua;LIU Zhe;LIN Jie;WANG Liang-jun
    Acta Electronica Sinica. 2009, 37(5): 1070-1081.
    Sampling is the bridge between analog source signal and digital signal.With the rapid progress of information technologies,the demands for information are increasing dramatically.So the existing systems are very difficult to meet the challenges of high speed sampling,large volume data transmission and storage.How to acquire information in signal efficiently is an urgent problem in electronic information fields.In recent years,an emerging theory of signal acquirement——compressed sensing (CS) provides a golden opportunity for solving this problem.This paper reviews the theoretical framework and the key technical problems of compressed sensing and introduces the latest developments of signal sparse representation,design of measurement matrix and reconstruction algorithm.Then this paper also reviews several open problems in CS theory and discusses the existing difficult problems.In the end,the application fields of compressed sensing are introduced.
  • JIAO Li-cheng;YANG Shu-yuan;LIU Fang;HOU Biao
    Acta Electronica Sinica. 2011, 39(7): 1651-1662.

    Compressive Sensing(CS) is a new developed theoretical framework for information acquisition and processing,which is based on matrix analysis,statistical probability theory,topological geometry,optimization and opsearch,functional analysis and so on.The high-dimensional signals can be recovered from the low-dimensional and sub-Nyquist sampling data based on the compressibility of signals.It not only inspires us to survey the linear problem again,but also enriches the optimization approaches for signal recovery to promote the combination of mathematics with engineering application.Nowadays the researches on compressive sensing have developed from the earlier concept understanding,numerical simulation,principle verification,and primary system designation,to the deeper researches on theory,development and application of practical system.In this paper,we introduce the basic idea of compressive sensing,and the development history,current and future challenges.

  • 论文
    REN Hai-bing;ZHU Yuan-xin;XU Guang-you;LIN Xue-yin;ZHANG Xiao-ping
    Acta Electronica Sinica. 2000, 28(2): 118-121.
    Hand gestures play a natural and intuitive communication mode for all human dialogs.The ability for computer to visually recognize hand gestures is essential for future human-computer interaction.However,vision-based recognition of hand gestures is an extremely challenging interdisciplinary project due to following three reasons:(1)hand gestures are rich in diversities,multi-meanings,and space-time varieties;(2)human hands are complex non-rigid objects;(3)computer vision itself is an ill-posed problem.This paper presents a survey on visual recognition of hand gestures from points of modeling,analysis and recognition techniques of vision-based hand gestures recognition.
  • PAPERS
    YAN Meng, YANG Ying, WANG Gang, LIU Xiao-guang
    ACTA ELECTRONICA SINICA. 2024, 52(4): 1364-1376. https://doi.org/10.12263/DZXB.20220219
    Abstract (807) Download PDF (10532) HTML (605)   Knowledge map   Save

    For the permissioned blockchain, the commonly-used full-replication storage mode impacts the storage scalability and security. To solve the problem, a blockchain storage sharding scheme was proposed, which offered good performance, high reliability, and low storage overhead. The network is divided into several storage units, each of which holds a certain number of blockchain copies through cooperation among nodes. The initial allocation distributes each new block to fixed-number of nodes. According to the changing access pattern, the adaptive replication increases replicas of popular blocks, and the storage optimization switches unpopular blocks into encoded mode. Experimental results show that, compared with the full-replication mode, the proposed scheme reduces the storage overhead of full nodes by on average 71%, with the performance kept at a proper level.

  • SHEN Lan-sun, WANG Ai-min, WEI Bao-guo, WANG Yong-gang, ZHAO Zhong-xu
    Acta Electronica Sinica. 2001, 29(S1): 1762-1765.
    Tongue Diagnosis is one of the essential methods of traditional Chinese medical diagnosis.The accuracy of tongue diagnosis can be improved by tongue characterizaton.This paper investigates the use of image analysis techniques for tongue characterization by evaluating visual features obtained from images.Several algorithms are presented for color calibration,tongue area segmentation,feature analysis for the tongue and its coating and quantification of the cracks of the tongue.The clinical application shows the effectiveness of the algorithms.
  • YANG Li-cai, LI Bai-min, LI Guang-lin, JIA Lei
    Acta Electronica Sinica. 2005, 33(7): 1234-1241.
    Brain-computer interfaces provide a direct communication and control channel for sending messages and instructions from brain to external computers or other electronic devices.Using the non-muscular channel,subjects with severe neuromuscular dysfunction can directly express their thought and manipulate the external devices without using human language and actions.This will greatly enhance the ability of these subjects to manage external event and will improve their living quality.Brain-computer interface technology is an interdisciplinary technology integrating neurology,signal collection,signal processing,pattern recognition and more other relevant techniques.In the present paper,we review the development,the rationale and the methodology of BCI's technology and the major limitations in the BCI's implementation and applications,and then discuss some vital aspects that may be conducted in the future investigations.
  • PAN Jing, XU Feng, WANG Yuan, ZHANG Lin, LÜ Jian
    Acta Electronica Sinica. 2006, 34(S1): 2571-2574.
    Most existing trust management systems have two main problems,(1) hard to provide security guarantee for web resources since their implements do not comply with Web Service standards;(2) the chief trust engine runs at a low efficiency,cannot fulfill demands of on time security policy in the all long changeable environment.We use java language to design and implement a trust engine oriented to Web Service based on mobile agent to satisfy security demands in the open and dynamic web environment.The main work of trust engine is to verify whether a web resource can be visited by some client.We use mobile agent to do bidirectional trust chain discovery to impro ve the efficiency of the trust engine.
  • SUN Dong-mei, QIU Zheng-ding
    Acta Electronica Sinica. 2001, 29(S1): 1744-1748.
    An accurate automatic personal identification is critical to our highly inter-connected information society.Biometrics refers to automatic identification of an individual based on her/his physiological or behavioral traits.Though biometrics is not an identi-fication panacea,it is beginning to provide very powerful tools for problems requiring positive identification.This paper attempts to summarize important research issues in biometrics.
  • CHEN Hao-wen, LI Xiang, ZHUANG Zhao-wen
    Accepted: 2023-01-18
    Multiple-input multiple-output (MIMO) radar as a new radar system is proposed at the beginning of 21st century,which has been attracting much attention of researchers and institutions all over the world.In this paper,MIMO radar theory is summarized based on the current literature firstly.Then,the potential capabilities of system configuration,signal design,target detection,parameter estimation and high resolution performance are introduced.At the same time,the restricting factors in practical application are pointed out.Finally,some further work and the technical difficulties in MIMO radar are predicted.
  • 论文
    GAO Ying;XIE Sheng-li
    Acta Electronica Sinica. 2001, 29(8): 1094-1097.
    This paper discusses about some algorithms of variable step size LMS adaptive filtering and establishes another new non-linear functional relationship between μ and e(n).The functional relationship is not only simpler than Sigmoid functional relationship,but also has the property of slight change e(n) near to zero.Therefore it is superior to Sigmoid functional relationship in the process of step size change of adaptive steady state.On the basis of the functional relationship,The author presents the new algorithm of variable step size LMS adaptive filtering and analyses the algorithm with various α and β.the algorithm has less computational complexity than the former algorithms,besides good convergence properties.Computer simulation results confirms the theoretical analysis and shows the algorithm performance is better than that of former algorithms.
  • 学术论文
    XU Xin-zheng;DING Shi-fei;SHI Zhong-zhi;JIA Wei-kuan
    Acta Electronica Sinica. 2010, 38(2A): 76-82.

    Image segmentation is a classic problem in computer vision,and become a hot topic in the field of image understanding.The research actuality and new progress in image segmentation in recent years are summarized in this paper.Firstly,the traditional methods of image segmentation are introduced summarily.Then,the specific theory for image segmentation,including morphology,fuzzy sets and neural network,support vector machine,immune algorithm,graph theory and granular computing,are presented emphatically.Furthermore,several new representative papers with the application of each theory are analyzed and discussed.Finally,the development trend of image segmentation method is discussed.

  • 论文
    ZHOU Le-zhu;LI Dou;GUO Wen-jia
    Acta Electronica Sinica. 2001, 29(6): 824-828.
    Multiple-beam antennas have found wide use in a variety of applications involving satellite communications.In this paper a summary of several structure schemes of multiple-beam antennas for satellite communications is presented,and a comparison about their advantages and drawbacks are also made.Some topics to be further researched are pointed out.
  • DENG Bin, WU Cheng-guang, QIN Yu-liang, LI Xiang, WANG Hong-qiang
    Acta Electronica Sinica. 2013, 41(12): 2436-2442. https://doi.org/10.3969/j.issn.0372-2112.2013.12.018
    CSCD(5)
    Target micro-motion conveys vital information which is favorable for understanding synthetic aperture radar (SAR) images.However,image defocusing also ensues.Therefore,techniques on micro-motion effect analysis,micro-motion target detection and imaging are gaining more and more attentions in the remote sensing field.These techniques are generally named SAR/micro-motion target indication (SAR/MMTI).In this paper,topics on SAR/MMTI are introduced including its concept,key difficulties,existing experiments,processing approaches,and its application promise.Some directions of future work on SAR micro-motion are predicted at last.
  • 综述评论
    XIAO Zhu;WANG Yong-chao;TIAN Bin;YU Quan;YI Ke-chu
    Acta Electronica Sinica. 2011, 39(1): 133-141.
    Ultra-Wideband (UWB) has the ability of achieving the better ranging and localization precision than current wireless system.The research and application of UWB localization are studied on this paper,in which the main topics include the different UWB localization methods like TOA/TDOA(Time/Time Difference of Arrival),multipath delay estimation theory,non-light-of-sight localization,cooperative localization,MB-OFDM(Orthogonal Frequency Division Multiplexing) and other ultra-wideband signals localization.Then its development and actuality are discussed in details.The existing problems and several future valuable research directions are summarized finally.
  • SURVEYS AND REVIEWS
    CHEN Jian-rui, WANG Jing-jing, HOU Xiang-wang, FANG Zheng-ru, DU Jun, REN Yong
    Acta Electronica Sinica. 2021, 49(12): 2458-2467. https://doi.org/10.12263/DZXB.20201448
    Abstract (1329) Download PDF (6822) HTML (700)   Knowledge map   Save
    CSCD(9)

    In recent years, swarm intelligence, as a novel multi-disciplinary technology, has made remarkable achievements in various fields, such as shared traffic, swarm unmanned aerial vehicle system, underwater multi-agent platform, and so on, but the swarm intelligence technology combined with underwater scene is lack of systematic induction. Therefore, it is necessary to discuss and analyze the development status and trend of underwater swarm intelligence technology. This review aims to study and summarize the underwater swarm intelligence technology. It makes a complete introduction to the swarm intelligence theory, and gives the complete concept, specific algorithm and application field of swarm intelligence. And swarm intelligence technology needs to be applied to underwater scenes in order to solve a series of difficulties caused by complex marine environment. This review summarizes the research status of underwater swarm intelligence technology at home and abroad, and comments on the difficulties of underwater swarm intelligence, such as complex environment, limited communication, difficult information acquisition, insufficient system capacity and limited energy supply. In addition, aiming at these difficulties, this review analyzes the time-varying environment perception technology, underwater sensor network, collaborative navigation and positioning technology, path planning technology, underwater formation control and distributed autonomous decision-making technology combined with swarm intelligence theory, and gives the future application of underwater swarm intelligence technology in cross domain communication, multi-platform heterogeneous development trend and prospect of innovation of independent operation ability.

  • WANG Qiang, LI Jia, SHEN Yi
    Acta Electronica Sinica. 2013, 41(10): 2041-2050. https://doi.org/10.3969/j.issn.0372-2112.2013.10.027
    CSCD(31)
    Measurement matrix,whose performance can affect the compression and reconstruction of original signal,plays a key role in compressive sensing.Most of the existing measurement matrices are random ones,which have shortcomings in practical application,such as large storage capacity,low efficiency and difficulty when implemented in the hardware.Therefore,it is of important practical significance to construct deterministic measurement matrix for the promotion and application of the compressive sensing theory.In this paper,the existing construction algorithms for deterministic measurement matrix are reviewed,introduced and classified in detail.Finally the performances of all algorithms are summarized in terms of common indicators.
  • SURVEYS AND REVIEWS
    LIN Lin, HUANG Li, KONG Lei, LIU Fu-qiang, YAN Hao
    Acta Electronica Sinica. 2022, 50(6): 1492-1520. https://doi.org/10.12263/DZXB.20210822
    Abstract (1765) Download PDF (6594) HTML (1181)   Knowledge map   Save
    CSCD(1)

    Molecular communication, which uses tiny particles to encode, transmit and receive information, is a communication paradigm with good biological compatibility and small size, and is the one of the most promising communication schemes for the realization of nanonetwork engineering. The concept of molecular communication has attracted wide attention since it was put forward. At present, the theory of molecular communication has been widely studied, and the related experiments have also made progress. However, there are still many problems to be solved in the construction of practical molecular communication systems. To promote the development of molecular communication, it is necessary to systematically summarize the theories and current research progress of molecular communication. In this paper, the basic concepts and research progress of diffusion-based molecular communication are described, including channel models, signal encoding, modulation, and receiving mechanisms. In addition, the latest research progress of the synchronization mechanisms of molecular communication systems, mobile molecular communication systems, and molecular communication experiment systems are introduced. Finally, future works and research directions are given.

  • 学术论文
    XU Bao-guo;SONG Ai-guo;FEI Shu-min
    Acta Electronica Sinica. 2011, 39(5): 1025-1030.
    In the study of brain-computer interface (BCI),a novel method of extracting electroencephalography (EEG) features based on discrete wavelet transform (DWT) and autoregressive (AR) model was proposed.First,the EEG signal was decomposed to three levels by Daubechies wavelet function and statistics of wavelet coefficients were computed.Also,the sixth-order AR coefficients of the EEG signal were estimated using Burg's algorithm.Then,the combination features were used as an input vector for neural network (NN) classifier,support vector machine (SVM) classifier,and linear discriminant analysis (LDA) classifier.Performance of this feature extraction method was tested using the data set from BCI 2003 competition.The recognition rate was compared with the best result of the competition and the classification results showed the effectiveness of this algorithm.Moreover,applying this pattern recognition algorithm to online robot control system based on EEG,the average accuracy of 89.5% was obtained.This method provides a new idea for the study of online BCI system.
  • SURVEYS AND REVIEWS
    LIU Ying, PANG Yu-liang, ZHANG Wei-dong, LI Da-xiang, XU Zhi-jie
    Acta Electronica Sinica. 2023, 51(10): 2960-2984. https://doi.org/10.12263/DZXB.20230397
    Abstract (1070) Download PDF (6510) HTML (1060)   Knowledge map   Save
    CSCD(1)

    As one of the important research directions in the field of computer vision, image classification has a wide range of applications. The success of deep learning-based image classification techniques depends on a large amount of annotated data. However, the cost of data annotation is often expensive. Active learning is a machine learning method that aims to achieve the expected model performance with as few high-quality annotated data as possible, and it can alleviate the problem of high annotation costs and difficulty in obtaining a large amount of annotation information in supervised learning tasks. Based on a sample selection strategy, active learning for image classification selects samples from the unlabeled dataset which are informative and thus contribute more to the training of the classification model, in order to update the annotated training data pool. This process is repeated until a given stopping condition is met or the model annotation budget is exhausted. This paper provides a comprehensive survey of the active learning image classification algorithms published in recent years. According the strategies applied in sample data processing and model structure optimization, existing algorithms are classified into three categories: algorithms based on data augmentation, including those using image augmentation to expand the scale of training data or using the differences in image feature interpolation to select high-quality training data; algorithms based on data distribution information, which optimize sample selection strategies based on the characteristics of data distribution; algorithms for optimizing model predictions, including methods for optimizing the acquisition and utilization of deep model prediction information, improving the predictive model structure through the use of generative adversarial networks and reinforcement learning, as well as enhancing model prediction performance based on the Transformer architecture to ensure the reliability of model predictions. In addition, this paper also conducts experimental comparisons on important academic work under various types of active learning image classification algorithms, and analyzes the performance and adaptability of each algorithm on datasets of different scales. Furthermore, this paper discusses the challenges faced by active learning image classification technology and points out future research directions.

  • 科研通信
    SONG Jin-ze;DAI Bin;SHAN En-zhong;HE Han-gen
    Acta Electronica Sinica. 2010, 38(2A): 225-228.
    Aiming at the application of ALV (automatic land vehicle),an improved RRT (Rapidly Random-exploring Trees) path planning algorithm is proposed.The algorithm combines the noholonomic constraints of vehicle with double extend RRTs,which not only improves the efficiency of searching but also guarantees the feasibility of the path at the same time.The path points are taken as reference points for the B-spline basic function,approach and create a new smooth route which suits for the vehicle to follow.The simulation outcomes and field tests verify the effectiveness of the method proposed.
  • 学术论文
    WEN Xue-zhi;;FANG Wei;ZHENG Yu-hui;
    Acta Electronica Sinica. 2011, 39(5): 1121-1126.
    An algorithm based on Haar-like features and AdaBoost classifier for vehicle recognition is proposed to solve the problem of poor recognition performance based on SVM (Support Vector Machines) classifier and cascaded AdaBoost classifier as well as the problem of much time consumed for training traditional AdaBoost.At first,the extended Haar-like features are extracted using integral image method,then a small number of critical features from a very large set of Haar-like features are selected while training AdaBoost,finally two classes classification is performed using the AdaBoost classifier and the selected features.Experimental results demonstrate that the proposed approaches has better performance both in recognition and time consuming than traditional methods, and shows promising perspective.
  • ZHANG Xian-da, BAO Zheng
    Acta Electronica Sinica. 2001, 29(S1): 1766-1771.
    A typical problem in array processing and data analysis is to recover the unobserved source signals from their mixtures.Blind source separation(BSS) is a powerful methodology for solving this problem.In recent years,the BSS has received considerable attention from the signal processing community and the neural network community.This paper presents a survey and review on the BSS,focusing on the independent component analysis(ICA) and the principal component analysis(PCA).
  • 论文
    Acta Electronica Sinica. 2004, 32(3): 416-420.
    A new adaptive mutation particle swarm optimizer(AMPSO),which is based on the variance of the population's fitness is presented.During the running time,the mutation probability for the current best particle is determined by two factors:the variance of the population's fitness and the current optimal solution.The ability of particle swarm optimization algorithm(PSO) to break away from the local optimum is greatly improved by the mutation.The experimental results show that the new algorithm not only has great advantage of convergence property over genetic algorithm and PSO,but also can avoid the premature convergence problem effectively.
  • SUN Xue-hong, LI Qiang, PANG Dan-xu, ZENG Zhi-min
    Acta Electronica Sinica. 2015, 43(11): 2305-2314. https://doi.org/10.3969/j.issn.0372-2112.2015.11.025
    CSCD(14)

    With the rapid development of wireless communication technology,spectrum efficiency and system capacity has been close to the Shannon limit.As a new technology,the orbital angular momentum(OAM) has attractive properties of high spectrum utilization and anti-interference,arousing widespread concerns of domestic and foreign academics.Firstly,this paper reviews the application of OAM and the basic principle of wireless communication system.Then,it puts emphasis on the research progress of OAM in the related fields,mainly on the in-depth analysis for key technologies of generating OAM and the summary in existing method for receiving OAM.Finally,it looks into the future and proposes some prominent issues to be solved and focused on wireless communication research and application of OAM,including generation and reception of electromagnetic vortex waves carrying OAM,the suppression of the mutual interference of the OAM electromagnetic vortex waves in different modes,coding of OAM and the separation and detection of vortex waves carrying OAM in different modes and so on.

  • CHEN Huo-wang, WANG Ji, Dong Wei
    Acta Electronica Sinica. 2003, 31(S1): 1933-1938.
    As the software plays more and more important roles in today's information society,the software reliabitity,safety and security are strongly required.The state of art of its engineering technologies for this high confidence software and the challenges it faced are descirbed in this paper.Based on the formal methods,this confidence software developing trends and its key technical points are also discussed.
  • 综述评论
    LI Jian-jiang;CUI Jian;WANG Dan;YAN Lin;HUANG Yi-shuang
    Acta Electronica Sinica. 2011, 39(11): 2635-2642.
    Through well-defined interfaces and runtime support library,MapReduce parallel programming model can automatically perform the large-scale computing tasks in parallel,hide the underlying implementation details,and reduce the difficulty of parallel programming.This paper reviews the domestic and overseas research of the MapReduce,describes and analyzes the characteristics and lack of the typical research achievements about MapReduce at home and abroad.Then this paper focus on the in-depth analysis of the key technologies about MapReduce (including:model optimization,model implementation according to the different platforms,task scheduling,load balancing,and fault tolerance).Finally,this paper prospects the MapReduce for the future trend.
  • GONG Shi-xian, WEI Xi-zhang, LI Xiang
    Acta Electronica Sinica. 2013, 41(5): 949-959. https://doi.org/10.3969/j.issn.0372-2112.2013.05.019
    CSCD(20)
    Wideband digital channelized receivers have an important application in Electronic Warfare(EW)and wireless communication,especially in Electronic Intelligence systems(ELINT)and Radar Warning Receiver(RWR)systems.This paper introduces the channelized receiver systems and the structures of the channelized technique.And base on the analysis of the development history of the channelized Receivers,we can see that the channelized Receivers system trend towards wideband digital and the digital channelized technique trend towards nouniform channelized to make channelized Receivers more suitable to the modern EW.
  • XIE Hui, HUANG Zhi-tao, WANG Feng-hua
    Acta Electronica Sinica. 2013, 41(6): 1166-1176. https://doi.org/10.3969/j.issn.0372-2112.2013.06.019
    CSCD(36)
    Blind recognition of channel coding plays an important role in the field of non-cooperative signal processing,which has been extended from the signal level to the information level.Blind recognition of channel coding is widely used in the fields of intelligence communication,information interception and information countermeasure.Firstly,the recognition algorithms of convolution code,BCH code,RS code,Turbo code and scramble code which are commonly used in modern digital communication systems were summarized and classified.Then the theories of the algorithms were described,and the computational complexity and performances in noisy environment of the algorithms were analyzed.Finally,the future of blind recognition of channel coding was pointed out based on the shortcoming of current algorithms and practical need.
  • LIN Xiang-hong, WANG Xiang-wen, ZHANG Ning, MA Hui-fang
    Acta Electronica Sinica. 2015, 43(3): 577-586. https://doi.org/10.3969/j.issn.0372-2112.2015.03.024
    CSCD(15)

    Spiking neural networks are shown to be suitable tools for the processing of spatio-temporal information.However, due to their intricately discontinuous and implicit nonlinear mechanisms, the formulation of efficient supervised learning algorithms for spiking neural networks is difficult, which is an important problem in the research area.In this paper, we introduce the general framework of supervised learning algorithms for spiking neural networks, and analyze their performance evaluations including spike trains learning ability, offline and online processing ability, the locality of learning mechanism and the applicability to network structure.Furthermore, we survey the advance of the research on supervised learning algorithms, which can be divided into three categories according to their differences:gradient descent rule, synaptic plasticity rule, and spike trains convolution rule.Finally, we discuss the advantages and disadvantages of these algorithms, and prospect the problems in current research and some future research directions in this area.

  • 学术论文
    NING Huan-sheng;XU Qun-yu
    Acta Electronica Sinica. 2010, 38(11): 2590-2599.
    This paper interprets the Internet of Things (IoT) definitions and gives our understanding for the IoT concept in terms of "Sensor network of Things",and describes the global developments and international strategic plans towards this technology in US,Europe,Japan and China.Key technologies are further discussed in detail,with a focus on Identification Technology,Architecture Technology,Communication and Network,Search and Discovery Service,Data Processing,Security and Privacy,Standardization and Governance.Some advice are given for China IoT Construction within three aspects:national,industrial and academic Dimensions.The paper aims to provide reference for the research and development of China IoT.
  • 论文
    JIAO Li-cheng;DU Hai-feng
    Acta Electronica Sinica. 2003, 31(10): 1540-1548.
    The history,research areas and development directions of the artificial immune system are reviewed.The research on immune mechanism,algorithm and application are emphasized. The similarities and differences between the AIS and evolutionary algorithms,neural networks,general optimized algorithm are studied.Based on the disadvantage of AIS,the development directions are discussed.
  • PAN Zong-xu, YU Jing, XIAO Chuang-bai, SUN Wei-dong
    Acta Electronica Sinica. 2015, 43(2): 209-216. https://doi.org/10.3969/j.issn.0372-2112.2015.02.001
    CSCD(18)

    Adaptive dictionary learning uses the low resolution image itself as training samples to make the similar patches have sparse representation over the learned dictionary,so that extra information can be exploited from structural self-similarity by dictionary learning.In this paper,we propose a single image super resolution method based on adaptive multi-dictionary learning.To exploit extra information from both the low resolution image itself,and the image database,the proposed method incorporates the idea of global dictionary learning that the image database can be used to obtain extra information into the process of adaptive dictionary learning.In the proposed method,all patches in the image pyramid of the low resolution image are clustered into several groups,then each patch satisfying a certain condition in the database is classified into one of these groups with the supervision of the clustering results,and multi-dictionary learning is used to learn corresponding dictionaries for different groups.Experimental results demonstrate that our method achieves better result compared with ScSR,SISR,NLIBP,CSSS and mSSIM methods.

  • FAN Ke-feng, MO Wei, CAO Shan, ZHAO Xin-hua, PEI Qing-qi
    Acta Electronica Sinica. 2007, 35(6): 1139-1147.
    With the rapid development of ICT technologies,the distribution,copying,and editing the digital media content is more and more easy.The copyright management and content protection of digital content may decrease the content piracy and abnormal usage.In this paper,the basic principal of DRM (digital rights management) is introduced firstly.The key technologies of DRM are summarized in detail secondly.The DRM applications of main scenarios are analyzed thirdly.In addition,several challengeable problems are discussed.Finally,the key research interest and development tendency are expected.
  • ZOU Quan, GUO Mao-zu, ZHANG Tao-tao
    Acta Electronica Sinica. 2008, 36(2): 331-337.
    RNA secondary structure prediction is one of the most important fields in computational molecular biology.The method to predict RNA secondary structure is introduced,including the mathematic models,main algorithms and softwares.Then seven main softwares are tested and compared detailedly with some groups of tRNA and RNase P.It showed that Pfold performed better than others when several homologous RNA sequences were predicted.At last some vital aspects that may be conducted in the future investigations are discussed.
  • SURVEYS AND REVIEWS
    JIANG Hua-wei, GUO Tao, YANG Zhen
    Acta Electronica Sinica. 2022, 50(2): 480-492. https://doi.org/10.12263/DZXB.20201154
    Abstract (1992) Download PDF (5859) HTML (1502)   Knowledge map   Save
    CSCD(2)

    As a classical combinatorial optimization problem, vehicle routing has always been a hot and difficult research topic. It is very important to make reasonable planning for it in both emergency management and logistics distribution. In order to better carry out related work in the future, this paper reviewed the research progress of exact algorithm, heuristic algorithm, and machine learning algorithm in vehicle routing optimization problem. Then the comparisons of the performance of six classical algorithms were conducted based on Solomon standard data set. The development trend was prospected from the aspects of balance relationship between the local optimum and the convergence speed, individual evaluation function, dynamic vehicle routing problem, and the application of machine learning algorithms in the vehicle routing problem.

  • SURVEYS AND REVIEWS
    ZHU Jian, HU Kai, ZHANG Bo-jun
    Acta Electronica Sinica. 2021, 49(4): 792-804. https://doi.org/10.12263/DZXB.20200723
    CSCD(8)
    Formal methods are widely used in safety-critical software systems and have effective mathematical-based verification methods, while smart contracts belong to safety-critical codes. Using formal methods to verify smart contracts has become a popular research topic. This paper has conducted researches and analysis on 47 typical related papers since 2015 and carried out detailed classification research and comparative analysis on technology, as well as the formal methods, languages, tools and frameworks used in the formal verification of smart contracts overview. Research shows that theorem proving technique and symbolic execution technique have the widest scope of application, can verify the most properties and are involved in many basic frameworks. And the runtime verification is a new lightweight verification technology, still in the exploratory stage. From this, we have listed some key issues such as automatic verification of smart contracts, conversion consistency, trust in formal tools, and evaluation criteria for formal verification. This paper also looks forward for the future research direction on the combination of formal methods and smart contracts. For attracting more valuable ideas and promote the research in the field.