首页 > 最新文献

Chinese Journal of Electronics最新文献

英文 中文
A Local Differential Privacy Hybrid Data Clustering Iterative Algorithm for Edge Computing 用于边缘计算的局部差分隐私混合数据聚类迭代算法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2023.00.332
Yousheng Zhou;Zhonghan Wang;Yuanni Liu
As a new computing method, edge computing not only improves the computing efficiency and processing power of data, but also reduces the transmission delay of data. Due to the wide variety of edge devices and the increasing amount of terminal data, third-party data centers are unable to ensure no user privacy data leaked. To solve these problems, this paper proposes an iterative clustering algorithm named local differential privacy iterative aggregation (LDPIA) based on localized differential privacy, which implements local differential privacy. To address the problem of uncertainty in numerical types of mixed data, random perturbation is applied to the user data at the attribute category level. The server then performs clustering on the perturbed data, and density threshold and disturbance probability are introduced to update the cluster point set iteratively. In addition, a new distance calculation formula is defined in combination with attribute weights to ensure the availability of data. The experimental results show that LDPIA algorithm achieves better privacy protection and availability simultaneously.
作为一种新的计算方式,边缘计算不仅能提高计算效率和数据处理能力,还能减少数据的传输延迟。由于边缘设备种类繁多,终端数据量不断增加,第三方数据中心无法确保用户隐私数据不被泄露。为了解决这些问题,本文提出了一种基于局部差分隐私的迭代聚类算法,命名为局部差分隐私迭代聚类(LDPIA),实现了局部差分隐私。为解决数值类型混合数据的不确定性问题,在属性类别层面对用户数据进行随机扰动。然后,服务器对扰动数据进行聚类,并引入密度阈值和扰动概率来迭代更新聚类点集。此外,还结合属性权重定义了新的距离计算公式,以确保数据的可用性。实验结果表明,LDPIA 算法同时实现了更好的隐私保护和可用性。
{"title":"A Local Differential Privacy Hybrid Data Clustering Iterative Algorithm for Edge Computing","authors":"Yousheng Zhou;Zhonghan Wang;Yuanni Liu","doi":"10.23919/cje.2023.00.332","DOIUrl":"https://doi.org/10.23919/cje.2023.00.332","url":null,"abstract":"As a new computing method, edge computing not only improves the computing efficiency and processing power of data, but also reduces the transmission delay of data. Due to the wide variety of edge devices and the increasing amount of terminal data, third-party data centers are unable to ensure no user privacy data leaked. To solve these problems, this paper proposes an iterative clustering algorithm named local differential privacy iterative aggregation (LDPIA) based on localized differential privacy, which implements local differential privacy. To address the problem of uncertainty in numerical types of mixed data, random perturbation is applied to the user data at the attribute category level. The server then performs clustering on the perturbed data, and density threshold and disturbance probability are introduced to update the cluster point set iteratively. In addition, a new distance calculation formula is defined in combination with attribute weights to ensure the availability of data. The experimental results show that LDPIA algorithm achieves better privacy protection and availability simultaneously.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1421-1434"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748533","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Graph Completion Method of Combining Structural Information with Semantic Information 将结构信息与语义信息相结合的知识图谱补全方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2022.00.299
Binhao Hu;Jianpeng Zhang;Hongchang Chen
With the development of knowledge graphs, a series of applications based on knowledge graphs have emerged. The incompleteness of knowledge graphs makes the effect of the downstream applications affected by the quality of the knowledge graphs. To improve the quality of knowledge graphs, translation-based graph embeddings such as TransE, learn structural information by representing triples as low-dimensional dense vectors. However, it is difficult to generalize to the unseen entities that are not observed during training but appear during testing. Other methods use the powerful representational ability of pre-trained language models to learn entity descriptions and contextual representation of triples. Although they are robust to incompleteness, they need to calculate the score of all candidate entities for each triple during inference. We consider combining two models to enhance the robustness of unseen entities by semantic information, and prevent combined explosion by reducing inference overhead through structured information. We use a pre-training language model to code triples and learn the semantic information within them, and use a hyperbolic space-based distance model to learn structural information, then integrate the two types of information together. We evaluate our model by performing link prediction experiments on standard datasets. The experimental results show that our model achieves better performances than state-of-the-art methods on two standard datasets.
随着知识图谱的发展,出现了一系列基于知识图谱的应用。知识图谱的不完整性使得下游应用的效果受到知识图谱质量的影响。为了提高知识图谱的质量,基于翻译的图嵌入(如 TransE)通过将三元组表示为低维密集向量来学习结构信息。然而,这种方法很难泛化到在训练过程中没有观察到但在测试过程中出现的未见实体。其他方法则利用预训练语言模型的强大表征能力来学习实体描述和三元组的上下文表征。虽然它们对不完整性具有鲁棒性,但在推理过程中需要计算每个三元组的所有候选实体的得分。我们考虑将两种模型结合起来,通过语义信息增强未见实体的鲁棒性,并通过结构化信息减少推理开销,防止组合爆炸。我们使用预训练语言模型对三元组进行编码并学习其中的语义信息,同时使用基于双曲空间的距离模型学习结构信息,然后将这两类信息整合在一起。我们通过在标准数据集上进行链接预测实验来评估我们的模型。实验结果表明,在两个标准数据集上,我们的模型比最先进的方法取得了更好的性能。
{"title":"Knowledge Graph Completion Method of Combining Structural Information with Semantic Information","authors":"Binhao Hu;Jianpeng Zhang;Hongchang Chen","doi":"10.23919/cje.2022.00.299","DOIUrl":"https://doi.org/10.23919/cje.2022.00.299","url":null,"abstract":"With the development of knowledge graphs, a series of applications based on knowledge graphs have emerged. The incompleteness of knowledge graphs makes the effect of the downstream applications affected by the quality of the knowledge graphs. To improve the quality of knowledge graphs, translation-based graph embeddings such as TransE, learn structural information by representing triples as low-dimensional dense vectors. However, it is difficult to generalize to the unseen entities that are not observed during training but appear during testing. Other methods use the powerful representational ability of pre-trained language models to learn entity descriptions and contextual representation of triples. Although they are robust to incompleteness, they need to calculate the score of all candidate entities for each triple during inference. We consider combining two models to enhance the robustness of unseen entities by semantic information, and prevent combined explosion by reducing inference overhead through structured information. We use a pre-training language model to code triples and learn the semantic information within them, and use a hyperbolic space-based distance model to learn structural information, then integrate the two types of information together. We evaluate our model by performing link prediction experiments on standard datasets. The experimental results show that our model achieves better performances than state-of-the-art methods on two standard datasets.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1412-1420"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748382","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FMR-GNet: Forward Mix-Hop Spatial-Temporal Residual Graph Network for 3D Pose Estimation FMR-GNet:用于三维姿态估计的前向混合跳转时空残差图网络
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2022.00.365
Honghong Yang;Hongxi Liu;Yumei Zhang;Xiaojun Wu
Graph convolutional networks that leverage spatial-temporal information from skeletal data have emerged as a popular approach for 3D human pose estimation. However, comprehensively modeling consistent spatial-temporal dependencies among the body joints remains a challenging task. Current approaches are limited by performing graph convolutions solely on immediate neighbors, deploying separate spatial or temporal modules, and utilizing single-pass feedforward architectures. To solve these limitations, we propose a forward multi-scale residual graph convolutional network (FMR-GNet) for 3D pose estimation from monocular video. First, we introduce a mix-hop spatial-temporal attention graph convolution layer that effectively aggregates neighboring features with learnable weights over large receptive fields. The attention mechanism enables dynamically computing edge weights at each layer. Second, we devise a cross-domain spatial-temporal residual module to fuse multi-scale spatial-temporal convolutional features through residual connections, explicitly modeling interdependencies across spatial and temporal domains. Third, we integrate a forward dense connection block to propagate spatial-temporal representations across network layers, enabling high-level semantic skeleton information to enrich lower-level features. Comprehensive experiments conducted on two challenging 3D human pose estimation benchmarks, namely Human3.6M and MPI-INF-3DHP, demonstrate that the proposed FMR-GNet achieves superior performance, surpassing the most state-of-the-art methods.
利用骨骼数据中的时空信息的图卷积网络已成为三维人体姿态估计的一种流行方法。然而,全面建模身体关节间一致的时空依赖关系仍然是一项具有挑战性的任务。目前的方法局限于仅对近邻进行图卷积、部署单独的空间或时间模块以及使用单通道前馈架构。为了解决这些局限性,我们提出了一种前向多尺度残差图卷积网络(FMR-GNet),用于从单目视频中进行三维姿态估计。首先,我们引入了一个混合跳转的时空注意力图卷积层,它能有效地将邻近特征与可学习的权重聚合在大型感受野上。这种注意力机制可以动态计算每一层的边缘权重。其次,我们设计了一个跨域时空残差模块,通过残差连接融合多尺度时空卷积特征,明确模拟跨时空域的相互依存关系。第三,我们整合了一个前向密集连接块,以跨网络层传播时空表征,从而使高层语义骨架信息能够丰富低层特征。在两个具有挑战性的三维人体姿态估计基准(即 Human3.6M 和 MPI-INF-3DHP)上进行的综合实验表明,所提出的 FMR-GNet 实现了卓越的性能,超越了最先进的方法。
{"title":"FMR-GNet: Forward Mix-Hop Spatial-Temporal Residual Graph Network for 3D Pose Estimation","authors":"Honghong Yang;Hongxi Liu;Yumei Zhang;Xiaojun Wu","doi":"10.23919/cje.2022.00.365","DOIUrl":"https://doi.org/10.23919/cje.2022.00.365","url":null,"abstract":"Graph convolutional networks that leverage spatial-temporal information from skeletal data have emerged as a popular approach for 3D human pose estimation. However, comprehensively modeling consistent spatial-temporal dependencies among the body joints remains a challenging task. Current approaches are limited by performing graph convolutions solely on immediate neighbors, deploying separate spatial or temporal modules, and utilizing single-pass feedforward architectures. To solve these limitations, we propose a forward multi-scale residual graph convolutional network (FMR-GNet) for 3D pose estimation from monocular video. First, we introduce a mix-hop spatial-temporal attention graph convolution layer that effectively aggregates neighboring features with learnable weights over large receptive fields. The attention mechanism enables dynamically computing edge weights at each layer. Second, we devise a cross-domain spatial-temporal residual module to fuse multi-scale spatial-temporal convolutional features through residual connections, explicitly modeling interdependencies across spatial and temporal domains. Third, we integrate a forward dense connection block to propagate spatial-temporal representations across network layers, enabling high-level semantic skeleton information to enrich lower-level features. Comprehensive experiments conducted on two challenging 3D human pose estimation benchmarks, namely Human3.6M and MPI-INF-3DHP, demonstrate that the proposed FMR-GNet achieves superior performance, surpassing the most state-of-the-art methods.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1346-1359"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748551","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical Research on a D-Band Traveling Wave Extended Interaction Amplifier D 波段行波扩展交互放大器的理论研究
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2022.00.345
Zhongtao Cui;Xuesong Yuan;Xiaotao Xu;Dongrui Chen;Yifan Zu;Matthew Thomas Cole;Qingyun Chen;Yang Yan
A traveling-wave, extended interaction amplifier is herein investigated for use in millimeter-wave and terahertz amplification sources. By placing engineered extended interaction cavities between the traveling wave structures, higher gain is obtained with a shorter high frequency circuit, compared with conventional traveling wave tubes architectures. The bandwidth of the device is significantly increased relative to extended interaction klystrons. A D-band beam wave interaction circuit of 26 mm long has been designed. Particle-in-cell simulations at 21.5-kV operating voltage, 0.3-A beam current, and 5-mW input power show that the maximum output power reaches 351 W, with a gain of 48.4 dB and 3-dB bandwidth of 1.42 GHz.
本文研究了一种用于毫米波和太赫兹放大源的行波扩展交互放大器。与传统的行波管结构相比,通过在行波结构之间放置工程扩展相互作用空腔,以更短的高频电路获得更高的增益。与扩展交互 klystrons 相比,该设备的带宽显著增加。我们设计了一个 26 毫米长的 D 波段束波交互电路。在 21.5 kV 工作电压、0.3 A 束电流和 5 mW 输入功率条件下进行的粒子内电池模拟显示,最大输出功率达到 351 W,增益为 48.4 dB,3 dB 带宽为 1.42 GHz。
{"title":"Theoretical Research on a D-Band Traveling Wave Extended Interaction Amplifier","authors":"Zhongtao Cui;Xuesong Yuan;Xiaotao Xu;Dongrui Chen;Yifan Zu;Matthew Thomas Cole;Qingyun Chen;Yang Yan","doi":"10.23919/cje.2022.00.345","DOIUrl":"https://doi.org/10.23919/cje.2022.00.345","url":null,"abstract":"A traveling-wave, extended interaction amplifier is herein investigated for use in millimeter-wave and terahertz amplification sources. By placing engineered extended interaction cavities between the traveling wave structures, higher gain is obtained with a shorter high frequency circuit, compared with conventional traveling wave tubes architectures. The bandwidth of the device is significantly increased relative to extended interaction klystrons. A D-band beam wave interaction circuit of 26 mm long has been designed. Particle-in-cell simulations at 21.5-kV operating voltage, 0.3-A beam current, and 5-mW input power show that the maximum output power reaches 351 W, with a gain of 48.4 dB and 3-dB bandwidth of 1.42 GHz.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1487-1491"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748542","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Migration Algorithm Based on Markov Decision Process with Multiple Service Types and Multiple System Factors 基于马尔可夫决策过程与多种服务类型和多种系统因素的服务迁移算法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2022.00.128
Anhua Ma;Su Pan;Weiwei Zhou
This paper proposes a Markov decision process based service migration algorithm to satisfy quality of service (QoS) requirements when the terminals leave the original server. Services were divided into real-time services and non-real-time services, each type of them has different requirements on transmission bandwidth and latency, which were considered in the revenue function. Different values were assigned to the weight coefficients of QoS parameters for different service types in the revenue and cost functions so as to distinguish the differences between the two service types. The overall revenue was used for migration decisions, rather than fixed threshold or instant revenue. The Markov decision process was used to maximize the overall revenue of the system. Simulation results show that the proposed algorithm obtained more revenue compared with the existing works.
本文提出了一种基于马尔可夫决策过程的服务迁移算法,以满足终端离开原服务器时的服务质量(QoS)要求。服务分为实时服务和非实时服务,每种服务对传输带宽和延迟都有不同的要求,收入函数考虑了这些要求。在收入和成本函数中,为不同服务类型的 QoS 参数赋予了不同的权重系数,以区分两种服务类型之间的差异。迁移决策使用的是总体收入,而不是固定阈值或即时收入。马尔可夫决策过程用于最大化系统的总体收入。仿真结果表明,与现有算法相比,拟议算法获得了更多收入。
{"title":"Service Migration Algorithm Based on Markov Decision Process with Multiple Service Types and Multiple System Factors","authors":"Anhua Ma;Su Pan;Weiwei Zhou","doi":"10.23919/cje.2022.00.128","DOIUrl":"https://doi.org/10.23919/cje.2022.00.128","url":null,"abstract":"This paper proposes a Markov decision process based service migration algorithm to satisfy quality of service (QoS) requirements when the terminals leave the original server. Services were divided into real-time services and non-real-time services, each type of them has different requirements on transmission bandwidth and latency, which were considered in the revenue function. Different values were assigned to the weight coefficients of QoS parameters for different service types in the revenue and cost functions so as to distinguish the differences between the two service types. The overall revenue was used for migration decisions, rather than fixed threshold or instant revenue. The Markov decision process was used to maximize the overall revenue of the system. Simulation results show that the proposed algorithm obtained more revenue compared with the existing works.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1515-1525"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748538","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidential Image Super-Resolution with Privacy Protection 具有隐私保护功能的机密图像超级分辨率
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2023.00.034
Yiran Han;Jianwei Liu;Xin Deng;Junpeng Jing;Yanting Zhang
Nowadays, people are getting used to upload images to a third party for post-processing, such as image denoising and super-resolution. This may easily lead to the disclosure of the privacy in the confidential images. One possible solution is to encrypt the image before sending it to the third party, the encrypted image can be easily detected by a malicious attacker in the transmission channel. We propose a confidential image super-resolution method named HSR-Net which firstly hide the secret image and then super-resolve it in the hidden domain. The method is composed of three important modules: image hiding module (IHM), image super-resolution module (ISM), and image revealing module (IRM). The IHM aims to encode secret image and hide it into a cover image to generate the stego image. The stego image looks similar to the cover image but contains the information of the secret image. The third party uses the ISM to perform image super-resolution on the stego image. The user can reveal the super-resolved secret image from the stego image. The proposed HSR-Net method has two advantages. It ensures that the third party cannot directly operate on the secret image, thus protecting the user's privacy. Due to the similarity between the stego image and cover image, we can reduce the attacker's suspicion to further improve the image security. The experimental results were tested on DIV2K dataset and Flickr2K dataset. The peak signal-to-noise ratios (PSNR) of IHM, ISM, and IRM are 38.81 dB, 28.91 dB, and 23.51 dB, respectively, which verify that the proposed HSR-Net method is able to achieve image super-resolution and protect user's privacy simultaneouly.
如今,人们越来越习惯于将图像上传到第三方进行后期处理,如图像去噪和超分辨率。这很容易导致机密图像的隐私泄露。一种可行的解决方案是在将图像发送给第三方之前对其进行加密,但加密后的图像很容易被传输通道中的恶意攻击者检测到。我们提出了一种名为 HSR-Net 的机密图像超分辨率方法,它首先隐藏机密图像,然后在隐域中对其进行超分辨率处理。该方法由三个重要模块组成:图像隐藏模块(IHM)、图像超分辨率模块(ISM)和图像揭示模块(IRM)。图像隐藏模块(IHM)旨在对秘密图像进行编码,并将其隐藏到覆盖图像中,从而生成偷窃图像。伪图像看起来与封面图像相似,但包含了秘密图像的信息。第三方使用 ISM 对伪图像进行图像超分辨率处理。用户可以从伪图像中发现超分辨率的秘密图像。拟议的 HSR-Net 方法有两个优点。它确保第三方无法直接对秘密图像进行操作,从而保护了用户的隐私。由于偷窃图像和封面图像之间的相似性,我们可以减少攻击者的怀疑,从而进一步提高图像的安全性。实验结果在 DIV2K 数据集和 Flickr2K 数据集上进行了测试。IHM、ISM和IRM的峰值信噪比(PSNR)分别为38.81 dB、28.91 dB和23.51 dB,验证了所提出的HSR-Net方法能够同时实现图像超分辨率和保护用户隐私。
{"title":"Confidential Image Super-Resolution with Privacy Protection","authors":"Yiran Han;Jianwei Liu;Xin Deng;Junpeng Jing;Yanting Zhang","doi":"10.23919/cje.2023.00.034","DOIUrl":"https://doi.org/10.23919/cje.2023.00.034","url":null,"abstract":"Nowadays, people are getting used to upload images to a third party for post-processing, such as image denoising and super-resolution. This may easily lead to the disclosure of the privacy in the confidential images. One possible solution is to encrypt the image before sending it to the third party, the encrypted image can be easily detected by a malicious attacker in the transmission channel. We propose a confidential image super-resolution method named HSR-Net which firstly hide the secret image and then super-resolve it in the hidden domain. The method is composed of three important modules: image hiding module (IHM), image super-resolution module (ISM), and image revealing module (IRM). The IHM aims to encode secret image and hide it into a cover image to generate the stego image. The stego image looks similar to the cover image but contains the information of the secret image. The third party uses the ISM to perform image super-resolution on the stego image. The user can reveal the super-resolved secret image from the stego image. The proposed HSR-Net method has two advantages. It ensures that the third party cannot directly operate on the secret image, thus protecting the user's privacy. Due to the similarity between the stego image and cover image, we can reduce the attacker's suspicion to further improve the image security. The experimental results were tested on DIV2K dataset and Flickr2K dataset. The peak signal-to-noise ratios (PSNR) of IHM, ISM, and IRM are 38.81 dB, 28.91 dB, and 23.51 dB, respectively, which verify that the proposed HSR-Net method is able to achieve image super-resolution and protect user's privacy simultaneouly.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1447-1457"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748534","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing 无人机辅助移动边缘计算的协作服务供应
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2021.00.323
Yuben Qu;Zhenhua Wei;Zhen Qin;Tao Wu;Jinghao Ma;Haipeng Dai;Chao Dong
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC), as a way of coping with delay-sensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC networks. In this work, we study the problem of collaborative service provisioning (CSP) for UAV-assisted MEC. Specifically, taking into account the task latency and other resource constraints, this paper investigates how to minimize the total energy consumption of all terrestrial user equipments, by jointly optimizing computing resource allocation, task offloading, UAV trajectory, and service placement. The CSP problem is a non-convex mixed integer nonlinear programming problem, owing to the complex coupling of mixed integral variables and non-convexity of CSP. To address the CSP problem, this paper proposes an alternating optimization-based solution with the convergence guarantee as follows. We iteratively deal with the joint service placement and task offloading subproblem, and UAV movement trajectory subproblem, by branch and bound and successive convex approximation, respectively, while the closed form of the optimal computation resource allocation can be efficiently obtained. Extensive simulations validate the effectiveness of the proposed algorithm compared to three baselines.
无人飞行器(UAV)辅助移动边缘计算(MEC)作为一种应对延迟敏感和计算密集型任务的方法,被认为是解决地面 MEC 网络挑战的关键技术。在这项工作中,我们研究了无人机辅助 MEC 的协作服务供应(CSP)问题。具体来说,考虑到任务延迟和其他资源约束,本文研究了如何通过联合优化计算资源分配、任务卸载、无人机轨迹和服务投放,使所有地面用户设备的总能耗最小。由于混合积分变量的复杂耦合和 CSP 的非凸性,CSP 问题是一个非凸混合积分非线性编程问题。针对 CSP 问题,本文提出了一种基于交替优化的、具有收敛性保证的解决方案,具体如下。我们分别通过分支与约束和连续凸近似的方法迭代处理了联合服务安置和任务卸载子问题以及无人机运动轨迹子问题,同时可以高效地得到最优计算资源分配的闭合形式。大量仿真验证了所提算法与三种基线算法相比的有效性。
{"title":"Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing","authors":"Yuben Qu;Zhenhua Wei;Zhen Qin;Tao Wu;Jinghao Ma;Haipeng Dai;Chao Dong","doi":"10.23919/cje.2021.00.323","DOIUrl":"https://doi.org/10.23919/cje.2021.00.323","url":null,"abstract":"Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC), as a way of coping with delay-sensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC networks. In this work, we study the problem of collaborative service provisioning (CSP) for UAV-assisted MEC. Specifically, taking into account the task latency and other resource constraints, this paper investigates how to minimize the total energy consumption of all terrestrial user equipments, by jointly optimizing computing resource allocation, task offloading, UAV trajectory, and service placement. The CSP problem is a non-convex mixed integer nonlinear programming problem, owing to the complex coupling of mixed integral variables and non-convexity of CSP. To address the CSP problem, this paper proposes an alternating optimization-based solution with the convergence guarantee as follows. We iteratively deal with the joint service placement and task offloading subproblem, and UAV movement trajectory subproblem, by branch and bound and successive convex approximation, respectively, while the closed form of the optimal computation resource allocation can be efficiently obtained. Extensive simulations validate the effectiveness of the proposed algorithm compared to three baselines.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1504-1514"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748536","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contents 2024 内容 2024
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/CJE.2024.10748570
{"title":"Contents 2024","authors":"","doi":"10.23919/CJE.2024.10748570","DOIUrl":"https://doi.org/10.23919/CJE.2024.10748570","url":null,"abstract":"","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"I-VI"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748570","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lattice-Based Method for Recovering the Unknown Parameters of Truncated Multiple Recursive Generators with Constant 一种基于网格的方法,用于恢复具有常数的截断多重递归发生器的未知参数
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2022.00.387
Hanbing Yu;Qunxiong Zheng
Multiple recursive generators with constant, as the high-order extension of linear congruence generators, form an important class of pseudorandom number generators that are widely used in cryptography. The predictability of truncated sequences output by multiple recursive generators with constant that predicts the whole sequences by the truncated high-order bits of the sequences, is a crucial problem in cryptography. This paper studies the predictability of truncated multiple recursive generators with constant. Given a few truncated digits of high-order bits output by a multiple recursive generator with constant, we first convert the multiple recursive generator with constant to multiple recursive generator and then adopt the method we proposed recently to recover the modulus, the coefficients, and the differences of initial state. In particular, we give an estimation of the number of truncated digits required for recovering the differences of initial state by using the expected norm of target vector. We prove by exponential sums that the number of truncated digits required for uniquely determining both the initial state and the constant is finite and give an upper bound. Extensive experiments confirm the correctness of our method.
带常数的多重递归发生器作为线性全等发生器的高阶扩展,构成了一类重要的伪随机数发生器,被广泛应用于密码学领域。有常数的多重递归发生器通过序列的截断高阶位来预测整个序列,其输出的截断序列的可预测性是密码学中的一个关键问题。本文研究了带常数的截断多重递归发生器的可预测性。给定由带常数的多重递归发生器输出的高阶比特的几位截断数,我们首先将带常数的多重递归发生器转换为多重递归发生器,然后采用我们最近提出的方法来恢复模、系数和初始状态的差值。特别是,我们利用目标向量的期望规范估算了恢复初始状态差值所需的截断位数。我们通过指数和证明了唯一确定初始状态和常数所需的截断位数是有限的,并给出了一个上限。大量实验证实了我们方法的正确性。
{"title":"A Lattice-Based Method for Recovering the Unknown Parameters of Truncated Multiple Recursive Generators with Constant","authors":"Hanbing Yu;Qunxiong Zheng","doi":"10.23919/cje.2022.00.387","DOIUrl":"https://doi.org/10.23919/cje.2022.00.387","url":null,"abstract":"Multiple recursive generators with constant, as the high-order extension of linear congruence generators, form an important class of pseudorandom number generators that are widely used in cryptography. The predictability of truncated sequences output by multiple recursive generators with constant that predicts the whole sequences by the truncated high-order bits of the sequences, is a crucial problem in cryptography. This paper studies the predictability of truncated multiple recursive generators with constant. Given a few truncated digits of high-order bits output by a multiple recursive generator with constant, we first convert the multiple recursive generator with constant to multiple recursive generator and then adopt the method we proposed recently to recover the modulus, the coefficients, and the differences of initial state. In particular, we give an estimation of the number of truncated digits required for recovering the differences of initial state by using the expected norm of target vector. We prove by exponential sums that the number of truncated digits required for uniquely determining both the initial state and the constant is finite and give an upper bound. Extensive experiments confirm the correctness of our method.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1458-1467"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748545","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid ITÖ Algorithm for Large-Scale Colored Traveling Salesman Problem 大规模彩色旅行推销员问题的混合 ITÖ 算法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-11 DOI: 10.23919/cje.2023.00.040
Xueshi Dong
In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem (CTSP). When solving large-scale CTSP with a scale of more than 1000 dimensions, their convergence speed and the quality of their solutions are limited. This paper proposes a new hybrid ITÖ (HITÖ) algorithm, which integrates two new strategies, crossover operator and mutation strategy, into the standard ITÖ. In the iteration process of HITÖ, the feasible solution of CTSP is represented by the double chromosome coding, and the random drift and wave operators are used to explore and develop new unknown regions. In this process, the drift operator is executed by the improved crossover operator, and the wave operator is performed by the optimized mutation strategy. Experiments show that HITÖ is superior to the known comparison algorithms in terms of the quality solution.
在智能交通和多任务合作领域,许多实际问题都可以用彩色旅行推销员问题(CTSP)来建模。在求解规模超过 1000 维的大规模 CTSP 时,它们的收敛速度和求解质量都受到限制。本文提出了一种新的混合 ITÖ 算法(HITÖ),它在标准 ITÖ 算法的基础上集成了两种新策略:交叉算子和突变策略。在 HITÖ 的迭代过程中,CTSP 的可行解由双染色体编码表示,随机漂移算子和波浪算子用于探索和开发新的未知区域。在此过程中,漂移算子由改进的交叉算子执行,波浪算子由优化的突变策略执行。实验表明,就解决方案的质量而言,HITÖ 优于已知的比较算法。
{"title":"Hybrid ITÖ Algorithm for Large-Scale Colored Traveling Salesman Problem","authors":"Xueshi Dong","doi":"10.23919/cje.2023.00.040","DOIUrl":"https://doi.org/10.23919/cje.2023.00.040","url":null,"abstract":"In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem (CTSP). When solving large-scale CTSP with a scale of more than 1000 dimensions, their convergence speed and the quality of their solutions are limited. This paper proposes a new hybrid ITÖ (HITÖ) algorithm, which integrates two new strategies, crossover operator and mutation strategy, into the standard ITÖ. In the iteration process of HITÖ, the feasible solution of CTSP is represented by the double chromosome coding, and the random drift and wave operators are used to explore and develop new unknown regions. In this process, the drift operator is executed by the improved crossover operator, and the wave operator is performed by the optimized mutation strategy. Experiments show that HITÖ is superior to the known comparison algorithms in terms of the quality solution.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 6","pages":"1337-1345"},"PeriodicalIF":1.6,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748549","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chinese Journal of Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1