Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Gaojie Chen, Zhen Li
In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. In particular, we maximize the weighted sum secrecy rate of the system by jointly optimizing the beamforming vector for transmitted signal and artificial noise at the base station (BS) and the cooperative phase shifts of two IRSs, under the constraints of transmission power at the BS and the unit-modulus phase shift of IRSs. To tackle the nonconvexity of the optimization problem, we first convert the objective function to its concave lower bound by utilizing a novel successive convex approximation technique, then solve the transformed problem iteratively by applying an alternating optimization method. The Lagrange dual method, Karush–Kuhn–Tucker conditions, and alternating direction method of multipliers are applied to develop a low-complexity solution for each subproblem. Finally, simulation results are provided to verify the advantages of the cooperative double-IRS scheme in comparison with the benchmark schemes.
{"title":"Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network","authors":"Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Gaojie Chen, Zhen Li","doi":"10.1049/2024/7768640","DOIUrl":"10.1049/2024/7768640","url":null,"abstract":"<p>In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. In particular, we maximize the weighted sum secrecy rate of the system by jointly optimizing the beamforming vector for transmitted signal and artificial noise at the base station (BS) and the cooperative phase shifts of two IRSs, under the constraints of transmission power at the BS and the unit-modulus phase shift of IRSs. To tackle the nonconvexity of the optimization problem, we first convert the objective function to its concave lower bound by utilizing a novel successive convex approximation technique, then solve the transformed problem iteratively by applying an alternating optimization method. The Lagrange dual method, Karush–Kuhn–Tucker conditions, and alternating direction method of multipliers are applied to develop a low-complexity solution for each subproblem. Finally, simulation results are provided to verify the advantages of the cooperative double-IRS scheme in comparison with the benchmark schemes.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7768640","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140680602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. However, interpolation algorithms commonly used in digital cameras are nonlinear, and their coefficients vary with content to enhance edge information. To avoid the impact of this impractical assumption, a CFA-based forgery localization method independent of linear assumption is proposed. The probability of an interpolated pixel value falling within the range of its neighboring acquired pixel values is computed. This probability serves as a means of discerning the presence and absence of CFA artifacts, as well as distinguishing between various interpolation techniques. Subsequently, curvature is employed in the analysis to select suitable features for generating the tampering probability map. Experimental results on the Columbia and Korus datasets indicate that the proposed method outperforms the state-of-the-art methods and is also more robust to various attacks, such as noise addition, Gaussian filtering, and JPEG compression with a quality factor of 90.
相机的彩色滤波器阵列是数字取证的有效指纹。以往大多数基于彩色滤波器阵列(CFA)的伪造定位方法都是在假设插值算法是线性的情况下执行的。然而,数码相机中常用的插值算法是非线性的,其系数随内容的变化而变化,以增强边缘信息。为了避免这种不切实际的假设的影响,我们提出了一种独立于线性假设的基于 CFA 的伪造定位方法。计算插值像素值在其相邻获取像素值范围内的概率。该概率可用于辨别是否存在 CFA 伪影,以及区分各种插值技术。随后,在分析中采用曲率来选择合适的特征,生成篡改概率图。在哥伦比亚和 Korus 数据集上的实验结果表明,所提出的方法优于最先进的方法,而且对各种攻击(如噪声添加、高斯滤波和 JPEG 压缩)具有更强的鲁棒性,质量因子高达 90。
{"title":"CFA-Based Splicing Forgery Localization Method via Statistical Analysis","authors":"Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li","doi":"10.1049/2024/9929900","DOIUrl":"10.1049/2024/9929900","url":null,"abstract":"<p>The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. However, interpolation algorithms commonly used in digital cameras are nonlinear, and their coefficients vary with content to enhance edge information. To avoid the impact of this impractical assumption, a CFA-based forgery localization method independent of linear assumption is proposed. The probability of an interpolated pixel value falling within the range of its neighboring acquired pixel values is computed. This probability serves as a means of discerning the presence and absence of CFA artifacts, as well as distinguishing between various interpolation techniques. Subsequently, curvature is employed in the analysis to select suitable features for generating the tampering probability map. Experimental results on the Columbia and Korus datasets indicate that the proposed method outperforms the state-of-the-art methods and is also more robust to various attacks, such as noise addition, Gaussian filtering, and JPEG compression with a quality factor of 90.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/9929900","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140698176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qing Wang, Huanding Qin, Kai Yang, Hao Wu, Fangmin He, Jin Meng
Sidelobe cancellation (SLC) is a well-established beamforming technique for mitigating interference, particularly in the context of satellite communication (SATCOM). However, traditional SLC suffers from the issue of partially canceling the desired signal at high signal-to-noise ratio (SNR), primarily due to unconstrained beamforming processing. Extensive research has been conducted to address this problem; however, existing algorithms have limitations such as dependence on knowledge of signal array vectors or number of interferers and involve high computational complexity. In this paper, we propose a robust SLC algorithm based on beamforming vector norm constraint. Our proposal offers a practical solution by only requiring knowledge of the earth station antenna gain and maximum auxiliary array gain to the desired signal, both of which are fully known. Furthermore, compared to traditional SLC, our proposed method introduces additional computational complexity that only scales linearly with the size of the auxiliary array. Simulation results demonstrate comparable performance between our proposed method and existing techniques such as diagonal loading and spatial degrees-of-freedom control-based algorithms.
{"title":"A Robust Sidelobe Cancellation Algorithm Based on Beamforming Vector Norm Constraint","authors":"Qing Wang, Huanding Qin, Kai Yang, Hao Wu, Fangmin He, Jin Meng","doi":"10.1049/2024/7696638","DOIUrl":"10.1049/2024/7696638","url":null,"abstract":"<p>Sidelobe cancellation (SLC) is a well-established beamforming technique for mitigating interference, particularly in the context of satellite communication (SATCOM). However, traditional SLC suffers from the issue of partially canceling the desired signal at high signal-to-noise ratio (SNR), primarily due to unconstrained beamforming processing. Extensive research has been conducted to address this problem; however, existing algorithms have limitations such as dependence on knowledge of signal array vectors or number of interferers and involve high computational complexity. In this paper, we propose a robust SLC algorithm based on beamforming vector norm constraint. Our proposal offers a practical solution by only requiring knowledge of the earth station antenna gain and maximum auxiliary array gain to the desired signal, both of which are fully known. Furthermore, compared to traditional SLC, our proposed method introduces additional computational complexity that only scales linearly with the size of the auxiliary array. Simulation results demonstrate comparable performance between our proposed method and existing techniques such as diagonal loading and spatial degrees-of-freedom control-based algorithms.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7696638","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Belal Al-Qudsi, Mohammed El-Shennawy, Niko Joram, Marco Gunia, Frank Ellinger
Real-time locating systems (RTLSs) suffer from clock synchronization inaccuracy among their distributed reference nodes. Conventional systems require periodic time synchronization and typically necessitate a two-way ranging (TWR) clock synchronization protocol to eliminate their measurement errors. Particularly, frequency-modulated continuous-wave (FMCW) time-based location systems pose unique design considerations on the TWR that have a significant impact on the quality of their measurements. In this paper, a valid operation design diagram is proposed for the case of an FMCW time-based TWR synchronization protocol. The proposed diagram represents an intersection area of two boundary curves that indicate the functionality of the system at a given frequency bandwidth, spectral length, and clock synchronization ambiguity. It presents an intuitive illustration of the measurement’s expected accuracy by indicating a larger intersection area for relaxed design conditions and vice versa. Furthermore, the absence of a working condition can easily be detected before proceeding with the actual system development. To demonstrate the feasibility of the proposed diagram, four scenarios with different design constraints were evaluated in a Monte-Carlo model of a basic TWR system. Moreover, an experimental measurement setup demonstrated the validity of the proposed diagram. Both the simulation and experimental outcomes show that the indicated valid conditions and the distribution of the measurements’ accuracy are in very good agreement.
{"title":"Critical Design Considerations on Continuous Frequency Modulation Localization Systems","authors":"Belal Al-Qudsi, Mohammed El-Shennawy, Niko Joram, Marco Gunia, Frank Ellinger","doi":"10.1049/2024/6664937","DOIUrl":"10.1049/2024/6664937","url":null,"abstract":"<p>Real-time locating systems (RTLSs) suffer from clock synchronization inaccuracy among their distributed reference nodes. Conventional systems require periodic time synchronization and typically necessitate a two-way ranging (TWR) clock synchronization protocol to eliminate their measurement errors. Particularly, frequency-modulated continuous-wave (FMCW) time-based location systems pose unique design considerations on the TWR that have a significant impact on the quality of their measurements. In this paper, a valid operation design diagram is proposed for the case of an FMCW time-based TWR synchronization protocol. The proposed diagram represents an intersection area of two boundary curves that indicate the functionality of the system at a given frequency bandwidth, spectral length, and clock synchronization ambiguity. It presents an intuitive illustration of the measurement’s expected accuracy by indicating a larger intersection area for relaxed design conditions and vice versa. Furthermore, the absence of a working condition can easily be detected before proceeding with the actual system development. To demonstrate the feasibility of the proposed diagram, four scenarios with different design constraints were evaluated in a Monte-Carlo model of a basic TWR system. Moreover, an experimental measurement setup demonstrated the validity of the proposed diagram. Both the simulation and experimental outcomes show that the indicated valid conditions and the distribution of the measurements’ accuracy are in very good agreement.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/6664937","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141096406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless communication plays a crucial role in the automation process in the industrial environment. However, the open nature of wireless communication renders industrial wireless sensor networks susceptible to malicious attacks that impersonate authorized nodes. The heterogeneity of the wireless transmission channel, coupled with hardware and software limitations, further complicates the issue of secure authentication. This form of communication urgently requires a lightweight authentication technique characterized by low complexity and high security, as inadequately secure communication could jeopardize the evolution of industrial devices. These requirements are met through the introduction of physical layer authentication. This article proposes novel deep learning (DL) models designed to enhance physical layer authentication by autonomously learning from the frequency domain without relying on expert features. Experimental results demonstrate the effectiveness of the proposed models, showcasing a significant enhancement in authentication accuracy. Furthermore, the study explores the efficacy of various DL architecture settings and traditional machine learning approaches through a comprehensive comparative analysis.
{"title":"Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency Response","authors":"Lamia Alhoraibi, Daniyal Alghazzawi, Reemah Alhebshi, Liqaa F. Nawaf, Fiona Carroll","doi":"10.1049/2024/8884688","DOIUrl":"10.1049/2024/8884688","url":null,"abstract":"<p>Wireless communication plays a crucial role in the automation process in the industrial environment. However, the open nature of wireless communication renders industrial wireless sensor networks susceptible to malicious attacks that impersonate authorized nodes. The heterogeneity of the wireless transmission channel, coupled with hardware and software limitations, further complicates the issue of secure authentication. This form of communication urgently requires a lightweight authentication technique characterized by low complexity and high security, as inadequately secure communication could jeopardize the evolution of industrial devices. These requirements are met through the introduction of physical layer authentication. This article proposes novel deep learning (DL) models designed to enhance physical layer authentication by autonomously learning from the frequency domain without relying on expert features. Experimental results demonstrate the effectiveness of the proposed models, showcasing a significant enhancement in authentication accuracy. Furthermore, the study explores the efficacy of various DL architecture settings and traditional machine learning approaches through a comprehensive comparative analysis.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/8884688","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140370967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the development of digital radio frequency memory (DRFM), active jamming against the main lobe of the radar has become mainstream in electronic warfare. The jamming infiltrates the radar receiver via the main lobe, covering up the target echo information. This greatly affects the detection, tracking, and localization of targets by radar. In this study, we consider jamming suppression based on the independence of RF features. First, two stacked sparse auto-encoders (SSAEs) are built to extract the RF characteristics and signal features carried out by the actual radar signal for subsequent jamming suppression. This method can effectively separate RF features from signal features, making the extracted RF features more efficient and accurate. Then, an SSAE-based jamming suppression auto-encoder (JSAE) is proposed; the mixed signal, including the radar signal, jamming signal, and noise, is input to JSAE for dimensionality reduction. Therefore, the radar signal and RF features, extracted by the two SSAEs in the previous step, are used to constrain the features of the reduced mixed signal. Moreover, we integrate the feature level and signal level to jointly achieve jamming suppression. The original radar signal is used to assist the radar signal reconstructed by the decoder. By first filtering out interference-related features and then reconstructing the signal, we can achieve better jamming suppression performance. Finally, the effectiveness of the proposed method is verified by simulating the actual collected data.
{"title":"Deep Learning-Based Active Jamming Suppression for Radar Main Lobe","authors":"Yilin Jiang, Yaozu Yang, Wei Zhang, Limin Guo","doi":"10.1049/2024/3179667","DOIUrl":"10.1049/2024/3179667","url":null,"abstract":"<p>Due to the development of digital radio frequency memory (DRFM), active jamming against the main lobe of the radar has become mainstream in electronic warfare. The jamming infiltrates the radar receiver via the main lobe, covering up the target echo information. This greatly affects the detection, tracking, and localization of targets by radar. In this study, we consider jamming suppression based on the independence of RF features. First, two stacked sparse auto-encoders (SSAEs) are built to extract the RF characteristics and signal features carried out by the actual radar signal for subsequent jamming suppression. This method can effectively separate RF features from signal features, making the extracted RF features more efficient and accurate. Then, an SSAE-based jamming suppression auto-encoder (JSAE) is proposed; the mixed signal, including the radar signal, jamming signal, and noise, is input to JSAE for dimensionality reduction. Therefore, the radar signal and RF features, extracted by the two SSAEs in the previous step, are used to constrain the features of the reduced mixed signal. Moreover, we integrate the feature level and signal level to jointly achieve jamming suppression. The original radar signal is used to assist the radar signal reconstructed by the decoder. By first filtering out interference-related features and then reconstructing the signal, we can achieve better jamming suppression performance. Finally, the effectiveness of the proposed method is verified by simulating the actual collected data.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/3179667","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140238122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To accelerate the data acquisition speed of magnetic resonance imaging (MRI) and improve the reconstructed MR images’ quality, we propose a parallel MRI reconstruction model (SPIRiT-Net), which combines the iterative self-consistent parallel imaging reconstruction model (SPIRiT) with the cascaded complex convolutional neural networks (CCNNs). More specifically, this model adopts the SPIRiT model for reconstruction in the k-space domain and the cascaded CCNNs with dense connection for reconstruction in the image domain. Meanwhile, this model introduces the data consistency layers for better reconstruction in both the image domain and the k-space domain. The experimental results on two clinical knee datasets as well as the fastMRI brain dataset under different undersampling patterns show that the SPIRiT-Net model achieves better reconstruction performance in terms of visual effect, peak signal-to-noise ratio, and structural similarity over SPIRiT, Deepcomplex, and DONet. It will be beneficial to the diagnosis of clinical medicine.
为了加快磁共振成像(MRI)的数据采集速度并提高重建磁共振图像的质量,我们提出了一种并行磁共振成像重建模型(SPIRiT-Net),它将迭代自洽并行成像重建模型(SPIRiT)与级联复杂卷积神经网络(CCNN)相结合。更具体地说,该模型采用 SPIRiT 模型重建 k 空间域,采用具有密集连接的级联 CCNNs 重建图像域。同时,该模型引入了数据一致性层,以便在图像域和 k 空间域进行更好的重建。在两个临床膝关节数据集和不同欠采样模式下的 fastMRI 脑数据集上的实验结果表明,SPIRiT-Net 模型在视觉效果、峰值信噪比和结构相似性方面的重建性能均优于 SPIRiT、Deepcomplex 和 DONet。这将有利于临床医学诊断。
{"title":"Improved Complex Convolutional Neural Network Based on SPIRiT and Dense Connection for Parallel MRI Reconstruction","authors":"Jizhong Duan, Xinmin Ren","doi":"10.1049/2024/7006156","DOIUrl":"10.1049/2024/7006156","url":null,"abstract":"<p>To accelerate the data acquisition speed of magnetic resonance imaging (MRI) and improve the reconstructed MR images’ quality, we propose a parallel MRI reconstruction model (SPIRiT-Net), which combines the iterative self-consistent parallel imaging reconstruction model (SPIRiT) with the cascaded complex convolutional neural networks (CCNNs). More specifically, this model adopts the SPIRiT model for reconstruction in the k-space domain and the cascaded CCNNs with dense connection for reconstruction in the image domain. Meanwhile, this model introduces the data consistency layers for better reconstruction in both the image domain and the k-space domain. The experimental results on two clinical knee datasets as well as the fastMRI brain dataset under different undersampling patterns show that the SPIRiT-Net model achieves better reconstruction performance in terms of visual effect, peak signal-to-noise ratio, and structural similarity over SPIRiT, Deepcomplex, and DONet. It will be beneficial to the diagnosis of clinical medicine.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7006156","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140241599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the domain of lie detection, a common challenge arises from the dissimilar distributions of training and testing datasets. This causes a model mismatch, leading to a performance decline of the pretrained deep learning model. To solve this problem, we propose a lie detection technique based on a domain adversarial neural network employing a dual-mode state feature. First, a deep learning neural network was used as a feature extractor to isolate speech and facial expression features exhibited by the liars. The data distributions of the source and target domain signals must be aligned. Second, a domain-antagonistic transfer-learning mechanism is introduced to build a neural network. The objective is to facilitate feature migration from the training to the testing domain, that is, the migration of lie-related features from the source to the target domain. This method results in improved lie detection accuracy. Simulations conducted on two professional lying databases with different distributions show the superiority of the detection rate of the proposed method compared to an unimodal feature detection algorithm. The maximum improvement in detection rate was 23.3% compared to the traditional neural network-based detection method. Therefore, the proposed method can learn features unrelated to domain categories, effectively mitigating the problem posed by different distributions in the training and testing of lying data.
{"title":"Lie Detection Technology of Bimodal Feature Fusion Based on Domain Adversarial Neural Networks","authors":"Yan Zhou, Feng Bu","doi":"10.1049/2024/7914185","DOIUrl":"10.1049/2024/7914185","url":null,"abstract":"<p>In the domain of lie detection, a common challenge arises from the dissimilar distributions of training and testing datasets. This causes a model mismatch, leading to a performance decline of the pretrained deep learning model. To solve this problem, we propose a lie detection technique based on a domain adversarial neural network employing a dual-mode state feature. First, a deep learning neural network was used as a feature extractor to isolate speech and facial expression features exhibited by the liars. The data distributions of the source and target domain signals must be aligned. Second, a domain-antagonistic transfer-learning mechanism is introduced to build a neural network. The objective is to facilitate feature migration from the training to the testing domain, that is, the migration of lie-related features from the source to the target domain. This method results in improved lie detection accuracy. Simulations conducted on two professional lying databases with different distributions show the superiority of the detection rate of the proposed method compared to an unimodal feature detection algorithm. The maximum improvement in detection rate was 23.3% compared to the traditional neural network-based detection method. Therefore, the proposed method can learn features unrelated to domain categories, effectively mitigating the problem posed by different distributions in the training and testing of lying data.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7914185","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Wang, Lang Zhou, Kun Ye, Haixin Sun, Shaohua Hong
In this paper, the Star-Transformer model is improved to obtain more accurate direction of arrivals (DOA) estimation of underwater sonar uniform linear array (ULA) under low signal-to-noise ratio (SNR) conditions. The ideal real covariance matrix is divided into three channels: real part channel, imaginary part channel, and phase channel to obtain more input features. In training, the real covariance matrix is used under different SNRs. In testing, the covariance matrix of samples in the real environment is used as input. The on-grid form is used to estimate the DOA of multiple signal sources, which is modelled as a multilabel classification problem. The results show that the model can be effective and can still have a good DOA estimation performance under the conditions of trained and untrained SNRs, different snapshots, signal power mismatch, different separation angles, signal correlation, and so on. It shows that the model has excellent robustness.
本文改进了星形变换器模型,以在低信噪比(SNR)条件下获得更精确的水下声纳均匀线性阵列(ULA)到达方向(DOA)估计。理想的实协方差矩阵被分为三个通道:实部通道、虚部通道和相位通道,以获得更多的输入特征。在训练中,实协方差矩阵用于不同信噪比条件下。在测试中,使用真实环境中样本的协方差矩阵作为输入。网格上的形式用于估计多个信号源的 DOA,并将其模拟为多标签分类问题。结果表明,该模型是有效的,在训练和未训练信噪比、不同快照、信号功率不匹配、不同分离角度、信号相关性等条件下,仍能具有良好的 DOA 估计性能。这表明该模型具有良好的鲁棒性。
{"title":"A DOA Estimation Method Based on an Improved Transformer Model for Uniform Linear Arrays with Low SNR","authors":"Wei Wang, Lang Zhou, Kun Ye, Haixin Sun, Shaohua Hong","doi":"10.1049/2024/6666395","DOIUrl":"10.1049/2024/6666395","url":null,"abstract":"<p>In this paper, the Star-Transformer model is improved to obtain more accurate direction of arrivals (DOA) estimation of underwater sonar uniform linear array (ULA) under low signal-to-noise ratio (SNR) conditions. The ideal real covariance matrix is divided into three channels: real part channel, imaginary part channel, and phase channel to obtain more input features. In training, the real covariance matrix is used under different SNRs. In testing, the covariance matrix of samples in the real environment is used as input. The on-grid form is used to estimate the DOA of multiple signal sources, which is modelled as a multilabel classification problem. The results show that the model can be effective and can still have a good DOA estimation performance under the conditions of trained and untrained SNRs, different snapshots, signal power mismatch, different separation angles, signal correlation, and so on. It shows that the model has excellent robustness.</p>","PeriodicalId":56301,"journal":{"name":"IET Signal Processing","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/6666395","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139959455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}