Top Read Articles

    Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    A Review of Research on Cybersecurity Risk Assessment Methods
    WU Jiacheng, YU Xiao
    Electronic Science and Technology    2024, 37 (3): 10-17.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.002
    Abstract986)   HTML41)    PDF(pc) (988KB)(195)       Save

    Cybersecurity risk assessment is an important part of building a cyberspace security system, which can effectively protect individuals and organizations from the risk of cybersecurity attacks.This study briefly outlines the theory of cybersecurity risk assessment, emphatically introduces the current mainstream cybersecurity risk assessment methods, and classifies and compares the existing methods according to their different nature, analyzes the advantages, disadvantages and application scope of each method.On this basis, this study summarizes and extracts the factors that have an impact on the cybersecurity assessment results and proposes future research priorities in the field of cybersecurity assessment. The analysis results show that the three factors of correlation, uncertainty of assessment indexes and real-time of assessment process are the main factors affecting the effect of risk assessment, and it provides a reference for the research of risk assessment methods in the future.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Blind Roads and Obstacle Recognition Algorithm Based on Deep Learning
    MA Wenjie, ZHANG Xuanxiong
    Electronic Science and Technology    2024, 37 (3): 75-83.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.010
    Abstract566)   HTML16)    PDF(pc) (3884KB)(169)       Save

    Blind roads and blind road obstacles are important factors that affect the travel safety of blind people. Existing algorithms only deal with blind road segmentation and blind road obstacle detection separately, with low efficiency and high computational complexity. To solve the above problems, this study proposes a multi-task recognition algorithm based on deep learning. The algorithm extracts public features through the backbone network, after the extracted features are fused through the SPP(Spatial Pyramid Pooling)and FPN(Feature Pyramid Networks)networks, they are respectively passed into the segmentation network and the detection network to complete the tasks of blind road segmentation and blind road obstacle detection. In order to make the blind road segmentation smoother, a correction loss function is introduced. In order to improve the recall rate of obstacle detection, the NMS(Non Maximum Suppression) of the detection network is replaced by Soft-NMS. The experimental results show that the algorithm segmentation part MIoU, MPA reach 93.52%, 95.29%, respectively, and the detection part mAP(mean Average Precision)、mAP@0.5 and mAP@0.75 respectively reach 75.58%、91.58%and 74.82%. Compared with using the SegFormer network for blind road segmentation and the RetinaNet network for blind road obstacle detection, this algorithm not only improves the accuracy, but also improves the speed by 73.72%, and the FPS(Frames Per Secon) reaches 18.52. Compared with other comparative algorithms, this algorithm also has a certain improvement in speed and accuracy.

    Table and Figures | Reference | Related Articles | Metrics
    A Review and Prospect of Research on Situational Awareness Technology in Active Distribution Network
    MAN Yanlu,LIU Min,WANG Kai
    Electronic Science and Technology    2024, 37 (2): 6-13.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.002
    Abstract395)   HTML17)    PDF(pc) (1036KB)(85)       Save

    With the large-scale access of distributed generation and diversified loads, the traditional distribution network is gradually transformed into an active distribution network,which means that the types of faults in distribution networks are becoming more diverse, and the operating environment, operating conditions and topologies are becoming more and more complex. Therefore, in order to accurately predict the potential risks of the system in the active distribution network, it is necessary to improve the timeliness and accuracy of system operation decisions through sophisticated and efficient situational awareness technology.This study expounds the significance and concept of situational awareness technology in active distribution network, constructs its basic framework, latsly summarizes the research process, research difficulties and future research directions of situational awareness, situation understanding and situation prediction in detail.

    Table and Figures | Reference | Related Articles | Metrics
    Network Security Device Design Based on Red-Black Isolation Architecture
    GONG Zhi,LIU Chao,FU Qiang
    Electronic Science and Technology    2024, 37 (2): 76-86.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.011
    Abstract341)   HTML12)    PDF(pc) (3711KB)(106)       Save

    The data transmission of the heaven and the earth integrated network based on IP(Internet Protocol) technology is vulnerable to illegal attacks. The traditional network security device based on IPSec(Internet Protocol Security) is designed by connecting a single host to both internal and external network processing units, which has the risk of unauthorized users directly accessing the protected intranet through the extranet. A new scheme for a network security device based on a red-black isolation architecture is proposed. The scheme adopts the design concept of red-black partition and VPN technology based on IPSec framework under Linux. It implements the validity verification of the transmitted data based on the "quintuple" security and security rules and the encapsulation and decapsulation transformation of the IPSec ESP protocol in the red zone, and implements the public network sending and receiving of the ESP encapsulated and encrypted data in the black zone. In this scheme, the security service module implements dynamic switching of encryption algorithms and encryption and decryption of ESP encapsulated data according to external instructions, and uses the security service module as a data exchange channel between the red and black zones to achieve isolation between the internal and external networks and effectively ensure Intranet security.The experimental results show that the network security device based on red-black isolation architecture has the advantages of strong anti-attack capability, replaceable encryption algorithm, and encryption rate of 1 024 bytes packet length greater than 50 Mbit·s-1 under 100 megabit bandwidth.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Electromagnetic Transient Acceleration Simulation Technoloy of New-Type Power System
    NIE Chunfang, HAO Zhenghang, CHEN Zhuo, HE Puxiang
    Electronic Science and Technology    2024, 37 (3): 18-25.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.003
    Abstract297)   HTML6)    PDF(pc) (1938KB)(75)       Save

    In order to solve the problems of low simulation efficiency and difficulty in simulation in the electromagnetic transient simulation of new power system due to complex system topology, numerous power electronic switching devices and insufficient single-core computing capability of simulator, this study uses the ideal transformer model segmentation algorithm to divide the large-scale new power system model into several subsystems. The decoupling and order reduction of the large system are realized and the computation of the whole system as one state-space system matrix is effectively reduced during simulation. In order to further reduce the computing burden of a single processor, an accelerated simulation platform UREP300 for efficient parallel computing in the bare-metal environment is designed by using multi-core CPU(Central Processing Unit) parallel technology. The segmented model is loaded into UREP300 for accelerated simulation experiment and compared with the offline simulation of the original model based on MATLAB/Simulink. The experimental results show that the acceleration simulation technology combining the ideal transformer model segmentation and multi-core parallel operation can not only guarantee the simulation accuracy but also improve the simulation speed to 586 times of the original, which can significantly improve the simulation efficiency, and is suitable for large-scale new power system simulation work.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Optimal Charging Strategy of Electric Vehicle Based on Multi-Objective Particle Swarm Optimization
    LI Tingting, LOU Ke, WANG Yuan, XU Huachao
    Electronic Science and Technology    2024, 37 (3): 51-56.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.007
    Abstract287)   HTML10)    PDF(pc) (1090KB)(131)       Save

    Household electric vehicle charging in residential areas has a strong centrality. Large-scale electric vehicle charging load causes large peak-valley load difference and other problems in the distribution network system. This study proposes a user charging selection control strategy based on Multi-Objective Particle Swarm Optimization(MPSO) algorithm. Through the analysis and prediction of electric vehicle charging load, a multi-objective optimization model is established with the minimum variance of the total system load and scheduling cost as the objective function. Meanwhile, considering the constraints of electric vehicle battery and system power, the MPSO algorithm is used to solve the optimal initial charging time of electric vehicles. The simulation results show that compared with unordered charging of EVs in residential areas, the EV charging strategy proposed in this study can effectively reduce load peak and dispatch cost.

    Table and Figures | Reference | Related Articles | Metrics
    Research Status of Mid-Infrared Silicon-Based Optical Waveguides
    FENG Lulu,FENG Song,HU Xiangjian,CHEN Menglin,LIU Yong,WANG Di
    Electronic Science and Technology    2024, 37 (2): 36-45.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.006
    Abstract273)   HTML8)    PDF(pc) (2256KB)(77)       Save

    As the basic passive device in silicon photonic integrated chip, silicon-based optical waveguide is the channel for optical signal transmission. Because of its good performance and compatibility with CMOS(Complementary Metal Oxide Semiconductor) process, silicon-based optical waveguide has been widely used. Silicon photonic integrated circuits used in telecommunications and data centers have been gradually commercialized.The potential applications of mid-infrared band in free-space communication, sensing, environmental monitoring and other fields have attracted much attention from researchers in recent years.In this study, the research status of mid-infrared silicon-based optical waveguides in recent years is analyzed.The research results of waveguide material platform of SOI(Silicon on Insulator)、GOSI(Ge-on-SOI)、SOS(Si on Sapphire)、GOS(Ge-on-Si)、SGOS(SiGe-on-Si)、SON(Si-on Si3N4)、GON(Ge-on Si3N4) and manufacturing process platform of SOPS(Si on Porous Si), Pedestal, Freestanding, Suspended, LOCOS(Local Oxidation of Silicon), plasma structure are summarized. So far, the propagation loss of most monocrystalline silicon in MIR(Mid-Infrared) platform is about 0.7~3.0 dB·cm-1. The application prospects of different types of waveguides are discussed and compared, which provides a reference for the research and development, application and commercialization of mid-infrared silicon-based optical waveguides.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Hybrid Critical-Level Task Scheduling and Semi-Partition Algorithm in Multi-Core Processor
    ZHU Jiawei, MAO Hang, ZHANG Fengdeng
    Electronic Science and Technology    2024, 37 (3): 1-9.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.001
    Abstract259)   HTML29)    PDF(pc) (1186KB)(155)       Save

    At present, the schedulability analysis of mixed critical level tasks and semi-partition scheduling algorithms in most multiprocessors are focused on single-core utilization. However, due to the high complexity of task scheduling in multi-core systems, the existing research results have some problems, such as unbalanced load of each processor and unsatisfactory task schedulability. To solve this problem, the application scope of Dynamic Demand Boundary Function(DDBF) is extended to multi-core processor system in this study. DDBF is improved based on half-partition scheduling algorithm, and SDDBF(Super Dynamic Demand Boundary Function) is proposed by adding forward job and forward job analysis, which can calculate and utilize resources more accurately. Based on SDDBF, the schedulability analysis method of SDA(Stepper Dispatch Algorithm) and semi-partition algorithm MCWF(Mixed-Criticality Worist First) are proposed. The simulation results show that compared with AMC(Adaptive Mixed Criticality), AMC-MAX and XU algorithms, the schedulability analysis of SDA can be improved by 5%~10%. Compared with WF_MY(Worst First_My) and WF_NEW(Worst First_New) algorithms, MCWF makes the system have better CPU(Central Processing Unit) load balancing performance at any critical level.

    Table and Figures | Reference | Related Articles | Metrics
    Research on MHz High Voltage Pulse Power Supply
    DING Kai,RAO Junfeng
    Electronic Science and Technology    2024, 37 (2): 69-75.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.010
    Abstract250)   HTML6)    PDF(pc) (1597KB)(72)       Save

    In view of the application requirements of high frequency nanosecond pulse such as uniform discharge and biomedical, a high frequency and high voltage pulse power supply based on radio frequency Metal Oxide-Semiconductor Field Effect Transistor(MOSFET) is designed. The control signal of the pulse power supply is provided by Field Programmable Gate Array(FPGA) and transmitted through optical fiber. After amplification by the driver chip, each stage of the discharge tube is triggered synchronously. The drive chip adopts power module to provide different ground potential. The discharge tube adopts Residual Current Device(RCD) absorbing circuit to improve the instantaneous working condition at the opening and closing time. The main analysis and research is the effect of the last stage isolation inductance on the voltage waveform of discharge tube and load voltage waveform, and the Marx circuit is improved. The experimental results show that the power supply can output nanosecond pulses with rising edge of 40 ns, half-height width of 100 ns and voltage amplitude of 1.1 kV at 1 MHz repetition rate on 1 kΩ resistance load. It is verified that the power supply can work reliably in high frequency and high voltage state and meet the design requirements.

    Table and Figures | Reference | Related Articles | Metrics
    Design of Dual-Frequency Integrated Ultra-Wideband Ground Penetrating Radar Antenna
    LIN Xiangyu, ZENG Weihua
    Electronic Science and Technology    2024, 37 (4): 25-29.   DOI: 10.16180/j.cnki.issn1007-7820.2024.04.004
    Abstract226)   HTML9)    PDF(pc) (1869KB)(81)       Save

    In view of the disadvantages of time consuming and low efficiency caused by single frequency band of Ground Penetrating Radar (GPR) products, a dual-frequency integrated composite array antenna with center frequency of 400 MHz and 1 000 MHz and bandwidth of 200~1 500 MHz is designed and implemented, and is applied in Ultra-Wide Band (UWB)GPR system. The array antenna consists of three butterfly antennas with a center frequency of 400 MHz and six butterfly antennas with a center frequency of 1 000 MHz, and has the capability of simultaneous detection of dual frequency bands, which can realize the detection results of two different frequency bands in one survey line, overcome the problem of repeated detection of different frequencies of traditional GPR and enhance the practicability of GPR system. The proposed dual-frequency integrated GPR antenna has the characteristics of ultra-wideband, high gain and narrow beam. Its relative bandwidth is 153%, the maximum peak gain of 17.6 dBi is achieved in the whole bandwidth, and the narrowest half-power beam width is 7.6°. It provides a new antenna scheme for high resolution and high efficiency GPR applications.

    Table and Figures | Reference | Related Articles | Metrics
    Power Load Forecasting Model Based on Expansion Period
    ZHANG Haifang,HE Qinglong,ZHANG Lin
    Electronic Science and Technology    2024, 37 (2): 1-5.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.001
    Abstract225)   HTML34)    PDF(pc) (756KB)(112)       Save

    In view of the problem that the existing power load forecasting models rely on recent data, which leads to the prediction results deviating from the real situation of the time series, a power load forecasting model based on extended period information is proposed. The pre-processed power load time series is processed according to the same time and different days. On this basis, the ARIMA(Autoregressive Integrated Maving Average Model) model and LSTM(Long Short-Term Memory Network) model are used for modeling and analysis, and three evaluation indicators are used to evaluate the predictive performance of the model. The prediction results show that the three evaluation indexes of the ARIMA model constructed by expanding the period information are lower than those of the traditional ARIMA model, and the corresponding RMSE(Root Mean Square Error), MAE(Mean Absolute Error) and MAPE(Mean Absolute Percentage Error) are 32 434.114 8, 5 828.390 9 and 0.025 2, respectively. The LSTM model of expanding the period information is also lower than the original LSTM model, and the corresponding RMSE, MAE, and MAPE are 13 520.497 4, 9 298.352 6, and 0.091 4,respectively.

    Table and Figures | Reference | Related Articles | Metrics
    Simplified Model Predictive Current Control for the Six-Phase Full-Bridge Inverter Fed PMSM Drive
    YUAN Qingqing, WU Ruiqi, MA Ting, XIE Xiaotong
    Electronic Science and Technology    2024, 37 (3): 34-43.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.005
    Abstract219)   HTML7)    PDF(pc) (4685KB)(79)       Save

    Although the full bridge inverter motor drive or open winding structure has the advantages of interphase electrical isolation, good fault tolerance and low switching frequency of the device, there are many inverter output voltage vectors, serious redundancy and control constraints.In this study, a simplified model prediction current control algorithm based on two-stage vector optimization is proposed for a six-phase permanent magnet synchronous motor driven by a six-phase full-bridge inverter powered by a common DC bus, which can effectively track and control the stator fundamental current and suppress the harmonic and zero sequence components of the stator current.Based on the criteria of stator fundamental current control, harmonic and zero sequence current suppression, 729 voltage vectors output by inverter are optimized, and 12 candidate voltage vectors are obtained.Based on this, the model predictive current control algorithm is designed.The experimental results show that the simplified model predictive current control method in this study has good dynamic and static performance, and can effectively suppress harmonic and zero sequence current components while controlling fundamental wave current, which can provide theoretical support for the research of polyphase motor drive system.

    Table and Figures | Reference | Related Articles | Metrics
    Multi-Encoder Transformer for End-to-End Speech Recognition
    PANG Jiangfei, SUN Zhanquan
    Electronic Science and Technology    2024, 37 (4): 1-7.   DOI: 10.16180/j.cnki.issn1007-7820.2024.04.001
    Abstract218)   HTML14)    PDF(pc) (949KB)(108)       Save

    The current widely used Transformer model has a strong ability to capture global dependencies, but it tends to ignore local feature information at shallow layers. To solve this problem, this study proposes a method using multiple encoders to improve the ability of speech feature extraction. An additional convolutional encoder branch is added to strengthen the capture of local feature information, make up for the neglect of local feature information in shallow Transformer, and effectively realize the integration of global and local dependencies of audio feature sequences. In other words, a multi-encoder model based on Transformer is proposed. Experiments on the open-source Chinese Mandarin data set Aishell-1 show that without an external language model, the proposed Transformer-based multi-encoder model has a relative reduction of 4.00% in character error rate when compared with the Transformer model. On the internal non-public Shanghainese dialect data set, the performance improvement of the proposed model is more obvious, and the character error rate is reduced by 48.24% from 19.92% to 10.31%.

    Table and Figures | Reference | Related Articles | Metrics
    Surface Defect Detection of Transparent Objects Based on Phase Measuring Deflectometry
    DING Yujie, ZHOU Zhifeng, WANG Yong, WANG Lirui
    Electronic Science and Technology    2024, 37 (5): 62-70.   DOI: 10.16180/j.cnki.issn1007-7820.2024.05.009
    Abstract204)   HTML3)    PDF(pc) (3719KB)(105)       Save

    At present,the traditional method is still used to control the quality of glass,lens and other transparent objects in China,and the traditional visual evaluation method is inefficient.In order to realize automatic detection of surface defects of transparent objects,a transmission detection method based on PMD(Phase Measuring Deflectometry) is proposed.The structure light fringe pattern is generated by PMD algorithm combined with the new phase shift pattern generation formula,and the fringe pattern is projected to the surface of the measured object using the transmission system. The distorted fringe image after refraction of the measured object is collected by the camera,then the absolute phase diagrams are generated, and the defects are extracted by identifying the local distortion in the absolute phase diagram.Through analyzing the reason of false detection caused by periodic misalignment,a method of correcting absolute phase periodic misalignment is proposed. The new formula of phase shift pattern generation can also correct periodic misalignment in advance,the combination of the two methods can improve the precision of phase unwrapping. A concave and convex lens with a focal length of 300 mm is taken as an example, the experimental results show that the proposed method can accurately extract the local distortion in the absolute phase diagram caused by surface defects with an accuracy of 0.1 mm.

    Table and Figures | Reference | Related Articles | Metrics
    Research Progress of SiGe Electro-Optical Modulator
    WANG Di,FENG Song,CHEN Menglin,LIU Yong,HU Xiangjian,FENG Lulu
    Electronic Science and Technology    2024, 37 (2): 46-54.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.007
    Abstract193)   HTML5)    PDF(pc) (1975KB)(66)       Save

    Photon modulator is the core device in the optical fiber communication system, which mainly modulates the optical signal to realize the conversion of the signal from the electrical domain to the optical domain. With the development of silicon based semiconductor technology, silicon based photonic modulator has gradually become a mainstream silicon photonic device. The realization of GHz bandwidth modulator based on silicon technology also lays a foundation for the development of silicon photonics. As a high performance optical modulator for short distance off optical interconnection, SiGe optical absorption modulator has gotten much attention. This study discusses the development status of high-performance SiGe electro-optic modulator, mainly analyzes the research progress of silicon based photonic modulator at home and abroad,and discusses the electrical modulation structures such as PIN, PN junction, which provides a way to continue to develop high-speed, low loss photonic modulator in the future.

    Table and Figures | Reference | Related Articles | Metrics
    Small Object Detection Based on Convolution and Self-Attention of Aggregation
    WANG Xiaozhu,YU Lianzhi
    Electronic Science and Technology    2024, 37 (2): 14-22.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.003
    Abstract189)   HTML22)    PDF(pc) (2213KB)(101)       Save

    Small object detection is a research hotspot in most object detection open datasets. In view of the problem of insufficient detection accuracy of small targets in multi-size detection scenarios, an improved small target detection model based on YOLOv5s(You Only Look Once version 5s) is proposed in this study.A convolution self-attention aggregation residual block is added to the feature extraction network of the detector to improve the feature extraction ability, and a new feature graph is introduced from the shallow network to enhance the feature information of small object. The feature fusion network structure is improved to make full use of the newly introduced shallow features. SIOU Loss is introduced to replace the original GIOU Loss rectangular frame loss function to improve the detection accuracy and training speed.The experimental results show that the detection accuracy of the improved model is 0.012 higher than YOLOv5s on the 2007 and 2012 data sets of PASCAL VOC, and the small object detection accuracy is 0.023 higher than YOLOv5s. The detection accuracy of the imporved model in MS COCO data set is 0.001 higher than YOLOv5s, and the detection accuracy of small objects is 0.009 higher than YOLOv5s.

    Table and Figures | Reference | Related Articles | Metrics
    Classification Method of Steel Surface Defects Based on Multi-Scale Feature Fusion
    TIAN Zhixin,XU Zhen,MAO Jian,LIN Binbin,LIAO Wei
    Electronic Science and Technology    2024, 37 (2): 87-95.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.012
    Abstract183)   HTML8)    PDF(pc) (2470KB)(67)       Save

    In view of the low detection rate of steel surface defect classification, a surface defect classification method based on texture multi-scale feature fusion is adopted. Gabor filter and gray level co-occurrence matrix are used to establish multi-scale feature vectors of texture images. At the same time, convolution operation is used to extract features of texture images, and hybrid dilated convolution module is introduced to increase receptive field. The two feature vectors are fused to obtain the enhanced fused texture feature vector. The fused features are input into Long Short-Term Memory(LSTM) network in sequence to build a classification model, and the classification results are evaluated using the confusion matrix. The results show that the classification accuracy of this method on the NEU(Northeastern University) data set is 97.5%. The LSTM network, BP(Back Propagation) neural network, SVM(Support Vector Machine), KNN(K-Nearest Neighbor), CART(Classification And Regression Tree) and other classification methods are set up for comparative experiments. The results show that LSTM classification method performs best in multi-scale, and F1 index is the highest. Ablation experiments are conducted with BP network, LSTM network, SVM, KNN, CART, CNN, AlexNet and other methods to verify the universality of this method. This method fully exploits the multi-scale feature information of the texture image, and has important significance for the research of the classification method of steel surface defects.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Robot Global Path Planning Based on Improved Ant Colony Algorithm
    WANG Yanchun, GUO Yongfeng, XIA Ying, WANG Yangyang
    Electronic Science and Technology    2024, 37 (5): 88-94.   DOI: 10.16180/j.cnki.issn1007-7820.2024.05.012
    Abstract172)   HTML8)    PDF(pc) (892KB)(103)       Save

    In response to the problems of traditional ant colony algorithm such as lack of initial pheromone, slow convergence speed and inability to effectively avoid obstacles, this study proposes a global path planning based on improved ant colony algorithm.The introduction of a normal distribution function improves the traditional heuristic function, greatly improving the efficiency of the algorithm and shortening the time required for convergence; adaptively adjusting the pheromone volatility coefficient to limit the pheromone range and avoid premature convergence; and smoothing the algorithm path to shorten the path length, thus realising global path planning for the robot.Simulation results show that under a 20×20 environment, the average number of iterations of the proposed algorithm is 28 generations less than that of the traditional ant colony algorithm, resulting in faster convergence, the average number of inflection points is reduced by 33.3%, making the path smoother, overcoming the lack of initial pheromone, speeding up convergence, reducing the number of inflection points, and enabling effective avoidance of obstacles in the environment, demonstrating the feasibility of the algorithm.

    Table and Figures | Reference | Related Articles | Metrics
    Lightweight Capsule Network Fusing Attention and Capsule Pooling
    ZHU Zihao, SONG Yan
    Electronic Science and Technology    2024, 37 (5): 1-8.   DOI: 10.16180/j.cnki.issn1007-7820.2024.05.001
    Abstract163)   HTML15)    PDF(pc) (3050KB)(89)       Save

    In view of the inefficiency of feature information propagation in capsule networks and the huge computational overhead in the routing process, a graph pooling capsule network that combines attention and capsule pooling is proposed. The network mainly has the following two advantages: 1) The capsule attention is proposed, and the attention is applied to the primary capsule layer, which enhances the attention to the important capsules, and improves the accuracy of the prediction of the lower capsules to the higher capsules; 2) A new capsule pooling is proposed. The capsule with the largest weight is screened out at the corresponding positions of all feature maps in the primary capsule layer, and the effective feature information is represented by a small number of important capsules while reducing the number of model parameters. Results on public data sets show that the proposed capsule network achieves the accuracy of 92.60% on CIFAR10 and has excellent robustness against white-box adversarial attacks on complex datasets. In addition, the proposed capsule network achieves 95.74% accuracy on the AffNIST data set with superior affine transformation robustness. The calculation efficiency results show that the amount of floating-point operations of the proposed capsule is reduced by 31.3% and the number of parameters is reduced by 41.9% when compared with traditional CapsNet.

    Table and Figures | Reference | Related Articles | Metrics
    Research Progress in Network Security Situation Awareness Models
    FANG Xiang
    Electronic Science and Technology    2024, 37 (6): 98-102.   DOI: 10.16180/j.cnki.issn1007-7820.2024.06.013
    Abstract161)   HTML4)    PDF(pc) (596KB)(53)       Save

    In response to the increasing number and forms of network attacks, different types and names of network security situational awareness models have received widespread attention and research from the academic community. In the context of the rapid popularization of information technology, hardware system, software vulnerabilities, and security vulnerabilities in daily application operations have led to an increasing number of ways and means of network attacks. However, a single type of network security monitoring and analysis tool is no longer suitable for the current development of network technology. By reviewing the research history and current status of network security situational awareness technology, this article summarizes and analyzes the theoretical development and engineering applications of situational awareness models, and discusses the shortcomings and deficiencies in relevant technical solutions. It also looks forward to the future research directions of network security situational awareness models.

    Reference | Related Articles | Metrics
    Swin-Transformer-Based Carotid Ultrasound Image Plaque Segmentation
    HE Zhiqiang, SUN Zhanquan
    Electronic Science and Technology    2024, 37 (9): 48-56.   DOI: 10.16180/j.cnki.issn1007-7820.2024.09.008
    Abstract161)   HTML10)    PDF(pc) (2281KB)(62)       Save

    The evaluation of carotid ultrasound image plaque requires a large number of experienced clinicians, and the ultrasound image has the characteristics of blurred boundary and strong noise interference, making the evaluation of plaques time-consuming and laborious. Therefore, a fully automated carotid plaque segmentation method is urgently needed to solve the problem of manpower scarcity. This study proposes a deep neural network model based on Swin-Transformer (Shifted-Windows Transformer) block for the automatic segmentation of carotid plaques. Based on the U-Net(U-Convolutional Network) architecture, the encoding part uses three convolutional blocks for image down-sampling to obtain feature images of different resolution sizes, and then adds six pairs of two consecutive Swin-Transformer blocks for more refined feature extraction. The decoding part up-samples the refined features output by the Swin-Transformer module step by step, and jump-joints them with the feature maps of each resolution level in the encoding part, respectively. The comparison experiments based on the data set of Tong Ren Hospital show that the Dice index of the proposed deep neural network model reaches 0.814 2, which is higher than that of other comparison networks. The results demonstrate that the proposed model can effectively extract the features of carotid ultrasound image plaques and achieve automated and high-precision plaque segmentation.

    Table and Figures | Reference | Related Articles | Metrics
    Particle Size Analysis in A Coupled Multi-Physics Models for Lithium-Ion Batteries
    YU Runzhou, LI Peichao
    Electronic Science and Technology    2024, 37 (9): 1-7.   DOI: 10.16180/j.cnki.issn1007-7820.2024.09.001
    Abstract160)   HTML19)    PDF(pc) (1438KB)(75)       Save

    In order to deeply understand the multi-physical field coupling behavior inside the LIB(Lithium-Ion Battery) and better provide reference for the manufacturing and optimization design of the LIB, a more physically realistic coupled ETM(Electrochemical-Thermal-Mechanical) model of the LIB is established and solved in the finite element simulation software COMSOL Multiphysics by means of numerical simulation in the present study. The model takes into account the stress generation in both electrode and particle scales during battery operation, which solves the problem of difficult calculation of stress at the electrode level in previous models, and better correlates the relationship between stress and electrochemistry by considering the correction of stress on lithium diffusion and overpotential. Based on this model, the effect of different positive electrode particle sizes on the battery performance is discussed in the study. The numerical results show that the performance index of each physical field during the discharge of LIB is better and the energy density of the battery is improved when the positive electrode particle size is small, which proves that the use of smaller positive electrode particle size can improve the performance of LIB.

    Table and Figures | Reference | Related Articles | Metrics
    Identification Strategy of Power Grid Weak Links Based on Random Matrix Theory
    YANG Jie, SUN Weiqing, MA Meiling
    Electronic Science and Technology    2024, 37 (7): 1-8.   DOI: 10.16180/j.cnki.issn1007-7820.2024.07.001
    Abstract160)   HTML13)    PDF(pc) (2265KB)(130)       Save

    With the continuous expansion of the scale of bulk power grid, the operating characteristics of new power system has become more and more complex. Accurately identifying the weak links in the power grid is of great practical significance for improving the monitoring ability of the system and ensuring its reliable operation. Therefore, an identification strategy of weak links for power grid is proposed based on random matrix theory. The strategy uses the measured data in power grid operation to construct a random matrix and uses the weak links judgment index based on the random matrix theory to design the judgment method of weak nodes and weak branches. This method is analyzed from the perspective of data correlation, without considering the complex network structure and operation mechanism of the actual power grid, so there is no complex modeling process. To verify the feasibility of the method, an example simulation is established through the IEEE 39 node system and compared with the traditional methods. The results show that the proposed identification strategy has a good effect on identifying weak nodes and branches, and the accuracy is improved compared with the traditional methods.

    Table and Figures | Reference | Related Articles | Metrics
    YOLOv3 Lung Nodule Detection Based on Coordinate Attention
    WANG Xinyu, ZHAO Jingwen, LIU Xiang, SHI Yunyu, SHE Yunlang
    Electronic Science and Technology    2024, 37 (6): 1-7.   DOI: 10.16180/j.cnki.issn1007-7820.2024.06.001
    Abstract155)   HTML18)    PDF(pc) (1807KB)(82)       Save

    Lung nodules occupy fewer pixels in CT(Computed Tomography), which brings great difficulty to detection. In view of small target detection of lung nodule, this study proposes YOLOv3(You Only Look Once version 3) lung nodule detection algorithm based on coordinate attention. The backbone network adopts the improved YOLOv3, reduces the number of residual blocks and introduces the dilated convolution module to sense context information around the target. In the feature utilization, coordinate attention is introduced to capture the position, direction and cross-channel information, so as to locate lung nodules accurately. The loss function of YOLOv3 is improved, the boundary box is modeled as Gaussian distribution. Wasserstein distance is used to calculate the similarity between the two distributions instead of IoU(Intersection over Union), so as to improve the sensitivity of the target scale. The results on LUNA16 show that the average precision is 89.96% and the sensitivity is 95.37%. Compared with mainstream target detection algorithms, the precision and sensitivity of the proposed method are improved by 11.33% and 9.03%, respectively.

    Table and Figures | Reference | Related Articles | Metrics
    Pavement Pothole Detection Method Based on Improved YOLOv5
    HE Xing, HUANG Yongming, ZHU Yong
    Electronic Science and Technology    2024, 37 (7): 53-59.   DOI: 10.16180/j.cnki.issn1007-7820.2024.07.007
    Abstract148)   HTML14)    PDF(pc) (2169KB)(90)       Save

    Pothole is a common road disease, it reduce driving safety, accurate and rapid detection of potholes is more important.In viewof the problem that the detection accuracy of existing pothole detection methods is not high in the scenario of small targets and dense targets, an improved YOLOv5(You Only Look Once version 5) model is proposed in this study.TheCBAM(Convolutional Block Attention Module) is introduced into YOLOv5's backbone network to improve the model's ability to pay attention to key features. The loss function of YOLOv5 is changed to EIoU(Efficient Intersection over Union) to improve the detection accuracy of the model.The experimental results show that the proposed model can detect Potholes quickly and accurately in the scenarios of small targets and dense targets, and the mAP(mean Average Precision) in the open source Annotated Potholes Image Dataset reaches 82%. Compared with YOLOv5 and other mainstream methods, it is also improved.

    Table and Figures | Reference | Related Articles | Metrics
    Vehicle Detection and Analysis in Urban Waterlogging Area Based on Deep Learning
    XIA Rongcheng, LIU Deer
    Electronic Science and Technology    2024, 37 (5): 18-24.   DOI: 10.16180/j.cnki.issn1007-7820.2024.05.003
    Abstract147)   HTML7)    PDF(pc) (4676KB)(58)       Save

    In the urban waterlogging scene, many people and vehicles are trapped in the water, which brings adverse effects to the public life. With the rapid development of computer technology, deep learning is more and more widely used in solving practical problems. This study proposes a method to build a MaskR-CNN(Regions with Convolutional Neural Networks Features) model using TensorFlow deep learning framework, which has achieved good detection results in the detection of waterlogging areas in urban waterlogging scenes, with the mAP(mean Average Precision) value reaching 89%. Based on the YOLOv5(You Only Look Once version 5) model, the dense interframe difference operation is used to track people and vehicles in waterlogged areas, and the tracking accuracy reached about 90%. Moreover, ResNet(Residual Network) attached to YOLOv5 is used to analyze the risk of submersion of vehicles in waterlogging scenarios. The experimental results show that the vehicle risk detection effect of the proposed model is better than other models.

    Table and Figures | Reference | Related Articles | Metrics
    Estimation and Performance Analysis of Unscented Kalman Filter with Randomly Missing Measurements
    BAI Rui,REN Zhu
    Electronic Science and Technology    2024, 37 (2): 23-29.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.004
    Abstract143)   HTML7)    PDF(pc) (865KB)(61)       Save

    In engineering applications, wireless network control systems are mostly nonlinear systems. Due to long-distance transmission and unreliable communication networks, the measured values of system sensors may be lost in the transmission process, which influences accuracy estimation and system performance. In this study, the problem of unscented Kalman filtering for a class of nonlinear discrete stochastic systems affected by correlated noise and sensor measurement loss is studied. By introducing a random variable that obeys Bernoulli distribution and has known conditional probability to describe the random sensor measurement loss, an algorithm is proposed to compensate the data. The results are verified by standard numerical software. The results show that the filter compensated by the algorithm can estimate the system well, greatly reduce the impact of sensor measurement loss on the filter performance, and increase the accuracy of estimation.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Double Layer Ring Equalizer for Lithium Battery Pack of Electric Vehicle
    HAN Xinsheng, KAN Jiarong, LING Huiying, WANG Peng, CHENG Qian
    Electronic Science and Technology    2024, 37 (4): 16-24.   DOI: 10.16180/j.cnki.issn1007-7820.2024.04.003
    Abstract138)   HTML4)    PDF(pc) (3025KB)(57)       Save

    The traditional Buck-Boost equalization circuit has long transmission path and low equalization efficiency, and the existing ring equalizer cannot fundamentally solve this problem. In view of this problem, a double-layer ring equalizer for lithium battery based on Buck-Boost and switched capacitor is proposed in this study. The equalization circuit adopts modular balancing method, and adopts Buck-Boost and switching capacitor hybrid circuit to achieve equalization in the bottom module and top module. The circuit structure is analyzed from two aspects of equalization speed and efficiency by graph theory analysis. The results show that the equalization circuit has the advantages of less energy transmission paths and high energy transmission efficiency. The simulation model of the equalization circuit is built on the MATLAB/Simulink power simulation platform. The simulation results show that the equalization speed of the double-layer ring equalizer based on Buck-Boost and switched capacitor is 46% higher than that of the single-layer ring equalizer. Additionally, an experimental prototype of four batteries is established to verify the working principle and system equalization efficiency of the ring equalization circuit. The experimental results show that the equalization efficiency of the double-layer ring equalizer is 26.78% higher than that of single-layer ring equalizer. The simulation and experimental results are consistent with the theoretical analysis, which indicates that the circuit structure is reasonable and effective.

    Table and Figures | Reference | Related Articles | Metrics
    Design of High Precision Over-Temperature Protection Circuit for Power Management Chip
    DU Wenhe, XU Zheng, KANG Jiahao, YANG Ke, PAN Jingxue
    Electronic Science and Technology    2024, 37 (9): 79-86.   DOI: 10.16180/j.cnki.issn1007-7820.2024.09.012
    Abstract138)   HTML9)    PDF(pc) (1026KB)(65)       Save

    Power management chips is damaged to varying degrees when they work at the ambient temperature beyond their acceptable range, and the over-temperature protection circuit plays an important role in improving the reliability and robustness of this kind of chip. This study designs a high-precision over-temperature protection circuit with the dual functions of turning off when the temperature is too high and reminding when the temperature is too low. The positive and negative temperature coefficient voltages are used to detect the chip temperature in real time, and then four logic turnover points are obtained by comparing them with different reference voltages at the output end of the band-gap reference circuit. After processing by the high-precision comparator circuit and hysteresis logic circuit, the hysteresis logic signals are output to control the working state of the chip or to remind the low temperature. The design and relevant simulation have been carried out based on 0.18 μm BCD(Bipolar-Complementary Metal Oxied Semiconductor-Double diffused Metal Oxide Semiconductor) process, and the simulation results show that when the power supply voltage ranges from 3.0~ 5.5 V, the maximum offset of the temperature threshold corresponding to the hysteresis logic turnover signal at the output end of the circuit is within 0.3 ℃. The circuit has high precision and can be widely integrated in various power management chips requiring over-temperature protection.

    Table and Figures | Reference | Related Articles | Metrics
    Thermal Simulation of COB-LED Heat Sink Based on Two-Dimensional Heat Conduction Equation
    WANG Chaorui, YANG Ping, HAN Shuai, XU Xinying
    Electronic Science and Technology    2024, 37 (3): 68-74.   DOI: 10.16180/j.cnki.issn1007-7820.2024.03.009
    Abstract136)   HTML1)    PDF(pc) (3460KB)(44)       Save

    For solving the problem about heat dissipation of COB-LED(Chip on Board-Light Emitting Diode), a mathematical model is established based on two-dimensional heat conduction equation which can quickly calculate heat distribution on the surface of COB-LED heat sink in this study. In order to facilitate the solution of the model, the finite difference method is used to solve the mathematical model and the alternate direction implicit scheme is chosen as its difference scheme.According to the boundary conditions and initial conditions in the model, the COB-LED normal temperature lighting experiment is designed, and the simulation analysis is carried out based on ANSYS finite element analysis software. The rationality of the mathematical model is verified by comparing the solution results, simulation results and experimental results. The results show that the relative error of the maximum temperature between the solution result and the experimental results is about 23.57%, and the temperature variation trend of the two is consistent. The maximum temperature relative error between the solution result and simulation results is about 34.84%, and the temperature distribution is close. The rationality and correctness of the mathematical model are proved.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Object Detection Based on Radar and Video Fusion
    ZHU Yong, HUANG Yongming, HE Xing
    Electronic Science and Technology    2024, 37 (8): 1-7.   DOI: 10.16180/j.cnki.issn1007-7820.2024.08.001
    Abstract133)   HTML10)    PDF(pc) (3310KB)(68)       Save

    The object detection based on video has the problem of poor recognition effect in bad weather, so it is necessary to make up for video defects and improve the robustness of detection framework. In view of this problem, this study designs an object detection framework based on radar and video fusion. YOLOv5 (You Only Look Once version 5) network is used to obtain image feature map and image detection frame, density-based clustering is used to obtain radar detection frame, and radar data is encoded to get object detection results based on radar information. Finally, the detection boxes of the two are superimposed to obtain a new ROI (Region of Interest), and the classification vector after fusion radar information is obtained, which improves the detection accuracy in extreme weather. The experimental results show that the mAP(mean Average Precision) of the framework reaches 60.07%, and the parameter number is only 7.64×106, which indicates that the framework has the characteristics of lightweight, fast computing speed and high robustness, and can be widely used in embedded and mobile platforms.

    Table and Figures | Reference | Related Articles | Metrics
    Research on AES and ECC Algorithm Image Encryption Based on FPGA
    FANG Yingli, FANG Yuming
    Electronic Science and Technology    2024, 37 (6): 92-97.   DOI: 10.16180/j.cnki.issn1007-7820.2024.06.012
    Abstract131)   HTML14)    PDF(pc) (2019KB)(42)       Save

    With the increasing use of digital images, it is essential to protect confidential image data from unauthorized access. In view of the security problems of digital image in the fields of communication, storage and transmission, this study proposes a digital envelope technology encryption scheme with high security and high speed based on the advantages of symmetric algorithm model and asymmetric algorithm model. This method is based on AES(Advanced Encryption Standard) and ECC(Elliptic Curve Cryptography), and optimized ECC hardware architecture is used for symmetric key sharing to enhance the security of the key. The traditional AES is optimized by adding pseudo-random numbers, using column shift instead of column obfuscation, and three-dimensional S-box box to maintain the Shannon diffusion and obfuscation principle while reducing the time complexity. This study the digital image encryption simulation and performance test of AES algorithm are carried out on FPGA(Field Programmable Gate Array). The test results show that the proposed encryption scheme has the advantages of rapidity, high security and effectiveness, and can better achieve image encryption.

    Table and Figures | Reference | Related Articles | Metrics
    Irreversible Expansion Model for Lithium-Ion Batteries and its Application
    WANG Yahui, LI Peichao, WANG Keyong
    Electronic Science and Technology    2024, 37 (9): 8-13.   DOI: 10.16180/j.cnki.issn1007-7820.2024.09.002
    Abstract128)   HTML7)    PDF(pc) (968KB)(41)       Save

    In view of the problem of rapid estimation of capacity attenuation after multiple charge and discharge cycles of LIB(lithium-ion battery), a new method based on the capacity attenuation model of lithium-ion battery is proposed to rapidly estimate its internal capacity attenuation using the external expansion displacement of the battery.Based on the capacity attenuation model of LIB, the radial irreversible expansion model is derived, and the cylindrical LIB Sanyo UR18650E is modeled and solved by COMSOL Multiphysics, and the numerical results are compared with the experimental data, so as to verify the proposed model. Based on the above model, the causes of capacity attenuation and irreversible expansion of battery due to side reactions during the charge-discharge cycle are analyzed.The results show that the change of side reaction rate causes the gradient distribution of the concentration of side reaction products in the negative electrode, and the accumulation of side reaction products causes the expansion displacement of the battery to increase linearly with the cycle.The function formula of the cell capacity attenuation and its radial displacement is obtained by using the side reaction product as a bridge, which provides a new method for the rapid estimation of the capacity attenuation.

    Table and Figures | Reference | Related Articles | Metrics
    Real-Time Hybrid Task Scheduling Algorithm in Embedded Multicore System
    LUO Guang, MAO Hang, ZHU Yangshuo, ZHANG Fengdeng
    Electronic Science and Technology    2024, 37 (8): 84-91.   DOI: 10.16180/j.cnki.issn1007-7820.2024.08.012
    Abstract127)   HTML6)    PDF(pc) (996KB)(54)       Save

    In this study, an algorithm based on BFZL(Boundary Fair until Zero Laxit) is proposed to solve the problem of reasonable scheduling of real-time mixed task set formed by periodic task and sporadic task. Based on the I-BF(Improved Boundary Fair) real-time mixed task algorithm, the relaxation parameter of LLF(Least Laxity First) algorithm is introduced to improve the priority of decision task. A heuristic algorithm based on relaxation and heuristic strategy is proposed to improve task assignment strategy. The experimental results show that the BFZL algorithm can satisfy the real-time performance of the system and achieve the purpose of algorithm optimization. Through data comparative analysis, compared with the original algorithm, the proposed algorithm reduces the average response time of sporadic tasks by about 26%, reduces the context switch and migration by about 28% and 50%, respectively. Additionally, the algorithm also has advantages in scheduling overhead.

    Table and Figures | Reference | Related Articles | Metrics
    Sorting Method of Multi Leads ECG Based on Mutual Information
    NAN Jiao,SUN Zhanquan
    Electronic Science and Technology    2024, 37 (2): 55-60.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.008
    Abstract127)   HTML4)    PDF(pc) (731KB)(47)       Save

    The studies of automatic Electrocardiograph(ECG) classification based on convolutional neural networks all extract features from the ECG with the default 12-lead sequence, ignore the influence of lead sequence on feature extraction of convolutional network. To solve the problem, this study proposes a 2-end increasing sorting method based on mutual information, which uses mutual information to measure the correlation between leads. According to the correlation between leads and the characteristics of two-dimensional convolution, the adjacent connections of closely related leads are sorted.The experimental results show that the multi-lead ECG sorting method has achieved remarkable results on three databases and three convolutional network classification models.F1, accuracy, recall, accuracy, and Jacquard's coefficient of the proposed method increases by 0.011,0.009,0.007,0.014, and 0.013, while Hamming's loss decreases by 0.002.

    Table and Figures | Reference | Related Articles | Metrics
    Instance Segmentation Based on Attention and Image Contour
    GU Denghua, GU Chunhua
    Electronic Science and Technology    2024, 37 (4): 62-68.   DOI: 10.16180/j.cnki.issn1007-7820.2024.04.009
    Abstract126)   HTML7)    PDF(pc) (1555KB)(66)       Save

    Based on image contour, the instance segmentation method uses fewer contour nodes to represent an object, which effectively reduces the number of algorithmic parameters and improves its operation efficiency. However, with the segmentation result of poor quality, it is no match for traditional pixel-by-pixel processing segmentation algorithm in terms of accuracy. To improve the accuracy of the algorithm, it is of great necessity to introduce a refined model of the instance segmentation (Attend the Contour snake,AC-snake), which is based on image contour with a combination of attention mechanism. An improved Largekernel+ is added to the backbone network to improve the receptive field of the model and extract richer feature information. The network structure at the contour vertex deformation stage is improved, and the Dual Channel attention (DC-attentio) module is combined to enhance the effective information of contour vertex, reduce the invalid parameters in the training network, and improve the detection accuracy and training speed. The experimental results show that in Cityscapes validation data set, the improved model proposed in this study has improved performance when compared with the original model.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Hardware in Loop Experiment Method of Direct Drive Wind Turbines Based on RTDS
    HE Puxiang,HAO Zhenghang,CHEN Zhuo,YANG Guangrao,NIE Chunfang
    Electronic Science and Technology    2024, 37 (2): 61-68.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.009
    Abstract124)   HTML3)    PDF(pc) (1028KB)(49)       Save

    In order to realize the generality of wind turbines hardware in the loop platform, a universal wind turbines hardware in the loop experiment platform is built to realize the optimal control of wind turbines. In view of the problem that direct drive wind turbines can affect the normal operation of direct drive wind turbines when the power grid voltage is unbalanced or asymmetrical, this study adopts the algorithm based on the decoupling of positive sequence current and negative sequence current to eliminate the negative sequence current and keep the constant output power. By inhibiting the double frequency fluctuation of the reactive power of the wind turbines when the fault occurs, the reference value of the active power and reactive power is 0, the amplitude of the double frequency fluctuation component of the grid reactive power is 0, and the purpose of eliminating the negative sequence current and making the output of the wind turbines stable is achieved. The simulation verification is carried out on the experimental platform. The experimental results show that the active power output of wind turbines remains unchanged and the grid-connection adaptability of wind turbines is significantly improved, which verifies the rationality and effectiveness of the method.

    Table and Figures | Reference | Related Articles | Metrics
    Quality Guidance Based Branch-Cut Phase Unwrapping Algorithm
    TAI Manli, LI Wenguo, LIU Tao, ZHONG Yongpeng
    Electronic Science and Technology    2024, 37 (7): 72-80.   DOI: 10.16180/j.cnki.issn1007-7820.2024.07.010
    Abstract124)   HTML5)    PDF(pc) (4316KB)(57)       Save

    Phase unwrapping is a key data processing step in phase measurement profilometry. In this study, a quality-guided branch-cut phase unwrapping algorithm is proposed based on the traditional Goldstein branch-cut method, aiming to obtain more accurate phase unwrapping results. The proposed algorithm uses the second-order differential of the wrapped phase as a supplement parameter for residual detection principle, and regards the mutation points in the second-order differential of the wrapped phase as non-polar residual points, and uses modulation as the criterion for residual point effectiveness judgment, regarding the residual points with low modulation as having higher effectiveness for local optimization to reduce the density of residual points. The optimized equivalent residual points are connected into branch-cut to block error propagation. The proposed algorithm calculates the quality of pixels using modulation to guide the order of phase unwrapping, with the unwrapping path circumventing the branch-cut and prioritizing high-quality pixels. Experimental results show that the proposed algorithm has higher accuracy and competitiveness in phase unwrapping results.

    Table and Figures | Reference | Related Articles | Metrics
    Pulse High-Frequency Voltage Injection Method Based on Rotor Polarity Judgment Optimization
    CHEN Yibin, JIN Hai, XU Shen
    Electronic Science and Technology    2024, 37 (6): 29-35.   DOI: 10.16180/j.cnki.issn1007-7820.2024.06.004
    Abstract122)   HTML5)    PDF(pc) (1348KB)(53)       Save

    When the permanent magnet synchronous motor operates at zero speed and low speed, the rotor position information can be accurately estimated by the pulse high-frequency injection method. The pulse high frequency injection method can not realize the rotor polarity judgment, while the traditional polarity judgment method has problems such as long response time, complex sampling and implementation process, and even polarity misjudgment. In this study, a method of judging the rotor polarity based on positive and negative voltage pulse injection is proposed. This method injects positive and negative voltage pulses into the motor, and judges the rotor polarity according to the response current peak value of the corresponding pulse. The pulse high frequency injection method combines the rotor position estimation with the polarity judgment result to obtain the accurate initial position of the rotor. This study verifies the effectiveness of the algorithm through Simulink simulation. The simulation results show that the proposed rotor polarity determination method can simplify the sampling method and algorithm complexity, reduce the response time for determining rotor polarity, and enable the pulse high-frequency injection method to accurately and quickly estimate the initial position of the rotor.

    Table and Figures | Reference | Related Articles | Metrics
    Deep Learning with Noisy Labels Based on Co-Teaching
    XIA Qiangqiang, LI Feifei
    Electronic Science and Technology    2024, 37 (11): 1-6.   DOI: 10.16180/j.cnki.issn1007-7820.2024.11.001
    Abstract121)   HTML15)    PDF(pc) (792KB)(60)       Save

    When large-scale data is labeled artificially, labeling errors are easy to occur, which leads to the existence of noise labels in data sets, and further affects the generalization of deep neural network models. The sample selection mechanism in the existing research methods such as Co-teaching makes the noise samples easy to flow into the selected clean label sample subset, and it is difficult to control the deep neural network model's fitting to the selected clean sample subset in training. Therefore, this study presents a novel algorithm that improves upon Co-teaching. In this method, two regularization losses are added to prevent the model from placing too much trust in a single class and falling into a local optimal solution respectively. Additionally, the introduction of high learning rate attenuation training method makes the model more inclined to learn clean label sample features in the initial training to get better model parameters. Compared with the results of Co-teaching, the performance of the proposed model is improved on MNIST, CIFAR-10 synthetic noise data set and Animal10N realistic data set under 20% and 50% symmetric noise and 45% asymmetric noise environment.

    Table and Figures | Reference | Related Articles | Metrics
    Image Style Transfer Algorithm Based on Improved Generative Adversarial Network
    WANG Shengxiong, LIU Ruian, YAN Da
    Electronic Science and Technology    2024, 37 (6): 36-43.   DOI: 10.16180/j.cnki.issn1007-7820.2024.06.005
    Abstract116)   HTML14)    PDF(pc) (3584KB)(58)       Save

    Image style transfer has been a research hotspot in the field of image processing, but the current style transfer models have problems such as fuzzy details of generated image, the poor color effect of style texture and excessive model parameters. An image style transfer method based on improved cycle-consistent generative adversarial network is proposed in this study. The generator network architecture is improved by adding the Ghost convolution module and the inverted residual improved module to reduce the number of model parameters and computation cost, as well as enhance the feature extraction capability of the network. And the content style loss item, the color reconstruction loss item and the map identity loss item are added to the loss function for enhancing generative capability of the model and improving the quality of generated images. The experimental results show that the proposed method has a stronger ability for style transfer, which enhances the content details and color effect of style texture from generated images effectively, improves the image quality significantly, and the model performance has also been improved well.

    Table and Figures | Reference | Related Articles | Metrics
    Multimodal Android Malware Detection Method Based on Behavioral and Semantic Characteristics
    ZHU Jinkai, FANG Lanting, JI Xiaowen, HUANG Jie
    Electronic Science and Technology    2024, 37 (5): 71-78.   DOI: 10.16180/j.cnki.issn1007-7820.2024.05.010
    Abstract113)   HTML2)    PDF(pc) (998KB)(46)       Save

    Existing methods for detecting Android malware only consider a single kind of features, which do not fully describe the features of Android software. In order to solve the above problems, this study presents a multimodal Android malware detection method based on the permissions, byte code probability matrix and function call graph. At the same time, in order to solve the problem of feature representation of function nodes, a new node feature generation method is presented in this study in the generation of function call graph. In order to enrich the semantic information of opcode, a byte probability matrix generation method based on 2-gram is presented. The experiment proves that the method described the characteristics of Android software more comprehensively than other methods, and the detection accuracy rate reached 95.2%. Compared with the existing methods, the accuracy of this method has been improved by 22% on average, effectively improving the detection ability of Android malware.

    Table and Figures | Reference | Related Articles | Metrics
    Research on Multiclass Garbage Classification Algorithm Based on Improved MobileNet Network
    LIANG Chenye, ZHANG Xuanxiong
    Electronic Science and Technology    2024, 37 (4): 38-46.   DOI: 10.16180/j.cnki.issn1007-7820.2024.04.006
    Abstract113)   HTML8)    PDF(pc) (3591KB)(69)       Save

    view of the large amount of garbage and the fact that a picture contains multiple garbage objects, this study proposes a garbage detection and classification algorithm based on the improved MobileNet network, which integrates the MobileNet network into YOLOv5(You Only Look Oncev5) target detection algorithm. At the same time, the CBAM(Convolutional Block Attention Modul) module is introduced in the backbone to filter meaningful information, and the vision transformer is used to aggregate and form image features. In addition, the weighted bidirectional feature pyramid network is used to distinguish the contribution of different features. At the same time, the ECA(Efficient Channel Attention) module is introduced to combine the image features and transmit them to the prediction layer. Finally, in order to obtain better performance when there is occlusion between garbage targets, soft-NMS(soft-Non Maximum Suppression) method and Alpha-IoU(Alpha-Intersection over Union) loss function is used to predict the extracted features. The experimental results show that the method proposed in this study can realize the location and recognition of multi-target and multi-category garbage., and the mAP(mean Average Percision) value reaches 90.31%, which is 4.95% higher than that of YOLOv5 network, and the processing speed is shortened by about 2.4 seconds. Compared with the Faster R-CNN(Region-based Convolutional Neural Network) algorithm which integrates ResNet(Residual Network) network, the algorithm proposed in this study improves the processing efficiency on the premise of ensuring the accuracy.

    Table and Figures | Reference | Related Articles | Metrics
    Low Power Consumption Wearable Electrocardiogram Monitoring System
    ZHANG Peng, JIANG Mingfeng, LI Yang
    Electronic Science and Technology    2024, 37 (10): 88-94.   DOI: 10.16180/j.cnki.issn1007-7820.2024.10.012
    Abstract113)   HTML5)    PDF(pc) (2442KB)(50)       Save

    Daily electrocardiogram monitoring is of great significance for the prevention of cardiovascular diseases. However, medical-grade electrocardiogram monitoring systems are expensive, complicated to operate, and not suitable for home-based electrocardiogram monitoring. Wearable devices often ignore the interference of noise, and the signals collected are difficult to analyze and diagnose. This study presents a low-power wearable electrocardiogram monitoring system, which consists of four parts:Power management module, electrocardiogram acquisition module, data processing module, and delay switch module. The system uses the BMD101 chip to acquire human electrocardiogram signals and sends the electrocardiogram data to a mobile device via low-power Bluetooth chip nrf52832. To address the muscle electrical interference noise that is easily introduced into the electrocardiogram signals, a denoising algorithm based on VMD (Variational Mode Decomposition) is proposed. The NLM(Non-Local Mean) filter is used to remove the noise in the low-frequency mode of the electrocardiogram signal, and the DWT(Discrete Wavelet Transform) threshold denoising algorithm is used to eliminate the high-frequency mode noise of the electrocardiogram signal. The reconstructed signal quality is significantly improved. The experimental results show that the proposed algorithm has the characteristics of low cost, easy portability and convenient use, and can obtain high quality electrocardiogramsignals, meet the needs of users for long-range monitoring, and solve the problems of inconvenient daily electrocardiogrammonitoring and low quality electrocardiogram signal acquisition.

    Table and Figures | Reference | Related Articles | Metrics
    Hybrid Image Super-Resolution Reconstruction with Multiple and Multi-Scale Attention
    KUAI Xinchen, LI Ye
    Electronic Science and Technology    2024, 37 (9): 34-42.   DOI: 10.16180/j.cnki.issn1007-7820.2024.09.006
    Abstract111)   HTML14)    PDF(pc) (2627KB)(61)       Save

    Image itself information is naturally robust to image reconstruction, yet most current super-resolution methods do not fully utilize global feature information. This study proposes a new image super-resolution model mixing multiple and multi-scale attentions, including two new modules: Multi-scale hybrid non-local attention upsampling module and residual dense attention block. Different from previous nonlocal methods, multi-scale hybrid non-local attention upsampling module mixes pixel-based and patch-based nonlocal attention and establishes patch-level upsampling mapping relationships at multiple scales, which enables a wider global search space. The residual dense attention block establishes attention associations in channel and spatial dimensions, which enhances the transfer and fusion of front-to-back attention information through dense connections. In this study, quantitative and qualitative evaluations are conducted on several benchmark datasets, and the experimental results show that the model outperforms similar super-resolution models in terms of performance and reconstruction quality.

    Table and Figures | Reference | Related Articles | Metrics
    Ozone Generation by Dielectric Barrier Discharge under Different Square Wave Pulse Modes
    JIANG Song,HE Yuanyuan
    Electronic Science and Technology    2024, 37 (2): 30-35.   DOI: 10.16180/j.cnki.issn1007-7820.2024.02.005
    Abstract105)   HTML5)    PDF(pc) (1897KB)(49)       Save

    In order to improve the concentration and output of ozone produced by dielectric barrier discharge, the characteristics of ozone produced by dielectric barrier discharge under different square wave pulse modes are studied in this study. The discharge characteristics of the system are analyzed, the discharge power of the system is calculated, and the concentration and output of ozone produced under different polarity, frequency and pulse width are studied. The results are analyzed and discussed. The results show that the ozone concentration is the highest (8.8 g·Nm-3) when positive and negative square wave pulses are applied, while the ozone yield is the highest (55 g·kWh-1) when positive square wave pulses are applied. With the increase of the frequency, the ozone concentration and production show a trend of first increasing and then decreasing. When the discharge frequency is 1 kHz, the ozone concentration is the highest, and when the discharge frequency is 1.5 kHz, the ozone production is the highest. Under the condition that other parameters are fixed, the ozone concentration increases slowly with the increase of pulse width, and the output of ozone basically remains unchanged.

    Table and Figures | Reference | Related Articles | Metrics
    Heterogeneous Converged Network Access Algorithm Based on Deep Reinforcement Learning
    XIAO Xiong, LIU Hongyan, YI Mengjie
    Electronic Science and Technology    2024, 37 (11): 7-12.   DOI: 10.16180/j.cnki.issn1007-7820.2024.11.002
    Abstract103)   HTML8)    PDF(pc) (2468KB)(41)       Save

    With the increasingly mature communication networks in the fields of air, space and ground, cross-domain heterogeneous converged technology has become an important direction for the integrated development of future communication networks. Driven by the demand for cross-domain heterogeneous in the converged network of air, space and ground, this study aims to solve the problem of low spectrum resource utilization in heterogeneous networks. It uses deep reinforcement learning method to establish a heterogeneous converged network system model and designs intelligent agent access algorithm with fair scale. The system throughput is selected as the maximization objective. The communication network standards that meet the characteristics of air, space and ground integration are selected and corresponding access protocols are extracted. Non-dimensional channel parameters are set according to the principle of fairness and simulation scenarios are established. Multiple comparison strategies are introduced in the simulation to statistically analyze system throughput, collision rate, utilization rate and channel selection ratio. The simulation results show that the system throughput of cross-domain heterogeneous fusion network is increased by more than 60%, system channel utilization efficiency is increased by 20%, and the collision rate of service packets is maintained at 10%, which verifies the adaptability of the algorithm to different business scenarios.

    Table and Figures | Reference | Related Articles | Metrics
    Event-Triggered Fault Detection for Delta Operator Network Control Systems
    GE Xiaowei, ZHOU Ying
    Electronic Science and Technology    2024, 37 (5): 79-87.   DOI: 10.16180/j.cnki.issn1007-7820.2024.05.011
    Abstract102)   HTML5)    PDF(pc) (1536KB)(43)       Save

    A fault detection method based on a combination of event-triggered mechanism and Delta operator is used for the fault problems caused by time delay and packet loss in the network due to bandwidth limitation of the communication network in the case of high-speed sampling of the network control system. In this study, while co-designing the fault detection filter and the controller, the construction vector is added to the Delta operator filter model to avoid the generation of bilinear terms in the parameter design. Constructing Lyapunov-Krasovskii generalized connotations of the δ-domain for the stability and H performance of the residual system. The numerical simulation example verifies the effectiveness of the proposed event triggering mechanism and demonstrates its high sensitivity to faults by the residual evaluation function.

    Table and Figures | Reference | Related Articles | Metrics
    Emotion Recognition Algorithm Based on Multimodal Cross-Interaction
    ZHANG Hui, LI Feifei
    Electronic Science and Technology    2024, 37 (10): 81-87.   DOI: 10.16180/j.cnki.issn1007-7820.2024.10.011
    Abstract101)   HTML3)    PDF(pc) (1735KB)(38)       Save

    Due to the limitations of single modality emotion recognition, many researchers have shifted their focus to the field of multimodal emotion recognition. Multi-modal emotion recognition focuses on two problems: The optimal extraction of the features of each mode and the effective fusion of the extracted features. This study proposes an emotion recognition method based on multimodal cross-interaction to capture the diversity of modality expressions. The editors of various modalities separately extract features with emotional information, and the stacked interaction modules based on the attention mechanism between modalities model the potential relationship among vision, text and audio. Experiments are conducted on CMU-MOSI and CMU-MOSEI datasets for emotion recognition based on text, audio and visual. The results show that the method achieved the scores of 86.5%, 47.7%, 86.4%, 0.718, 0.776, and 83.4%, 51.5%, 83.4%, 0.566, 0.737 on five indicators, Acc2(Accuracy2)、Acc7(Accuracy7)、F1、MAE(Mean Absolute Error) and Corr(Correlation). This demonstrates that the proposed algorithm significantly improves performance, and also validates that the cross-mapping mutual representation mechanism perform better than single-modal representation methods.

    Table and Figures | Reference | Related Articles | Metrics
    Overview of Research on Network Security Situation Prediction Technology
    LU Zhenyang
    Electronic Science and Technology    2024, 37 (8): 92-96.   DOI: 10.16180/j.cnki.issn1007-7820.2024.08.013
    Abstract100)   HTML7)    PDF(pc) (607KB)(45)       Save

    In order to further reduce the probability of multiple networks being attacked, different types of network security situation prediction models have received widespread attention and in-depth research from scholars both domestically and internationally. With the rapid development of situational awareness modeling technology, various novel technical solutions such as neural networks, time series, and support vector machines have been introduced into the prediction model of network security situations, deeply optimizing and improving the means and methods of situational prediction models, thereby further improving the accuracy of situational prediction models. This study reviews and sorts out the research history and development process of network security situation prediction technology, elaborates on the main principles and current development status of situation prediction models, analyzes the shortcomings and deficiencies of current technical solutions, and points out the future research directions of network security situation prediction model technology.

    Reference | Related Articles | Metrics
Download

Monthly,Founded in September 1987
Competent Authorities:
Ministry of Education of the People's Republic of China
Sponsored by:Xidian University
Chief Editor:Liao Guisheng
Executive Editor:Wan Liancheng
Editor:Hei Lei
Editor and Publisher:
The Editorial Department of Electronic Science and Technology
Distribution Abroad:
China Intermational Book Trading Corporation
P.O.BOx 399,Beijing 100044,China
Address:
P.O.Box 375,2 Taibai Road(South),Xi'an 710071,China
Tel/Fax:0086-029-88202440
Website:http://www.dianzikeji.org
E-mail:dzkj@mail.xidian.edu.cn
Unit Price:$20.00