Accesso libero

Anomalous signal recognition algorithm for electronic communication equipment based on improved gradient projection method

,  e   
21 mar 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Introduction

With the rapid development of communication technology, people’s dependence on communication is increasing. Whether it is an individual or an enterprise, in the process of communication, we all want to maintain the stability of communication and good connection status. However, due to various reasons, abnormalities in communication are inevitable. In order to find and solve the communication anomalies in time, the communication equipment anomalous signal recognition is especially important [1-4].

Communication anomaly detection and identification is a very important part of the communication system, which detects potential problems and identifies anomalies by monitoring the communication network and equipment. Common communication anomalies include network delay, packet loss, signal interference and so on [5-7]. Communication anomaly detection and identification can be achieved in the following ways: monitoring network status: by real-time monitoring of the network connection status, including network delay, packet loss and other parameters, to determine whether the network is working properly. Network monitoring tools can be used to regularly test the network, and the results will be fed back to the user [8-11]. Equipment status monitoring: real-time monitoring of communication equipment, including the working status of the equipment, hardware failure and so on. It can be realized through the monitoring interface provided by the equipment itself or integrated with the equipment management system [12-14]. Data analysis and anomaly identification: analyze the communication data, through the anomaly identification algorithm to determine whether there is anomaly. Data analysis software can be used to pre-process communication data and anomaly identification to improve the accuracy and efficiency of detection [15-18].

Literature [19] designed automatic detection system to prevent anomalous communication packets from propagating in the Internet. By completing the decoding work such as TCP protocol, the decoded data is fed into the SVM-based model for detecting anomalous communication packets for electronic devices. The experimental results pointed out that the system has advantages such as high efficiency compared to other systems. Literature [20] identifies anomalous behaviors by generating data sequences of network behaviors and inputting the data sequences into an RNN model to unfold the training to identify the anomalous behaviors. The data set is also divided into training set and test set, the training set is input into the RNN model for training and the model is evaluated by the test set. Literature [21] proposes a feature extraction method based on nonlinear techniques for network anomalous communication signals, which utilizes wavelet transform to decompose the anomalous network communication signals in both high and low frequency bands. It is verified through testing that the method can realize effective signal noise reduction effect and accurately extract the features of abnormal signals. Literature [22] proposed the IMemAE model to identify anomalous communication signals. The model is able to solve the problem of degradation of anomaly identification performance due to unbalanced communication signals. The effectiveness of ImemAE is emphasized by simulation results for better identification of synthetic anomalous communication signals. Literature [23] introduces a deep learning network based on sequence convolutional network, which consists of one-dimensional sequence convolution of residual network modules and variable convolutional kernel value domains, which is capable of mitigating the effect of signal packets. It is shown experimentally that this network exhibits better recognition in underwater communication environments, which makes it more meaningful to display for underwater communication systems. Literature [24] describes the signal recognition methods, pointing out that, with the development of wireless communication systems, classical methods, deep learning, etc. are gradually extended to wireless technology recognition. The open problems and challenges exposed in practice are discussed and current signal recognition methods and their future trends are summarized. Literature [25] examines the key technologies for fingerprinting of communication devices and discusses the individual recognition scheme for communication devices with XGBoost classification model. The GBDT model with different parameters is used as the main learner of the stacked classifier. The results show that using GBDT model with different parameters has higher recognition rate. Literature [26] uses the FFT method to analyze the time-frequency unfolding of the overlapping part of the interfering signal with BPSK to obtain the time-frequency map and its introduction of convolutional neural network to identify the interfering signal effectively. Simulation experiments show that the overall recognition rate of the proposed method is very high for different types of interference.

In this paper, the algorithm design for recognizing abnormal signals in electronic communication equipment is realized by combining a deep learning method and an improved gradient projection method. First, based on the theory of anti-jamming communication, a signal model is constructed, and an efficient path for signal detection is proposed. At the same time, the signal of electronic communication equipment is preprocessed, and the signal features are extracted based on the deep learning method, which lays the foundation for the recognition of abnormal information. Then, the improved gradient projection method is used to recognize abnormal signals in electronic communication equipment. In order to verify the effectiveness of the designed algorithm, anomaly recognition experiments are conducted on different types of signals, and their recognition performance is compared with that of the traditional method in different partitions and different numbers of experiments.

Algorithm design for abnormal signal recognition of electronic communication equipment
Anti-jamming communication theory
Signal Model

The anti-jamming communication channel model is shown in Fig. 1, and the channel coefficients of the three links from the jamming source to the transmitter (JT), the transmitter to the receiver (TR), and the jamming source to the receiver (JR) are h1,h2 as well as h3. The channel is assumed to be a flat-block fading channel model, i.e., all the channel coefficients are kept constant at one channel coherence time, while they are varied at different coherence times. In real communication counter scenarios, the CSIs of the jamming channels JT and JR links as well as the type of jamming model are difficult to obtain, and therefore, it is assumed that this information is unknown at both the transmitter and the receiver. In this thesis, without loss of generality, the transmitter operates in the FD mode, i.e., signal transmission and signal reception occur simultaneously in the same frequency band.

Figure 1.

Anti-interference communication channel model

The specific process of signal transmission is as follows:

1) Signal transmission: after the interference source discovers the transmitter and receiver of our communication node, it starts to broadcast an interference signal to attack the communication channel between the transmitter and receiver. Therefore the expression of the received signal YT(t) at the transmitter is: YT(t)=hlXJ(t)\[{{Y}_{T}}(t)={{h}_{l}}{{X}_{J}}(t)\] where XJ(t) denotes the unknown interference signal. For computational purposes, both the PGA noise at the transmitter and the self-interference introduced by the FD mode are combined into the noise at the receiver.

In this case, the communication between the transmitter and the receiver employs an interference modulation technique, which maps the information to be transmitted to different PGA amplification coefficients, amplifies the interference signal to different degrees, and forwards it to the receiver. Therefore, the expression for the transmitter’s emitted signal XT(t) is given by: XT(t)=A(t)YT(t)=A(t)h1XJ(t)\[{{X}_{T}}(t)=A(t){{Y}_{T}}(t)=A(t){{h}_{1}}{{X}_{J}}(t)\] where A(t) ∈ {ak : k = 1,2,…,K} denotes the PGA amplification factor mapped by the information to be transmitted by the transmitter and satisfying distribution p(A(t) = ak) = pkk=1Kpk=1$\sum\limits_{k=1}^{K}{{{p}_{k}}}=1$.

2) Signal reception: the receiver simultaneously receives the superposition of the interference signal from the interference source to the receiver link and the signal after the secondary modulation from the transmitter to the receiver link. Therefore, the expression for the received signal YR(t) at the receiver is: YR(t)=h2XT(tτ)+h3XJ(t)+ZR(t)=h1h2A(tτ)XJ(tτ)+h3XJ(t)+ZR(t)\[\begin{align} & {{Y}_{R}}(t)={{h}_{2}}{{X}_{T}}(t-\tau )+{{h}_{3}}{{X}_{J}}(t)+{{Z}_{R}}(t) \\ & ={{h}_{1}}{{h}_{2}}A(t-\tau ){{X}_{J}}(t-\tau )+{{h}_{3}}{{X}_{J}}(t)+{{Z}_{R}}(t) \end{align}\] where τ denotes the delay between the JR link and the JT-TR link. ZR(t) denotes the independently identically distributed (i.i.d.) 0-mean cyclically symmetric complex Gaussian (CSCG) noise, i.e., ZR(t)~CN(0,σR2)${{Z}_{R}}(t)\tilde{\ }CN(0,\sigma _{R}^{2})$.

Throughout the signaling process, the useful information A(t) is carried only by the interference signal from the interference source to the transmitter link. And the interference from the interference source to the receiver link, i.e., h3X1(t), is still considered as an interference term during decoding.

3) Signal Interference Noise Ratio (SINR): In a transmitted symbol period, the receiver samples the received signal N times to obtain the sampling sequence yR = [YR[1],YR[2],…,YR[N]]T. If the interference bandwidth is greater than or equal to the signal bandwidth of N times (the symbol period of the baseband signal is greater than or equal to the interfering signal of N times), the greater the length of the sequence N, the more the signal power convergence of the signal power to its transmitter power, the better the system BER performance. From Eq. (3), it can be seen that when the transmitter transmits symbol ak, the nth received signal sample can be expressed as: YR[n]=H[n]ak+Z[n]\[{{Y}_{\text{R}}}[n]=H[n]{{a}_{k}}+Z[n]\] where H[n] = hih2Xj[nnτ] and Z[n] = h3XJ[n]+ZR[n].

Based on Eq. (4), the expression for SINR can be further written as: SINR=E[ |h1h2XJ[nnτ]ak|2 ]E[ |h3XJ[n]+ZR[n]|2 ]&=|h1|2|h2|2|ak|2PJ|h3|2PJ+σR2\[SINR=\frac{\text{E}\left[ |{{h}_{1}}{{h}_{2}}{{X}_{J}}[n-{{n}_{\tau }}]{{a}_{k}}{{|}^{2}} \right]}{\text{E}\left[ |{{h}_{3}}{{X}_{J}}[n]+{{Z}_{R}}[n]{{|}^{2}} \right]}\And =\frac{|{{h}_{1}}{{|}^{2}}|{{h}_{2}}{{|}^{2}}|{{a}_{k}}{{|}^{2}}{{P}_{J}}}{|{{h}_{3}}{{|}^{2}}{{P}_{J}}+\sigma _{R}^{2}}\] where PJ is the average power of the interfering signal.

From Eq. (5), it can be seen that the adaptive transmission scheme can be considered for the strength of the interfering signal, and the selection of the amplification factor A(t) is determined by the strength of the interfering signal XJ(t), while the energy level of the received signal is mainly determined by the amplification factor A(t).

Efficient signal detection

1) Energy detector: it is to distinguish different symbols by measuring the average power of the received signals during the symbol period and comparing it with the preset judgment threshold. Therefore, the average power of the received signal after N samples in one symbol period can be expressed as: Q1Nn=1N| yR[ n ] |2\[Q\triangleq \frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{y}_{R}}\left[ n \right] \right|}^{2}}}\]

Substituting Eq. (4) into Eq. (6) gives: 1Nn=1N| yR[ n ] |2=1Nn=1N| h1h2akXJ[ nnτ ]+h3XJ[ n ]+ZR[n] |21Nn=1N| h1h2akXJ[ nnτ ]+h3XJ[ n ] |2+1Nn=1N| ZR[n] |2\[\begin{align} & \frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{y}_{R}}\left[ n \right] \right|}^{2}}}=\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{h}_{1}}{{h}_{2}}{{a}_{k}}{{X}_{J}}\left[ n-{{n}_{\tau }} \right]+{{h}_{3}}{{X}_{J}}\left[ n \right]+{{Z}_{R}}[n] \right|}^{2}}} \\ & \approx \frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{h}_{1}}{{h}_{2}}{{a}_{k}}{{X}_{J}}\left[ n-{{n}_{\tau }} \right]+{{h}_{3}}{{X}_{J}}\left[ n \right] \right|}^{2}}}+\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{Z}_{R}}[n] \right|}^{2}}} \\ \end{align}\]

The result of Eq. (7) is obtained by utilizing the mutual independence between the interfering signal XJ[n] and the noise ZR[n] and when N is large enough.

Since the effect of noise is negligible in the case of strong interference and this paper mainly focuses on the useful signal as a narrowband scenario. Thus, Eq. (7) can be approximated as: Q=1Nn=1N| yR[ n ] |2| h1h2ak+h3 |21Nn=1N| XJ[ n ] |2\[Q=\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{y}_{R}}\left[ n \right] \right|}^{2}}}\approx {{\left| {{h}_{1}}{{h}_{2}}{{a}_{k}}+{{h}_{3}} \right|}^{2}}\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{X}_{J}}\left[ n \right] \right|}^{2}}}\]

From the above equation, it can be seen that the average power of the received signal at the receiver is mainly determined by the amplification factor ak, implying that the receiver can extract useful information from the received signal by the difference in energy levels.

For example, when the transmitter uses OOK modulation. Then, the received signal power at the receiver can be expressed as: QN_is_big_enough{ | h1h2ak+h3 |21Nn=1N| XJ[ n ] |2,when_sending_"1"(A=a)| h3 |21Nn=1N| XJ[ n ] |2,when_sending_"0"(A=0)\[Q\xrightarrow{N\_is\_big\_enough}\left\{ \begin{align} & {{\left| {{h}_{1}}{{h}_{2}}{{a}_{k}}+{{h}_{3}} \right|}^{2}}\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{X}_{J}}\left[ n \right] \right|}^{2}},when\_sending\_''1''\left( A=a \right)} \\ & {{\left| {{h}_{3}} \right|}^{2}}\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{X}_{J}}\left[ n \right] \right|}^{2}},when\_sending\_''0''\left( A=0 \right)} \\ \end{align} \right.\]

Obviously, the power levels of the received signals at A = a and A = 0 are different. As long as the amplification factor a is large enough, the energy level of the received signal of the receiver at different transmitter symbols is distinguishable.

2) Estimated Signal Judgment Threshold: For each transmission of information, a portion of the received signal will be used as a guide signal, located before the useful signal, which is the judgment threshold Tth agreed upon by both sides of the transmitter-receiver to be used to estimate the energy of the signal. For example, when the transmitter uses binary modulation, the sequence “101010” can be used as a guide frequency training sequence. When the receiver receives the entire transmitted signal, it first estimates the average power of the received signal at the time of transmitting the symbols “1” and “0” by using the guide frequency signal, and thus sets the energy judgment threshold. The expression for the average power of the received signal when transmitting two guided-frequency symbols is: Qp={ (P2+P4+P6)/3,when_sending_"0"(P1+P3+P5)/3,when_sending_"1"\[{{Q}_{p}}=\left\{ \begin{align} & \left( {{P}_{2}}+{{P}_{4}}+{{P}_{6}} \right)/3,when\_sending\_''0'' \\ & \left( {{P}_{1}}+{{P}_{3}}+{{P}_{5}} \right)/3,when\_sending\_''1'' \\ \end{align} \right.\] where Pl denotes the average power of the lnd symbol in the guide frequency sequence, i.e: Pl=1Nn=1N| yR(l1)N+n |2,1<l<L\[{{P}_{l}}=\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{y}_{R}}\left( l-1 \right)N+n \right|}^{2}}},1<l<L\]

In engineering practice, it is common to choose a longer training sequence, i.e., L is large enough to obtain a more accurate judgment threshold. Thus, the expression of the judgment threshold between the symbols “1” and “0” estimated from the guide frequency signal is: Tth=TED[ QP(ak=a1),QP(ak=a2) ]\[{{T}_{th}}={{T}_{ED}}\left[ {{Q}_{P}}\left( {{a}_{k}}={{a}_{1}} \right),{{Q}_{P}}\left( {{a}_{k}}={{a}_{2}} \right) \right]\] where TED is the mapping between the estimated signal power QP and the judgment threshold Tth, determined by the judgment criterion and the type of interfering signal. QP(ak = a1) and QP(ak = a2) are the average power of the received signal when the estimated symbols are “0” and “1”, respectively, given by Equation (10).

In communication confrontation, when the type of the enemy jamming signal is unknown, the signal detection criterion based on the Euclidean distance [27] can be used as the judgment threshold Tth by taking the middle value of the signal power corresponding to the two transmitted symbols, i.e: Tth=[ QP(ak=a1)+QP(ak=a2) ]/2\[{{T}_{th}}={\left[ {{Q}_{P}}\left( {{a}_{k}}={{a}_{1}} \right)+{{Q}_{P}}\left( {{a}_{k}}={{a}_{2}} \right) \right]}/{2}\;\]

3) Message decoding: after obtaining the judgment threshold Tth, the judgment space is divided into two parts, T1 and T2, which correspond to different amplification coefficients { ak }k=12\[\left\{ ak \right\}_{k=1}^{2}\], viz: TK={ Q(0,Tth),when_sending_"0",ak=a1Q(Tth,),when_sending_"1",ak=a2\[{{T}_{K}}=\left\{ \begin{align} & Q\in \left( 0,{{T}_{th}} \right),when\_sending\_''0'',{{a}_{k}}={{a}_{1}} \\ & Q\in \left( {{T}_{th}},\infty \right),when\_sending\_''1'',{{a}_{k}}={{a}_{2}} \\ \end{align} \right.\]

Thus, the receiver decoding criterion can be expressed as: k:{ k{ 1,2 }:QTk }\[k:\left\{ k\in \left\{ 1,2 \right\}:Q\in {{T}_{k}} \right\}\]

In summary, the signal demodulation can be summarized in the following three steps:

Step1: Calculate the average power of the pilot signal in the received signal.

Step2: Estimate the judgment threshold of the average power of the signal.

Step3: Use energy detection criterion to extract useful information. When the received signal power, the verdict is QTth, otherwise,ak = a2.

It is worth noting that the energy detection criterion, as a non-coherent demodulation method, uses only the average power of the received signal, i.e., Q=1Nn=1N| yR[ n ] |2\[Q=\frac{1}{N}\sum\limits_{n=1}^{N}{{{\left| {{y}_{R}}\left[ n \right] \right|}^{2}}}\], to decode the useful information.

Abnormal Signal Recognition of Electronic Communication Equipment Based on IGP

To improve the recognition efficiency of abnormal signals in electronic communication equipment, this paper proposes an abnormal signal recognition algorithm based on the Improved Gradient Projection (IGP) method.

Signal Data Preprocessing

The signal data of the electronic communication equipment is stored in the server disk in text format, and it is necessary to screen and count these data, delete the null value in the signal data, remove the erroneous signal data and irrelevant signal data due to human operation, organize and classify the signal data and standardize the storage and management, and adjust the format of the signal data and then re-save it. According to different signal data types for classification and storage, the same type of signal data in the same folder for differentiation, using data compression methods to standardize the signal data constraints. The normalization of signal data is intended to ensure that the recognition results can accurately and truthfully reflect the recognition of signals by electronic communication equipment. The formula for normalizing the data is: x=xxminxmaxxmin\[x=\frac{x-{{x}_{\text{min}}}}{{{x}_{\text{max}}}-{{x}_{\min }}}\]

Where x is the data that can be used as a sample after normalization, xmax is the maximum value in the data without normalization, and xmin is the minimum value in the data without normalization.

In the process of signal identification of electronic communication equipment, some frequency points are not working at some moments, when the signal data of that frequency point is abnormal signal data. If this data is removed, it will cause loss of signal when that frequency point is working. Abnormal signals are generated by misidentification during the recognition process. Although the abnormal signals themselves do not have any significance, the study of how the abnormal signals are recognized by the electronic communication equipment can make the safety of the electronic communication equipment secure. Standardized processing of data can improve the true validity of data, and the standardized processing formula is: x=xns\[{{x}^{\prime }}=\frac{{{x}^{\prime }}-n}{s}\] where x'${{x}^{'}}$ is the data that can be used as a sample after standardization is performed. n is the mean of the data without normalization and is the standard deviation of the data without normalization. Finally do not select signal data that are unique and repetitive, select signal data that can be correlated with each other and can be coded with the attributes of the data source to correct the data for omission filling and uniformity, selected so that the data can be given attribute names and values of attributes to facilitate the later research can be carried out smoothly.

Deep learning based signal feature extraction

The features of the signals of electronic communication devices are extracted using deep learning methods. By using the coding network of the autoencoder and the coding network in the decoding network, the processed data is further compressed and processed to reduce the amount of signal data processed at the coding end as the input data, and since the input data of the implicit layer may be reduced, the signal data set is passed through the signal dataset, the root node data is selected, and then traversed to select the leaf nodes and construct a feature tree, which facilitates the training of the DNN cascade. Reduce unnecessary waste of resources. Using the deep learning autoencoder for DNN cascade training, the DNN can obtain the required feature information of abnormal signals from the sample signal data provided by electronic communication devices [28].

Using the BP algorithm of deep learning, the abnormal signal data of electronic communication equipment obtained by DNN is then adjusted so that the feature information of the abnormal signal of electronic communication equipment obtained by DNN is more complete and accurate. The deep learning adjustment process is shown in Fig. 2.

Figure 2.

Deep learning adjustment process

To analyze the feature data of the abnormal signal of electronic communication equipment obtained through DNN, let the scale of the signal be x and the time delay be y. The feature parameters of the abnormal signal data of the electronic communication equipment are calculated by the formula: Z(y)=(xx)×yZ(y)\[{{Z}^{\prime }}(y)=\frac{({{x}^{\prime }}-x)\times {{y}^{\prime }}}{Z(y)}\] where Z(y) is the characteristic parameter of the anomalous signal data to be obtained.

Separating the spectral offset characteristics of the anomalous signals of electronic communication equipment, the parameters associated with frequency and time can be obtained, which are expressed in the form: { m1(y)=2Zcosϕ(y)m2(y)=Z2(y) \[\left\{ \begin{array}{*{35}{l}} {{m}_{1}}(y)=-2{{Z}^{\cos \phi }}(y) \\ {{m}_{2}}(y)={{Z}^{2}}(y) \\ \end{array} \right.\]

Where ϕ is the dynamic phase angle of the anomaly signal output, and m1(y) and m2(y) indicate that the two parameters are correlated with each other.

Measuring the linear spectrum of the anomalous signal of the electronic communication equipment, the measurement calculation formula is: n(i)=a(i)δ(i)+ηminβ\[n(i)=\frac{a(i)}{\delta (i)+{{\eta }_{min}}}-\beta \]

Where, β is the parameter factor, δ(i) is the loss function, ηmin is the minimum value in the convergence error, a(i) is the dynamic phase of the output, and n(i) is the anomalous signal spectrum.

Analyze the signal characteristics of the electronic communication device through the measurement results. Decompose the left and right wave eigenvalues of the anomalous signals of the electronic communication equipment, use the characteristic aggregation of the signals, get the characteristic spectrum of the anomalous signals, and extract the characteristics of the anomalous signals of the electronic communication equipment. Calculate the extraction using equation (21): Wz=hmax[n(i)cos(2ϕθ)]\[{{W}_{z}}={{h}_{max}}[n(i)\cos (2\phi -\theta )]\]

Where wx is the abnormal signal characteristic of the electronic communication equipment, hmax is the effective characteristic quantity of the abnormal signal, and θ is the phase angle of the abnormal signal characteristic value of the electronic communication equipment. Through the above series of operations, the extraction of the abnormal signal characteristics of the electronic communication equipment is completed.

IGP-based anomaly signal recognition algorithm

The problem of identifying anomalous signals of electronic communication devices can be transformed into a sparse signal reconstruction problem. For sparse signal x, if it has S nonzero elements, its sparsity level is S. Thus the set of supports of sparse signal x can be defined as: Γ={k:k{1,2,,K},xk0}\[\Gamma =\{k:k\in \{1,2,\cdots ,K\},{{x}_{k}}\ne 0\}\]

Using the idea of convex optimization algorithm [29], the signal model is transformed into an unconstrained convex optimization problem, viz: minx12||yHx||22+τ||x||1\[{{\min }_{x}}\frac{1}{2}||y-Hx||_{2}^{2}+\tau ||x|{{|}_{1}}\]

In Eq. (23), ||x||1=i=12K|xi|$||x|{{|}_{1}}=\sum\limits_{i=1}^{2K}{|{{x}_{i}}|}$ denotes the l1-parameter of x. τ is a non-negative parameter to balance sparsity and residuals.

In order to solve for x in Eq. (23) based on the l1-paradigm, x is divided into 2 parts, positive and negative, viz: x=uv\[x=u-v\]

In Eq. (24), the elements in vectors u and v satisfy ut = (xt)+,vt = (–xt)+,t = 1,2,⋯,2K, where (·)+ denotes the taking of the positive part, defined as (x)+ = max{0,x}. Thus, ||x||1=12KTu+12KTv$||x|{{|}_{1}}=1_{2K}^{T}u+1_{2K}^{T}v$, where 12K = [1,1,⋯,1]T. This transforms the unconstrained convex optimization problem of Eq. (23) into a bounded quadratic programming (BCQP) problem, denoted as: minu,v12||yH(uv)||22+τ12KTu+τ12KTvs.t.u0,v0\[\begin{align} & \underset{u,v}{\mathop{\min }}\,\frac{1}{2}||y-H(u-v)||_{2}^{2}+\tau 1_{2K}^{T}u+\tau 1_{2K}^{T}v \\ & \begin{matrix} s.t. & u\ge 0,v\ge 0 \\ \end{matrix} \\ \end{align}\]

Further Eq. (25) is rewritten as a rigorous BCQP problem, i.e: minqF(q)=12qTWq+cTqs.t.q0\[\begin{align} & {{\min }_{q}}F(q)=\frac{1}{2}{{q}^{T}}Wq+{{c}^{T}}q \\ & \begin{matrix} s.t. & q\ge 0 \\ \end{matrix} \\ \end{align}\]

In the formula: q=[ uTνT ]T;W=[ HTHHTHHTHHTH ];c=τ14K+[ y¯Ty¯T ]T\[q={{\left[ \begin{matrix} {{u}^{T}} & {{\nu }^{T}} \\ \end{matrix} \right]}^{T}};W=\left[ \begin{matrix} {{H}^{T}}H & -{{H}^{T}}H \\ -{{H}^{T}}H & {{H}^{T}}H \\ \end{matrix} \right];c=\tau {{1}_{4K}}+{{\left[ \begin{matrix} -{{{\bar{y}}}^{T}} & {{{\bar{y}}}^{T}} \\ \end{matrix} \right]}^{T}}\] where y¯=HTy$\bar{y}={{H}^{T}}y$, W are semipositive definite matrices.

However, it is very difficult to solve Eq. (27) directly, and in this paper, we propose an algorithm based on the Improved Gradient Projection (IGP) method to solve Eq. (27) iteratively [30]. In the algorithmic process, the superscript (i) of each variable indicates the ith iteration process.

First calculate the gradient of function F(q(i)) at q(i) in Eq. (27), i.e., ∇F(q(i)) = Wq(i)+c. Choose the step factor α(i) > 0 and calculate the gradient factor δ(i) as: δ(i)=(q(i)α(i)F(q(i)))+q(i)\[{{\delta }^{(i)}}={{({{q}^{(i)}}-{{\alpha }^{(i)}}\nabla F({{q}^{(i)}}))}_{+}}-{{q}^{(i)}}\]

Next, scale factor λ(i) ∈ [0,1] is chosen and q(i+1) is computed by iteration as: q(i+1)=q(i)+λ(i)δ(i)\[{{q}^{(i+1)}}={{q}^{(i)}}+{{\lambda }^{(i)}}{{\delta }^{(i)}}\]

The objective of minimizing F(q(i+1)) is achieved through Eq. (29).

In order to accurately detect the active users and their data information, the estimation of the target signal, i.e., q(i+1)x^c(i+1)${{q}^{(i+1)}}\to \hat{x}_{c}^{(i+1)}$, is derived first after each selection of generations.Unlike the traditional gradient projection (GP) method, in this paper, we are going to preprocess x^c(i+1)$\hat{x}_{c}^{(i+1)}$ first, i.e., obtain the estimation vector of the target signal by maximizing the l2-parameter of x^c(i+1)$\hat{x}_{c}^{(i+1)}$. Here, x˜(i+1)${{\tilde{x}}^{(i+1)}}$ is used to denote the estimation vector of the target signal obtained after preprocessing x^c(i+1)$\hat{x}_{c}^{(i+1)}$, denoted as: x˜(i+1)=max||x^c(i+1)||2\[{{\tilde{x}}^{(i+1)}}=\max ||\hat{x}_{c}^{(i+1)}|{{|}_{2}}\]

The process of maximizing x^c(i+1)$\hat{x}_{c}^{(i+1)}$ based on the l2-paradigm can be described as follows: first sort the elements in x^c(i+1)$\hat{x}_{c}^{(i+1)}$, keep the first S larger elements in x^c(i+1)$\hat{x}_{c}^{(i+1)}$, and set the other elements in x^c(i+1)$\hat{x}_{c}^{(i+1)}$ to 0, and then update the set of detected signal supports Γ(i+1) accordingly as: Γ(i+1)=supp(x˜(i+1))\[{{\Gamma }^{(i+1)}}=\sup p\text{(}{{\tilde{x}}^{(i+1)}}\text{)}\]

In Eq. (31), supp(x˜(i+1))\[\sup p\text{(}{{\tilde{x}}^{(i+1)}}\text{)}\] denotes the position index of the nonzero element in x^(i+1)${{\hat{x}}^{(i+1)}}$. The preprocessed detection symbol x˜c(i+1)$\tilde{x}_{c}^{(i+1)}$ is transformed into a real number q(i+1), i.e., x˜c(i+1)q(i+1)$\tilde{x}_{c}^{(i+1)}\to {{q}^{(i+1)}}$, to prepare for the next iteration.

According to the above analysis, the flow of the IGP-based abnormal signal recognition algorithm for electronic communication devices is shown in Fig. 3, and the corresponding operation steps are summarized as follows:

Step1: Input system parameters yc,Hc,S,Iter,αmin,αmax. lter denotes the total number of iterations of the algorithm, αmin and αmax denote the minimum and maximum values of the scale factor required in the algorithm, respectively.

Step2: Initialize the parameters. First, convert complex numbers yc and Hc to real numbers yc and H to make i=0,x˜(0)=0,Γ(0)=$i=0,{{\tilde{x}}^{(0)}}=0,{{\Gamma }^{(0)}}=\varnothing $, and convert x˜(0)${{\tilde{x}}^{(0)}}$ to q(0), i.e., x˜(0)q(0)${{\tilde{x}}^{(0)}}\to {{q}^{(0)}}$, and compute: g=F(q(0))α(0)=gTggTWgλ(0)=1y¯=HTyc=τ14K+[ y¯Ty¯T ]TW=[ HTHHTHHTHHTH ]\[\begin{matrix} g=\nabla F({{q}^{(0)}}) \\ {{\alpha }^{(0)}}=\frac{{{g}^{T}}g}{{{g}^{T}}Wg} \\ {{\lambda }^{(0)}}=1 \\ \bar{y}={{H}^{T}}y \\ c=\tau {{1}_{4K}}+{{\left[ \begin{matrix} -{{{\bar{y}}}^{T}} & {{{\bar{y}}}^{T}} \\ \end{matrix} \right]}^{T}} \\ W=\left[ \begin{matrix} {{H}^{T}}H & -{{H}^{T}}H \\ -{{H}^{T}}H & {{H}^{T}}H \\ \end{matrix} \right] \\ \end{matrix}\]

Where, x˜(0)${{\tilde{x}}^{(0)}}$ denotes the initial value of signal iteration Γ(0) denotes the initial set of active users, α(0) and λ(0) denote the initial values of the 2 scale factors, 14k denotes the 4K×1-dimensional all-1 vector, and τ=0.1||y¯||$\tau =0.1||\bar{y}|{{|}_{\infty }}$.

Step3: Judge whether iIter is valid, if so, execute Step4. otherwise, the iteration ends and execute Step6.

Step4: Sequentially update the intermediate variable δ(i),q(i+1),α(i+1),λ(i+1) until the end of the iteration. Where the updating equations for scale factor α(i+1) and step factor λ(i+1) are: α(i+1)=mid{ αmin,||δ(i)||22γ(i),αmax }\[{{\alpha }^{(i+1)}}=\text{mid}\left\{ {{\alpha }_{\text{min}}},\frac{||{{\delta }^{(i)}}||_{2}^{2}}{{{\gamma }^{(i)}}},{{\alpha }_{\text{max}}} \right\}\] λ(i+1)=mid{ 0,(δ(i))TF(q(i))γ(i),1 }\[{{\lambda }^{(i+1)}}=mid\left\{ 0,\frac{{{({{\delta }^{(i)}})}^{T}}\nabla F({{q}^{(i)}})}{{{\gamma }^{(i)}}},1 \right\}\] where γ(i) = (δ(i))T(i). If γ(i) = 0, then take λ(i) = 1,α(i+1) = αmax.

Step5: First convert the result of each iteration q(i+1) to a real signal x^(i+1)${{\hat{x}}^{(i+1)}}$, i.e.: x^(i+1)=q1:2K(i+1)q2K+1:4K(i+1)\[{{\hat{x}}^{(i+1)}}=q_{1:2K}^{(i+1)}-q_{2K+1:4K}^{(i+1)}\]

Then the real signal x^(i+1)${{\hat{x}}^{(i+1)}}$ is transformed into the complex signal x^c(i+1)$\hat{x}_{c}^{(i+1)}$, i.e: x^c(i+1)=x^1:K(i+1)+ix^K+1:2K(i+1)\[\hat{x}_{c}^{(i+1)}=\hat{x}_{1:K}^{(i+1)}+i\cdot \hat{x}_{K+1:2K}^{(i+1)}\]

Also preprocess x^c(i+1)$\hat{x}_{c}^{(i+1)}$ according to Eq. (30) and update the detection support set Γ(i+1) according to Eq. (31), and finally convert the processed information x^c(i+1)$\hat{x}_{c}^{(i+1)}$ to real numbers q(i+1) for the next iteration.

Step6: End of iteration and output x˜c,Γ(ler)${{\tilde{x}}_{c,{{\Gamma }^{(ler)}}}}$.

Figure 3.

Flow chart of IGP abnormal signal recognition algorithm

Simulation experiment and result analysis
Experiments on anomaly recognition for different types of signals

In order to test the performance of the application of the method of this paper in realizing the signal anomaly identification of electronic communication equipment, simulation test and analysis are carried out, the length of the electronic communication equipment signal sampling is 1048, the deviation of the signal anomaly feature sampling is 0.32, and the time delay of the signal statistical analysis is 240 ms. According to the parameter settings mentioned above, the signal obtained from the electronic communication equipment is shown in Fig. 4.

Figure 4.

Signals of electronic communication equipment

Taking the signal of electronic communication equipment in Fig. 4 as input, the method of this paper is used to extract the abnormal features of the signal of electronic communication equipment, and the feature extraction results are obtained as shown in Fig. 5.

Figure 5.

Signal anomaly feature extraction results of electronic communication equipment

Analyzing Fig. 5, we know that the method of this paper can effectively realize the abnormal feature extraction of electronic communication equipment signals and realize the abnormal automatic identification of electronic communication equipment signals.

Test the accuracy of this paper’s method for different types of electronic communication equipment signal anomaly recognition, the test results of different types of signals are shown in Table 1. Analysis of Table 1 shows that for different types of electronic communication equipment signals, the accuracy of this paper’s method for electronic communication equipment signal anomaly recognition is above 97%, which indicates that the method can identify many types of electronic communication equipment signal anomaly problems, and the recognition results are reliable.

Signal anomaly recognition accuracy of electronic communication equipment

Signal type Recognition accuracy
Deterministic signal 99.04%
Random signal 98.12%
Analog signal 99.26%
Digital signal 99.75%
Energy signal 99.89%
Power signal 99.13%
Time domain signal 99.21%
Frequency domain signal 97.52%
Time limit signal 98.27%
Frequency limited signal 99.09%
Real signal 97.08%
Complex signal 98.54%

Taking the digital signal as an example, a comparison experiment on the accuracy of signal anomaly recognition of electronic communication equipment was carried out, and the results of the comparison test are shown in Table 2. Analyzing Table 2, we know that the accuracy of electronic communication equipment signal anomaly identification by the method of this paper is high, above 95%, which is greater than that of comparison method 1 and comparison method 2. The reason is that the method constructs the transmission channel equalization regulation model of electronic communication equipment signal, adopts the deep learning method to realize output equalization scheduling of electronic communication equipment signal, as well as analyzes the spectrum of the output signal of electronic communication equipment and extracts anomalous features, based on which it adopts the improved gradient projection method to realize automatic identification of the signal anomaly of electronic communication equipment. Abnormal feature extraction is based on the improved gradient projection method to automatically identify signal abnormalities in electronic communication equipment.

Comparison of signal anomaly recognition accuracy

Signal-to-noise ratio Method of this paper Comparison method 1 Comparison method 2
-12 95.50% 84.20% 91.92%
-6 98.28% 89.25% 92.97%
0 99.02% 91.02% 92.42%
6 99.95% 92.82% 95.77%
12 100.00% 93.65% 96.89%
Abnormal signal recognition comparison test

In order to further verify the advantages of the proposed abnormal signal recognition algorithm for electronic communication devices in practical applications, this paper conducts comparative experiments between it and the traditional method, including the comparison of recognition accuracy at different recognition partitions and the comparison of recognition accuracy at different numbers of experiments.

Identification of anomalous signals in different partitions

Before the start of the experiment, it is first necessary to prepare a compatible device, as well as electronic communication equipment, to connect and complete the conduction of various types of signals. This paper selects the electronic communication equipment for 2445IEC48RVV model communication equipment, its rated voltage is 220V, the implementation of the standard GB/T448.26-2020, the transmission rate of the signal is 1320bps, the sampling frequency is 54kHz, the carrier size of 32kHz. 120 different signals are randomly produced by the use of software settings, of which 60 are normal signals and 60 are abnormal signals.

The 120 signals conducted in the signaling process of 2445IEC48RVV model communication equipment are identified using the identification method proposed in this paper and the traditional identification method, respectively, and the same strong interference effects are applied to both identification methods during the identification process. In order to ensure that the experimental results have a higher degree of objectivity and fairness, in addition to the different recognition methods used, in the exact same case to complete the comparison experiment, the comparison of the experimental results under different recognition of the partition is shown in Table 3.

Comparison of experimental results of two recognition methods

Identification partition The number of actual abnormal signals The number of correct recognitions of this method The number of correct recognitions of the traditional method
First partition 8 8 4
Second partition 12 12 5
Third partition 10 10 4
Fourth partition 16 16 3
Fifth partition 14 14 5

As shown in Table 3, the number of correctly recognized signals in this paper is exactly the same as the actual abnormal signals in different recognition partitions, while the number of correctly recognized signals in the traditional method is smaller than the number of actual abnormal signals. Therefore, it is further proved through comparative experiments that the anomalous signal recognition method for electronic communication equipment based on improved gradient projection method proposed in this paper can effectively improve the recognition accuracy of anomalous signals in practical applications. Introducing this identification method into practical applications can effectively provide protection for the normal transmission of communication signals, and at the same time, it can also provide a basis for the subsequent enhancement of the anti-interference ability of electronic communication equipment in the identification process, which is of higher value.

Identification of abnormal signals at different number of experiments

Experiments using 1200 groups of electronic communication equipment signals for experiments, of which, the abnormal signal has 500 groups, using the method of this paper and the traditional method of abnormal signal recognition experiments, then different experiments when the number of times the abnormal signal recognition as shown in Table 4.

Abnormal signal identification

Number of experiments The identification quantity of the method in this article The identification quantity of the traditional method
10 440 255
20 378 271
30 419 286
40 433 324
50 408 244
60 462 248
70 481 236
80 492 260
90 488 429
100 469 305

The recognition performance of the proposed method is validated by calculating the recognition correctness rate, which is calculated as: p=qQ×100%\[p=\frac{q}{Q}\times 100%\]

Where: p denotes the rate of correct recognition. Q denotes the total number of anomalous signals. q denotes the number of abnormal signals recognized using the recognition method.

Calculated by the above formula, the comparison of recognition correct rate is obtained as shown in Fig. 6.

Figure 6.

Comparison of recognition accuracy rates

As can be seen from Fig. 6, the recognition correct rate of the proposed method in this paper is significantly higher than that of the traditional method. In particular, the maximum and average recognition correct rate of the proposed method are 98.40% and 89.40%, respectively, while the maximum and average recognition correct rate of the traditional method are 85.80% and 57.16%, respectively, so the average recognition correct rate of the proposed method is 32.24% higher than that of the traditional method, which fully demonstrates that the proposed anomalous signal recognition method based on the improved gradient projection method of the electronic communication equipment has better recognition performance. This fully demonstrates that the proposed recognition method based on the improved gradient projection method for abnormal signals of electronic communication equipment has better recognition performance and higher recognition stability.

Conclusion

In this paper, based on the signal model, the deep learning method and the improved gradient projection method, we successfully designed an abnormal signal recognition algorithm for electronic communication equipment, and explored its recognition performance through simulation experiments.

Electronic communication equipment signals are selected as input, and the method of this paper is used to realize the abnormal feature extraction and automatic identification of electronic communication equipment signals. For different types of electronic communication equipment signals, the signal anomaly recognition accuracy of this paper’s method is above 97%, indicating that the method can recognize multiple types of electronic communication equipment signal anomaly problems and the recognition results are reliable. At the same time, digital signals are an example of comparison experiments in identification accuracy. In the case of different signal-to-noise ratios, the accuracy of this paper’s method for signal anomaly recognition of electronic communication equipment is higher, both above 95%, which are greater than the other two comparison methods. In addition, compared to traditional anomalous signal recognition methods, this paper’s method achieves higher recognition accuracy and stability under different signal partitions and different numbers of experiments. When controlling the number of experiments, the maximum and average recognition correct rate of this paper’s method are 98.40% and 89.40%, respectively, which are larger than the maximum (85.80%) and average (57.16%) of the traditional method, which fully illustrates the reliability and superiority of the anomalous signal recognition method of electronic communication equipment based on the improved gradient projection method designed in this paper.

Acknowledgments

School Level Project of Beijing Polytechnic: Research on Integrated Emergency Communication Shelter System Based on 5G (No.2022X009-KXD).

Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro