The search functionality is under construction.

Author Search Result

[Author] Bo WANG(31hit)

21-31hit(31hit)

  • Optimal Power Allocation for Low Complexity Channel Estimation and Symbol Detection Using Superimposed Training

    Qingbo WANG  Gaoqi DOU  Jun GAO  Xianwen HE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/10/26
      Vol:
    E102-B No:5
      Page(s):
    1027-1036

    A low complexity channel estimation scheme using data-dependent superimposed training (DDST) is proposed in this paper, where the pilots are inserted in more than one block, rather than the single block of the original DDST. Comparing with the original DDST (which improves the performance of channel estimation at the cost of huge computational overheads), the proposed DDST scheme improves the performance of channel estimation with only a slight increase in the consumption of computation resources. The optimal precoder is designed to minimize the data distortion caused by the rank-deficient precoding. The optimal pilots and placement are also provided to improve the performance of channel estimation. In addition, the impact of power allocation between the data and pilots on symbol detection is analyzed, the optimal power allocation scheme is derived to maximize the effective signal-to-noise ratio at the receiver. Simulation results are presented to show the computational advantage of the proposed scheme, and the advantages of the optimal pilots and power allocation scheme.

  • Re-Scheduling of Unit Commitment Based on Customers' Fuzzy Requirements for Power Reliability

    Bo WANG  You LI  Junzo WATADA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E94-D No:7
      Page(s):
    1378-1385

    The development of the electricity market enables us to provide electricity of varied quality and price in order to fulfill power consumers' needs. Such customers choices should influence the process of adjusting power generation and spinning reserve, and, as a result, change the structure of a unit commitment optimization problem (UCP). To build a unit commitment model that considers customer choices, we employ fuzzy variables in this study to better characterize customer requirements and forecasted future power loads. To measure system reliability and determine the schedule of real power generation and spinning reserve, fuzzy Value-at-Risk (VaR) is utilized in building the model, which evaluates the peak values of power demands under given confidence levels. Based on the information obtained using fuzzy VaR, we proposed a heuristic algorithm called local convergence-averse binary particle swarm optimization (LCA-PSO) to solve the UCP. The proposed model and algorithm are used to analyze several test systems. Comparisons between the proposed algorithm and the conventional approaches show that the LCA-PSO performs better in finding the optimal solutions.

  • A Flexible and Accurate Reasoning Method for Danger-Aware Services Based on Context Similarity from Feature Point of View

    Junbo WANG  Zixue CHENG  Yongping CHEN  Lei JING  

     
    PAPER-Information Network

      Vol:
    E94-D No:9
      Page(s):
    1755-1767

    Context awareness is viewed as one of the most important goals in the pervasive computing paradigm. As one kind of context awareness, danger awareness describes and detects dangerous situations around a user, and provides services such as warning to protect the user from dangers. One important problem arising in danger-aware systems is that the description/definition of dangerous situations becomes more and more complex, since many factors have to be considered in such description, which brings a big burden to the developers/users and thereby reduces the reliability of the system. It is necessary to develop a flexible reasoning method, which can ease the description/definition of dangerous situations by reasoning dangers using limited specified/predefined contexts/rules, and increase system reliability by detecting unspecified dangerous situations. Some reasoning mechanisms based on context similarity were proposed to address the above problems. However, the current mechanisms are not so accurate in some cases, since the similarity is computed from only basic knowledge, e.g. nature property, such as material, size etc, and category information, i.e. they may cause false positive and false negative problems. To solve the above problems, in this paper we propose a new flexible and accurate method from feature point of view. Firstly, a new ontology explicitly integrating basic knowledge and danger feature is designed for computing similarity in danger-aware systems. Then a new method is proposed to compute object similarity from both basic knowledge and danger feature point of views when calculating context similarity. The method is implemented in an indoor ubiquitous test bed and evaluated through experiments. The experiment result shows that the accuracy of system can be effectively increased based on the comparison between system decision and estimation of human observers, comparing with the existing methods. And the burden of defining dangerous situations can be decreased by evaluating trade-off between the system's accuracy and burden of defining dangerous situations.

  • The Development of a High Accuracy Algorithm Based on Small Sample Size for Fingerprint Location in Indoor Parking Lot

    Weibo WANG  Jinghuan SUN  Ruiying DONG  Yongkang ZHENG  Qing HUA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/06/13
      Vol:
    E101-B No:12
      Page(s):
    2479-2486

    Indoor fingerprint location based on WiFi in large-scale indoor parking lots is more and more widely employed for vehicle lookup. However, the challenge is to ensure the location functionality because of the particularity and complexities of the indoor parking lot environment. To reduce the need to deploy of reference points (RPs) and the offline sampling workload, a partition-fitting fingerprint algorithm (P-FP) is proposed. To improve the location accuracy of the target, the PS-FP algorithm, a sampling importance resampling (SIR) particle filter with threshold based on P-FP, is further proposed. Firstly, the entire indoor parking lot is partitioned and the environmental coefficients of each partitioned section are gained by using the polynomial fitting model. To improve the quality of the offline fingerprint database, an error characteristic matrix is established using the difference between the fitting values and the actual measured values. Thus, the virtual RPs are deployed and C-means clustering is utilized to reduce the amount of online computation. To decrease the fluctuation of location coordinates, the SIR particle filter with a threshold setting is adopted to optimize the location coordinates. Finally, the optimal threshold value is obtained by comparing the mean location error. Test results demonstrated that PS-FP could achieve high location accuracy with few RPs and the mean location error is only about 0.7m. The cumulative distribution function (CDF) show that, using PS-FP, 98% of location errors are within 2m. Compared with the weighted K-nearest neighbors (WKNN) algorithm, the location accuracy by PS-FP exhibit an 84% improvement.

  • Online/Offline Self-Updating Encryption

    Guangbo WANG  Jianhua WANG  Zhencheng GUO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:12
      Page(s):
    2517-2526

    Self-updating encryption (SUE) is a new cryptographic scheme produced in the recent work of Lee, Choi, Lee, Park and Yung (Asiacrypt 2013) to achieve a time-updating mechanism for revocation. In SUE, a ciphetext and a private key are associated with the time and a user can decrypt a ciphertext only if its time is earlier than that of his private key. But one drawback is the encryption computational overhead scales with the size of the time which makes it a possible bottleneck for some applications. To address this problem, we provide a new technique for the SUE that splits the encryption algorithm into two phases: an offline phase and an online phase. In the offline phase, an intermediate ciphertext header is generated before it knows the concrete encryption time. Then an online phase is implemented to rapidly generate an SUE ciphertext header when the time becomes known by making use of the intermediate ciphertext header. In addition, two different online encryption constructions are proposed in view of different time level taking 50% as the boundary. At last, we prove the security of our scheme and provide the performance analysis which shows that the vast majority of computational overhead can be moved to the offline phase. One motivating application for this technique is resource-constrained mobile devices: the preparation work can be done when the mobile devices are plugged into a power source, then they can later rapidly perform SUE operations on the move without significantly consuming the battery.

  • A Novel 3D Gradient LBP Descriptor for Action Recognition

    Zhaoyang GUO  Xin'an WANG  Bo WANG  Zheng XIE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/03/02
      Vol:
    E100-D No:6
      Page(s):
    1388-1392

    In the field of action recognition, Spatio-Temporal Interest Points (STIPs)-based features have shown high efficiency and robustness. However, most of state-of-the-art work to describe STIPs, they typically focus on 2-dimensions (2D) images, which ignore information in 3D spatio-temporal space. Besides, the compact representation of descriptors should be considered due to the costs of storage and computational time. In this paper, a novel local descriptor named 3D Gradient LBP is proposed, which extends the traditional descriptor Local Binary Patterns (LBP) into 3D spatio-temporal space. The proposed descriptor takes advantage of the neighbourhood information of cuboids in three dimensions, which accounts for its excellent descriptive power for the distribution of grey-level space. Experiments on three challenging datasets (KTH, Weizmann and UT Interaction) validate the effectiveness of our approach in the recognition of human actions.

  • Novel Secure Communication Based on Chaos Synchronization

    Bo WANG  Xiaohua ZHANG  Xiucheng DONG  

     
    LETTER-Nonlinear Problems

      Vol:
    E101-A No:7
      Page(s):
    1132-1135

    In this paper, the problem on secure communication based on chaos synchronization is investigated. The dual channel information transmitting technology is proposed to increase the security of secure communication system. Based on chaos synchronization, a new digital secure communication scheme is presented for a class of master-slave systems. Finally some numerical simulation examples are given to demonstrate the effectiveness of the given results.

  • Hybrid, Asymmetric and Reconfigurable Input Unit Designs for Energy-Efficient On-Chip Networks

    Xiaoman LIU  Yujie GAO  Yuan HE  Xiaohan YUE  Haiyan JIANG  Xibo WANG  

     
    PAPER

      Pubricized:
    2023/04/10
      Vol:
    E106-C No:10
      Page(s):
    570-579

    The complexity and scale of Networks-on-Chip (NoCs) are growing as more processing elements and memory devices are implemented on chips. However, under strict power budgets, it is also critical to lower the power consumption of NoCs for the sake of energy efficiency. In this paper, we therefore present three novel input unit designs for on-chip routers attempting to shrink their power consumption while still conserving the network performance. The key idea behind our designs is to organize buffers in the input units with characteristics of the network traffic in mind; as in our observations, only a small portion of the network traffic are long packets (composed of multiple flits), which means, it is fair to implement hybrid, asymmetric and reconfigurable buffers so that they are mainly targeting at short packets (only having a single flit), hence the smaller power consumption and area overhead. Evaluations show that our hybrid, asymmetric and reconfigurable input unit designs can achieve an average reduction of energy consumption per flit by 45%, 52.3% and 56.2% under 93.6% (for hybrid designs) and 66.3% (for asymmetric and reconfigurable designs) of the original router area, respectively. Meanwhile, we only observe minor degradation in network latency (ranging from 18.4% to 1.5%, on average) with our proposals.

  • Hierarchical Detailed Intermediate Supervision for Image-to-Image Translation

    Jianbo WANG  Haozhi HUANG  Li SHEN  Xuan WANG  Toshihiko YAMASAKI  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2023/09/14
      Vol:
    E106-D No:12
      Page(s):
    2085-2096

    The image-to-image translation aims to learn a mapping between the source and target domains. For improving visual quality, the majority of previous works adopt multi-stage techniques to refine coarse results in a progressive manner. In this work, we present a novel approach for generating plausible details by only introducing a group of intermediate supervisions without cascading multiple stages. Specifically, we propose a Laplacian Pyramid Transformation Generative Adversarial Network (LapTransGAN) to simultaneously transform components in different frequencies from the source domain to the target domain within only one stage. Hierarchical perceptual and gradient penalization are utilized for learning consistent semantic structures and details at each pyramid level. The proposed model is evaluated based on various metrics, including the similarity in feature maps, reconstruction quality, segmentation accuracy, similarity in details, and qualitative appearances. Our experiments show that LapTransGAN can achieve a much better quantitative performance than both the supervised pix2pix model and the unsupervised CycleGAN model. Comprehensive ablation experiments are conducted to study the contribution of each component.

  • Sentence-Level Combination of Machine Translation Outputs with Syntactically Hybridized Translations

    Bo WANG  Yuanyuan ZHANG  Qian XU  

     
    LETTER-Natural Language Processing

      Vol:
    E97-D No:1
      Page(s):
    164-167

    We describe a novel idea to improve machine translation by combining multiple candidate translations and extra translations. Without manual work, extra translations can be generated by identifying and hybridizing the syntactic equivalents in candidate translations. Candidate and extra translations are then combined on sentence level for better general translation performance.

  • Dynamic Spectrum Access Based on Stochastic Differential Games

    Zhonggui MA  Hongbo WANG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E97-B No:5
      Page(s):
    1087-1093

    Dynamic spectrum access is the key approach in cognitive wireless regional area networks, and it is adopted by secondary users to access the licensed radio spectrum opportunistically. In order to realize real-time secondary spectrum usage, a dynamic spectrum access model based on stochastic differential games is proposed to realize dynamic spectrum allocation; a Nash equilibrium solution to the model is given and analyzed in this paper. From an overall perspective, the relationships between available spectrum percentage and the spectrum access rate are studied. Changes in the available spectrum percentage of the cognitive wireless regional area networks involve a deterministic component and a stochastic component which depends upon an r-dimensional Wiener process. The Wiener process represents an accumulation of random influences over the interval, and it reflects stochastic and time-varying properties of the available spectrum percentage. Simulation results show that the dynamic spectrum access model is efficient, and it reflects the time-varying radio frequency environment. Differential games are useful tools for the spectrum access and management in the time-varying radio environment.

21-31hit(31hit)