The search functionality is under construction.

Author Search Result

[Author] Chao WANG(14hit)

1-14hit
  • Low Complexity Cooperative Transmission Design and Optimization for Physical Layer Security of AF Relay Networks

    Chao WANG  Hui-Ming WANG  Weile ZHANG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:6
      Page(s):
    1113-1120

    This paper studies the design of cooperative beamforming (CB) and cooperative jamming (CJ) for the physical layer security of an amplify-and-forward (AF) relay network in the presence of multiple multi-antenna eavesdroppers. The secrecy rate maximization (SRM) problem of such a network is to maximize the difference of two concave functions, a problem which is non-convex and has no efficient solution. Based on the inner convex approximation (ICA) and semidefinite relaxation (SDR) techniques, we propose two novel low-complexity schemes to design CB and CJ for SRM in the AF network. In the first strategy, relay nodes adopt the CB only to secure transmission. Based on ICA, this design guarantees convergence to a Karush-Kuhn-Tucker (KKT) solution of the SDR of the original problem. In the second strategy, the optimal joint CB and CJ design is studied and the proposed joint design can guarantee convergence to a KKT solution of the original problem. Moreover, in the second strategy, we prove that SDR always has a rank-1 solution for the SRM problem. Simulation results show the superiority of the proposed schemes.

  • Enhancing Endurance of Huge-Capacity Flash Storage Systems by Selectively Replacing Data Blocks

    Wei-Neng WANG  Kai NI  Jian-She MA  Zong-Chao WANG  Yi ZHAO  Long-Fa PAN  

     
    PAPER-Computer System

      Vol:
    E95-D No:2
      Page(s):
    558-564

    The wear leveling is a critical factor which significantly impacts the lifetime and the performance of flash storage systems. To extend lifespan and reduce memory requirements, this paper proposed an efficient wear leveling without substantially increasing overhead and without modifying Flash Translation Layer (FTL) for huge-capacity flash storage systems, which is based on selective replacement. Experimental results show that our design levels the wear of different physical blocks with limited system overhead compared with previous algorithms.

  • Using Similarity Parameters for Supervised Polarimetric SAR Image Classification

    Junyi XU  Jian YANG  Yingning PENG  Chao WANG  Yuei-An LIOU  

     
    PAPER-Sensing

      Vol:
    E85-B No:12
      Page(s):
    2934-2942

    In this paper, a new method is proposed for supervised classification of ground cover types by using polarimetric synthetic aperture radar (SAR) data. The concept of similarity parameter between two scattering matrices is introduced for characterizing target scattering mechanism. Four similarity parameters of each pixel in image are used for classification. They are the similarity parameters between a pixel and a plane, a dihedral, a helix and a wire. The total received power of each pixel is also used since the similarity parameter is independent of the spans of target scattering matrices. The supervised classification is carried out based on the principal component analysis. This analysis is applied to each data set in image in the feature space for getting the corresponding feature transform vector. The inner product of two vectors is used as a distance measure in classification. The classification result of the new scheme is shown and it is compared to the results of principal component analysis with other decomposition coefficients, to demonstrate the effectiveness of the similarity parameters.

  • Survey on Challenges and Achievements in Context-Aware Requirement Modeling

    Yuanbang LI  Rong PENG  Bangchao WANG  

     
    SURVEY PAPER-Software Engineering

      Pubricized:
    2019/12/20
      Vol:
    E103-D No:3
      Page(s):
    553-565

    A context-aware system always needs to adapt its behaviors according to context changes; therefore, modeling context-aware requirements is a complex task. With the increasing use of mobile computing, research on methods of modeling context-aware requirements have become increasingly important, and a large number of relevant studies have been conducted. However, no comprehensive analysis of the challenges and achievements has been performed. The methodology of systematic literature review was used in this survey, in which 68 reports were selected as primary studies. The challenges and methods to confront these challenges in context-aware requirement modeling are summarized. The main contributions of this work are: (1) four challenges and nine sub-challenges are identified; (2) eight kinds of methods in three categories are identified to address these challenges; (3) the extent to which these challenges have been solved is evaluated; and (4) directions for future research are elaborated.

  • Per-Pixel Water Detection on Surfaces with Unknown Reflectance

    Chao WANG  Michihiko OKUYAMA  Ryo MATSUOKA  Takahiro OKABE  

     
    PAPER

      Pubricized:
    2021/07/06
      Vol:
    E104-D No:10
      Page(s):
    1555-1562

    Water detection is important for machine vision applications such as visual inspection and robot motion planning. In this paper, we propose an approach to per-pixel water detection on unknown surfaces with a hyperspectral image. Our proposed method is based on the water spectral characteristics: water is transparent for visible light but translucent/opaque for near-infrared light and therefore the apparent near-infrared spectral reflectance of a surface is smaller than the original one when water is present on it. Specifically, we use a linear combination of a small number of basis vector to approximate the spectral reflectance and estimate the original near-infrared reflectance from the visible reflectance (which does not depend on the presence or absence of water) to detect water. We conducted a number of experiments using real images and show that our method, which estimates near-infrared spectral reflectance based on the visible spectral reflectance, has better performance than existing techniques.

  • A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution

    Ning TAI  Huan LIN  Chao WEI  Yongwei LU  Chao WANG  Kaibo CUI  

     
    PAPER-Sensing

      Pubricized:
    2019/11/06
      Vol:
    E103-B No:5
      Page(s):
    609-617

    Since ISAR is widely applied in many occasions and provides high resolution images of the target, ISAR countermeasures are attracting more and more attention. Most of the present methods of deception jamming are not suitable for engineering realization due to the heavy computation load or the large calculation delay. Deception jamming against ISAR requires large computation resource and real-time performance algorithms. Many studies on false target jamming assume that the jammer is able to receive the target echo or transmit the jamming signal to the real target, which is sometimes not possible. How to impose the target property onto the intercepted radar signal is critical to a deception jammer. This paper proposes a jamming algorithm based on parallel convolution and one-bit quantization. The algorithm is able to produce a single false target on ISAR image by the jammer itself. The requirement for computation resource is within the capabilities of current digital signal processors such as FPGA or DSP. The method processes the samples of radar signal in parallel and generates the jamming signal at the rate of ADC data, solving the problem that the real-time performance is not satisfied when the input data rate for convolution is far higher than the clock frequency of FPGA. In order to reduce the computation load of convolution, one-bit quantization is utilized. The complex multiplication is implemented by logical resources, which significantly reduces the consumption of FPGA multipliers. The parallel convolution jamming signal, whose date rate exceeds the FPGA clock rate, is introduced and analyzed in detail. In theory, the bandwidth of jamming signal can be half of the sampling frequency of high speed ADC, making the proposed jamming algorithm able to counter ultra-wideband ISAR signals. The performance and validity of the proposed method are verified by simulations. This jamming method is real-time and capable of producing a false target of large size at the low cost of FPGA device.

  • QP Selection Optimization for Intra-Frame Encoding Based on Constant Perceptual Quality

    Chao WANG  Xuanqin MOU  Lei ZHANG  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/11/17
      Vol:
    E99-D No:2
      Page(s):
    443-453

    In lossy image/video encoding, there is a compromise between the number of bits and the extent of distortion. Optimizing the allocation of bits to different sources, such as frames or blocks, can improve the encoding performance. In intra-frame encoding, due to the dependency among macro blocks (MBs) introduced by intra prediction, the optimization of bit allocation to the MBs usually has high complexity. So far, no practical optimal bit allocation methods for intra-frame encoding exist, and the commonly used method for intra-frame encoding is the fixed-QP method. We suggest that the QP selection inside an image/a frame can be optimized by aiming at the constant perceptual quality (CPQ). We proposed an iteration-based bit allocation scheme for H.264/AVC intra-frame encoding, in which all the local areas (which is defined by a group of MBs (GOMBs) in this paper) in the frame are encoded to have approximately the same perceptual quality. The SSIM index is used to measure the perceptual quality of the GOMBs. The experimental results show that the encoding performance on intra-frames can be improved greatly by the proposed method compared with the fixed-QP method. Furthermore, we show that the optimization on the intra-frame can bring benefits to the whole sequence encoding, since a better reference frame can improve the encoding of the subsequent frames. The proposed method has acceptable encoding complexity for offline applications.

  • Memory-Efficient and High-Performance Two-Dimensional Discrete Wavelet Transform Architecture Based on Decomposed Lifting Algorithm

    Peng CAO  Chao WANG  Longxing SHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:8
      Page(s):
    2000-2008

    The line-based method has been one of the most commonly-used methods of hardware implementation of two-dimensional (2D) discrete wavelet transform (DWT). However, data buffer is required between the row DWT processor and the column DWT processor to solve the data flow mismatch, which increases the on-chip memory size and the output latency. Since the incompatible data flow is induced from the intrinsic property of adopted lifting-based algorithm, a decomposed lifting algorithm (DLA) is presented by rearranging the data path of lifting steps to ensure that image data is processed in raster scan manner in row processor and column processor. Theoretical analysis indicates that the precision issue of DLA outperforms other lifting-based algorithms in terms of round-off noise and internal word-length. A memory-efficient and high-performance line-based architecture is proposed based on DLA without the implementation of data buffer. For an N M image, only 2N internal memory is required for 5/3 filter and 4N of that is required for 9/7 filter to perform 2D DWT, where N and M indicate the width and height of an image. Compared with related 2D DWT architectures, the size of on-chip memory is reduced significantly under the same arithmetic cost, memory bandwidth and timing constraint. This design was implemented in SMIC 0.18 µm CMOS logic fabrication with 32 kbits dual-port RAM and 20 K equivalent 2-input NAND gates in a 1.00 mm 1.00 mm die, which can process 512 512 image under 100 MHz.

  • A 32GHz 68dBΩ Low-Noise and Balance Operation Transimpedance Amplifier in 130nm SiGe BiCMOS for Optical Receivers

    Chao WANG  Xianliang LUO  Mohamed ATEF  Pan TANG  

     
    PAPER

      Vol:
    E103-A No:12
      Page(s):
    1408-1416

    In this paper, a balance operation Transimpedance Amplifier (TIA) with low-noise has been implemented for optical receivers in 130 nm SiGe BiCMOS Technology, in which the optimal tradeoff emitter current density and the location of high-frequency noise corner were analyzed for acquiring low-noise performance. The Auto-Zero Feedback Loop (AZFL) without introducing unnecessary noises at input of the TIA, the tail current sink with high symmetries and the balance operation TIA with the shared output of Operational Amplifier (OpAmp) in AZFL were designed to keep balanced operation for the TIA. Moreover, cascode and shunt-feedback were also employed to expanding bandwidth and decreasing input referred noise. Besides, the formula for calculating high-frequency noise corner in Heterojunction Bipolar Transistor (HBT) TIA with shunt-feedback was derived. The electrical measurement was performed to validate the notions described in this work, appearing 9.6 pA/√Hz of input referred noise current Power Spectral Density (PSD), balance operation (VIN1=896mV, VIN2=896mV, VOUT1=1.978V, VOUT2=1.979V), bandwidth of 32GHz, overall transimpedance gain of 68.6dBΩ, a total 117mW power consumption and chip area of 484µm × 486µm.

  • A Study on Consistency between MINAVE and MINMAX in SSIM Based Independent Perceptual Video Coding

    Chao WANG  Xuanqin MOU  Lei ZHANG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2015/04/13
      Vol:
    E98-D No:7
      Page(s):
    1417-1421

    In this letter, we study the R-D properties of independent sources based on MSE and SSIM, and compare the bit allocation performance under the MINAVE and MINMAX criteria in video encoding. The results show that MINMAX has similar results in terms of average distortion with MINAVE by using SSIM, which illustrates the consistency between these two criteria in independent perceptual video coding. Further more, MINMAX results in lower quality fluctuation, which shows its advantage for perceptual video coding.

  • Secure Wireless Network with Movable Base Stations

    Yi LU  Bharat BHARGAVA  Weichao WANG  Yuhui ZHONG  Xiaoxin WU  

     
    PAPER-Mobile Ad Hoc Networks

      Vol:
    E86-B No:10
      Page(s):
    2922-2930

    Security, flexibility, and scalability are critical to the success of wireless communications. Wireless networks with movable base stations combine the advantages of mobile ad hoc networks and wireless LAN to achieve these goals. Hierarchical mobile wireless network (HMWN) is proposed for supporting movable base stations. In such a system, mobile hosts are organized into hierarchical groups. The group agents serve as a distributed trust entity. A secure packet forwarding algorithm and an authentication and key exchange protocol are developed to protect the network infrastructure. A roaming support mechanism and the associated mutual authentication protocol are proposed to secure the foreign group and the mobile host when it roams within the network. The computation overhead of secure packet forwarding and roaming support algorithms is studied via experiments. The results demonstrate that these two security mechanisms only require, respectively, less than 2% and 0.2% to 5% CPU time in a low-end 700 MHz PC.

  • A Visual Inspection System for Accurate Positioning of Railway Fastener

    Jianwei LIU  Hongli LIU  Xuefeng NI  Ziji MA  Chao WANG  Xun SHAO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2020/07/17
      Vol:
    E103-D No:10
      Page(s):
    2208-2215

    Automatic disassembly of railway fasteners is of great significance for improving the efficiency of replacing rails. The accurate positioning of fastener is the key factor to realize automatic disassembling. However, most of the existing literature mainly focuses on fastener region positioning and the literature on accurate positioning of fasteners is scarce. Therefore, this paper constructed a visual inspection system for accurate positioning of fastener (VISP). At first, VISP acquires railway image by image acquisition subsystem, and then the subimage of fastener can be obtained by coarse-to-fine method. Subsequently, the accurate positioning of fasteners can be completed by three steps, including contrast enhancement, binarization and spike region extraction. The validity and robustness of the VISP were verified by vast experiments. The results show that VISP has competitive performance for accurate positioning of fasteners. The single positioning time is about 260ms, and the average positioning accuracy is above 90%. Thus, it is with theoretical interest and potential industrial application.

  • UWB Localization for NLOS under Indoor Multipath Channel: Scheme and TOA Estimation

    Zhu XIAO  Ke-Chu YI  Bin TIAN  Yong-Chao WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3391-3394

    This letter proposes a UWB signaling localization scheme for indoor multipath channel. It demonstrates that the proposed method does not require LOS path (LP) and is suitable for severe non line-of-sight (NLOS) condition. A low-complexity TOA estimation algorithm, the strongest path (SP) detection by convolution, is designed, which is easier to implement than the LP detection since it dispenses with the process of threshold setting. Experiments under NLOS channels in IEEE.802.15.4a are conducted and the localization influences due to the algorithm parameters are discussed. The results prove the feasibility of the proposed localization scheme under the indoor multipath NLOS environment.

  • Unsupervised Polarimetric SAR Image Classification

    Junyi XU  Jian YANG  Yingning PENG  Chao WANG  

     
    LETTER-Sensing

      Vol:
    E87-B No:4
      Page(s):
    1048-1052

    In this letter, the concept of cross-entropy is introduced for unsupervised polarimetric synthetic aperture radar (SAR) image classification. The difference between two scatterers is decomposed into three parts, i.e., the difference of average scattering characteristic, the difference of scattering randomness and the difference of scattering matrix span. All these three parts are expressed in cross-entropy formats. The minimum cross-entropy principle is adopted to make classification decision. It works well in unsupervised terrain classification with a NASA/JPL AIRSAR image.