The search functionality is under construction.

Author Search Result

[Author] Chen LIU(20hit)

1-20hit
  • A Wide Locking Range Injection Locked Frequency Divider with Quadrature Outputs

    Sheng-Lyang JANG  Cheng-Chen LIU  Jhin-Fang HUANG  

     
    PAPER-Electronic Circuits

      Vol:
    E91-C No:3
      Page(s):
    373-377

    This paper presents a quadrature injection locked frequency divider (ILFD) employing tunable active inductors (TAIs), which are used is to extend the locking range and to reduce die area. The CMOS ILFD is based on a new quadrature voltage-controlled oscillator (VCO) with cross-coupled switching pairs and TAI-C tanks, and was fabricated in the 0.18-µm 1P6M CMOS technology. The divide-by-2 LC-tank ILFD is performed by adding injection MOSFETs between the differential outputs of the VCO. Measurement results show that at the supply voltage of 1.8 V, the divider free-running frequency is tunable from 1.34 GHz to 3.07 GHz, and at the incident power of 0 dBm the locking range is about 6 GHz (137%), from the incident frequency 1.37 GHz to 7.38 GHz. The core power consumption is 22.8 mW. The die area is 0.630.55 mm2.

  • On Secrecy Performance Analysis for Downlink RIS-Aided NOMA Systems

    Shu XU  Chen LIU  Hong WANG  Mujun QIAN  Jin LI  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2022/11/21
      Vol:
    E106-B No:5
      Page(s):
    402-415

    Reconfigurable intelligent surface (RIS) has the capability of boosting system performance by manipulating the wireless propagation environment. This paper investigates a downlink RIS-aided non-orthogonal multiple access (NOMA) system, where a RIS is deployed to enhance physical-layer security (PLS) in the presence of an eavesdropper. In order to improve the main link's security, the RIS is deployed between the source and the users, in which a reflecting element separation scheme is developed to aid data transmission of both the cell-center and the cell-edge users. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed RIS-aided NOMA scheme. To obtain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. Moreover, the secrecy diversity order is derived according to the asymptotic approximation in the high signal-to-noise ratio (SNR) and main-to-eavesdropper ratio (MER) regime. Furthermore, based on the derived results, the power allocation coefficient and number of elements are optimized to minimize the system SOP. Simulations demonstrate that the theoretical results match well with the simulation results and the SOP of the proposed scheme is clearly less than that of the conventional orthogonal multiple access (OMA) scheme obviously.

  • Improved Spectral Efficiency at Reduced Outage Probability for Cooperative Wireless Networks by Using CSI Directed Estimate and Forward Strategy

    Yihenew Wondie MARYE  Chen LIU  Feng LU  Hua-An ZHAO  

     
    PAPER-Foundations

      Vol:
    E97-A No:1
      Page(s):
    7-17

    Cooperative wireless communication is a communication mechanism to attain diversity through virtual antenna array that is formed by sharing resources among different users. Different strategies of resource utilization such as amplify-and-forward (AF) and decode-and-forward (DF) already exist in cooperative networks. Although the implementation of these strategies is simple, their utilization of the channel state information (CSI) is generally poor. As a result, the outage and bit error rate (BER) performances need much more improvement in order to satisfy the upcoming high data rate demands. For that to happen the spectral efficiency supported by a wireless system at a very low outage probability should be increased. In this paper a new approach, based on the previously existing ones, called CSI directed estimate and forward (CDEF) with a reduced estimation domain is proposed. A closed form solution for the optimal signal estimation at the relay using minimum mean square error (MMSE) as well as a possible set reduction of the estimation domain is given. It will be shown that this new strategy attains better symbol error rate (SER) and outage performance than AF or DF when the source relay link is comparatively better than the relay destination link. Simulation results also show that it has got better spectral efficiency at low outage probability for a given signal to noise ratio (SNR) as well as for a fixed outage probability in any operating SNR range.

  • Pairs of Ternary Perfect Sequences with Three-Valued Cross-Correlation

    Chenchen LIU  Wenyi ZHANG  Xiaoni DU  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2023/08/08
      Vol:
    E106-A No:12
      Page(s):
    1521-1524

    The calculation of cross-correlation between a sequence with good autocorrelation and its decimated sequence is an interesting problem in the field of sequence design. In this letter, we consider a class of ternary sequences with perfect autocorrelation, proposed by Shedd and Sarwate (IEEE Trans. Inf. Theory, 1979, DOI: 10.1109/TIT.1979.1055998), which is generated based on the cross-correlation between m-sequence and its d-decimation sequence. We calculate the cross-correlation distribution between a certain pair of such ternary perfect sequences and show that the cross-correlation takes three different values.

  • Dual-Band CMOS Injection-Locked Frequency Divider with Variable Division Ratio

    Sheng-Lyang JANG  Chih-Yeh LIN  Cheng-Chen LIU  Jhin-Fang HUANG  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:4
      Page(s):
    550-557

    A dual band 0.18 µm CMOS LC-tank injection locked frequency divider (ILFD) is proposed. The ILFD circuit is realized with a cross-coupled pMOS LC-tank oscillator with an inductor switch for frequency band selection. The self-oscillating VCO is injection-locked by nth-harmonic input to obtain the division factor of n. The division ratio of 1, 2, and 3 has been found for the proposed ILFD. Measurement results show that at the supply voltage of 1.1 V, the free-running frequency is from 2.28(3.09) GHz to 2.78(3.72) GHz for the low- (high-) frequency band. The power consumption of the ILFD core is 3.7 mW (6.2 mW) at low (high) band. The total area including the output buffer and the pads is 0.8410.764 mm2.

  • The Optimal MMSE-Based OSIC Detector for MIMO System

    Yunchao SONG  Chen LIU  Feng LU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:1
      Page(s):
    232-239

    The ordered successive interference cancellation (OSIC) detector based on the minimum mean square error (MMSE) criterion has been proved to be a low-complexity detector with efficient bit error rate (BER) performance. As the well-known MMSE-Based OSIC detector, the MMSE-Based vertical Bell Laboratories Layered Space-Time (VBLAST) detector, whose computational complexity is cubic, can not attain the minimum BER performance. Some approaches to reducing the BER of the MMSE-Based VBLAST detector have been contributed, however these improvements have large computational complexity. In this paper, a low complexity MMSE-Based OSIC detector called MMSE-OBEP (ordering based on error probability) is proposed to improve the BER performance of the previous MMSE-Based OSIC detectors, and it has cubic complexity. The proposed detector derives the near-exact error probability of the symbols in the MMSE-Based OSIC detector, thus giving priority to detect the symbol with the smallest error probability can minimize the error propagation in the MMSE-Based OSIC detector and enhance the BER performance. We show that, although the computational complexity of the proposed detector is cubic, it can provide better BER performance than the previous MMSE-Based OSIC detector.

  • Joint MMSE Design of Relay and Destination in Two-Hop MIMO Multi-Relay Networks

    Youhua FU  Wei-Ping ZHU  Chen LIU  Feng LU  Hua-An ZHAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:3
      Page(s):
    836-846

    This paper presents a joint linear processing scheme for two-hop and half-duplex distributed amplify-and-forward (AF) relaying networks with one source, one destination and multiple relays, each having multiple antennas. By using the minimum mean-square error (MMSE) criterion and the Wiener filter principle, the joint relay and destination design with perfect channel state information (CSI) is first formulated as an optimization problem with respect to the relay precoding matrix under the constraint of a total relay transmit power. The constrained optimization with an objective to design the relay block-diagonal matrix is then simplified to an equivalent problem with scalar optimization variables. Next, it is revealed that the scalar-version optimization is convex when the total relay power or the second-hop SNR (signal to noise ratio) is above a certain threshold. The underlying optimization problem, which is non-convex in general, is solved by complementary geometric programming (CGP). The proposed joint relay and destination design with perfect CSI is also extended for practical systems where only the channel mean and covariance matrix are available, leading to a robust processing scheme. Finally, Monte Carlo simulations are undertaken to demonstrate the superior MSE (mean-square error) and SER (symbol error rate) performances of the proposed scheme over the existing relaying method in the case of relatively large second-hop SNR.

  • Multiple Region-of-Interest Based H.264 Encoder with a Detection Architecture in Macroblock Level Pipelining

    Tianruo ZHANG  Chen LIU  Minghui WANG  Satoshi GOTO  

     
    PAPER

      Vol:
    E94-C No:4
      Page(s):
    401-410

    This paper proposes a region-of-interest (ROI) based H.264 encoder and the VLSI architecture of the ROI detection algorithm. In ROI based video coding system, pre-processing unit to detect ROI should only introduce low computational complexity overhead due to the low power requirement. The Macroblocks (MBs) in ROIs are detected sequentially in the same order of H.264 encoding to satisfy the MB level pipelining of ROI detector and H.264 encoder. ROI detection is performed in a novel estimation-and-verification process with an ROI contour template. Proposed architecture can be configured to detect either single ROI or multiple ROIs in each frame and the throughput of single detection mode is 5.5 times of multiple detection mode. 98.01% and 97.89% of MBs in ROIs can be detected in single and multiple detection modes respectively. Hardware cost of proposed architecture is only 4.68 k gates. Detection speed is 753 fps for CIF format video at the operation frequency of 200 MHz in multiple detection mode with power consumption of 0.47 mW. Compared with previous fast ROI detection algorithms for video coding application, the proposed architecture obtains more accurate and smaller ROI. Therefore, more efficient ROI based computation complexity and compression efficiency optimization can be implemented in H.264 encoder.

  • Diagonal Block Orthogonal Algebraic Space-Time Block Codes

    Chen LIU  Zhenyang WU  Hua-An ZHAO  

     
    LETTER-Communications and Wireless Systems

      Vol:
    E88-D No:7
      Page(s):
    1457-1459

    This paper proposes a new family of space-time block codes whose transmission rate is 1 symbol per channel use. The proposed space-time codes can achieve full transmit diversity with larger coding gain for the constellation carved from the scaled complex integer ring κZ[i]. It is confirmed that the performances of the proposed space-time codes are superior to the existing space-time block codes by our simulation results.

  • Encoder-Unconstrained User Interactive Partial Decoding Scheme

    Chen LIU  Xin JIN  Tianruo ZHANG  Satoshi GOTO  

     
    PAPER-Coding & Processing

      Vol:
    E95-A No:8
      Page(s):
    1288-1296

    High-definition (HD) videos become more and more popular on portable devices these years. Due to the resolution mismatch between the HD video sources and the relative low-resolution screens of portable devices, the HD videos are usually fully decoded and then down-sampled (FDDS) for the displays, which not only increase the cost of both computational power and memory bandwidth, but also lose the details of video contents. In this paper, an encoder-unconstrained partial decoding scheme for H.264/AVC is presented to solve the problem by only decoding the object of interest (OOI) related region, which is defined by users. A simplified compression domain tracking method is utilized to ensure that the OOI locates in the center of the display area. The decoded partial area (DPA) adaptation, the reference block relocation (RBR) and co-located temporal Intra prediction (CTIP) methods are proposed to improve the visual quality for the DPA with low complexity. The simulation results show that the proposed partial decoding scheme provides an average of 50.16% decoding time reduction comparing to the fully decoding process. The displayed region also presents the original HD granularity of OOI. The proposed partial decoding scheme is especially useful for displaying HD video on the devices of which the battery life is a crucial factor.

  • Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model Open Access

    Xiaochen LIU  Yuanyuan GAO  Nan SHA  Guozhen ZANG  Kui XU  

     
    LETTER

      Vol:
    E103-A No:1
      Page(s):
    215-220

    In this letter, we investigate the secure transmission in radio frequency (RF) powered two-hop untrusted relay networks, where the source node and untrusted relay are both wireless powered by an RF power supplier. Specifically, considering the non-linear energy-harvesting (EH) model, the two-process communication protocol is proposed. The secrecy rate is maximized by jointly designing the beamforming vector at source and beamforming matrix at relay, under the constraints of transmit power at RF power supplier and destination. The secrecy rate maximization (SRM) is non-convex, hence we propose an alternative optimization (AO) based iterative algorithm. Numerical results demonstrate that the proposed scheme can significantly increase the secrecy rate compared to the baseline schemes.

  • On the Joint Optimal Power Allocation for DF Relaying and Beamforming Communication Systems

    Feng LU  Chen LIU  Hua-An ZHAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:3
      Page(s):
    889-897

    This paper considers the power allocation (PA) problem for three-node decode-and-forward (DF) relay communication systems, where the aggregate transmit power constraint is imposed on the source and the relay and the optimization target is to maximize the system's instantaneous information rate. Since the relay is equipped with multiple antennas, the receiver and transmitter beamforming strategies are generally adopted. In this paper, we start by proposing a closed-form solution for the frequency-flat (FF) fading environment, then give a bisection algorithm with low complexity to obtain an optimal solution for the frequency-selective (FS) fading scenario. Finally, simulations validate the proposed methods.

  • Clustering for Interference Alignment with Cache-Enabled Base Stations under Limited Backhaul Links

    Junyao RAN  Youhua FU  Hairong WANG  Chen LIU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/12/25
      Vol:
    E103-B No:7
      Page(s):
    796-803

    We propose to use clustered interference alignment for the situation where the backhaul link capacity is limited and the base station is cache-enabled given MIMO interference channels, when the number of Tx-Rx pairs exceeds the feasibility constraint of interference alignment. We optimize clustering with the soft cluster size constraint algorithm by adding a cluster size balancing process. In addition, the CSI overhead is quantified as a system performance indicator along with the average throughput. Simulation results show that cluster size balancing algorithm generates clusters that are more balanced as well as attaining higher long-term throughput than the soft cluster size constraint algorithm. The long-term throughput is further improved under high SNR by reallocating the capacity of the backhaul links based on the clustering results.

  • Enhancing Physical Layer Security Performance in Downlink Cellular Networks through Cooperative Users

    Shijie WANG  Yuanyuan GAO  Xiaochen LIU  Guangna ZHANG  Nan SHA  Mingxi GUO  Kui XU  

     
    LETTER-Graphs and Networks

      Vol:
    E102-A No:12
      Page(s):
    2008-2014

    In this paper, we explore how to enhance the physical layer security performance in downlink cellular networks through cooperative jamming technology. Idle user equipments (UE) are used to cooperatively transmit jamming signal to confuse eavesdroppers (Eve). We propose a threshold-based jammer selection scheme to decide which idle UE should participate in the transmission of jamming signal. Threshold conditions are carefully designed to decrease interference to legitimate channel, while maintain the interference to the Eves. Moreover, fewer UE are activated, which is helpful for saving energy consumptions of cooperative UEs. Analytical expressions of the connection and secrecy performances are derived, which are validated through Monte Carlo simulations. Theoretical and simulation results reveal that our proposed scheme can improve connection performance, while approaches the secrecy performance of [12]. Furthermore, only 43% idle UEs of [12] are used for cooperative jamming, which helps to decrease energy consumption of network.

  • EQ-Sequences for Coding Floorplans

    Hua-An ZHAO  Chen LIU  Yoji KAJITANI  Keishi SAKANUSHI  

     
    PAPER-Floorplan

      Vol:
    E87-A No:12
      Page(s):
    3233-3243

    A floorplan specifies the layout of modules in very large scale integration (VLSI) design, and a new code, called the EQ-sequence, for representing a floorplan is presented in this paper. The EQ-sequence is based on a Q-sequence. The EQ-sequence can preserve the adjacent relationships of rooms on a floorplan, but the Q-sequence cannot. The algorithms for encoding, moving and decoding of an EQ-sequence are introduced. With the EQ-sequence, we can check whether two modules abut each other on a floorplan. It has been proved that any floorplan of n rooms is uniquely encoded by an EQ-sequence and any EQ-sequence is uniquely decoded to a floorplan, both in O(n) time.

  • Quadrature VCOs Using Single-Ended Injected Injection-Locked Frequency Dividers

    Sheng-Lyang JANG  Cheng-Chen LIU  Jhin-Fang HUANG  Yuan-Kai WU  Jhao-Jhang CHEN  

     
    LETTER-Electronic Circuits

      Vol:
    E92-C No:9
      Page(s):
    1226-1229

    This letter presents a new quadrature voltage-controlled oscillator (QVCO) consisting of two n-core Colpitts voltage-controlled oscillators (VCOs) with a tail inductor. The VCOs are used as a single-ended injected injection-locked frequency divider (ILFD). The output of the tail inductor in one ILFD is injected into the injection node in the other ILFD and vice versa. The proposed QVCO has been implemented in the 0.18 µm CMOS technology. At the supply voltage of 1.0 V, the power consumption is 1.8 mW. The free-running frequency is tunable from 4.68 GHz to 5.03 GHz as the tuning voltage is varied from 0.0 V to 1.8 V. The measured phase noise is -113.58 dBc/Hz at the 1 MHz frequency offset from the oscillation frequency of 5.03 GHz and the figure of merit (FOM) of the QVCO is -185.06 dBc/Hz.

  • Divide-by-3 Injection-Locked Frequency Divider Using Two Linear Mixers

    Sheng-Lyang JANG  Cheng-Chen LIU  Jhin-Fang HUANG  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E93-C No:1
      Page(s):
    136-139

    This paper proposes a wide-locking range divide-by-3 injection-locked frequency divider (ILFD) fabricated in the 90 nm 1P9M CMOS technology. The divider consists of an nMOS cross-coupled LC oscillator and two injection MOSFETs in series with the cross-coupled nMOSFETs. The ILFD is formed with two linear mixers which share the same dc current so that a low power ILFD can be designed. At the supply voltage of 0.7 V, the free-running frequency is from 10.18 to 11.56 GHz, the current and power consumption of the divider without buffers are 2.8 mA and 1.96 mW, respectively. At the incident power of 0 dBm, the total operational locking range is 4.94 GHz, from the incident frequency 29.96 to 34.9 GHz.

  • Security-Reliability Tradeoff for Joint Relay-User Pair and Friendly Jammer Selection with Channel Estimation Error in Internet-of-Things

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Xiaochen LIU  Nan SHA  Kui XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/12/22
      Vol:
    E104-B No:6
      Page(s):
    686-695

    In this paper, we explore the physical layer security of an Internet of Things (IoT) network comprised of multiple relay-user pairs in the presence of multiple malicious eavesdroppers and channel estimation error (CEE). In order to guarantee secure transmission with channel estimation error, we propose a channel estimation error oriented joint relay-user pair and friendly jammer selection (CEE-JRUPaFJS) scheme to improve the physical layer security of IoT networks. For the purpose of comparison, the channel estimation error oriented traditional round-robin (CEE-TRR) scheme and the channel estimation error oriented traditional pure relay-user pair selection (CEE-TPRUPS) scheme are considered as benchmark schemes. The exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the CEE-TRR and CEE-TPRUPS schemes as well as the CEE-JRUPaFJS scheme are derived over Rayleigh fading channels, which are employed to characterize network reliability and security, respectively. Moreover, the security-reliability tradeoff (SRT) is analyzed as a metric to evaluate the tradeoff performance of CEE-JRUPaFJS scheme. It is verified that the proposed CEE-JRUPaFJS scheme is superior to both the CEE-TRR and CEE-TPRUPS schemes in terms of SRT, which demonstrates our proposed CEE-JRUPaFJS scheme are capable of improving the security and reliability performance of IoT networks in the face of multiple eavesdroppers. Moreover, as the number of relay-user pairs increases, CEE-TPRUPS and CEE-JRUPaFJS schemes offer significant increases in SRT. Conversely, with an increasing number of eavesdroppers, the SRT of all these three schemes become worse.

  • A Harvested Power-Oriented SWIPT Scheme in MIMO Communication Systems with Non-Linear Harvesters

    Yan CHEN  Chen LIU  Mujun QIAN  Yu HUANG  Wenfeng SUN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/01/18
      Vol:
    E104-B No:7
      Page(s):
    893-902

    This paper studies a harvested power-oriented simultaneous wireless information and power transfer (SWIPT) scheme over multiple-input multiple-output (MIMO) interference channels in which energy harvesting (EH) circuits exhibit nonlinearity. To maximize the power harvested by all receivers, we propose an algorithm to jointly optimize the transmit beamforming vectors, power splitting (PS) ratios and the receive decoding vectors. As all variables are coupled to some extent, the problem is non-convex and hard to solve. To deal with this non-convex problem, an iterative optimization method is proposed. When two variables are fixed, the third variable is optimized. Specifically, when the transmit beamforming vectors are optimized, the transferred objective function is the sum of several fractional functions. Non-linear sum-of-ratios programming is used to solve the transferred objective function. The convergence and advantage of our proposed scheme compared with traditional EH circuits are validated by simulation results.

  • Time Allocation in Ambient Backscatter Assisted RF-Powered Cognitive Radio Network with Friendly Jamming against Eavesdropping

    Ronghua LUO  Chen LIU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    1011-1018

    In this paper, we study a radio frequency (RF)-powered backscatter assisted cognitive radio network (CRN), where an eavesdropper exists. This network includes a primary transmitter, a pair of secondary transmitter and receiver, a friendly jammer and an eavesdropper. We assume that the secondary transmitter works in ambient backscatter (AmBack) mode and the friendly jammer works in harvest-then-transmit (HTT) mode, where the primary transmitter serves as energy source. To enhance the physical layer security of the secondary user, the friendly jammer uses its harvested energy from the primary transmitter to transmit jamming noise to the eavesdropper. Furthermore, for maximizing the secrecy rate of secondary user, the optimal time allocation including the energy harvesting and jamming noise transmission phases is obtained. Simulation results verify the superiority of the proposed scheme.