The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Chun WANG(13hit)

1-13hit
  • Combining Boundary and Region Information with Bolt Prior for Rail Surface Detection

    Yaping HUANG  Siwei LUO  Shengchun WANG  

     
    LETTER-Pattern Recognition

      Vol:
    E95-D No:2
      Page(s):
    690-693

    Railway inspection is important in railway maintenance. There are several tasks in railway inspection, e.g., defect detection and bolt detection. For those inspection tasks, the detection of rail surface is a fundamental and key issue. In order to detect rail defects and missing bolts, one must know the exact location of the rail surface. To deal with this problem, we propose an efficient Rail Surface Detection (RSD) algorithm that combines boundary and region information in a uniform formulation. Moreover, we reevaluate the rail location by introducing the top down information–bolt location prior. The experimental results show that the proposed algorithm can detect the rail surface efficiently.

  • Low-Complexity Concatenated Soft-In Soft-Out Detector for Spreading OFDM Systems

    Huan-Chun WANG  De-Jhen HUANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:11
      Page(s):
    3480-3491

    This paper proposes a low-complexity concatenated (LCC) soft-in soft-out (SISO) detector for spreading OFDM systems. The LCC SISO detector uses the turbo principle to compute the extrinsic information of the optimal maximum a priori probability (MAP) SISO detector with extremely low complexity. To develop the LCC SISO detector, we first partition the spreading matrix into some concatenated sparse matrices separated by interleavers. Then, we use the turbo principle to concatenate some SISO detectors, which are separated by de-interleavers or interleavers. Each SISO detector computes the soft information for each sparse matrix. By exchanging the soft information between the SISO detectors, we find the extrinsic information of the MAP SISO detector with extremely low complexity. Simulation results show that using the LCC SISO detector produces a near-optimal performance for both uncoded and coded spreading OFDM systems. In addition, by using the LCC SISO detector, the spreading OFDM system significantly improves the BER of the conventional OFDM system.

  • Low Cost and Fault Tolerant Parallel Computing Using Stochastic Two-Dimensional Finite State Machine

    Xuechun WANG  Yuan JI  Wendong CHEN  Feng RAN  Aiying GUO  

     
    LETTER-Architecture

      Pubricized:
    2017/07/18
      Vol:
    E100-D No:12
      Page(s):
    2866-2870

    Hardware implementation of neural networks usually have high computational complexity that increase exponentially with the size of a circuit, leading to more uncertain and unreliable circuit performance. This letter presents a novel Radial Basis Function (RBF) neural network based on parallel fault tolerant stochastic computing, in which number is converted from deterministic domain to probabilistic domain. The Gaussian RBF for middle layer neuron is implemented using stochastic structure that reduce the hardware resources significantly. Our experimental results from two pattern recognition tests (the Thomas gestures and the MIT faces) show that the stochastic design is capable to maintain equivalent performance when the stream length set to 10Kbits. The stochastic hidden neuron uses only 1.2% hardware resource compared with the CORDIC algorithm. Furthermore, the proposed algorithm is very flexible in design tradeoff between computing accuracy, power consumption and chip area.

  • The Covering Radius of the Reed-Muller Code R(3, 7) in R(5, 7) Is 20

    Gui LI  Qichun WANG  Shi SHU  

     
    LETTER-Coding Theory

      Vol:
    E102-A No:3
      Page(s):
    594-597

    We propose a recursive algorithm to reduce the computational complexity of the r-order nonlinearity of n-variable Boolean functions. Applying the algorithm and using the sufficient and necessary condition put forward by [1] to cut the vast majority of useless search branches, we show that the covering radius of the Reed-Muller Code R(3, 7) in R(5, 7) is 20.

  • More New Classes of Differentially 4-Uniform Permutations with Good Cryptographic Properties

    Jie PENG  Chik How TAN  Qichun WANG  Jianhua GAO  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:6
      Page(s):
    945-952

    Research on permutation polynomials over the finite field F22k with significant cryptographical properties such as possibly low differential uniformity, possibly high nonlinearity and algebraic degree has attracted a lot of attention and made considerable progress in recent years. Once used as the substitution boxes (S-boxes) in the block ciphers with Substitution Permutation Network (SPN) structure, this kind of polynomials can have a good performance against the classical cryptographic analysis such as linear attacks, differential attacks and the higher order differential attacks. In this paper we put forward a new construction of differentially 4-uniformity permutations over F22k by modifying the inverse function on some specific subsets of the finite field. Compared with the previous similar works, there are several advantages of our new construction. One is that it can provide a very large number of Carlet-Charpin-Zinoviev equivalent classes of functions (increasing exponentially). Another advantage is that all the functions are explicitly constructed, and the polynomial forms are obtained for three subclasses. The third advantage is that the chosen subsets are very large, hence all the new functions are not close to the inverse function. Therefore, our construction may provide more choices for designing of S-boxes. Moreover, it has been checked by a software programm for k=3 that except for one special function, all the other functions in our construction are Carlet-Charpin-Zinoviev equivalent to the existing ones.

  • New Balanced Boolean Functions with Good Cryptographic Properties

    Qichun WANG  Xiangyang XUE  Haibin KAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2633-2637

    It is known that Boolean functions used in stream ciphers should have good cryptographic properties to resist fast algebraic attacks. In this paper, we study a new class of Boolean functions with good cryptographic properties: balancedness, optimum algebraic degree, optimum algebraic immunity and a high nonlinearity.

  • A Note on the Construction of Differentially Uniform Permutations Using Extension Fields

    Qichun WANG  Haibin KAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:11
      Page(s):
    2080-2083

    Constructing APN or 4-differentially uniform permutations achieving all the necessary criteria is an open problem, and the research on it progresses slowly. In ACISP 2011, Carlet put forth an idea for constructing differentially uniform permutations using extension fields, which was illustrated with a construction of a 4-differentially uniform (n,n)-permutation. The permutation has optimum algebraic degree and very good nonlinearity. However, it was proved to be a permutation only for n odd. In this note, we investigate further the construction of differentially uniform permutations using extension fields, and construct a 4-differentially uniform (n,n)-permutation for any n. These permutations also have optimum algebraic degree and very good nonlinearity. Moreover, we consider a more general type of construction, and illustrate it with an example of a 4-differentially uniform (n,n)-permutation with good cryptographic properties.

  • A Constructive Method of Algebraic Attack with Less Keystream Bits

    Xiaoyan ZHANG  Qichun WANG  Bin WANG  Haibin KAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:10
      Page(s):
    2059-2062

    In algebraic attack on stream ciphers based on LFSRs, the secret key is found by solving an overdefined system of multivariate equations. There are many known algorithms from different point of view to solve the problem, such as linearization, relinearization, XL and Grobner Basis. The simplest method, linearization, treats each monomial of different degrees as a new variable, and consists of variables (the degree of the system of equations is denoted by d). Thus it needs at least equations, i.e. keystream bits to recover the secret key by Gaussian reduction or other. In this paper we firstly propose a concept, called equivalence of LFSRs. On the basis of it, we present a constructive method that can solve an overdefined system of multivariate equations with less keystream bits by extending the primitive polynomial.

  • Search for 9-Variable Boolean Functions with the Optimal Algebraic Immunity-Resiliency Trade-Off and High Nonlinearity Open Access

    Yueying LOU  Qichun WANG  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2024/03/28
      Vol:
    E107-A No:8
      Page(s):
    1382-1385

    Boolean functions play an important role in symmetric ciphers. One of important open problems on Boolean functions is determining the maximum possible resiliency order of n-variable Boolean functions with optimal algebraic immunity. In this letter, we search Boolean functions in the rotation symmetric class, and determine the maximum possible resiliency order of 9-variable Boolean functions with optimal algebraic immunity. Moreover, the maximum possible nonlinearity of 9-variable rotation symmetric Boolean functions with optimal algebraic immunity-resiliency trade-off is determined to be 224.

  • Variable and Fixed Power Adaptive Turbo Coded Modulation for OFDM Transmissions

    Xiaoming SHE  Anchun WANG  Shidong ZHOU  Yan YAO  

     
    LETTER-Wireless Communication Technology

      Vol:
    E87-B No:6
      Page(s):
    1710-1714

    In this letter, we propose an adaptive turbo coded modulation scheme for orthogonal frequency division multiplexing (OFDM), and three power allocation algorithms with transmit power variable over subcarriers, variable over subbands and constant over subcarriers. Our object is to improve the overall throughput under target bit-error-rate (BER). Simulation results show that our fixed power adaptation scheme exhibits a more than 7 dB signal-noise-ratio (SNR) gain relative to non-adaptive turbo coded modulation, and an about 2 dB additional gain can be achieved with our variable power algorithm employed. We also discuss the effect of the number of subbands on throughput performance in our adaptive scheme.

  • A Note on Minimum Hamming Weights of Correlation-Immune Boolean Functions

    Qichun WANG  Yanjun LI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:2
      Page(s):
    464-466

    It is known that correlation-immune (CI) Boolean functions used in the framework of side channel attacks need to have low Hamming weights. In this letter, we determine all unknown values of the minimum Hamming weights of d-CI Boolean functions in n variables, for d ≤ 5 and n ≤ 13.

  • Hand Gesture Recognition Based on Perceptual Shape Decomposition with a Kinect Camera

    Chun WANG  Zhongyuan LAI  Hongyuan WANG  

     
    LETTER-Pattern Recognition

      Vol:
    E96-D No:9
      Page(s):
    2147-2151

    In this paper, we propose the Perceptual Shape Decomposition (PSD) to detect fingers for a Kinect-based hand gesture recognition system. The PSD is formulated as a discrete optimization problem by removing all negative minima with minimum cost. Experiments show that our PSD is perceptually relevant and robust against distortion and hand variations, and thus improves the recognition system performance.

  • Visual Indexing of Large Scale Train-Borne Video for Rail Condition Perceiving

    Peng DAI  Shengchun WANG  Yaping HUANG  Hao WANG  Xinyu DU  Qiang HAN  

     
    PAPER

      Pubricized:
    2017/06/14
      Vol:
    E100-D No:9
      Page(s):
    2017-2026

    Train-borne video captured from the camera installed in the front or back of the train has been used for railway environment surveillance, including missing communication units and bolts on the track, broken fences, unpredictable objects falling into the rail area or hanging on wires on the top of rails. Moreover, the track condition can be perceived visually from the video by observing and analyzing the train-swaying arising from the track irregularity. However, it's a time-consuming and labor-intensive work to examine the whole large scale video up to dozens of hours frequently. In this paper, we propose a simple and effective method to detect the train-swaying quickly and automatically. We first generate the long rail track panorama (RTP) by stitching the stripes cut from the video frames, and then extract track profile to perform the unevenness detection algorithm on the RTP. The experimental results show that RTP, the compact video representation, can fast examine the visual train-swaying information for track condition perceiving, on which we detect the irregular spots with 92.86% recall and 82.98% precision in only 2 minutes computation from the video close to 1 hour.