The search functionality is under construction.

Author Search Result

[Author] Ding WANG(3hit)

1-3hit
  • A Novel Clutter Cancellation Method Utilizing Joint Multi-Domain Information for Passive Radar

    Yonghui ZHAI  Ding WANG  Jiang WU  Shengheng LIU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:10
      Page(s):
    2203-2211

    Considering that existing clutter cancellation methods process information either in the time domain or in the spatial domain, this paper proposes a new clutter cancellation method that utilizes joint multi-domain information for passive radar. Assuming that there is a receiving array at the surveillance channel, firstly we propose a multi-domain information clutter cancellation model by constructing a time domain weighted matrix and a spatial weighted vector. Secondly the weighted matrix and vector can be updated adaptively utilizing the constant modulus constraint. Finally the weighted matrix is derived from the principle of optimal filtering and the recursion formula of weighted vector is obtained utilizing the Gauss-Newton method. Making use of the information in both time and spatial domain, the proposed method attenuates the noise and residual clutter whose directions are different from that of the target echo. Simulation results prove that the proposed method has higher clutter attenuation (CA) compared with the traditional methods in the low signal to noise ratio condition, and it also improves the detection performance of weak targets.

  • Indoor Channel Characterization and Performance Evaluation with Directional Antenna and Multiple Beam Combining

    Xiaoya ZUO  Ding WANG  Rugui YAO  Guomei ZHANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    104-114

    Ultra-wideband (UWB) beamforming is now attracting significant research attention for attaining spatial gain from array antennas. It is commonly believed that directional antenna based communication could improve the system performance. In order to further make clear the relationship between system performance and the antenna array beamforming, UWB indoor channels are extracted from practical measurements and circular horn antenna is used to characterize the channel properties and to evaluate the system performance. Using a single beam directional antenna with a certain half power beamwidth (HPBW), the channel capacity and the bit-error-rate (BER) performance of a UWB RAKE receiver are evaluated. In the line-of-sight (LOS) environments, the channel capacity and BER performance are improved with the beamwidth becoming smaller. However in the non-line-of-sight (NLOS) environments, the capacity and BER performance are not always better with directional antennas. And the variation trend between the system performance and the antenna beamwidth disappears. This is mainly because that there exist no dominant strong path components like those seen in LOS environments. Then beam combining is introduced to further improve the system performance. Simulation results show that the channel capacity and BER performance cloud be greatly improved by multiple beam combining, especially for the NLOS environments. This reminds us that when antenna beamforming is used to obtain array gain, the beamwidth should be carefully designed and beam combining is necessary to obtain optimal performance, especially in NLOS environments.

  • White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

    Yudi ZHANG  Debiao HE  Xinyi HUANG  Ding WANG  Kim-Kwang Raymond CHOO  Jing WANG  

     
    INVITED PAPER

      Pubricized:
    2019/09/27
      Vol:
    E103-D No:2
      Page(s):
    188-195

    Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years, there is no white-box implementation for public key cryptography. In this paper, we propose the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance of our white-box implementations, in order to demonstrate utility for real-world applications.