The search functionality is under construction.

Author Search Result

[Author] Hao CHEN(31hit)

1-20hit(31hit)

  • Spectrum Sensing for Multiuser Network Based on Free Probability Theory

    Lei WANG  Baoyu ZHENG  Qingmin MENG  Chao CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:1
      Page(s):
    65-72

    Based on Free Probability Theory (FPT), which has become an important branch of Random Matrix Theory (RMT), a new scheme of frequency band sensing for Cognitive Radio (CR) in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) multiuser network is proposed. Unlike previous studies in the field, the new scheme does not require the knowledge of the spreading sequences of users and is related to the behavior of the asymptotic free behavior of random matrices. Simulation results show that the asymptotic claims hold true even for a small number of observations (which makes it convenient for time-varying topologies) outperforming classical energy detection scheme and another scheme based on random matrix theory.

  • Dual Band Hybrid Dielectric Resonator Antenna for Application in ISM and UNII Band

    Yen-Nien WANG  Yih-Chien CHEN  Kai-Hao CHEN  

     
    LETTER-Antennas

      Vol:
    E93-B No:10
      Page(s):
    2662-2665

    The hybrid antenna consisted of cylindrical dielectric resonator and rectangular slot was implemented. The hybrid antenna resonated at two different frequencies. The lower resonant frequency was associated with the rectangular slot while the higher resonant frequency was associated with the cylindrical dielectric resonator. Parametric investigation was carried out using simulation software. The proposed hybrid antenna had good agreement between the simulation and measurement results. A 24% bandwidth (return loss < 10 dB) of 2.30 GHz, and a 18% bandwidth (return loss < 10 dB) of 5.46 GHz was implemented successfully for application in ISM and UNII band.

  • Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)

    ShuKai HU  Chao CHEN  Rong SUN  XinMei WANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:3
      Page(s):
    983-986

    Quasi-cyclic (QC) low-density parity-check (LDPC) codes have several appealing properties regarding decoding, storage requirements and encoding aspects. In this paper, we focus on the QC LDPC codes over GF(q) whose parity-check matrices have fixed column weight j = 2. By investigating two subgraphs in the Tanner graphs of the corresponding base matrices, we derive two upper bounds on the minimum Hamming distance for this class of codes. In addition, a method is proposed to construct QC LDPC codes over GF(q), which have good Hamming distance distributions. Simulations show that our designed codes have good performance.

  • Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques

    Hao CHEN  Tao WANG  Shize GUO  Xinjie ZHAO  Fan ZHANG  Jian LIU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:3
      Page(s):
    811-821

    The differential fault analysis of SOSEMNAUK was presented in Africacrypt in 2011. In this paper, we improve previous work with algebraic techniques which can result in a considerable reduction not only in the number of fault injections but also in time complexity. First, we propose an enhanced method to determine the fault position with a success rate up to 99% based on the single-word fault model. Then, instead of following the design of SOSEMANUK at word levels, we view SOSEMANUK at bit levels during the fault analysis and calculate most components of SOSEMANUK as bit-oriented. We show how to build algebraic equations for SOSEMANUK and how to represent the injected faults in bit-level. Finally, an SAT solver is exploited to solve the combined equations to recover the secret inner state. The results of simulations on a PC show that the full 384 bits initial inner state of SOSEMANUK can be recovered with only 15 fault injections in 3.97h.

  • Particle Filter Target Tracking Algorithm Based on Dynamic Niche Genetic Algorithm

    Weicheng XIE  Junxu WEI  Zhichao CHEN  Tianqian LI  

     
    PAPER-Vision

      Vol:
    E100-A No:6
      Page(s):
    1325-1332

    Particle filter algorithm is an important algorithm in the field of target tracking. however, this algorithm faces the problem of sample impoverishment which is caused by the introduction of re-sampling and easily affected by illumination variation. This problem seriously affects the tracking performance of a particle filter algorithm. To solve this problem, we introduce a particle filter target tracking algorithm based on a dynamic niche genetic algorithm. The application of this dynamic niche genetic algorithm to re-sampling ensures particle diversity and dynamically fuses the color and profile features of the target in order to increase the algorithm accuracy under the illumination variation. According to the test results, the proposed algorithm accurately tracks the target, significantly increases the number of particles, enhances the particle diversity, and exhibits better robustness and better accuracy.

  • Design for Operation in Two Frequency Bands by Division of the Coupled Region in a Waveguide 2-Plane Coupler

    Shihao CHEN  Takashi TOMURA  Jiro HIROKAWA  Kota ITO  Mizuki SUGA  Yushi SHIRATO  Daisei UCHIDA  Naoki KITA  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2022/05/23
      Vol:
    E105-C No:12
      Page(s):
    729-739

    A waveguide 2-plane hybrid coupler with two operating bands is proposed. The cross-sectional shape of the coupled region inside the proposed coupler is designed with a two-dimensional arbitrary geometry sorting method. Simulations of the proposed hybrid coupler has a fractional bandwidth (FBW) of 2.17% at the center of 24.99GHz, and at the center of 28.28GHz an FBW of 6.13%. The proposed coupler is analyzed by the mode-matching finite-element hybrid method, and the final result is obtained using a genetic algorithm. The analyzed result of the coupling for the main modes in the coupled region is presented. The design result is confirmed by measurements.

  • Cognitive Shortest Path Tree Restoration (CSPTR) for MANET Using Cost-Sensitivity Analysis

    Huan CHEN  Bo-Chao CHENG  Po-Kai TSENG  

     
    PAPER

      Vol:
    E92-B No:3
      Page(s):
    717-727

    With quick topology changes due to mobile node movement or signal fading in MANET environments, conventional routing restoration processes are costly to implement and may incur high flooding of network traffic overhead and long routing path latency. Adopting the traditional shortest path tree (SPT) recomputation and restoration schemes used in Internet routing protocols will not work effectively for MANET. An object of the next generation SPT restoration system is to provide a cost-effective solution using an adaptive learning control system, wherein the SPT restoration engine is able to skip over the heavy SPT computation. We proposed a novel SPT restoration scheme, called Cognitive Shortest Path Tree Restoration (CSPTR). CSPTR is designed based on the Network Simplex Method (NSM) and Sensitivity Analysis (SA) techniques to provide a comprehensive and low-cost link failure healing process. NSM is used to derive the shortest paths for each node, while the use of SA can greatly reduce the effort of unnecessary recomputation of the SPT when network topology changes. In practice, a SA range table is used to enable the learning capability of CSPTR. The performance of computing and communication overheads are compared with other two well-known schemes, such as Dijstra's algorithm and incremental OSPF. Results show that CSPTR can greatly eliminate unnecessary SPT recomputation and reduce large amounts of the flooding overheads.

  • An Optimal Algorithm for Searching the Optimal Translation of Query Windows in Quadtree Decomposition

    Hao CHEN  Guangcun LUO  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E94-D No:10
      Page(s):
    2043-2047

    One of the efficient methods to build the index of continuous window queries over moving objects is by means of region quadtree index. In this paper, we present an optimal algorithm to search for the optimal position translation of query windows, where the total number of decomposed quadtree blocks for those windows in quadtree representation is minimal. We exploit the branch-and-bound concept to prune the particular paths of recursions in the search space. Evaluation proves that our optimal algorithm reduces search time greatly and the quadtree index based on optimal position translation works efficiently for continuous window queries. To the best of our knowledge, the algorithms and experiments reported in this paper are novel.

  • The Tracking of the Optimal Operating Frequency in a Class E Backlight Inverter Using the PLL Technique

    Chang Hua LIN  John Yanhao CHEN  

     
    PAPER-PLL

      Vol:
    E88-C No:6
      Page(s):
    1253-1262

    A new approach is proposed in this paper for the tracking of the optimal operating frequency in a Class E backlight inverter using the phase-locked loop (PLL) technique. First, a new single-stage backlight module is introduced to simplify the circuit and to raise the system efficiency. A piezoelectric transformer (PT) is used to drive the cold cathode fluorescent lamp (CCFL) to eliminate the downside of a conventional transformer and to reduce the dimension of the backlight module. Next, a PLL is embedded in the backlight system, as a feedback mechanism, to track the optimal operating frequency of the PT so that the PT's temperature effect is removed and, hence, the system efficiency and stability is improved. The feedback variable proposed is a phase angle rather than a lamp current amplitude traditionally used. A simplified model, along with its design procedure, is next presented. The complete analysis and design considerations are detailed. Finally, it is rather encouraging to observe that the experimental results match our analytical solutions closely.

  • Some Topological Properties of Fuzzy Values

    Qihao CHEN  Shin KAWASE  

     
    PAPER-General Fundamentals and Boundaries

      Vol:
    E81-A No:7
      Page(s):
    1483-1485

    Fuzzy value is a Fuzzy set the α-cuts of which are closed intervals. Let [0,1] be the set of Fuzzy values on [0,1]. We introduce two kinds of metric D and D1 in it, and investigate some topological properties.

  • Planar Photonic Crystal Nanolasers (II): Low-Threshold Quantum Dot Lasers

    Tomoyuki YOSHIE  Oleg B. SHCHEKIN  Hao CHEN  Dennis G. DEPPE  Axel SCHERER  

     
    INVITED PAPER

      Vol:
    E87-C No:3
      Page(s):
    300-307

    We have demonstrated low-threshold two-dimensional photonic crystal lasers with self-assembled InAs/GaAs quantum dots. Coupled cavity designs of whispering gallery modes are defined in square lattice photonic crystal slabs. Our lasers showed a small 120 µW input pumping power threshold. Actual absorption power is evaluated to be less than 20 µW. Our lasers show high spontaneous emission coupling (β) factors0.1. The mode volumes are expected to be 0.7-1.2 times cubed wavelength by our modelling. Based on threshold analysis, 80 QDs are the effective number of QDs defined as the number of QDs needed to make PC cavities transparent if they are on maximum optical field points. Using the same analysis we found that single quantum dot lasing is likely to occur both by proper alignment of the single quantum dot relative to geometries of photonic crystals and by using sharp QD emission lines in high-Q localized modes.

  • Multi-Antenna Secure Communications via Selective Diversity

    Ling TANG  Hao CHEN  Jianhui WU  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:2
      Page(s):
    587-590

    We consider secure wireless communications, where a source is communicating to a destination in the presence of K (K > 1) eavesdroppers. The source and destination both are equipped with multiple antennas, while each eavesdropper has a single antenna. The source aims to maximize the communication rate to the destination, while concealing the message from all the eavesdroppers. Combined with selective diversity, we propose a heuristic secrecy transmission scheme where the multiple-input-multiple-output (MIMO) secrecy channel is simplified into a multiple-input-single-output (MISO) one with the highest orthogonality to the eavesdropper channels. Then convex optimization is applied to obtain the optimal transmit covariance matrix for this selected MISO secrecy channel. Numerical results are provided to illustrate the efficacy of the proposed scheme.

  • An LCD Backlight-Module Driver Using a New Multi-Lamp Current Sharing Technique

    Chang-Hua LIN  John Yanhao CHEN  Fuhliang WEN  

     
    PAPER

      Vol:
    E88-C No:11
      Page(s):
    2111-2117

    This paper proposes a backlight module which drives multiple cold-cathode fluorescent lamps (CCFLs) with a current mirror technique to equalize the driving current for each lamp. We first adopt a half-bridge parallel-resonant inverter as the main circuit and use a single-input, multiple-output transformer to drive the multi-CCFLs. Next, we introduce current-mirror circuits to create a new current-sharing circuit, in which its current reference node and the parallel-connected multi-load nodes are used to accurately equalize all CCFLs' driving current. This will balance each lamp's brightness and, consequently, improve the picture display quality of the related liquid crystal display (LCD). This paper details the design concept for each component value with the assistance of an actual design example. The results of the example are examined with its actual measurements, which consequently verify the correctness of the proposed control strategy.

  • Printed Modified Bow-Tie Dipole Antenna for Multi-Band Applications

    I-Fong CHEN  Chia-Mei PENG  Ching-Chih HUNG  Han-Chao CHEN  

     
    LETTER-Antennas and Propagation

      Vol:
    E92-B No:4
      Page(s):
    1404-1405

    The ability of a modified bow-tie dipole antenna, which has an asymmetric-feed structure to operate at UHF-band (470-862 MHz) and dual ISM-band (2.4 GHz and 5.8 GHz) is demonstrated. Experimental results indicate that the VSWR 2:1 bandwidths achieved were 125.7%, 8.2% and 23.6% at 660 MHz, 2.45 GHz and 5.5 GHz. The proposed modified bow-tie dipole exhibits a nearly omni-directional radiation pattern with very easy to fabricate structure, and so is suitable for various commercial wideband applications.

  • Low-Power Fifth-Order Butterworth OTA-C Low-Pass Filter with an Impedance Scaler for Portable ECG Applications

    Shuenn-Yuh LEE  Cheng-Pin WANG  Chuan-Yu SUN  Po-Hao CHENG  Yuan-Sun CHU  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:12
      Page(s):
    942-952

    This study proposes a multiple-output differential-input operational transconductance amplifier-C (MODI OTA-C) filter with an impedance scaler to detect cardiac activity. A ladder-type fifth-orderButterworth low-pass filter with a large time constant and low noise is implemented to reduce coefficient sensitivity and address signal distortion. Moreover, linearized MODI OTA structures with reduced transconductance and impedance scaler circuits for noise reduction are used to achieve a wide dynamic range (DR). The OTA-based circuit is operated in the subthreshold region at a supply voltage of 1 V to reduce the power consumption of the wearable device in long-term use. Experimental results of the filter with a bandwidth of 250 Hz reveal that DR is 57.6 dB, and the harmonic distortion components are below -59 dB. The power consumption of the filter, which is fabricated through a TSMC 0.18 µm CMOS process, is lower than 390 nW, and the active area is 0.135 mm2.

  • A Good IDS Response Protocol of MANET Containment Strategies

    Bo-Chao CHENG  Huan CHEN  Ryh-Yuh TSENG  

     
    PAPER-Network

      Vol:
    E91-B No:11
      Page(s):
    3657-3666

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  • An Efficient Algorithm for Node-Weighted Tree Partitioning with Subtrees' Weights in a Given Range

    Guangchun LUO  Hao CHEN  Caihui QU  Yuhai LIU  Ke QIN  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:2
      Page(s):
    270-277

    Tree partitioning arises in many parallel and distributed computing applications and storage systems. Some operator scheduling problems need to partition a tree into a number of vertex-disjoint subtrees such that some constraints are satisfied and some criteria are optimized. Given a tree T with each vertex or node assigned a nonnegative integer weight, two nonnegative integers l and u (l < u), and a positive integer p, we consider the following tree partitioning problems: partitioning T into minimum number of subtrees or p subtrees, with the condition that the sum of node weights in each subtree is at most u and at least l. To solve the two problems, we provide a fast polynomial-time algorithm, including a pre-processing method and another bottom-up scheme with dynamic programming. With experimental studies, we show that our algorithm outperforms another prior algorithm presented by Ito et al. greatly.

  • Unsupervised Techniques for Identifying the Mode of a Multi-Functional Radar with Varying Pulse Sequences

    Jayson ROOK  Chi-Hao CHENG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2023/08/01
      Vol:
    E106-D No:11
      Page(s):
    1822-1830

    A multifunctional radar (MFR) with varying pulse sequences can change its signal characteristics and/or pattern, based on the presence of targets and to avoid being jammed. To take a countermeasure against an MFR, it is crucial for an electronic warfare (EW) system to be able to identify and separate a MFR's modes via analyzing intercepted radar signals, without a priori knowledge. In this article, two correlation-based methods, one taking the signal's order into account and another one ignoring the signal's order, are proposed and investigated for this task. The results demonstrate their great potential.

  • A Low-Complexity Bock Linear Smoothing Channel Estimation for SIMO-OFDM Systems without Cyclic Prefix

    Jung-Lang YU  Chia-Hao CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:4
      Page(s):
    1076-1083

    Orthogonal frequency-division multiplexing (OFDM) systems often use a cyclic prefix (CP) to simplify the equalization design at the cost of bandwidth efficiency. To increase the bandwidth efficiency, we study the blind equalization with linear smoothing [1] for single-input multiple-output (SIMO) OFDM systems without CP insertion in this paper. Due to the block Toeplitz structure of channel matrix, the block matrix scheme is applied to the linear smoothing channel estimation, which equivalently increases the number of sample vectors and thus reduces the perturbation of sample autocorrelation matrix. Compared with the linear smoothing and subspace methods, the proposed block linear smoothing requires the lowest computational complexity. Computer simulations show that the block linear smoothing yields a channel estimation error smaller than that from linear smoothing, and close to that of the subspace method. Evaluating by the minimum mean-square error (MMSE) equalizer, the block linear smoothing and subspace methods have nearly the same bit-error-rates (BERs).

  • VLA-MAC: A Variable Load Adaptive MAC Protocol for Wireless Sensor Networks

    Guoliang YAO  Hao LIU  Hao CHEN  Longxin SHI  

     
    LETTER-Network

      Vol:
    E92-B No:8
      Page(s):
    2735-2738

    This letter presents VLA-MAC, a novel adaptive MAC protocol for wireless sensor networks that can achieve high energy efficiency and low latency in variable load conditions. In VLA-MAC, traffic load is measured online and utilized for adaptive adjustment. VLA-MAC transmits packets via a burst style to alleviate packets accumulation problem and achieve low latency in high load condition. Furthermore, it also saves obvious energy by removing unnecessary listen period in low load condition. Unlike current approach, VLA-MAC does not need to adjust duty-cycle according to load online. Simulation results based on ns-2 show the performance improvements of our protocol.

1-20hit(31hit)