The search functionality is under construction.

Author Search Result

[Author] Hua WU(11hit)

1-11hit
  • A Predictive Logistic Regression Based Doze Mode Energy-Efficiency Mechanism in EPON

    MohammadAmin LOTFOLAHI  Cheng-Zen YANG  I-Shyan HWANG  AliAkbar NIKOUKAR  Yu-Hua WU  

     
    PAPER-Information Network

      Pubricized:
    2017/12/18
      Vol:
    E101-D No:3
      Page(s):
    678-684

    Ethernet passive optical network (EPON) is one of the energy-efficient access networks. Many studies have been done to reach maximum energy saving in the EPON. However, it is a trade-off between achieving maximum energy saving and guaranteeing QoS. In this paper, a predictive doze mode mechanism in an enhanced EPON architecture is proposed to achieve energy saving by using a logistic regression (LR) model. The optical line terminal (OLT) in the EPON employs an enhanced Doze Manager practicing the LR model to predict the doze periods of the optical network units (ONUs). The doze periods are estimated more accurately based on the historical high-priority traffic information, and logistic regression DBA (LR-DBA) performs dynamic bandwidth allocation accordingly. The proposed LR-DBA mechanism is compared with a scheme without energy saving (IPACT) and another scheme with energy saving (GDBA). Simulation results show that LR-DBA effectively improves the power consumption of ONUs in most cases, and the improvement can be up to 45% while it guarantees the QoS metrics, such as the high-priority traffic delay and jitter.

  • New Infinite Classes of Optimal (υ, {k, 6}, 1, Q) Optical Orthogonal Codes via Quadratic Residues

    Xiaorun ZHONG  Dianhua WU  Pingzhi FAN  

     
    PAPER-Sequences

      Vol:
    E95-A No:11
      Page(s):
    1827-1834

    Variable-weight optical orthogonal codes (OOCs) were introduced by Yang for multi-media optical CDMA systems with multiple quality of service (QoS) requirements. Some works had been done on the existence of optimal (υ,W,1,Q)-OOCs for W ∈ {{3,4}, {3,5}, {4,5}}. In this paper, by using quadratic residues, seven new infinite classes of optimal (υ,{k,6},1,Q)-OOCs for k ∈ {3,4} are constructed.

  • New Classes of Optimal Variable-Weight Optical Orthogonal Codes Based on Cyclic Difference Families

    Dianhua WU  Pingzhi FAN  Xun WANG  Minquan CHENG  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2232-2238

    Variable-weight optical orthogonal code (OOC) was introduced by G-C Yang for multimedia optical CDMA systems with multiple quality of service (QoS) requirement. In this paper, a construction for optimal (υ, {3,4}, 1, {s/(s+1), 1/(s+1)})-OOCs is given. For s=2, it is proved that for each prime υ≡ 1(mod 24), there exists a (υ, {3,4}, 1, {2/3, 1/3})-OOC. A recursive construction for cyclic difference family is also presented. By using these constructions, a number of new infinite classes of optimal (υ, {3,4}, 1, Q)-OOCs for Q = {1/2, 1/2} and {2/3, 1/3} are constructed.

  • General Constructions for (υ,4,1) Optical Orthogonal Codes via Perfect Difference Families

    Jing JIANG  Dianhua WU  Pingzhi FAN  

     
    LETTER-Sequences

      Vol:
    E95-A No:11
      Page(s):
    1921-1925

    Optical orthogonal codes (OOCs) were introduced by Salehi, as signature sequences to facilitate multiple access in optical fibre networks. The existence of optimal (υ,3,1)-OOCs had been solved completely. Although there are some partial results, the existence of optimal (υ, 4, 1)-OOCs is far from settled. In this letter, three general constructions for (υ, 4, 1)-OOCs via perfect difference families are presented, new infinite classes of (υ, 4, 1)-OOCs are then obtained.

  • Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems

    Yizhi REN  Zelong LI  Lifeng YUAN  Zhen ZHANG  Chunhua SU  Yujuan WANG  Guohua WU  

     
    PAPER

      Pubricized:
    2021/11/30
      Vol:
    E105-D No:2
      Page(s):
    289-299

    The recommend system has been widely used in many web application areas such as e-commerce services. With the development of the recommend system, the HIN modeling method replaces the traditional bipartite graph modeling method to represent the recommend system. But several studies have already showed that recommend system is vulnerable to shilling attack (injecting attack). However, the effectiveness of how traditional shilling attack has rarely been studied directly in the HIN model. Moreover, no study has focused on how to enhance shilling attacks against HIN recommend system by using the high-level semantic information. This work analyzes the relationship between the high-level semantic information and the attacking effects in HIN recommend system. This work proves that attack results are proportional to the high-level semantic information. Therefore, we propose a heuristic attack method based on high-level semantic information, named Semantic Shilling Attack (SSA) on a HIN recommend system (HERec). This method injects a specific score into each selected item related to the target in semantics. It ensures transmitting the misleading information towards target items and normal users, and attempts to interfere with the effect of the recommend system. The experiment is dependent on two real-world datasets, and proves that the attacking effect is positively correlate with the number of meta-paths. The result shows that our method is more effective when compared with existing baseline algorithms.

  • Block Implementation of High-Speed IIR Adaptive Noise Canceller

    Xiaohua WU  Shang LI  Nobuaki TAKAHASHI  Tsuyoshi TAKEBE  

     
    PAPER

      Vol:
    E80-A No:3
      Page(s):
    466-471

    In this paper, a block implementation of high-speed IIR adaptive noise canceller is proposed. First, the block difference equation of an IIR filter is derived by the difference equation for high-speed signal processing. It is shown that the computational complexity for updating the coefficients of IIR adaptive filter can be reduced by using the relations between the elements of coefficient matrices of block difference equation. Secondly, the block implementation of IIR adaptive noise canceller is proposed in which the convergence rate is increased by successively adjusting filter Q-factors. Finally, the usefulness of proposed block implementation is verified by the computer simulations.

  • Constructions of Optimal (υ,{4,5,6},1,Q)-OOCs

    Xiyang LI  Pingzhi FAN  Dianhua WU  

     
    LETTER-Coding Theory

      Vol:
    E95-A No:3
      Page(s):
    669-672

    Optical code-division multiple-access (OCDMA) is a promising technique for multimedia transmission in fiber-optic local-area networks (LANs). Variable-weight optical orthogonal codes (OOCs) can be used for OCDMA networks supporting multiple quality of services (QoS). Most constructions for optimal variable-weight OOCs have focused on the case where the number of distinct Hamming weights of all codewords is equal to two, and the codewords of weight 3 are normally included. In this letter, four explicit constructions of optimal (υ,{4,5,6},1,Q)-OOCs are presented, and more new optimal (υ,{4,5,6},1,Q)-OOCs are obtained via recursive constructions. These improve the existing results on optimal variable-weight OOCs with at least three distinct Hamming weights and minimum Hamming weight 4.

  • New Classes of Optimal Variable-Weight Optical Orthogonal Codes with Hamming Weights 3 and 4

    Xiyang LI  Pingzhi FAN  Naoki SUEHIRO  Dianhua WU  

     
    PAPER-Sequences

      Vol:
    E95-A No:11
      Page(s):
    1843-1850

    Variable-weight optical orthogonal codes (OOCs) have application in multimedia optical code division multiple access (OCDMA) systems supporting multiple quality of services (QoS). In this paper, several combinatorial constructions for optimal variable-weight OOCs are presented explicitly. A useful recursive construction for optimal variable-weight OOCs is proposed as well. Based on these results, two new infinite classes of optimal variable-weight OOCs with Hamming weights 3 and 4 are obtained.

  • A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks

    Qiuhua WANG  Mingyang KANG  Guohua WU  Yizhi REN  Chunhua SU  

     
    PAPER-Network Security

      Pubricized:
    2019/10/16
      Vol:
    E103-D No:2
      Page(s):
    230-238

    Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.

  • Hybrid MIC/CPU Parallel Implementation of MoM on MIC Cluster for Electromagnetic Problems Open Access

    Yan CHEN  Yu ZHANG  Guanghui ZHANG  Xunwang ZHAO  ShaoHua WU  Qing ZHANG  XiaoPeng YANG  

     
    INVITED PAPER

      Vol:
    E99-C No:7
      Page(s):
    735-743

    In this paper, a Many Integrated Core Architecture (MIC) accelerated parallel method of moment (MoM) algorithm is proposed to solve electromagnetic problems in practical applications, where MIC means a kind of coprocessor or accelerator in computer systems which is used to accelerate the computation performed by Central Processing Unit (CPU). Three critical points are introduced in this paper in detail. The first one is the design of the parallel framework, which ensures that the algorithm can run on distributed memory platform with multiple nodes. The hybrid Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) programming model is designed to achieve the purposes. The second one is the out-of-core algorithm, which greatly breaks the restriction of MIC memory. The third one is the pipeline algorithm which overlaps the data movement with MIC computation. The pipeline algorithm successfully hides the communication and thus greatly enhances the performance of hybrid MIC/CPU MoM. Numerical result indicates that the proposed algorithm has good parallel efficiency and scalability, and twice faster performance when compared with the corresponding CPU algorithm.

  • An Efficient Strategy for Bit-Quad-Based Euler Number Computing Algorithm

    Bin YAO  Hua WU  Yun YANG  Yuyan CHAO  Atsushi OHTA  Haruki KAWANAKA  Lifeng HE  

     
    LETTER-Pattern Recognition

      Vol:
    E97-D No:5
      Page(s):
    1374-1378

    The Euler number of a binary image is an important topological property for pattern recognition, and can be calculated by counting certain bit-quads in the image. This paper proposes an efficient strategy for improving the bit-quad-based Euler number computing algorithm. By use of the information obtained when processing the previous bit quad, the number of times that pixels must be checked in processing a bit quad decreases from 4 to 2. Experiments demonstrate that an algorithm with our strategy significantly outperforms conventional Euler number computing algorithms.