The search functionality is under construction.

Author Search Result

[Author] Hui CHEN(19hit)

1-19hit
  • A Preemptive Priority Scheme for Collision Resolution in HFC Networks

    Jenhui CHEN  Shiann-Tsong SHEU  Sheng-Kun SHEN  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E87-B No:10
      Page(s):
    2859-2870

    The hybrid fiber coax (HFC) technology enables the conventional cable-television (CATV) network to provide subscribers with Internet access services. In this paper, we propose a new preemptive priority scheme (PPS) for IEEE 802.14 hybrid fiber coax (HFC) networks with the intelligent nodes (INs). The INs are placed between the headend controller and stations. By using INs, that stand for downstream subscribers to contend for the demand resources, the collision probability, and the collision resolving period can be reduced. In this paper, we further extend such network architecture to support multi-priority access. In each IN or individual station, the proposed PPS will prevent a higher priority request from colliding with requests of lower priority. Moreover, in PPS, the granted bandwidth for lower priority requests can be preempted by the waiting request with higher priority. This will speedup the channel capture by priority data. The efficiency of PPS is investigated by simulations. Simulation results show that by adopting INs with PPS to be an agent for subscribers can not only shorten the collision resolving period but also minimize the average request delay of priority data.

  • A Broadcast Engagement ACK Mechanism for Reliable Broadcast Transmission in Mobile Ad Hoc Networks

    Jenhui CHEN  Muwen HUANG  

     
    PAPER

      Vol:
    E88-B No:9
      Page(s):
    3570-3578

    How to safely or reliably flood a packet via broadcast scheme to all nodes in computer networks is an important issue. However, it is a big challenge and critical problem to broadcast data packets over mobile ad hoc networks reliably due to the unsettled wireless links, high mobility, and the lack of the acknowledgment (ACK) scheme. Many solutions deal with this problem by adopting multiple unicast transmissions to achieve reliable broadcast transmission in network layer. Unfortunately, it will cause severe duplicate transmissions and thus rapidly consume the limited network bandwidth. One simplest way to solve this drawback is to broadcast data packets in data link layer. But a serious problem will be arisen that replied ACK frames will collide at the sending node if we enforce each mobile node to reply an ACK after receiving the broadcast data frame. Therefore, in order to overcome the thorny problem, we proposed a broadcast engagement ACK mechanism (BEAM), which is completely compatible with the IEEE 802.11 protocol, for reliable broadcast transmission in the data link layer. We also show that the overhead of raising the reliability of broadcast transmission in network layer would be significantly reduced in data link layer. Simulation results show that the proposed BEAM can reach approximate 100% reliability even in heavy traffic load. We also indicate that the BEAM could be combined with other network layer broadcast schemes to approach higher flooding ratio as well as reduce bandwidth consumption effectively.

  • A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    Albert JENG  Li-Chung CHANG  Sheng-Hui CHEN  

     
    PAPER-Key Management

      Vol:
    E91-D No:5
      Page(s):
    1408-1415

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e.g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e.g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  • Robust DOA Estimation for Uncorrelated and Coherent Signals

    Hui CHEN  Qun WAN  Hongyang CHEN  Tomoaki OHTSUKI  

     
    LETTER-Digital Signal Processing

      Vol:
    E94-A No:10
      Page(s):
    2035-2038

    A new direction of arrival (DOA) estimation method is introduced with arbitrary array geometry when uncorrelated and coherent signals coexist. The DOAs of uncorrelated signals are first estimated via subspace-based high resolution DOA estimation technique. Then a matrix that only contains the information of coherent signals can be formulated by eliminating the contribution of uncorrelated signals. Finally a subspace block sparse reconstruction approach is taken for DOA estimations of the coherent signals.

  • Software Creation: An Intelligent CASE Tool Featuring Automatic Design for Structured Programming

    Hui CHEN  Nagayasu TSUTSUMI  Hideki TAKANO  Zenya KOONO  

     
    PAPER-Application

      Vol:
    E81-D No:12
      Page(s):
    1439-1449

    This paper reports on an Intelligent CASE tool, applicable in a structured programming phase, or from detailed design to coding. This is automation of the bottom level in the hierarchical design process of detailed design and coding, where the largest man-hours are consumed. The main idea is that human designers use a CASE tool for the initial design of a software system, and the design knowledge is automatically acquired from the structured charts and stored in the knowledge base. The acquired design knowledge may be reused in designs. By reusing it, a similar software system may be designed automatically. It has been shown that knowledge acquired in this way has a Logarithmic Learning Effect. Based on this, a quantitative evaluation of productivity is made. By accumulating design experiences (e. g. 10 times), more than 80% of the detailing designs are performed automatically, and productivity increases by up to 4 times. This tool features universality, an essentially zero start-up cost for automatic design, and a substantial increase in software productivity after enough experiences have been accumulated. This paper proposes a new basic idea and its implementation, a quantitative evaluation applying techniques from Industrial Engineering, which proves the effectiveness of the proposed system.

  • Silicon Photonics Research in Hong Kong: Microresonator Devices and Optical Nonlinearities

    Andrew W. POON  Linjie ZHOU  Fang XU  Chao LI  Hui CHEN  Tak-Keung LIANG  Yang LIU  Hon K. TSANG  

     
    INVITED PAPER

      Vol:
    E91-C No:2
      Page(s):
    156-166

    In this review paper we showcase recent activities on silicon photonics science and technology research in Hong Kong regarding two important topical areas--microresonator devices and optical nonlinearities. Our work on silicon microresonator filters, switches and modulators have shown promise for the nascent development of on-chip optoelectronic signal processing systems, while our studies on optical nonlinearities have contributed to basic understanding of silicon-based optically-pumped light sources and helium-implanted detectors. Here, we review our various passive and electro-optic active microresonator devices including (i) cascaded microring resonator cross-connect filters, (ii) NRZ-to-PRZ data format converters using a microring resonator notch filter, (iii) GHz-speed carrier-injection-based microring resonator modulators and 0.5-GHz-speed carrier-injection-based microdisk resonator modulators, and (iv) electrically reconfigurable microring resonator add-drop filters and electro-optic logic switches using interferometric resonance control. On the nonlinear waveguide front, we review the main nonlinear optical effects in silicon, and show that even at fairly modest average powers two-photon absorption and the accompanied free-carrier linear absorption could lead to optical limiting and a dramatic reduction in the effective lengths of nonlinear devices.

  • GAN-SR Anomaly Detection Model Based on Imbalanced Data

    Shuang WANG  Hui CHEN  Lei DING  He SUI  Jianli DING  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2023/04/13
      Vol:
    E106-D No:7
      Page(s):
    1209-1218

    The issue of a low minority class identification rate caused by data imbalance in anomaly detection tasks is addressed by the proposal of a GAN-SR-based intrusion detection model for industrial control systems. First, to correct the imbalance of minority classes in the dataset, a generative adversarial network (GAN) processes the dataset to reconstruct new minority class training samples accordingly. Second, high-dimensional feature extraction is completed using stacked asymmetric depth self-encoder to address the issues of low reconstruction error and lengthy training times. After that, a random forest (RF) decision tree is built, and intrusion detection is carried out using the features that SNDAE retrieved. According to experimental validation on the UNSW-NB15, SWaT and Gas Pipeline datasets, the GAN-SR model outperforms SNDAE-SVM and SNDAE-KNN in terms of detection performance and stability.

  • Authors' Reply to the Comments by Kamata et al.

    Bo ZHOU  Benhui CHEN  Jinglu HU  

     
    WRITTEN DISCUSSION

      Pubricized:
    2023/05/08
      Vol:
    E106-A No:11
      Page(s):
    1446-1449

    We thank Kamata et al. (2023) [1] for their interest in our work [2], and for providing an explanation of the quasi-linear kernel from a viewpoint of multiple kernel learning. In this letter, we first give a summary of the quasi-linear SVM. Then we provide a discussion on the novelty of quasi-linear kernels against multiple kernel learning. Finally, we explain the contributions of our work [2].

  • An Adaptive Niching EDA with Balance Searching Based on Clustering Analysis

    Benhui CHEN  Jinglu HU  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E93-A No:10
      Page(s):
    1792-1799

    For optimization problems with irregular and complex multimodal landscapes, Estimation of Distribution Algorithms (EDAs) suffer from the drawback of premature convergence similar to other evolutionary algorithms. In this paper, we propose an adaptive niching EDA based on Affinity Propagation (AP) clustering analysis. The AP clustering is used to adaptively partition the niches and mine the searching information from the evolution process. The obtained information is successfully utilized to improve the EDA performance by using a balance niching searching strategy. Two different categories of optimization problems are used to evaluate the proposed adaptive niching EDA. The first one is solving three benchmark functional multimodal optimization problems by a continuous EDA based on single Gaussian probabilistic model; the other one is solving a real complicated discrete EDA optimization problem, the HP model protein folding based on k-order Markov probabilistic model. Simulation results show that the proposed adaptive niching EDA is an efficient method.

  • Four Classes of Bivariate Permutation Polynomials over Finite Fields of Even Characteristic Open Access

    Changhui CHEN  Haibin KAN  Jie PENG  Li WANG  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2023/10/17
      Vol:
    E107-A No:7
      Page(s):
    1045-1048

    Permutation polynomials have important applications in cryptography, coding theory and combinatorial designs. In this letter, we construct four classes of permutation polynomials over 𝔽2n × 𝔽2n, where 𝔽2n is the finite field with 2n elements.

  • Geographic Channel Assignment Framework for Broadband Wireless Access Networks

    Jenhui CHEN  Chih-Chieh WANG  Jiann-Der LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:11
      Page(s):
    3160-3163

    This letter proposes a novel geographic channel assignment (GCA) framework for dynamic channel allocation (DCA) in broadband wireless access networks (BWANs). The proposed GCA scheme is based on the characteristics of radio propagation, which focuses on the relationship between transmission distances and communication parameters, e.g., signal-to-noise ratio (SNR) etc., and uses a signal-aware distance estimation scheme to determinate an appropriate channel for communication. This method significantly increases the capacity of the BWA system. Simulation results show that the GCA framework can yield approximate two times throughput of the IEEE 802.16 standard specifications as well as obtain significantly lower call blocking probability compared with classical channel assignment methods.

  • Analysis of Cell Range Expansion with TDM ICIC in Heterogeneous Cellular Networks

    Weiqiang LIU  Xiaohui CHEN  Weidong WANG  

     
    PAPER-Network

      Vol:
    E96-B No:7
      Page(s):
    1865-1873

    This work investigates the cell range expansion (CRE) possible with time-domain multiplexing inter-cell interference coordination (TDM ICIC) in heterogeneous cellular networks (HCN). CRE is proposed to enable a user to connect to a picocell even when it is not the cell with the strongest received power. However, the users in the expanded region suffer severe interference from the macrocells. To alleviate the cross-tier interference, TDM ICIC is proposed to improve the SIR of pico users. In contrast to previous studies on CRE with TDM ICIC, which rely mostly on simulations, we give theoretical analysis results for different types of users in HCN with CRE and TDM ICIC under the Poisson Point Process (PPP) model, especially for the users in the expanded region of picocells. We analyze the outage probability and average ergodic rate based on the connect probability and statistical distance we obtain in advance. Furthermore, we analyze the optimal ratio of almost blank subframes (ABS) and bias factor of picocells in terms of the network fairness, which is useful in the parameter design of a two-tier HCN.

  • A Deep Neural Network Based Quasi-Linear Kernel for Support Vector Machines

    Weite LI  Bo ZHOU  Benhui CHEN  Jinglu HU  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E99-A No:12
      Page(s):
    2558-2565

    This paper proposes a deep quasi-linear kernel for support vector machines (SVMs). The deep quasi-linear kernel can be constructed by using a pre-trained deep neural network. To realize this goal, a multilayer gated bilinear classifier is first designed to mimic the functionality of the pre-trained deep neural network, by generating the gate control signals using the deep neural network. Then, a deep quasi-linear kernel is derived by applying an SVM formulation to the multilayer gated bilinear classifier. In this way, we are able to further implicitly optimize the parameters of the multilayer gated bilinear classifier, which are a set of duplicate but independent parameters of the pre-trained deep neural network, by using an SVM optimization. Experimental results on different data sets show that SVMs with the proposed deep quasi-linear kernel have an ability to take advantage of the pre-trained deep neural networks and outperform SVMs with RBF kernels.

  • Software Creation: A Study on the Inside of Human Design Knowledge

    Hassan ABOLHASSANI  Hui CHEN  Behrouz Homayoun FAR  Zenya KOONO  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    648-658

    This paper discusses the characteristics of human design knowledge. By studying a number of actual human made designs of excellent designers, the most frequent basic mental operations of a typical human designer have been found. They are: a design rule for hierarchical detailing reported previously, a micro design rule for generating a hierarchical expansion, dictionary operations to build a micro design rule and dictionaries. This study assumes a multiplicity of knowledge based on Zipf's theory, "the principle of least effort. " Zipf's principle may be proved and it becomes possible to understand the fundamental nature of human design.

  • A Reliable Broadcast/Multicast Scheme for Multihop Mobile Ad Hoc Networks

    Jenhui CHEN  Shiann-Tsong SHEU  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E89-B No:3
      Page(s):
    867-878

    In wired networks, broadcast and multicast transmissions can be easily achieved by data link layer (layer 2). Nevertheless, it is a big challenge to safely transfer broadcast or multicast data frames over multihop mobile ad hoc networks (MANETs) due to the high bit error rate, the high collision probability and the lack of acknowledgment. Additionally, most of MANET's routing protocols rely on the broadcast function to exchange essential routing packets between mobile nodes and need the multicast function to make more efficient use of network bandwidth for some particular multimedia applications. From our observations, the efficiency of the unicast/multicast routing protocol of finding the path/tree is highly dependent on supported broadcast schemes of the underlying media access control (MAC) protocol. Therefore, in this paper, we illustrate the uncertain broadcast problem due to no replying acknowledgment from any recipients when mobile nodes deliver broadcast frames in wireless networks. We, then, propose a novel reliable broadcast scheme to solve this problem as well as a reliable multicast scheme to enhance the network utilization in data link layer. Simulation results show that the proposed scheme, which is still compatible with IEEE 802.11 standard, can efficiently minimize the bandwidth consumption as well as propagation delay.

  • Quasi-Linear Support Vector Machine for Nonlinear Classification

    Bo ZHOU  Benhui CHEN  Jinglu HU  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E97-A No:7
      Page(s):
    1587-1594

    This paper proposes a so called quasi-linear support vector machine (SVM), which is an SVM with a composite quasi-linear kernel. In the quasi-linear SVM model, the nonlinear separation hyperplane is approximated by multiple local linear models with interpolation. Instead of building multiple local SVM models separately, the quasi-linear SVM realizes the multi local linear model approach in the kernel level. That is, it is built exactly in the same way as a single SVM model, by composing a quasi-linear kernel. A guided partitioning method is proposed to obtain the local partitions for the composition of quasi-linear kernel function. Experiment results on artificial data and benchmark datasets show that the proposed method is effective and improves classification performances.

  • Software Creation: Clich as Intermediate Knowledge in Software Design

    Hassan ABOLHASSANI  Hui CHEN  Zenya KOONO  

     
    PAPER-Software Engineering

      Vol:
    E85-D No:1
      Page(s):
    221-232

    This paper reports on clich and related mechanisms appearing in a process of human design of software. During studies on human design knowledge, the authors found frequent instance of same pattern of detailing, named clich. In our study, clich is an intermediate level of design knowledge, during a hierarchical detailing step, residing in between simple reuse and creation by micro design rules, which have already been reported. These three kinds of design knowledge are of various types and have different complexities. Discussions on them, focusing on clich type, with procedures of formation of a simple clich skeleton and generation of a clich are given. The studies show a working model of Zipf's principle, and are some trials to reveal a more detail of human designs.

  • High-Temperature Operation of Photonic-Crystal Lasers for On-Chip Optical Interconnection Open Access

    Koji TAKEDA  Tomonari SATO  Takaaki KAKITSUKA  Akihiko SHINYA  Kengo NOZAKI  Chin-Hui CHEN  Hideaki TANIYAMA  Masaya NOTOMI  Shinji MATSUO  

     
    PAPER

      Vol:
    E95-C No:7
      Page(s):
    1244-1251

    To meet the demand for light sources for on-chip optical interconnections, we demonstrate the continuous-wave (CW) operation of photonic-crystal (PhC) nanocavity lasers at up to 89.8 by using InP buried heterostructures (BH). The wavelength of a PhC laser can be precisely designed over a wide range exceeding 100 nm by controlling the lattice constant of the PhC. The dynamic responses of the PhC laser are also demonstrated with a 3-dB bandwidth of over 7.0 GHz at 66.2. These results reveal the laser's availability for application to wavelength division multiplexed (WDM) optical interconnection on CMOS chips. We discuss the total bandwidths of future on-chip optical interconnections, and report the capabilities of PhC lasers.

  • Delay-Oriented Routing Protocol for Wireless Ad Hoc Networks

    Shiann-Tsong SHEU  Tihjia TSAI  Jenhui CHEN  

     
    PAPER

      Vol:
    E84-B No:6
      Page(s):
    1581-1587

    In wireless ad hoc mobile network, a host desires to communicate with another host may need some intermediate nodes to relay data packets. To maximize the channel resource utilization and minimize the network transfer delay along the path, the shortest path with minimum hops approach is often adapted. However, by considering the employing medium access control (MAC) protocol, the minimum transfer delay from source to destination may be achieved by choosing a longer path but with less contention delay. In this paper, we will propose an efficient delay-oriented routing protocol for mobile ad hoc wireless networks. The expected access contention delay of IEEE 802.11 protocol is analyzed to support the routing decision. Simulation results show that the derived path length in proposed delay-oriented routing protocol is slightly higher than that of conventional shortest path with minimum hops approach but it can significantly reduce both average transfer delay and packet loss rate.