The search functionality is under construction.

Author Search Result

[Author] Jun LI(74hit)

1-20hit(74hit)

  • Unbiased Interference Suppression Method Based on Spectrum Compensation Open Access

    Jian WU  Xiaomei TANG  Zengjun LIU  Baiyu LI  Feixue WANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/07/16
      Vol:
    E103-B No:1
      Page(s):
    52-59

    The major weakness of global navigation satellite system receivers is their vulnerability to intentional and unintentional interference. Frequency domain interference suppression (FDIS) technology is one of the most useful countermeasures. The pseudo-range measurement is unbiased after FDIS filtering given an ideal analog channel. However, with the influence of the analog modules used in RF front-end, the amplitude response and phase response of the channel equivalent filter are non-ideal, which bias the pseudo-range measurement after FDIS filtering and the bias varies along with the frequency of the interference. This paper proposes an unbiased interference suppression method based on signal estimation and spectrum compensation. The core idea is to use the parameters calculated from the tracking loop to estimate and reconstruct the desired signal. The estimated signal is filtered by the equivalent filter of actual channel, then it is used for compensating the spectrum loss caused by the FDIS method in the frequency domain. Simulations show that the proposed algorithm can reduce the pseudo-range measurement bias significantly, even for channels with asymmetrical group delay and multiple interference sources at any location.

  • Failure Microscope: Precisely Diagnosing Routing Instability

    Hongjun LIU  Baokang ZHAO  Xiaofeng HU  Dan ZHAO  Xicheng LU  

     
    PAPER-Information Network

      Vol:
    E96-D No:4
      Page(s):
    918-926

    Root cause analysis of BGP updates is the key to debug and troubleshoot BGP routing problems. However, it is a challenge to precisely diagnose the cause and the origin of routing instability. In this paper, we are the first to distinguish link failure events from policy change events based on BGP updates from single vantage points by analyzing the relationship of the closed loops formed through intersecting all the transient paths during instability and the length variation of the stable paths after instability. Once link failure events are recognized, their origins are precisely inferred with 100% accuracy. Through simulation, our method is effective to distinguish link failure events from link restoration events and policy related events, and reduce the size of candidate set of origins.

  • Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames

    Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  

     
    PAPER-Information Network

      Pubricized:
    2018/07/02
      Vol:
    E101-D No:10
      Page(s):
    2465-2473

    With the development of wireless network technology and popularization of mobile devices, the Wireless Local Area Network (WLAN) has become an indispensable part of our daily life. Although the 802.11-based WLAN provides enormous convenience for users to access the Internet, it also gives rise to a number of security issues. One of the most severe threat encountered by Wi-Fi users is the evil twin attacks. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Due to the characteristics of strong concealment, high confusion, great harmfulness and easy implementation, the evil twin has led to significant loss of sensitive information and become one of the most prominent security threats in recent years. In this paper, we propose a passive client-based detection solution that enables users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.

  • An Efficient Selective Receiver Switching Scheme for STBC with Full Code Rate and Non Orthogonal Design

    Lijun LIU  Myoung-Seob LIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:6
      Page(s):
    2041-2044

    In the design of Space Time Block Coding (STBC), for an arbitrary complex signal constellation with a size above 2 as well as a real signal matrix with a size above 8, it is difficult to acquire full code rate and full transmit diversity simultaneously. In this letter, an efficient selective receiver switching scheme is proposed for STBC with the full code rate and non-orthogonal design with the example of a 4-by-4 matrix. In the proposed scheme with the aid of beamforming, we divide the received signals into two groups according to the encoded matrix. By this way, we can eliminate the interference from the neighboring signals by more than half.

  • Optimal Mutually Orthogonal ZCZ Polyphase Sequence Sets

    Fanxin ZENG  Xiping HE  Guixin XUAN  Wenchao ZHANG  Guojun LI  Zhenyu ZHANG  Yanni PENG  Sheng LU  Li YAN  

     
    LETTER-Information Theory

      Vol:
    E101-A No:10
      Page(s):
    1713-1718

    In an approximately synchronized (AS) code-division multiple-access (CDMA) communication system, zero correlation zone (ZCZ) sequences can be used as its spreading sequences so that the system suppresses multiple access interference (MAI) and multi-path interference (MPI) fully and synchronously. In this letter, the mutually orthogonal (MO) ZCZ polyphase sequence sets proposed by one of the authors are improved, and the resultant ZCZ sequences in each set arrive at the theoretical bound regarding ZCZ sequences under some conditions. Therefore, the improved MO ZCZ sequence sets are optimal.

  • Behavioral Equivalence of Security-Oriented Interactive Systems

    Guanjun LIU  Changjun JIANG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2061-2068

    In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.

  • Pre-Allocation Based Flow Control Scheme for Networks-On-Chip

    Shijun LIN  Li SU  Haibo SU  Depeng JIN  Lieguang ZENG  

     
    LETTER-VLSI Systems

      Vol:
    E92-D No:3
      Page(s):
    538-540

    Based on the traffic predictability characteristic of Networks-on-Chip (NoC), we propose a pre-allocation based flow control scheme to improve the performance of NoC. In this scheme, routes are pre-allocated and the injection rates of all routes are regulated at the traffic sources according to the average available bandwidths in the links. Then, the number of packets in the network is decreased and thus, the congestion probability is reduced and the communication performance is improved. Simulation results show that this scheme greatly increases the throughput and cuts down the average latency with little area and energy overhead, compared with the switch-to-switch flow control scheme.

  • SLA_Driven Adaptive Resource Allocation for Virtualized Servers

    Wei ZHANG  Li RUAN  Mingfa ZHU  Limin XIAO  Jiajun LIU  Xiaolan TANG  Yiduo MEI  Ying SONG  Yuzhong SUN  

     
    PAPER-Computer System and Services

      Vol:
    E95-D No:12
      Page(s):
    2833-2843

    In order to reduce cost and improve efficiency, many data centers adopt virtualization solutions. The advent of virtualization allows multiple virtual machines hosted on a single physical server. However, this poses new challenges for resource management. Web workloads which are dominant in data centers are known to vary dynamically with time. In order to meet application's service level agreement (SLA), how to allocate resources for virtual machines has become an important challenge in virtualized server environments, especially when dealing with fluctuating workloads and complex server applications. User experience is an important manifestation of SLA and attracts more attention. In this paper, the SLA is defined by server-side response time. Traditional resource allocation based on resource utilization has some drawbacks. We argue that dynamic resource allocation directly based on real-time user experience is more reasonable and also has practical significance. To address the problem, we propose a system architecture that combines response time measurements and analysis of user experience for resource allocation. An optimization model is introduced to dynamically allocate the resources among virtual machines. When resources are insufficient, we provide service differentiation and firstly guarantee resource requirements of applications that have higher priorities. We evaluate our proposal using TPC-W and Webbench. The experimental results show that our system can judiciously allocate system resources. The system helps stabilize applications' user experience. It can reduce the mean deviation of user experience from desired targets.

  • 2-D DOA Estimation of Multiple Signals Based on Sparse L-Shaped Array

    Zhi ZHENG  Yuxuan YANG  Wen-Qin WANG  Guangjun LI  Jiao YANG  Yan GE  

     
    PAPER-DOA Estimation

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    383-391

    This paper proposes a novel method for two-dimensional (2-D) direction-of-arrival (DOA) estimation of multiple signals employing a sparse L-shaped array structured by a sparse linear array (SLA), a sparse uniform linear array (SULA) and an auxiliary sensor. In this method, the elevation angles are estimated by using the SLA and an efficient search approach, while the azimuth angle estimation is performed in two stages. In the first stage, the rough azimuth angle estimates are obtained by utilizing a noise-free cross-covariance matrix (CCM), the estimated elevation angles and data from three sensors including the auxiliary sensor. In the second stage, the fine azimuth angle estimates can be achieved by using the shift-invariance property of the SULA and the rough azimuth angle estimates. Without extra pair-matching process, the proposed method can achieve automatic pairing of the 2-D DOA estimates. Simulation results show that our approach outperforms the compared methods, especially in the cases of low SNR, snapshot deficiency and multiple sources.

  • Hybridizing Dragonfly Algorithm with Differential Evolution for Global Optimization Open Access

    MeiJun DUAN  HongYu YANG  Bo YANG  XiPing WU  HaiJun LIANG  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2019/07/17
      Vol:
    E102-D No:10
      Page(s):
    1891-1901

    Due to its simplicity and efficiency, differential evolution (DE) has gained the interest of researchers from various fields for solving global optimization problems. However, it is prone to premature convergence at local minima. To overcome this drawback, a novel hybrid dragonfly algorithm with differential evolution (Hybrid DA-DE) for solving global optimization problems is proposed. Firstly, a novel mutation operator is introduced based on the dragonfly algorithm (DA). Secondly, the scaling factor (F) is adjusted in a self-adaptive and individual-dependent way without extra parameters. The proposed algorithm combines the exploitation capability of DE and exploration capability of DA to achieve optimal global solutions. The effectiveness of this algorithm is evaluated using 30 classical benchmark functions with sixteen state-of-the-art meta-heuristic algorithms. A series of experimental results show that Hybrid DA-DE outperforms other algorithms significantly. Meanwhile, Hybrid DA-DE has the best adaptability to high-dimensional problems.

  • Modular Serial Pipelined Sorting Architecture for Continuous Variable-Length Sequences with a Very Simple Control Strategy

    Tingting CHEN  Weijun LI  Feng YU  Qianjian XING  

     
    LETTER-Circuit Theory

      Vol:
    E100-A No:4
      Page(s):
    1074-1078

    A modular serial pipelined sorting architecture for continuous input sequences is presented. It supports continuous sequences, whose lengths can be dynamically changed, and does so using a very simple control strategy. It consists of identical serial cascaded sorting cells, and lends itself to high frequency implementation with any number of sorting cells, because both data and control signals are pipelined. With L cascaded sorting cells, it produces a fully sorted result for sequences whose length N is equal to or less than L+1; for longer sequences, the largest L elements are sorted out. Being modularly designed, several independent smaller sorters can be dynamically configured to form a larger sorter.

  • Improve the Prediction of Student Performance with Hint's Assistance Based on an Efficient Non-Negative Factorization

    Ke XU  Rujun LIU  Yuan SUN  Keju ZOU  Yan HUANG  Xinfang ZHANG  

     
    PAPER

      Pubricized:
    2017/01/17
      Vol:
    E100-D No:4
      Page(s):
    768-775

    In tutoring systems, students are more likely to utilize hints to assist their decisions about difficult or confusing problems. In the meanwhile, students with weaker knowledge mastery tend to choose more hints than others with stronger knowledge mastery. Hints are important assistances to help students deal with questions. Students can learn from hints and enhance their knowledge about questions. In this paper we firstly use hints alone to build a model named Hints-Model to predict student performance. In addition, matrix factorization (MF) has been prevalent in educational fields to predict student performance, which is derived from their success in collaborative filtering (CF) for recommender systems (RS). While there is another factorization method named non-negative matrix factorization (NMF) which has been developed over one decade, and has additional non-negative constrains on the factorization matrices. Considering the sparseness of the original matrix and the efficiency, we can utilize an element-based matrix factorization called regularized single-element-based NMF (RSNMF). We compared the results of different factorization methods to their combination with Hints-Model. From the experiment results on two datasets, we can find the combination of RSNMF with Hints-Model has achieved significant improvement and obtains the best result. We have also compared the Hints-Model with the pioneer approach performance factor analysis (PFA), and the outcomes show that the former method exceeds the later one.

  • A Dual-Port Access Structure of 3D Mesh-Based NoC

    Yuanyuan ZHANG  Shijun LIN  Li SU  Depeng JIN  Lieguang ZENG  

     
    LETTER-Computer System

      Vol:
    E93-D No:7
      Page(s):
    1987-1990

    Since the length of wires between different layers, even between the top and bottom layers, is acceptably small in 3D mesh-based NoC (three-Dimensional mesh-based Network on Chip), a structure in which an IP (Intelligence Property) core in a certain layer directly connected to a proper router in another layer may efficiently decrease the average latency of messages and increase the maximum throughput. With this idea, in the paper, we introduce a dual-port access structure, in which each IP core except that in the bottom layer is connected to two routers in two adjacent layers, and, in particular, the IP core in the bottom layer can be directly connected to the proper router in the top layer. Furthermore, we derive the close form expression of the average number of hops of messages and also give the quantitative analysis of the performance when the dual-port access structure is used. All the analytical results reveal that the average number of hops is reduced and the system performance is improved, including a decrease of average latency and an increase of maximum throughput. Finally, the simulation results confirm our theoretical analysis and show the advantage of the proposed dual-port access structure with a relatively small increment of area overhead.

  • Extended Selective Encoding of Scan Slices for Reducing Test Data and Test Power

    Jun LIU  Yinhe HAN  Xiaowei LI  

     
    PAPER-Information Network

      Vol:
    E93-D No:8
      Page(s):
    2223-2232

    Test data volume and test power are two major concerns when testing modern large circuits. Recently, selective encoding of scan slices is proposed to compress test data. This encoding technique, unlike many other compression techniques encoding all the bits, only encodes the target-symbol by specifying a single bit index and copying group data. In this paper, we propose an extended selective encoding which presents two new techniques to optimize this method: a flexible grouping strategy, X bits exploitation and filling strategy. Flexible grouping strategy can decrease the number of groups which need to be encoded and improve test data compression ratio. X bits exploitation and filling strategy can exploit a large number of don't care bits to reduce testing power with no compression ratio loss. Experimental results show that the proposed technique needs less test data storage volume and reduces average weighted switching activity by 25.6% and peak weighted switching activity by 9.68% during scan shift compared to selective encoding.

  • A Variable-Length Encoding Method to Prevent the Error Propagation Effect in Video Communication

    Linhua MA  Yilin CHANG  Jun LIU  Xinmin DU  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E89-D No:4
      Page(s):
    1592-1595

    A novel variable-length code (VLC), called alternate VLC (AVLC), is proposed, which employs two types of VLC to encode source symbols alternately. Its advantage is that it can not only stop the symbol error propagation effect, but also correct symbol insertion errors and symbol deletion errors, which is very important in video communication.

  • A Satellite Handover Strategy Based on Heuristic Algorithm for LEO Satellite Networks

    Senbai ZHANG  Aijun LIU  Chen HAN  Xiaohu LIANG  Xiang DING  Aihong LU  

     
    PAPER-Satellite Communications

      Pubricized:
    2022/01/13
      Vol:
    E105-B No:7
      Page(s):
    876-884

    Due to the significant difference in speed between the user terminals (UTs) and the low earth orbit (LEO) satellites, it is necessary to solve the frequent handover of UTs at the edge of the moving satellite beams. Besides, as the development of LEO satellite communications, the scale of constellations and the number of UTs undergoing massive increase. Thus, in this paper, a satellite handover strategy is proposed to improve the handover performances of UTs and satellites. We define the utility function of handover jointly by considering the quality of experience of UTs, the throughput of satellites and the load balancing of network. Then, a coding method is proposed to represent the combinations of UTs and satellites. To reduce the calculational cost, an access and handover strategy based on a heuristic algorithm is proposed to search the optimal handover result. Finally, simulations show the effectiveness and superiority of the proposed strategy.

  • A Note on Minimum Hamming Weights of Correlation-Immune Boolean Functions

    Qichun WANG  Yanjun LI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:2
      Page(s):
    464-466

    It is known that correlation-immune (CI) Boolean functions used in the framework of side channel attacks need to have low Hamming weights. In this letter, we determine all unknown values of the minimum Hamming weights of d-CI Boolean functions in n variables, for d ≤ 5 and n ≤ 13.

  • Waveform Optimization for MIMO Radar Based on Cramer-Rao Bound in the Presence of Clutter

    Hongyan WANG  Guisheng LIAO  Jun LI  Liangbing HU  Wangmei GUO  

     
    PAPER-Sensing

      Vol:
    E95-B No:6
      Page(s):
    2087-2094

    In this paper, we consider the problem of waveform optimization for multi-input multi-output (MIMO) radar in the presence of signal-dependent noise. A novel diagonal loading (DL) based method is proposed to optimize the waveform covariance matrix (WCM) for minimizing the Cramer-Rao bound (CRB) which improves the performance of parameter estimation. The resulting nonlinear optimization problem is solved by resorting to a convex relaxation that belongs to the semidefinite programming (SDP) class. An optimal solution to the initial problem is then constructed through a suitable approximation to an optimal solution of the relaxed one (in a least squares (LS) sense). Numerical results show that the performance of parameter estimation can be improved considerably by the proposed method compared to uncorrelated waveforms.

  • Speaker Adaptation Based on PARAFAC2 of Transformation Matrices for Continuous Speech Recognition

    Yongwon JEONG  Sangjun LIM  Young Kuk KIM  Hyung Soon KIM  

     
    LETTER-Speech and Hearing

      Vol:
    E96-D No:9
      Page(s):
    2152-2155

    We present an acoustic model adaptation method where the transformation matrix for a new speaker is given by the product of bases and a weight matrix. The bases are built from the parallel factor analysis 2 (PARAFAC2) of training speakers' transformation matrices. We perform continuous speech recognition experiments using the WSJ0 corpus.

  • A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/02/22
      Vol:
    E104-A No:9
      Page(s):
    1353-1356

    In this letter, we present a construction of bent functions which generalizes a work of Zhang et al. in 2016. Based on that, we obtain a cubic bent function in 10 variables and prove that, it has no affine derivative and does not belong to the completed Maiorana-McFarland class, which is opposite to all 6/8-variable cubic bent functions as they are inside the completed Maiorana-McFarland class. This is the first time a theoretical proof is given to show that the cubic bent functions in 10 variables can be outside the completed Maiorana-McFarland class. Before that, only a sporadic example with such properties was known by computer search. We also show that our function is EA-inequivalent to that sporadic one.

1-20hit(74hit)