The search functionality is under construction.

Author Search Result

[Author] Mengtian RONG(10hit)

1-10hit
  • Reduced Complexity Algorithm for QC-LDPC Coded Blind Frame Synchronization

    Yinghao QI  Tao LIU  Mengtian RONG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:4
      Page(s):
    1057-1061

    In this paper, we propose a reduced complexity algorithm for blind frame synchronization based on code-constraints in a quasi-cyclic low density parity check (QC-LDPC) coded system. It can be used for both hard and soft synchronizers. For soft synchronizers, we present a modified algorithm that achieves better performance at high signal to noise ratio (SNR). Analysis indicates that the proposed algorithm has low complexity for hardware implementation.

  • A Test-Bed of WiMAX and Wi-Fi Mesh for Shanghai Expo 2010

    Chao LIU  Mengtian RONG  

     
    LETTER

      Vol:
    E92-B No:3
      Page(s):
    807-810

    Broadband wireless networks are rapidly expanding over the world. To provide wireless broadband services for Shanghai Expo 2010, pre-research is launched and a test-bed has been developed, in which WiMAX and Wi-Fi mesh are involved. The test-bed shows that Wi-Fi mesh integrated with WiMAX is highly suitable for large-scale activities like the Olympic Games and the World Expo.

  • An Edge Dependent Weighted Filter for Video Deinterlacing

    Hao ZHANG  Mengtian RONG  Tao LIU  

     
    LETTER-Image

      Vol:
    E98-A No:2
      Page(s):
    788-791

    In this letter, we propose a new intra-field deinterlacing algorithm based on an edge dependent weighted filter (EDWF). The proposed algorithm consists of three steps: 1) calculating the gradients of three directions (45°, 90°, and 135°) in the local working window; 2) achieving the weights of the neighboring pixels by exploiting the edge information in the pixel gradients; 3) interpolating the missing pixel using the proposed EDWF interpolator. Compared with existing deinterlacing methods on different images and video sequences, the proposed algorithm improves the peak signal-to-noise-ratio (PSNR) while achieving better subjective quality.

  • Interim CRC: A Novel Method to Read Large-Size Data from Tags in RFID Systems

    Xiaodong DENG  Mengtian RONG  Tao LIU  

     
    PAPER-Network

      Vol:
    E95-B No:1
      Page(s):
    152-159

    Large capacity tags are becoming available to meet the demands of industry, but the UHF RFID protocol is unable to reliably and efficiently read large data sets from tags. First of all, large data sets are not well protected. The tag merely relies on 16-bit CRC for ensuring the validity of up to 4,096-bit user-specific data in EPCglobal C1G2 protocol. Furthermore, the reliability will be even worse if large capacity tags are implemented using semi-active technology which is likely to prevail among sensor-integrated RFID tags. Since semi-active tags greatly alleviate the performance limitation imposed by the turn-on power of the tag chip, backscattering signal of semi-active tags could be a serious challenge for most readers because it is much weaker than signals emitted by passive tags due to longer reading distance. In this paper, Interim CRC is presented to enhance transmission reliability and efficiency when the tag is backscattering a large data set. By taking advantage of Interim CRC, the large data set can be divided into several blocks, and 16-bit checksum is calculated over each block. The tag backscatters all blocks at the first time and only retransmits certain blocks if CRC error occurs in those blocks. The result of simulation shows that the reading error rate can be confined to a preset threshold and the accumulative total of transmitted data are greatly reduced if optimal block size and transmission times are complied with. The simulation also conclusively proves that semi-active tags derive even longer reading range from Interim CRC. In addition, Interim CRC is totally compliant with the EPCglobal C1G2 protocol. It fully makes use of CRC-16 encoder and does not involve any other data encoding schematics and hardware modifications.

  • Throughput Analysis of the IEEE 802.11 DCF under Both Saturated and Non-saturated Conditions

    Chao LIU  Mengtian RONG  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E92-B No:6
      Page(s):
    2168-2174

    The IEEE 802.11 standard has been extensively deployed all over the world. Many studies have been put on its performance, especially throughput. Most research focused on the analysis of saturated throughput, but non-saturated situation is more usual in practice. By extending a saturation throughput model, a concise and novel model is proposed in this paper, which can be used to analyze both saturated and non-saturated conditions. Moreover, the model can also deal with the heterogeneous condition, which allows stations to have different traffic. Different access mechanisms and packet payloads are used in simulation to validate it, and the results show that the model is accurate.

  • A Reliable Tag Anti-Collision Algorithm for Mobile Tags

    Xiaodong DENG  Mengtian RONG  Tao LIU  

     
    LETTER-Information Network

      Vol:
    E95-D No:5
      Page(s):
    1527-1530

    As RFID technology is being more widely adopted, it is fairly common to read mobile tags using RFID systems, such as packages on conveyer belt and unit loads on pallet jack or forklift truck. In RFID systems, multiple tags use a shared medium for communicating with a reader. It is quite possible that tags will exit the reading area without being read, which results in tag leaking. In this letter, a reliable tag anti-collision algorithm for mobile tags is proposed. It reliably estimates the expectation of the number of tags arriving during a time slot when new tags continually enter the reader's reading area and no tag leaves without being read. In addition, it gives priority to tags that arrived early among read cycles and applies the expectation of the number of tags arriving during a time slot to the determination of the number of slots in the initial inventory round of the next read cycle. Simulation results show that the reliability of the proposed algorithm is close to that of DFSA algorithm when the expectation of the number of tags entering the reading area during a time slot is a given, and is better than that of DFSA algorithm when the number of time slots in the initial inventory round of next read cycle is set to 1 assuming that the number of tags arriving during a time slot follows Poisson distribution.

  • A Dynamic Mobile Terminal Sleep Mode Operation Scheme Considering Packet Queue Length

    Hongkui SHI  Mengtian RONG  Ping LI  

     
    PAPER-Network

      Vol:
    E90-B No:9
      Page(s):
    2464-2471

    Due to the discontinuity of packet based traffic, the user terminals in next generation mobile telecommunications systems will be equipped with sleep mode operation functions for power saving purpose. The sleep mode parameters should be appropriately configured so that power consumption can be sufficiently decreased while packet queue length and packet delay are restricted within a demanded level. This paper proposes an adaptive sleep mode parameter configuration scheme which is able to jointly optimize the inactivity timer and sleep period in response to the variation of user traffic arrival pattern. The optimization target of this scheme is to minimize mobile terminal power consumption while ensuring that the mean downlink packet queue length do not exceed a certain threshold. Results of computer simulations prove that, the presented approach perfectly manages packet queue length restriction, packet delay control and power saving in a wide range of user packet inter-arrival rates both in single- and dual-service scenarios.

  • A Direction-Dependent Mobile Terminal Sleep Mode Operation Scheme

    Hongkui SHI  Mengtian RONG  Ping LI  

     
    LETTER-Network

      Vol:
    E90-B No:9
      Page(s):
    2596-2599

    Based on the mutuality between arrival moments of uplink and downlink messages, this paper proposes a scheme that assigns different time-out thresholds for mobile terminal sleep mode operation according to the direction of the message just processed. Simulation results prove that, this approach can increase the power saving factor of a mobile terminal without degrading QoS.

  • Inverse Distance Weighting Method Based on a Dynamic Voronoi Diagram for Thermal Reconstruction with Limited Sensor Data on Multiprocessors

    Xin LI  Mengtian RONG  Tao LIU  Liang ZHOU  

     
    PAPER-Electronic Components

      Vol:
    E94-C No:8
      Page(s):
    1295-1301

    With exponentially increasing power densities due to technology scaling and ever increasing demand for performance, chip temperature has become an important issue that limits the performance of computer systems. Typically, it is essential to use a set of on-chip thermal sensors to monitor temperatures during the runtime. The runtime thermal measurements are then employed by dynamic thermal management techniques to manage chip performance appropriately. In this paper, we propose an inverse distance weighting method based on a dynamic Voronoi diagram for the reconstruction of full thermal characterization of integrated circuits with non-uniform thermal sensor placements. Firstly we utilize the proposed method to transform the non-uniformly spaced samples to virtual uniformly spaced data. Then we apply three classical interpolation algorithms to reconstruct the full thermal signals in the uniformly spaced samples mode. To evaluate the effectiveness of our method, we develop an experiment for reconstructing full thermal status of a 16-core processor. Experimental results show that the proposed method significantly outperforms spectral analysis techniques, and can obtain full thermal characterization with an average absolute error of 1.72% using 9 thermal sensors per core.

  • Spectrum Partitioning and Relay Positioning for Cellular System Enhanced with Two-Hop Fixed Relay Nodes

    Ping LI  Mengtian RONG  Yisheng XUE  Dan YU  Lan WANG  Hongkui SHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3181-3188

    This paper investigates two issues of cellular engineering for cellular systems enhanced with two-hop fixed relay nodes (FRNs): spectrum partitioning and relay positioning, under the assumption of frequency reuse distance being equal to one. A channel-dependent spectrum partitioning scheme is proposed. According to this scheme, the ensemble mean of signal-to-interference-ratio on respective sets of links are taken into account to determine the bandwidths assigned to links connecting base station (BS) and FRNs, those connecting FRNs and mobile terminals (MTs) and those connecting BS and MTs. The proper FRN positioning is formulated as a constraint optimization problem, which tries to maximize the mean user data rate while at the same time ensures in probability 95% users being better served than in conventional cellular systems without relaying. It is demonstrated with computer simulations that FRN positioning has a strong impact on system performance. In addition, when FRNs can communicate with BS over line-of-sight channels the FRN enhanced cellular system with our proposed spectrum partitioning can remarkably outperform that with a known channel-borrowing based scheme and the conventional cellular systems without relaying. Simulation results also show that with proper FRN positioning the proposed spectrum partitioning scheme is robust against the unreliability of links connecting BS and FRNs.