The search functionality is under construction.

Author Search Result

[Author] Ming CHEN(48hit)

41-48hit(48hit)

  • Performance Analysis and Optimization of the Relay Multicast System with Space-Time Coding

    Nan WANG  Ming CHEN  Jianxin DAI  Xia WU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E97-A No:9
      Page(s):
    2005-2010

    In a sector of a single cell, due to the fading characteristic of wireless channels, several decode-and-forward relay stations are deployed to form a two-hop relay-assisted multicast system. We propose two schemes for the system, the first scheme combines the use of space-time code and distributed space-time code (DSTC), and the second one combines the use of DSTC and maximum ratio combining. We give an outage probability analysis for both of them. Based on this analysis, we manage to maximize the spectral efficiency under a preset outage probability confinement by finding out the optimal power allocation and relay location strategies. We use genetic algorithms to verify our analysis and numerical results show that the schemes proposed by us significantly outperform the scheme in previous work. We also show the effect of path loss exponent on the optimal strategy.

  • Connection Choice Codes

    Chih-Ming CHEN  Ying-ping CHEN  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:7
      Page(s):
    1350-1357

    Luby Transform (LT) codes are the first practical implementation of digital fountain codes. In LT codes, encoding symbols are independently generated so as to realize the universal property which means that performance is independent of channel parameters. The universal property makes LT codes able to provide reliable delivery simultaneously via channels of different quality while it may also limit the flexibility of LT codes. In certain application scenarios, such as real-time multimedia transmission, most receivers have tolerable channels whose erasure rates are not fixed, and channels of high erasure rate are outside the design box. In this paper, Connection Choice (CC) codes are proposed to trade the universal property for better performance. The key to CC codes is replacement of random selection with tournament selection. Tournament selection can equalize the frequency of input symbols to join encoding and change the degree distribution of input symbols. Our study indicates that CC codes with appropriate degree distributions provide better performance than the best known LT code when channels of high erasure rate can be ignored. CC codes enable system designers to customize digital fountain codes by taking into account the distribution of the erasure rate and create a new possibility for setting trade-offs between performance and erasure rate.

  • A New Model of Effective Carrier-to-Noise Ratio for Global Navigation Satellite System Receiver in the Presence of Continuous Wave Interference

    Jian LI  Junwei NIE  Huaming CHEN  Guangfu SUN  Feixue WANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/12/13
      Vol:
    E100-B No:6
      Page(s):
    1003-1009

    In this paper, a new effective C/N0 theoretical model for global navigation satellite system (GNSS) receiver is proposed, in the presence of continuous wave interference (CWI). The proposed model is derived based on an interesting finding, correlator may output direct current (DC) in the presence of CWI. The DC introduced by CWI eventually leads to increase of carrier power estimation. It is totally different from current assumption that interference just causes noise power increase after correlation. The proposed model is verified by simulation.

  • A New Method to Extract MOSFET Threshold Voltage, Effective Channel Length, and Channel Mobility Using S-parameter Measurement

    Han-Yu CHEN  Kun-Ming CHEN  Guo-Wei HUANG  Chun-Yen CHANG  Tiao-Yuan HUANG  

     
    PAPER-Active Devices and Circuits

      Vol:
    E87-C No:5
      Page(s):
    726-732

    In this work, a simple method for extracting MOSFET threshold voltage, effective channel length and channel mobility by using S-parameter measurement is presented. In the new method, the dependence between the channel conductivity and applied gate voltage of the MOSFET device is cleverly utilized to extract the threshold voltage, while biasing the drain node of the device at zero voltage during measurement. Moreover, the effective channel length and channel mobility can also be obtained with the same measurement. Furthermore, all the physical parameters can be extracted directly on the modeling devices without relying on specifically designed test devices. Most important of all, only one S-parameter measurement is required for each device under test (DUT), making the proposed extraction method promising for automatic measurement applications.

  • An Efficient Pipeline Architecture for Deblocking Filter in H.264/AVC

    Chung-Ming CHEN  Chung-Ho CHEN  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    99-107

    In this paper, we study and analyze the computational complexity of deblocking filter in H.264/AVC baseline decoder based on SimpleScalar/ARM simulator. The simulation result shows that the memory reference, content activity check operations, and filter operations are known to be very time consuming in the decoder of this new video coding standard. In order to improve overall system performance, we propose a novel processing order with efficient VLSI architecture which simultaneously processes the horizontal filtering of vertical edge and vertical filtering of horizontal edge. As a result, the memory performance of the proposed architecture is improved by four times when compared to the software implementation. Moreover, the system performance of our design significantly outperforms the previous proposals.

  • Reflection Attack on a Generalized Key Agreement and Password Authentication Protocol

    Wei-Chi KU  Hui-Lung LEE  Chien-Ming CHEN  

     
    LETTER-Fundamental Theories

      Vol:
    E87-B No:5
      Page(s):
    1386-1388

    In this letter, we show that a key agreement and password authentication protocol proposed by Kwon and Song is potentially vulnerable to a reflection attack, and then suggest simple improvements.

  • Weighted Generalized Hesitant Fuzzy Sets and Its Application in Ensemble Learning Open Access

    Haijun ZHOU  Weixiang LI  Ming CHENG  Yuan SUN  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2024/01/22
      Vol:
    E107-D No:5
      Page(s):
    694-703

    Traditional intuitionistic fuzzy sets and hesitant fuzzy sets will lose some information while representing vague information, to avoid this problem, this paper constructs weighted generalized hesitant fuzzy sets by remaining multiple intuitionistic fuzzy values and giving them corresponding weights. For weighted generalized hesitant fuzzy elements in weighted generalized hesitant fuzzy sets, the paper defines some basic operations and proves their operation properties. On this basis, the paper gives the comparison rules of weighted generalized hesitant fuzzy elements and presents two kinds of aggregation operators. As for weighted generalized hesitant fuzzy preference relation, this paper proposes its definition and computing method of its corresponding consistency index. Furthermore, the paper designs an ensemble learning algorithm based on weighted generalized hesitant fuzzy sets, carries out experiments on 6 datasets in UCI database and compares with various classification algorithms. The experiments show that the ensemble learning algorithm based on weighted generalized hesitant fuzzy sets has better performance in all indicators.

  • Analysis of an ATM Multiplexer with Correlated Real-Time and Independent Non-real-time Traffic

    Chung-Ju CHANG  Jia-Ming CHEN  Po-Chou LIN  

     
    PAPER-Communication Networks and Service

      Vol:
    E77-B No:12
      Page(s):
    1521-1529

    This paper presents an alternative traffic model for an ATM multiplexer providing video, voice, image, and data services. The traffic model classifies the input traffic into two types: real-time and non-real-time. The input process for realtime traffic is periodic and correlated, while that for non-realtime traffic is batch Poisson and independent. This multiplexer is assumed to be a priority queueing system with synchronous servers operating on time-frame basis and with separate finite buffers for each type of traffic. State probabilities and performance measures are successfully obtained using a Markov analysis technique and an application of the residue theorem in complex variable. The results can be applied in the design of an ATM multiplexer.

41-48hit(48hit)