The search functionality is under construction.

Author Search Result

[Author] Peng CHEN(23hit)

1-20hit(23hit)

  • Sequence Selection for Selected Mapping in OFDM

    Yue XIAO  Qihui LIANG  Peng CHENG  Lilin DAN  Shaoqian LI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:5
      Page(s):
    1495-1497

    Selected mapping (SLM) is a promising distortionless technique for controlling the high peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) systems. In SLM, phase sequence selection plays an important role for efficient PAPR reduction. Although some phase sequence sets have been proposed in past studies, we show that an optimal selection is still desired for the phase sequences from the same set. Therefore, this letter develops a measureable phase sequence selection criterion to optimally select the phase sequences from both the same and different sets, so as to achieve near optimum PAPR reduction performance in SLM-OFDM systems.

  • SIW-Like Guided Wave Structures and Applications Open Access

    Wei HONG  Ke WU  Hongjun TANG  Jixin CHEN  Peng CHEN  Yujian CHENG  Junfeng XU  

     
    INVITED PAPER

      Vol:
    E92-C No:9
      Page(s):
    1111-1123

    In this paper, the research advances in SIW-like (Substrate Integrated Waveguide-like) guided wave structures and their applications in the State Key Laboratory of Millimeter Waves of China is reviewed. Our work is concerned with the investigations on the propagation characteristics of SIW, half-mode SIW (HMSIW) and the folded HMSIW (FHMSIW) as well as their applications in microwave and millimeter wave filters, diplexers, directional couplers, power dividers, antennas, power combiners, phase shifters and mixers etc. Selected results are presented to show the interesting features and advantages of those new techniques.

  • Improved IFDMA Transmission Structure on SISO and MISO Channels

    Yue XIAO  Peng CHENG  Xu HE  Shaoqian LI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:8
      Page(s):
    2203-2206

    This letter presents a novel pre-transformed interleaved frequency division multiple access (IFDMA) transmission structure that improves system performance without the desire of channel information at the transmitter. Simulation results show that the proposed structure can provide improved system performance while only moderately increasing the complexity, and keeping the advantage of a low peak-to-average power ratio (PAPR) of the transmitted signal for SISO and MISO channels.

  • Q-Value Fine-Grained Adjustment Based RFID Anti-Collision Algorithm

    Jian SU  Xuefeng ZHAO  Danfeng HONG  Zhongqiang LUO  Haipeng CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:7
      Page(s):
    1593-1598

    Fast identification is an urgent demand for modern RFID systems. In this paper, we propose a novel algorithm, access probability adjustment based fine-grained Q-algorithm (APAFQ), to enhance the efficiency of RFID identification with low computation overhead. Specifically, instead of estimation accuracy, the target of most proposed anti-collision algorithms, the APAFQ scheme is driven by updating Q value with two different weights, slot by slot. To achieve higher identification efficiency, the reader adopts fine-grained access probability during the identification process. Moreover, based on the responses from tags, APAFQ adjusts the access probability adaptively. Simulations show the superiority of APAFQ over existing Aloha-based algorithms.

  • Enriching Semantic Knowledge for WSD

    Junpeng CHEN  Wei YU  

     
    LETTER-Natural Language Processing

      Vol:
    E97-D No:8
      Page(s):
    2212-2216

    In our previous work, we proposed to combine ConceptNet and WordNet for Word Sense Disambiguation (WSD). The ConceptNet was automatically disambiguated through Normalized Google Distance (NGD) similarity. In this letter, we present several techniques to enhance the performance of the ConceptNet disambiguation and use this enriched semantic knowledge in WSD task. We propose to enrich both the WordNet semantic knowledge and NGD to disambiguate the concepts in ConceptNet. Furthermore, we apply the enriched semantic knowledge to improve the performance of WSD. From a number of experiments, the proposed method has been obtained enhanced results.

  • Properties on the Average Number of Spanning Trees in Connected Spanning Subgraphs for an Undirected Graph

    Peng CHENG  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E86-A No:5
      Page(s):
    1027-1033

    Consider an undirected graph G=(V,E) with n (=|V|) vertices and m (=|E|) edges. It is well-known that the problem of computing the sequence Nn-1,Nn,...,Nm is #P-complete (see e.g.,[3]), where Ni denotes the number of connected spanning subgraphs with i (n-1!im) edges in G. In this paper, by proving new inequalities on the sequence Nn-1,Nn,...,Nm, we show an interesting and stronger property that the sequence γn-1,γn,...,γm, where γi denotes the average number of spanning trees in the connected spanning subgraphs with i edges, is a convex sequence as well as a monotonically increasing sequence, although this property does not hold for the sequence Nn-1,Nn,...,Nm.

  • Secure Multiuser Communications with Multiple Untrusted Relays over Nakagami-m Fading Channels

    Dechuan CHEN  Yunpeng CHENG  Weiwei YANG  Jianwei HU  Yueming CAI  Junquan HU  Meng WANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:8
      Page(s):
    978-981

    In this letter, we investigate the physical layer security in multi-user multi-relay networks, where each relay is not merely a traditional helper, but at the same time, can become a potential eavesdropper. We first propose an efficient low-complexity user and relay selection scheme to significantly reduce the amount of channel estimation as well as the amount of potential links for comparison. For the proposed scheme, we derive the closed-form expression for the lower bound of ergodic secrecy rate (ESR) to evaluate the system secrecy performance. Simulation results are provided to verify the validity of our expressions and demonstrate how the ESR scales with the number of users and relays.

  • Extraction Method of Failure Signal by Genetic Algorithm and the Application to Inspection and Diagnosis Robot

    Peng CHEN  Toshio TOYOTA  

     
    PAPER

      Vol:
    E78-A No:12
      Page(s):
    1620-1626

    In this study, an extraction method of failure sound signal which is strongly contaminated by noise is investigated by genetic algorithm and statistical tests of the frequency domain for the failure diagnosis of machinery. In order to check the extraction accuracy of the failure signal and obtain the optimum extraction of failure signal, the "existing probability Ps (t*k) of failure signal" and statistical information Iqp are defined as the standard indices for evaluation of the extraction results. It has been proven by practical field data and application of the inspection and diagnosis robot that the extraction method discussed in this paper is effective for detection of a failure and distinction of it's origin in the diagnosis of machinery.

  • Manage the Tradeoff in Data Sanitization

    Peng CHENG  Chun-Wei LIN  Jeng-Shyang PAN  Ivan LEE  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/07/14
      Vol:
    E98-D No:10
      Page(s):
    1856-1860

    Sharing data might bring the risk of disclosing the sensitive knowledge in it. Usually, the data owner may choose to sanitize data by modifying some items in it to hide sensitive knowledge prior to sharing. This paper focuses on protecting sensitive knowledge in the form of frequent itemsets by data sanitization. The sanitization process may result in side effects, i.e., the data distortion and the damage to the non-sensitive frequent itemsets. How to minimize these side effects is a challenging problem faced by the research community. Actually, there is a trade-off when trying to minimize both side effects simultaneously. In view of this, we propose a data sanitization method based on evolutionary multi-objective optimization (EMO). This method can hide specified sensitive itemsets completely while minimizing the accompanying side effects. Experiments on real datasets show that the proposed approach is very effective in performing the hiding task with fewer damage to the original data and non-sensitive knowledge.

  • Low-Complexity ICI Cancellation Based on BEM for OFDM Systems over Doubly Selective Channels

    Suyue LI  Jian XIONG  Peng CHENG  Lin GUI  Youyun XU  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E96-B No:6
      Page(s):
    1588-1596

    One major challenge to implement orthogonal frequency division multiplexing (OFDM) systems over doubly selective channels is the non-negligible intercarrier interference (ICI), which significantly degrades the system performance. Existing solutions to cope with ICI include zero-forcing (ZF), minimum mean square error (MMSE) and other linear or nonlinear equalization methods. However, these schemes fail to achieve a satisfactory tradeoff between performance and computational complexity. To address this problem, in this paper we propose two novel nonlinear ICI cancellation techniques, which are referred to as parallel interference cancelation (PIC) and hybrid interference cancelation (HIC). Taking advantage of the special structure of basis expansion model (BEM) based channel matrices, our proposed schemes enjoy low computational complexity and are capable of cancelling ICI effectively. Moreover, since the proposed schemes can flexibly select different basis functions and be independent of the channel statistics, they are applicable to practical OFDM based systems such as DVB-T2 over doubly selective channels. Theoretical analysis and simulation results both confirm their performance-complexity advantages in comparison with some existing methods.

  • On the Edge Importance Using Its Traffic Based on a Distribution Function along Shortest Paths in a Network

    Peng CHENG  Shigeru MASUYAMA  

     
    LETTER-Graphs, Networks and Matroids

      Vol:
    E78-A No:3
      Page(s):
    440-443

    We model a road network as a directed graph G(V,E) with a source s and a sink t, where each edge e has a positive length l(e) and each vertex v has a distribution function αv with respect to the traffic entering and leaving v. This paper proposes a polynomial time algorithm for evaluating the importance of each edge e E whicn is defined to be the traffic f(e) passing through e in order to assign the required traffic Fst(0) from s to t along only shortest s-t paths in accordance with the distribution function αv at each vertex v.

  • A Low-Power IF Circuit with 5 dB Minimum Input SNR for GFSK Low-IF Receivers

    Bo ZHAO  Guangming YU  Tao CHEN  Pengpeng CHEN  Huazhong YANG  Hui WANG  

     
    PAPER-Electronic Circuits

      Vol:
    E94-C No:10
      Page(s):
    1680-1689

    A low-power low-noise intermediate-frequency (IF) circuit is proposed for Gaussian frequency shift keying (GFSK) low-IF receivers. The proposed IF circuit is realized by an all-analog architecture composed of a couple of limiting amplifiers (LAs) and received signal strength indicators (RSSIs), a couple of band-pass filters (BPFs), a frequency detector (FD), a low-pass filter (LPF) and a slicer. The LA and RSSI are realized by an optimized combination of folded amplifiers and current subtractor based rectifiers to avoid the process induced depressing on accuracy. In addition, taking into account the nonlinearity and static current of rectifiers, we propose an analytical model as an accurate approximation of RSSIs' transfer character. An active-RC based GFSK demodulation scheme is proposed, and then both low power consumption and a large dynamic range are obtained. The chip is implemented with HJTC 0.18 µm CMOS technology and measured under an intermediate frequency of 200 kHz, a data rate of 100 kb/s and a modulation index of 1. The RSSI has a dynamic range of 51 dB with a logarithmic linearity error of less than 1 dB, and the slope is 23.9 mV/dB. For 0.1% bit error ratio (BER), the proposed IF circuit has the minimum input signal-to-noise ratio (SNR) of 5 dB and an input dynamic range of 55.4 dB, whereas it can tolerate a frequency offset of -3%+9.5% at 6 dB input SNR. The total power consumption is 5.655.89 mW.

  • An Efficient Anti-Collision Algorithm Based on Improved Collision Detection Scheme

    Jian SU  Danfeng HONG  Junlin TANG  Haipeng CHEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:2
      Page(s):
    465-470

    Tag collision has a negative impact on the performance of RFID systems. In this letter, we propose an algorithm termed anti-collision protocol based on improved collision detection (ACP-ICD). In this protocol, dual prefixes matching and collision bit detection technique are employed to reduce the number of queries and promptly identify tags. According to the dual prefixes matching method and collision bit detection in the process of collision arbitration, idle slots are eliminated. Moreover, the reader makes full use of collision to improve identification efficiency. Both analytical and simulation results are presented to show that the performance of ACP-ICD outperforms existing anti-collision algorithms.

  • A Comprehensive Performance Evaluation on Iterative Algorithms for Sensitivity Analysis of Continuous-Time Markov Chains

    Yepeng CHENG  Hiroyuki OKAMURA  Tadashi DOHI  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E103-A No:11
      Page(s):
    1252-1259

    This paper discusses how to compute the parametric sensitivity function in continuous-time Markov chains (CTMC). The sensitivity function is the first derivative of the steady-state probability vector regarding a CTMC parameter. Since the sensitivity function is given as a solution of linear equations with a sparse matrix, several linear equation solvers are available to obtain it. In this paper, we consider Jacobi and successive-over relaxation as variants of the Gauss-Seidel algorithm. In addition, we develop an algorithm based on the Takahashi method for the sensitivity function. In numerical experiments, we comprehensively evaluate the performance of these algorithms from the viewpoint of computation time and accuracy.

  • Target Scattering Coefficients Estimation in Cognitive Radar under Temporally Correlated Target and Multiple Receive Antennas Scenario

    Peng CHEN  Lenan WU  

     
    PAPER-Sensing

      Vol:
    E98-B No:9
      Page(s):
    1914-1923

    In cognitive radar systems (CRSs), target scattering coefficients (TSC) can be utilized to improve the performance of target identification and classification. This work considers the problem of TSC estimation for temporally correlated target. Multiple receive antennas are adopted to receive the echo waveforms, which are interfered by the signal-dependent clutter. Unlike existing estimation methods in time domain, a novel estimation method based on Kalman filtering (KF) is proposed in frequency domain to exploit the temporal TSC correlation, and reduce the complexity of subsequent waveform optimization. Additionally, to minimize the mean square error of estimated TSC at each KF iteration, in contrary to existing works, we directly model the design process as an optimization problem, which is non-convex and cannot be solved efficiently. Therefore, we propose a novel method, similar in some way to semi-definite programming (SDP), to convert the non-convex problem into a convex one. Simulation results demonstrate that the estimation performance can be significantly improved by the KF estimation with optimized waveform.

  • Multi-Party Electronic Contract Signing Protocol Based on Blockchain

    Tong ZHANG  Yujue WANG  Yong DING  Qianhong WU  Hai LIANG  Huiyong WANG  

     
    PAPER

      Pubricized:
    2021/12/07
      Vol:
    E105-D No:2
      Page(s):
    264-271

    With the development of Internet technology, the demand for signing electronic contracts has been greatly increased. The electronic contract generated by the participants in an online way enjoys the same legal effect as paper contract. The fairness is the key issue in jointly signing electronic contracts by the involved participants, so that all participants can either get the same copy of the contract or nothing. Most existing solutions only focus on the fairness of electronic contract generation between two participants, where the digital signature can effectively guarantee the fairness of the exchange of electronic contracts and becomes the conventional technology in designing the contract signing protocol. In this paper, an efficient blockchain-based multi-party electronic contract signing (MECS) protocol is presented, which not only offers the fairness of electronic contract generation for multiple participants, but also allows each participant to aggregate validate the signed copy of others. Security analysis shows that the proposed MECS protocol enjoys unforgeability, non-repudiation and fairness of electronic contracts, and performance analysis demonstrates the high efficiency of our construction.

  • An Efficient ARQ Scheme under IEEE 802.11ac Error Channel

    Xueyan LI  Peng CHENG  Bin WU  

     
    PAPER-Mobile Information Network and Personal Communications

      Pubricized:
    2021/10/04
      Vol:
    E105-A No:4
      Page(s):
    694-703

    In this paper, an automatic retransmission request (ARQ) scheme for IEEE 802.11ac is presented, which can solve the problem of severe packet loss and greatly improve the performance in error-prone environments. The proposed solution only requires to be deployed on the sender and is compatible with the 802.11 protocol. The algorithm utilizes the basic strategy of sliding retransmission and then adds the method of copying frames. The media access control (MAC) protocol data unit (MPDU) lost in the transmission and the newly added data frame brought by the sliding window change are replicated. The scheme retransmits the duplicated aggregated packet and further improves the throughput by increasing the probability of successful transmission of sub-frames. Besides, we also establish a mathematical model to analyze the performance of the proposed scheme. We introduce the concept of average aggregated sub-frames and express the sliding retransmission strategy as the aggregated transmission of average aggregated sub-frames, thereby simplifying the model and effectively analyzing the theoretical throughput of the proposed algorithm. The simulation results of Network simulator 3 (NS-3) simulation results demonstrate that the performance of the proposed algorithm is better than the traditional sliding retransmission ARQ algorithm in error-prone channels with a higher physical layer rate.

  • Computing the Expected Maximum Number of Vertex-Disjoint s-t Paths in a Probabilistic Basically Series-Parallel Digraph

    Peng CHENG  Shigeru MASUYAMA  

     
    PAPER-Graphs, Networks and Matroids

      Vol:
    E76-A No:12
      Page(s):
    2089-2094

    In this paper, we propose a polynomial time algorithm for computing the expected maximum number of vertex-disjoint s-t paths in a probabilistic basically series-parallel directed graph and a probabilistic series-parallel undirected graph with distinguished source s and sink t(st), where each edge has a mutually independent failure probability and each vertex is assumed to be failure-free.

  • Formulas for Counting the Numbers of Connected Spanning Subgraphs with at Most n+1 Edges in a Complete Graph Kn

    Peng CHENG  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2314-2321

    Let Ni be the number of connected spanning subgraphs with i(n-1 i m) edges in an n-vertex m-edge undirected graph G=(V,E). Although Nn-1 is computed in polynomial time by the Matrix-tree theorem, whether Nn is efficiently computed for a graph G is an open problem (see e.g., [2]). On the other hand, whether Nn2≥ Nn-1Nn+1 for a graph G is also open as a part of log concave conjecture (see e.g., [6],[12]). In this paper, for a complete graph Kn, we give the formulas for Nn, Nn+1, by which Nn, Nn+1 are respectively computed in polynomial time on n, and, in particular, prove Nn2> Nn-1Nn+1 as well.

  • LGCN: Learnable Gabor Convolution Network for Human Gender Recognition in the Wild Open Access

    Peng CHEN  Weijun LI  Linjun SUN  Xin NING  Lina YU  Liping ZHANG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2019/06/13
      Vol:
    E102-D No:10
      Page(s):
    2067-2071

    Human gender recognition in the wild is a challenging task due to complex face variations, such as poses, lighting, occlusions, etc. In this letter, learnable Gabor convolutional network (LGCN), a new neural network computing framework for gender recognition was proposed. In LGCN, a learnable Gabor filter (LGF) is introduced and combined with the convolutional neural network (CNN). Specifically, the proposed framework is constructed by replacing some first layer convolutional kernels of a standard CNN with LGFs. Here, LGFs learn intrinsic parameters by using standard back propagation method, so that the values of those parameters are no longer fixed by experience as traditional methods, but can be modified by self-learning automatically. In addition, the performance of LGCN in gender recognition is further improved by applying a proposed feature combination strategy. The experimental results demonstrate that, compared to the standard CNNs with identical network architecture, our approach achieves better performance on three challenging public datasets without introducing any sacrifice in parameter size.

1-20hit(23hit)