The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Shu LI(48hit)

1-20hit(48hit)

  • A Deep Q-Network Based Intelligent Decision-Making Approach for Cognitive Radar

    Yong TIAN  Peng WANG  Xinyue HOU  Junpeng YU  Xiaoyan PENG  Hongshu LIAO  Lin GAO  

     
    PAPER-Neural Networks and Bioengineering

      Pubricized:
    2021/10/15
      Vol:
    E105-A No:4
      Page(s):
    719-726

    The electromagnetic environment is increasingly complex and changeable, and radar needs to meet the execution requirements of various tasks. Modern radars should improve their intelligence level and have the ability to learn independently in dynamic countermeasures. It can make the radar countermeasure strategy change from the traditional fixed anti-interference strategy to dynamically and independently implementing an efficient anti-interference strategy. Aiming at the performance optimization of target tracking in the scene where multiple signals coexist, we propose a countermeasure method of cognitive radar based on a deep Q-learning network. In this paper, we analyze the tracking performance of this method and the Markov Decision Process under the triangular frequency sweeping interference, respectively. The simulation results show that reinforcement learning has substantial autonomy and adaptability for solving such problems.

  • Power Allocation Scheme for Energy Efficiency Maximization in Distributed Antenna System with Discrete-Rate Adaptive Modulation

    Xiangbin YU  Xi WANG  Tao TENG  Qiyishu LI  Fei WANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/02/12
      Vol:
    E102-B No:8
      Page(s):
    1705-1714

    In this paper, we study the power allocation (PA) scheme design for energy efficiency (EE) maximization with discrete-rate adaptive modulation (AM) in the downlink distributed antenna system (DAS). By means of the Karush-Kuhn-Tucker (KKT) conditions, an optimal PA scheme with closed-form expression is derived for maximizing the EE subject to maximum transmit power and target bit error rate (BER) constraints, where the number of active transmit antennas is also derived for attaining PA coefficients. Considering that the optimal scheme needs to calculate the PA of all transmit antennas for each modulation mode, its complexity is extremely high. For this reason, a low-complexity suboptimal PA is also presented based on the antenna selection method. By choosing one or two remote antennas, the suboptimal scheme offers lower complexity than the optimal one, and has almost the same EE performance as the latter. Besides, the outage probability is derived in a performance evaluation. Computer simulation shows that the developed optimal scheme can achieve the same EE as the exhaustive search based approach, which has much higher complexity, and the suboptimal scheme almost matches the EE of the optimal one as well. The suboptimal scheme with two-antenna selection is particularly effective in terms of balancing performance and complexity. Moreover, the derived outage probability is in good agreement with the corresponding simulation.

  • Energy Consumption Analysis on Gradient Sinking Model in Wireless Sensor Networks

    Tao LIU  Zhishu LI  

     
    LETTER-Network

      Vol:
    E95-B No:2
      Page(s):
    607-610

    In a wireless sensor network based on the gradient sinking model, unbalanced energy consumption is an inherent problem and can significantly reduce the network lifetime. In this letter, we propose a subcorona-based scheme to analyze the amount of received data and energy consumption of nodes on gradient sinking model. We then design an algorithm to compute the energy consumption of nodes in different subcoronas. Simulation results indicate the correctness of our proposed algorithm.

  • A Cyber Deception Method Based on Container Identity Information Anonymity

    Lingshu LI  Jiangxing WU  Wei ZENG  Xiaotao CHENG  

     
    LETTER-Information Network

      Pubricized:
    2021/03/02
      Vol:
    E104-D No:6
      Page(s):
    893-896

    Existing cyber deception technologies (e.g., operating system obfuscation) can effectively disturb attackers' network reconnaissance and hide fingerprint information of valuable cyber assets (e.g., containers). However, they exhibit ineffectiveness against skilled attackers. In this study, a proactive fingerprint deception method is proposed, termed as Continuously Anonymizing Containers' Fingerprints (CACF), which modifies the container's fingerprint in the cloud resource pool to satisfy the anonymization standard. As demonstrated by experimental results, the CACF can effectively increase the difficulty for attackers.

  • Novel Miniaturized Harmonic Suppression Branch-Line Coupler Using Artificial Transmission Lines for UHF Applications

    Chia-Hao KU  Hsien-Wen LIU  Yu-Shu LIN  Kuei-Yi LIN  Pao-Jen WANG  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E94-C No:7
      Page(s):
    1237-1239

    A planar miniaturized branch-line coupler with harmonic suppression property for UHF band applications is presented in this paper. By properly synthesizing the LC-tanks that employ artificial transmission lines, two pairs of quarter-wavelength branch-lines to respectively meet characteristic impedances of 35.4 and 50 ohms can be obtained with the coupler. For the operating band, it can achieve good 3 dB power division with a 90° phase difference in the outputs of the through and coupled arms. The coupler also has a small area of 20.5(L)18(W) mm2, corresponding to 0.11 λg0.1 λg at 922 MHz. Compared with conventional couplers, the proposed design not only offers a wide bandwidth of more than 230 MHz within 1° or 1 dB, but also works with additional harmonic suppression for achieving better performance. Therefore, the proposed branch-line coupler with a compact size is well suitable for power division application.

  • A Robust Interference Covariance Matrix Reconstruction Algorithm against Arbitrary Interference Steering Vector Mismatch

    Xiao Lei YUAN  Lu GAN  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:7
      Page(s):
    1553-1557

    We address a robust algorithm for the interference-plus-noise covariance matrix reconstruction (RA-INCMR) against random arbitrary steering vector mismatches (RASVMs) of the interferences, which lead to substantial degradation of the original INCMR beamformer performance. Firstly, using the worst-case performance optimization (WCPO) criteria, we model these RASVMs as uncertainty sets and then propose the RA-INCMR to obtain the robust INCM (RINCM) based on the Robust Capon Beamforming (RCB) algorithm. Finally, we substitute the RINCM back into the original WCPO beamformer problem for the sample covariance matrix to formulate the new RA-INCM-WCPO beamformer problem. Simulation results demonstrate that the performance of the proposed beamformer is much better than the original INCMR beamformer when there exist RASVMs, especially at low signal-to-noise ratio (SNR).

  • A Diversity Metric Based Study on the Correlation between Diversity and Security

    Qing TONG  Yunfei GUO  Hongchao HU  Wenyan LIU  Guozhen CHENG  Ling-shu LI  

     
    PAPER-Dependable Computing

      Pubricized:
    2019/07/16
      Vol:
    E102-D No:10
      Page(s):
    1993-2003

    Software diversity can be utilized in cyberspace security to defend against the zero-day attacks. Existing researches have proved the effectiveness of diversity in bringing security benefits, but few of them touch the problem that whether there is a positive correlation between the security and the diversity. In addition, there is little guidance on how to construct an effective diversified system. For that, this paper develops two diversity metrics based on system attribute matrix, proposes a diversity measurement and verifies the effectiveness of the measurement. Through several simulations on the diversified systems which use voting strategy, the relationship between diversity and security is analyzed. The results show that there is an overall positive correlation between security and diversity. Though some cases are against the correlation, further analysis is made to explain the phenomenon. In addition, the effect of voting strategy is also discussed through simulations. The results show that the voting strategy have a dominant impact on the security, which implies that security benefits can be obtained only with proper strategies. According to the conclusions, some guidance is provided in constructing a more diversified as well as securer system.

  • GDOP and the CRB for Positioning Systems

    Wanchun LI  Ting YUAN  Bin WANG  Qiu TANG  Yingxiang LI  Hongshu LIAO  

     
    LETTER-Information Theory

      Vol:
    E100-A No:2
      Page(s):
    733-737

    In this paper, we explore the relationship between Geometric Dilution of Precision (GDOP) and Cramer-Rao Bound (CRB) by tracing back to the original motivations for deriving these two indexes. In addition, the GDOP is served as a sensor-target geometric uncertainty analysis tool whilst the CRB is served as a statistical performance evaluation tool based on the sensor observations originated from target. And CRB is the inverse matrix of Fisher information matrix (FIM). Based on the original derivations for a same positioning application, we interpret their difference in a mathematical view to show that.

  • A Sufficient Condition for Ruling Out Some Useless Test Error Patterns in Iterative Decoding Algorithms

    Takuya KOUMOTO  Tadao KASAMI  Shu LIN  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E81-A No:2
      Page(s):
    321-326

    In an iterative decoding algorithm, such as Chase Type-II decoding algorithm and its improvements, candidate codewords for a received vector are generated for test based on a bounded-distance decoder and a set of test error patterns. It is desirable to remove useless test error patterns in these decoding algorithms. This paper presents a sufficient condition for ruling out some useless test error patterns. If this condition holds for a test error patterns e, then e can not produce a candidate codeword with a correlation metric larger than those of the candidate codewords generated already and hence e is useless. This significantly reduces the decoding operations in Chase type-II decoding algorithm or decoding iterations in its improvements.

  • On Branch Labels of Parallel Components of the L-Section Minimal Trellis Diagrams for Binary Linear Block Codes

    Tadao KASAMI  Toru FUJIWARA  Yoshihisa DESAKI  Shu LIN  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E77-A No:6
      Page(s):
    1058-1068

    In an earlier paper, we have shown that each section of the L-section minimal trellis diagram for a linear block code consists of parallel and structurally identical (except branch labels) subgraphs without cross connections. These parallel subgraphs are called parallel components of the section. In this paper, it is shown that if the sets of path label sequences of two parallel components have a common sequence, then the parallel components have the same branch labels, and the number of parallel components with the same branch labels in each section and the detail structure of each parallel component up to its branch labels are analyzed and expressed in terms of the dimensions of specific linear codes related to the given code. As an example, the 2i-section minimal trellis diagram for a Reed-Muller code is analyzed. Complexity measures of soft-decision maximum likelihood decoding for binary linear block codes are also discussed.

  • Circularity of the Fractional Fourier Transform and Spectrum Kurtosis for LFM Signal Detection in Gaussian Noise Model

    Guang Kuo LU  Man Lin XIAO  Ping WEI  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:12
      Page(s):
    2709-2712

    This letter investigates the circularity of fractional Fourier transform (FRFT) coefficients containing noise only, and proves that all coefficients coming from white Gaussian noise are circular via the discrete FRFT. In order to use the spectrum kurtosis (SK) as a Gaussian test to check if linear frequency modulation (LFM) signals are present in a set of FRFT points, the effect of the noncircularity of Gaussian variables upon the SK of FRFT coefficients is studied. The SK of the α th-order FRFT coefficients for LFM signals embedded in a white Gaussian noise is also derived in this letter. Finally the signal detection algorithm based on FRFT and SK is proposed. The effectiveness and robustness of this algorithm are evaluated via simulations under lower SNR and weaker components.

  • Multi-Target Position and Velocity Estimation Algorithm Based on Time Delay and Doppler Shift in Passive MIMO Radar

    Yao ZHOU  Hairui YU  Wenjie XU  Siyi YAO  Li WANG  Hongshu LIAO  Wanchun LI  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2022/05/18
      Vol:
    E105-A No:11
      Page(s):
    1466-1477

    In this paper, a passive multiple-input multiple-output (MIMO) radar system with widely separated antennas that estimates the positions and velocities of multiple moving targets by utilizing time delay (TD) and doppler shift (DS) measurements is proposed. Passive radar systems can detect targets by using multiple uncoordinated and un-synchronized illuminators and we assume that all the measurements including TD and DS have been known by a preprocessing method. In this study, the algorithm can be divided into three stages. First, based on location information within a certain range and utilizing the DBSCAN cluster algorithm we can obtain the initial position of each target. In the second stage according to the correlation between the TD measurements of each target in a specific receiver and the DSs, we can find the set of DS measurements for each target. Therefore, the initial speed estimated values can be obtained employing the least squares (LS) method. Finally, maximum likelihood (ML) estimation of a first-order Taylor expansion joint TD and DS is applied for a better solution. Extensive simulations show that the proposed algorithm has a good estimation performance and can achieve the Cramér-Rao lower bound (CRLB) under the condition of moderate measurement errors.

  • A Performance Analysis of Buffered DQDB Network with Request Arrival Process Depending on Its Request Counter Value and Its Location on the Buses

    Shu LI  Yasumitsu MIYAZAKI  

     
    PAPER-Communication Networks and Services

      Vol:
    E81-B No:3
      Page(s):
    493-502

    The location of stations on the buses can not be ignored in the analysis of the DQDB protocol, especially when traffic load is heavy. In this paper, we propose a new method to model the DQDB (Distributed Queue Dual Bus) protocol by assuming that the request arrival process depends on both the value of the request counter and the location of a station on the buses. By taking these dependences, we can catch the real behavior of the DQDB stations, which is locationally dependent and unfair under heavy load traffic. Based on this model, we analyze the DQDB system with finite buffer by considering the request counter states and buffer states separately and obtain the throughput, mean packet delay and packet reject probability of individual stations. The throughput in individual stations matches that of simulation very well within the range of traffic up to the channel capacity. Also the delay and packet reject rate performance is good up to moderate traffic load. These numerical results reveal the properties of the location dependence and the unfairness of DQDB system under heavy load condition. The analytic results under heavy load traffic for a general DQDB system has not been reported till now. Therefore we conclude that our model and analysis are valid and effective.

  • A Novel Robust Adaptive Beamforming Based on Interference Covariance Matrix Reconstruction over Annulus Uncertainty Sets

    Xiao Lei YUAN  Lu GAN  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:7
      Page(s):
    1473-1477

    In this letter, a novel robust adaptive beamforming algorithm is addressed to improve the robustness against steering vector random errors (SVREs), which eliminates the signal of interest (SOI) component from the sample covariance matrix (SCM), based on interference-plus-noise covariance matrix (IPNCM) reconstruction over annulus uncertainty sets. Firstly, several annulus uncertainty sets are used to constrain the steering vectors (SVs) of both interferences and the SOI. Additionally the IPNCM is reconstructed according to its definition by estimating each interference SV over its own annulus uncertainty set via the subspace projection algorithm. Meanwhile, the SOI SV is estimated as the prime eigenvector of the SOI covariance matrix term calculated over its own annulus uncertainty set. Finally, a novel robust beamformer is formulated based on the new IPNCM and the SOI SV, and it outperforms other existing reconstruction-based beamformers when the SVREs exist, especially in low input signal-to-noise ratio (SNR) cases, which is proved through the simulation results.

  • Multi-Sensor Multi-Target Bernoulli Filter with Registration Biases

    Lin GAO  Jian HUANG  Wen SUN  Ping WEI  Hongshu LIAO  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:10
      Page(s):
    1774-1781

    The cardinality balanced multi-target multi-Bernoulli (CBMeMBer) filter has emerged as a promising tool for tracking a time-varying number of targets. However, the standard CBMeMBer filter may perform poorly when measurements are coupled with sensor biases. This paper extends the CBMeMBer filter for simultaneous target tracking and sensor biases estimation by introducing the sensor translational biases into the multi-Bernoulli distribution. In the extended CBMeMBer filter, the biases are modeled as the first order Gauss-Markov process and assumed to be uncorrelated with target states. Furthermore, the sequential Monte Carlo (SMC) method is adopted to handle the non-linearity and the non-Gaussian conditions. Simulations are carried out to examine the performance of the proposed filter.

  • Low Weight Subtrellises for Binary Linear Block Codes and Their Applications

    Tadao KASAMI  Takuya KOUMOTO  Toru FUJIWARA  Hiroshi YAMAMOTO  Yoshihisa DESAKI  Shu LIN  

     
    PAPER-Coding Theory

      Vol:
    E80-A No:11
      Page(s):
    2095-2103

    Subtrellises for low-weight codewords of binary linear block codes have been recently used in a number of trellis-based decoding algorithms to achieve near-optimum or suboptimum error performance with a significant reduction in decoding complexity. An algorithm for purging a full code trellis to obtain a low-weight subtrellis has been proposed by H.T. Moorthy et al. This algorithm is effective for codes of short to medium lengths, however for long codes, it becomes very time consuming. This paper investigates the structure and complexity of low-weight subtrellises for binary linear block codes. A construction method for these subtrellises is presented. The state and branch complexities of low-weight subtrellises for Reed-Muller codes and some extended BCH codes are given. In addition, a recursive algorithm for searching the most likely codeword in low-weight subtrellis-based decoding algorithm is proposed. This recursive algorithm is more efficient than the conventional Viterbi algorithm.

  • Error Performance of Multilevel Block Coded 8-PSK Modulations Using Unequal Error Protection Codes for the Rayleigh Fading Channel

    Robert H. Moirelos-ZARAGOZA  Nobuyuki UETSUKI  Toyoo TAKATA  Tadao KASAMI  Shu LIN  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E80-A No:6
      Page(s):
    1143-1149

    In this paper, the error performance of block coded 8-PSK modulation systems of length 32, designed for unequal error protection (UEP) of messages transmitted over a Rayleigh fading channel, is investigated. Computer simulation are reported showing that, with transmission over a Rayleigh fading channel, a good improvement in coding gain is obtained by the use of a binary linear UEP (LUEP) code as a constituent code in the multilevel construction, compared with conventional block coded modulation (BCM) of the same length.

  • DOA Estimation of Coherently Distributed Sources Based on Block-Sparse Constraint

    Lu GAN  Xiao Qing WANG  Hong Shu LIAO  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:7
      Page(s):
    2472-2476

    In this letter, a new method is proposed to solve the direction-of-arrivals (DOAs) estimation problem of coherently distributed sources based on the block-sparse signal model of compressed sensing (CS) and the convex optimization theory. We make use of a certain number of point sources and the CS array architecture to establish the compressive version of the discrete model of coherently distributed sources. The central DOA and the angular spread can be estimated simultaneously by solving a convex optimization problem which employs a joint norm constraint. As a result we can avoid the two-dimensional search used in conventional algorithms. Furthermore, the multiple-measurement-vectors (MMV) scenario is also considered to achieve robust estimation. The effectiveness of our method is confirmed by simulation results.

  • A CFAR Detection Algorithm Based on Clutter Knowledge for Cognitive Radar

    Kaixuan LIU  Yue LI  Peng WANG  Xiaoyan PENG  Hongshu LIAO  Wanchun LI  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2022/09/13
      Vol:
    E106-A No:3
      Page(s):
    590-599

    Under the background of non-homogenous and dynamic time-varying clutter, the processing ability of the traditional constant false alarm rate (CFAR) detection algorithm is significantly reduced, as well as the detection performance. This paper proposes a CFAR detection algorithm based on clutter knowledge (CK-CFAR), as a new CFAR, to improve the detection performance adaptability of the radar in complex clutter background. With the acquired clutter prior knowledge, the algorithm can dynamically select parameters according to the change of background clutter and calculate the threshold. Compared with the detection algorithms such as CA-CFAR, GO-CFAR, SO-CFAR, and OS-CFAR, the simulation results show that CK-CFAR has excellent detection performance in the background of homogenous clutter and edge clutter. This algorithm can help radar adapt to the clutter with different distribution characteristics, effectively enhance radar detection in a complex environment. It is more in line with the development direction of the cognitive radar.

  • Tradeoffs between Error Performance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding

    Motohiko ISAKA  Robert H. MORELOS-ZARAGOZA  Marc P. C. FOSSORIER  Shu LIN  Hideki IMAI  

     
    PAPER-Coding Theory

      Vol:
    E83-A No:8
      Page(s):
    1704-1712

    In this paper, we investigate multilevel coding and multistage decoding for satellite broadcasting with moderate decoding complexity. An unconventional signal set partitioning is used to achieve unequal error protection capabilities. Two possibilities are shown and analyzed for practical systems: (i) linear block component codes with near optimum decoding, (ii) punctured convolutional component codes with a common trellis structure.

1-20hit(48hit)