The search functionality is under construction.

Author Search Result

[Author] Wei SUN(11hit)

1-11hit
  • Theory and Application of Compact Microstrip PBG Cell for Wide Stop-Band Filter

    Wenmei ZHANG  Xiaowei SUN  Junfa MAO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E88-C No:6
      Page(s):
    1315-1321

    Based on the periodical-loaded principle, a new wider stop-band filter is presented. The design equations are provided, the validity of which is proved by the measured results. Compared with loaded stub of length 1/4λg, the improved T-shape stub can change admittance paralleled with microstrip line and widen the band width of the band-stop filter. The size of the filter loaded by one side can be reduced by 2/3. The stop-band filter loaded by one side and two sides are simulated and realized. The filter loaded by two sides can achieve very wide stop-band. In addition, the stop-band of the new type of filter is deep and steep.

  • CPU Load Predictions on the Computational Grid

    Yuanyuan ZHANG  Wei SUN  Yasushi INOGUCHI  

     
    PAPER-Grid Computing

      Vol:
    E90-D No:1
      Page(s):
    40-47

    To make the best use of the resources in a shared grid environment, an application scheduler must make a prediction of available performance on each resource. In this paper, we examine the problem of predicting available CPU performance in time-shared grid system. We present and evaluate a new and innovative method to predict the one-step-ahead CPU load in a grid. Our prediction strategy forecasts the future CPU load based on the variety tendency in several past steps and in previous similar patterns, and uses a polynomial fitting method. Our experimental results on large load traces collected from four different kinds of machines demonstrate that this new prediction strategy achieves average prediction errors which are between 22% and 86% less than those incurred by four previous methods.

  • Improved Neighborhood Based Switching Filter for Protecting the Thin Curves in Arbitrary Direction in Color Images

    ChangCheng WU  Min WANG  JunJie WANG  WeiMing LUO  JiaFeng HUA  XiTao CHEN  Wei GENG  Yu LU  Wei SUN  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2020/06/03
      Vol:
    E103-D No:9
      Page(s):
    1939-1948

    Although the classical vector median filter (VMF) has been widely used to suppress the impulse noise in the color image, many thin color curve pixels aligned in arbitrary directions are usually removed out as impulse noise. This serious problem can be solved by the proposed method that can protect the thin curves in arbitrary direction in color image and remove out the impulse noise at the same time. Firstly, samples in the 3x3 filter window are considered to preliminarily detect whether the center pixel is corrupted by impulse noise or not. Then, samples outside a 5x5 filter window are conditionally and partly considered to accurately distinguish the impulse noise and the noise-free pixel. At last, based on the previous outputs, samples on the processed positions in a 3x3 filter window are chosen as the samples of VMF operation to suppress the impulse noise. Extensive experimental results indicate that the proposed algorithm can be used to remove the impulse noise of color image while protecting the thin curves in arbitrary directions.

  • Secure Outage Analysis of Buffer-Aided Cognitive Relay Networks with Multiple Primary Users

    Aiwei SUN  Tao LIANG  Hui TIAN  

     
    LETTER-Information Theoretic Security

      Vol:
    E99-A No:12
      Page(s):
    2296-2300

    This letter investigates the physical layer security for a buffer-aided underlay cooperative cognitive radio network in the presence of an eavesdropper, wherein, the relay is equipped with a buffer so that it can store packets received from the secondary source. To improve the secure performance of cognitive radio networks, we propose a novel cognitive secure link selection scheme which incorporates the instantaneous strength of the wireless links as well as the status of relay's buffer, the proposed scheme adapts the link selection decision on the strongest available link by dynamically switching between relay reception and transmission. Closed-form expressions of secrecy outage probability (SOP) for cognitive radio network is obtained based on the Markov chain. Numerical results demonstrate that the proposed scheme can significantly enhance the secure performance compared to the conventional relay selection scheme.

  • New Compact 1-D PBG Microstrip Structure with Steeper Stop-Band Characteristics

    Wenmei ZHANG  Xiaowei SUN  Junfa MAO  Rong QIAN  Dan ZHANG  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E86-C No:9
      Page(s):
    1894-1897

    A new type of compact one dimension (1-D) microstrip photonic bandgap (PBG) structure for filter is presented. A miniature semiconductor-based structure band-stop filter with four cells is simulated, fabricated, and measured. Agreement between the experimental and simulation results has been achieved. The filter with four proposed PBG structure exhibits deep (about -60 dB) and steep (about 40 dB/GHz) stop-band characteristics. It also has less loss and ripples in the pass-band. The period of the PBG lattice is about 0.2 λe (λe, guiding wavelength at the center frequency of stop-band), or 0.068 λ0 (λ0 wavelength in air), and the filter is very compact and much easier for fabrication and realization in MIC and MMIC.

  • Improved MILP Modeling for Automatic Security Evaluation and Application to FOX

    Kexin QIAO  Lei HU  Siwei SUN  Xiaoshuang MA  Haibin KAN  

     
    PAPER-Symmetric Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    72-80

    Counting the number of differentially active S-boxes is of great importance in evaluating the security of a block cipher against differential attack. Mouha et al. proposed a technique based on Mixed-Integer Linear Programming (MILP) to automatically calculate a lower bound of the number of differentially active S-boxes for word-oriented block ciphers, and applied it to symmetric ciphers AES and Enocoro-128v2. Later Sun et al. extended the method by introducing bit-level representations for S-boxes and new constraints in the MILP problem, and applied the extended method to PRESENT-80 and LBlock. This kind of methods greatly depends on the constraints in the MILP problem describing the differential propagation of the block cipher. A more accurate description of the differential propagation leads to a tighter bound on the number of differentially active S-boxes. In this paper, we refine the constraints in the MILP problem describing XOR operations, and apply the refined MILP modeling to determine a lower bound of the number of active S-boxes for the Lai-Massey type block cipher FOX in the model of single-key differential attack, and obtain a tighter bound in FOX64 than existing results. Experimental results show that 6, instead of currently known 8, rounds of FOX64 is strong enough to resist against basic single-key differential attack since the differential characteristic probability is upper bounded by 2-64, and thus the maximum differential characteristic probability of 12-round FOX64 is upper bounded by 2-128, where 128 is the key-length of FOX64. We also get the lower bound of the number of differentially active S-boxes for 5-round FOX128, and proved the security of the full-round FOX128 with respect to single-key differential attack.

  • Dynamic Task Flow Scheduling for Heterogeneous Distributed Computing: Algorithm and Strategy

    Wei SUN  Yuanyuan ZHANG  Yasushi INOGUCHI  

     
    PAPER-Computer Systems

      Vol:
    E90-D No:4
      Page(s):
    736-744

    Heterogeneous distributed computing environments are well suited to meet the fast increasing computational demands. Task scheduling is very important for a heterogeneous distributed system to satisfy the large computational demands of applications. The performance of a scheduler in a heterogeneous distributed system normally has something to do with the dynamic task flow, that is, the scheduler always suffers from the heterogeneity of task sizes and the variety of task arrivals. From the long-term viewpoint it is necessary and possible to improve the performance of the scheduler serving the dynamic task flow. In this paper we propose a task scheduling method including a scheduling strategy which adapts to the dynamic task flow and a genetic algorithm which can achieve the short completion time of a batch of tasks. The strategy and the genetic algorithm work with each other to enhance the scheduler's efficiency and performance. We simulated a task flow with enough tasks, the scheduler with our strategy and algorithm, and the schedulers with other strategies and algorithms. We also simulated a complex scenario including the variant arrival rate of tasks and the heterogeneous computational nodes. The simulation results show that our scheduler achieves much better scheduling results than the others, in terms of the average waiting time, the average response time, and the finish time of all tasks.

  • A Compact C-CMRC Feeding Open-Loop Resonator for Harmonic Rejection Bandpass Filter

    Jianzhong GU  Xiaowei SUN  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E89-C No:9
      Page(s):
    1365-1367

    A compact open-loop resonator bandpass filter is presented to suppress the spurious passband using compensated compact microstrip resonant cell (C-CMRC) feeding structure. Based on the inherently compact and stopband characteristics of the C-CMRC feeding, the proposed filters shows a better spurious rejection performance than the only open-loop resonator filter. The suppression is -57.4 dB, -49.5 dB, and -43.9 dB at the 2nd, 3rd and 4th harmonic signal separately. All the performance of proposed filters have been verified by the measured results.

  • Dynamic Scheduling Real-Time Task Using Primary-Backup Overloading Strategy for Multiprocessor Systems

    Wei SUN  Chen YU  Xavier DEFAGO  Yasushi INOGUCHI  

     
    PAPER-Dependable Computing

      Vol:
    E91-D No:3
      Page(s):
    796-806

    The scheduling of real-time tasks with fault-tolerant requirements has been an important problem in multiprocessor systems. The primary-backup (PB) approach is often used as a fault-tolerant technique to guarantee the deadlines of tasks despite the presence of faults. In this paper we propose a dynamic PB-based task scheduling approach, wherein an allocation parameter is used to search the available time slots for a newly arriving task, and the previously scheduled tasks can be re-scheduled when there is no available time slot for the newly arriving task. In order to improve the schedulability we also propose an overloading strategy for PB-overloading and Backup-backup (BB) overloading. Our proposed task scheduling algorithm is compared with some existing scheduling algorithms in the literature through simulation studies. The results have shown that the task rejection ratio of our real-time task scheduling algorithm is almost 50% lower than the compared algorithms.

  • Efficient Fingercode Classification

    Hong-Wei SUN  Kwok-Yan LAM  Dieter GOLLMANN  Siu-Leung CHUNG  Jian-Bin LI  Jia-Guang SUN  

     
    INVITED PAPER

      Vol:
    E91-D No:5
      Page(s):
    1252-1260

    In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e.g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.

  • A Novel Two-Dimensional (2-D) Defected Ground Array for Planar Circuits

    Hai-Wen LIU  Xiao-Wei SUN  Zheng-Fan LI  Jun-Fa MAO  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E87-C No:1
      Page(s):
    109-112

    This letter presents a novel two-dimensional (2-D) defected ground array (DGA) for planar circuits, which has horizontal and vertical periodicities of defect structure. The defect unit cell of DGA is composed of a Sierpinski carpet structure to improve the effective inductance. Measurements show that the proposed DGA provides steeper cutoff characteristics, lower cutoff frequency, and higher slow-wave factors than the conventional periodic defected ground structure in the same occupied surface.