1-20hit |
Yanjun LI Haibin KAN Jie PENG Chik How TAN Baixiang LIU
In this letter, we present a construction of bent functions which generalizes a work of Zhang et al. in 2016. Based on that, we obtain a cubic bent function in 10 variables and prove that, it has no affine derivative and does not belong to the completed Maiorana-McFarland class, which is opposite to all 6/8-variable cubic bent functions as they are inside the completed Maiorana-McFarland class. This is the first time a theoretical proof is given to show that the cubic bent functions in 10 variables can be outside the completed Maiorana-McFarland class. Before that, only a sporadic example with such properties was known by computer search. We also show that our function is EA-inequivalent to that sporadic one.
Yanjun LI Haibin KAN Jie PENG Chik How TAN Baixiang LIU
Permutation polynomials and their compositional inverses are crucial for construction of Maiorana-McFarland bent functions and their dual functions, which have the optimal nonlinearity for resisting against the linear attack on block ciphers and on stream ciphers. In this letter, we give the explicit compositional inverse of the permutation binomial $f(z)=z^{2^{r}+2}+alpha zinmathbb{F}_{2^{2r}}[z]$. Based on that, we obtain the dual of monomial bent function $f(x)={ m Tr}_1^{4r}(x^{2^{2r}+2^{r+1}+1})$. Our result suggests that the dual of f is not a monomial any more, and it is not always EA-equivalent to f.
Ke WANG Wei HENG Xiang LI Jing WU
In this paper, the artificial noise (AN)-aided multiple-input single-output (MISO) cognitive radio network with simultaneous wireless information and power transfer (SWIPT) is considered, in which the cognitive user adopts the power-splitting (PS) receiver architecture to simultaneously decode information and harvest energy. To support secure communication and facilitate energy harvesting, AN is transmitted with information signal at cognitive base station (CBS). The secrecy energy efficiency (SEE) maximization problem is formulated with the constraints of secrecy rate and harvested energy requirements as well as primary user's interference requirements. However, this challenging problem is non-convex due to the fractional objective function and the coupling between the optimization variables. For tackling the challenging problem, a double-layer iterative optimization algorithm is developed. Specifically, the outer layer invokes a one-dimension search algorithm for the newly introduced tight relaxation variable, while the inner one leverages the Dinkelbach method to make the fractional optimization problem more tractable. Furthermore, closed-form expressions for the power of information signal and AN are obtained. Numerical simulations are conducted to demonstrate the efficiency of our proposed algorithm and the advantages of AN in enhancing the SEE performance.
Ke WANG Wei HENG Xiang LI Jing WU
Cognitive radio network (CRN) provides an effective way of improving efficiency and flexibility in spectrum usage. Due to the coexistence of secondary user (SU) and primary user (PU), managing interference is a critical issue to be addressed if we are to reap the full benefits. In this paper, we consider the problem of joint interference management and resource allocation in a multi-channel ad hoc CRN. We formulate the problem as an overlapping coalition formation game to maximize the sum rate of SU links while guaranteeing the quality of service (QoS) of PU links. In the game, each SU link can make an autonomous decision and is allowed to participate in one or more cooperative coalitions simultaneously to maximize its payoff. To obtain the solution of the formulated game, a distributed, self-organizing algorithm is proposed for performing coalition formation. We analyze the properties of the algorithm and show that SU links can cooperate to reach a final stable coalition structure. Compared with existing approaches, the proposed scheme achieves appreciable performance improvement in terms of the sum rate of SU links, which is demonstrated by simulation results.
Wenhao JIANG Wenjiang FENG Shaoxiang GU Yuxiang LIU Zhiming WANG
In this paper, we study the power allocation problem in a relay assisted multi-band underlay cognitive radio network. Such a network allows unlicensed users (secondary users) to access the spectrum bands under a transmission power constraint. Due to the concave increasing property of logarithm function, it is not always wise for secondary users to expend all the transmission power in one band if their aim is to maximize achievable data rate. In particular, we study a scenario where two secondary users and a half-duplexing relay exist with two available bands. The two users choose different bands for direct data transmission and use the other band for relay transmission. By properly allocating the power on two bands, each user may be able to increase its total achievable data rate while satisfying the power constraint. We formulate the power allocation problem as a non-cooperative game and investigate its Nash equilibria. We prove the power allocation game is a supermodular game and that Nash equilibria exist. We further find the best response function of users and propose a best response update algorithm to solve the corresponding dynamic game. Numerical results show the overall performance in terms of achievable rates is improved through our proposed transmission scheme and power allocation algorithm. Our proposed algorithm also shows satisfactory performance in terms of convergence speed.
Xiang LI Yuki NARITA Yuta GOTOH Shigeo SHIODA
We propose an analytical model for IEEE 802.11 wireless local area networks (WLANs). The analytical model uses macroscopic descriptions of the distributed coordination function (DCF): the backoff process is described by a few macroscopic states (medium-idle, transmission, and medium-busy), which obviates the need to track the specific backoff counter/backoff stages. We further assume that the transitions between the macroscopic states can be characterized as a continuous-time Markov chain under the assumption that state persistent times are exponentially distributed. This macroscopic description of DCF allows us to utilize a two-dimensional continuous-time Markov chain for simplifying DCF performance analysis and queueing processes. By comparison with simulation results, we show that the proposed model accurately estimates the throughput performance and average queue length under light, heavy, or asymmetric traffic.
Kazutoshi KOBAYASHI Makoto EGUCHI Takuya IWAHASHI Takehide SHIBAYAMA Xiang LI Kosuke TAKAI Hidetoshi ONODERA
We propose a vector-pipeline processor VP-DSP for low-rate videophones which can encode and decode 10 frames/sec. of QCIF through a 29.2 kbps low-rate line. We have already fabricated a VP-DSP LSI by a 0.35 µm CMOS process. The area of the VP-DSP core is 4.26 mm2. It works properly at 25 MHz/1.6 V with a power consumption of 49 mW. Its peak performance is up to 400 MOPS, 8.2 GOPS/W.
Pengxiang LI Yuehong GAO Zhidu LI Hongwen YANG
This paper analyzes the performance of single-cell massive multiple-input multiple-output (MIMO) systems with non-orthogonal pilots. Specifically, closed-form expressions of the normalized channel estimation error and achievable uplink capacity are derived for both least squares (LS) and minimum mean square error (MMSE) estimation. Then a pilot reconstruction scheme based on orthogonal Procrustes principle (OPP) is provided to reduce the total normalized mean square error (NMSE) of channel estimations. With these reconstructed pilots, a two-step pilot assignment method is formulated by considering the correlation coefficient among pilots to reduce the maximum NMSE. Based on this assignment method, a step-by-step pilot power allocation scheme is further proposed to improve the average uplink signal-to-interference and noise ratio (SINR). At last, simulation results demonstrate the superiority of the proposed approaches.
Haoliang SUN Xiaohui HU Lixiang LIU
The existing routing protocols for the interplanetary backbone network did not consider future link connection and link congestion. A novel routing protocol named CAMARP for the interplanetary backbone network is proposed in this letter. We use wait delay to consider future link connection and make the best next hop selection. A load balancing mechanism is used to avoid congestion. The proposed method leads to a better and more efficient distribution of traffic, and also leads to lower packet drop rates and higher throughput. CAMARP demonstrates good performance in the experiment.
Wanchun LI Ting YUAN Bin WANG Qiu TANG Yingxiang LI Hongshu LIAO
In this paper, we explore the relationship between Geometric Dilution of Precision (GDOP) and Cramer-Rao Bound (CRB) by tracing back to the original motivations for deriving these two indexes. In addition, the GDOP is served as a sensor-target geometric uncertainty analysis tool whilst the CRB is served as a statistical performance evaluation tool based on the sensor observations originated from target. And CRB is the inverse matrix of Fisher information matrix (FIM). Based on the original derivations for a same positioning application, we interpret their difference in a mathematical view to show that.
Yizhong LIU Tian SONG Yiqi ZHUANG Takashi SHIMAMOTO Xiang LI
This paper proposes a novel greedy algorithm, called Creditability-Estimation based Matching Pursuit (CEMP), for the compressed sensing signal recovery. As proved in the algorithm of Stagewise Orthogonal Matching Pursuit (StOMP), two Gaussian distributions are followed by the matched filter coefficients corresponding to and without corresponding to the actual support set of the original sparse signal, respectively. Therefore, the selection for each support point is interpreted as a process of hypothesis testing, and the preliminarily selected support set is supposed to consist of rejected atoms. A hard threshold, which is controlled by an input parameter, is used to implement the rejection. Because the Type I error may happen during the hypothesis testing, not all the rejected atoms are creditable to be the true support points. The creditability of each preliminarily selected support point is evaluated by a well-designed built-in mechanism, and the several most creditable ones are adaptively selected into the final support set without being controlled by any extra external parameters. Moreover, the proposed CEMP does not necessitate the sparsity level to be a priori control parameter in operation. In order to verify the performance of the proposed algorithm, Gaussian and Pulse Amplitude Modulation sparse signals are measured in the noiseless and noisy cases, and the experiments of the compressed sensing signal recoveries by several greedy algorithms including CEMP are implemented. The simulation results show the proposed CEMP can achieve the best performances of the recovery accuracy and robustness as a whole. Besides, the experiment of the compressed sensing image recovery shows that CEMP can recover the image with the highest Peak Signal to Noise Ratio (PSNR) and the best visual quality.
This paper proposes an adaptive channel estimation scheme, which uses different moving average length and pilot gain for different mobile environments. It is based on MSE method and extensive simulations under various environments for WCDMA physical layer. The scheme applies a computationally efficient and easily implemented pilot filter on WCDMA forward channel. For different mobile channel environments, the optimal combination of moving average length and pilot gain for low SNR is achieved. The simulation results illustrate that the adaptive scheme can achieve much lower BER compared with two other adaptive schemes, especially when the speed of mobile user is high. And the BER performance of the proposed scheme is insensible to the mobile speed.
A multi-carrier and blind shift-frequency jamming(MCBSFJ) against the pulsed compression radar with order-statistic (OS) constant false alarm rate (CFAR) detector is proposed. Firstly, according to the detection principle of the OS-CFAR detector, the design requirements for jamming signals are proposed. Then, some key parameters of the jamming are derived based on the characteristics of the OS-CFAR detector. As a result, multiple false targets around the real target with the quantity, amplitude and space distribution which can be controlled are produced. The simulation results show that the jamming method can reduce the detection probability of the target effectively.
Qi TENG Guowei TENG Xiang LI Ran MA Ping AN Zhenglong YANG
The latest versatile video coding (VVC) introduces some novel techniques such as quadtree with nested multi-type tree (QTMT), multiple transform selection (MTS) and multiple reference line (MRL). These tools improve compression efficiency compared with the previous standard H.265/HEVC, but they suffer from very high computational complexity. One of the most time-consuming parts of VVC intra coding is the coding tree unit (CTU) structure decision. In this paper, we propose a low-complexity multi-type tree (MT) pruning method for VVC intra coding. This method consists of lookahead search and MT pruning. The lookahead search process is performed to derive the approximate rate-distortion (RD) cost of each MT node at depth 2 or 3. Subsequently, the improbable MT nodes are pruned by different strategies under different cost errors. These strategies are designed according to the priority of the node. Experimental results show that the overall proposed algorithm can achieve 47.15% time saving with only 0.93% Bjøntegaard delta bit rate (BDBR) increase over natural scene sequences, and 45.39% time saving with 1.55% BDBR increase over screen content sequences, compared with the VVC reference software VTM 10.0. Such results demonstrate that our method achieves a good trade-off between computational complexity and compression quality compared to recent methods.
Fuxiang LIU Chen ZANG Lei LI Chunfeng XU Jingmin LUO
Aiming at the different abilities of the defogging algorithms in different fog concentrations, this paper proposes a fog image classification algorithm for a small and imbalanced sample dataset based on a convolution neural network, which can classify the fog images in advance, so as to improve the effect and adaptive ability of image defogging algorithm in fog and haze weather. In order to solve the problems of environmental interference, camera depth of field interference and uneven feature distribution in fog images, the CutBlur-Gauss data augmentation method and focal loss and label smoothing strategies are used to improve the accuracy of classification. It is compared with the machine learning algorithm SVM and classical convolution neural network classification algorithms alexnet, resnet34, resnet50 and resnet101. This algorithm achieves 94.5% classification accuracy on the dataset in this paper, which exceeds other excellent comparison algorithms at present, and achieves the best accuracy. It is proved that the improved algorithm has better classification accuracy.
For the solutions of linear systems of equations with unsymmetric coefficient matrices, we propose an improved version of the quasi-minimal residual (IQMR) method by using the Lanczos process as a major component combining elements of numerical stability and parallel algorithm design. For Lanczos process, stability is obtained by a coupled two-term procedure that generates Lanczos vectors scaled to unit length. The algorithm is derived such that all inner products and matrixvector multiplications of a single iteration step are independent and communication time required for inner product can be overlapped efficiently with computation time. Therefore, the cost of global communication on parallel distributed memory computers can be significantly reduced. The resulting IQMR algorithm maintains the favorable properties of the Lanczos process while not increasing computational costs. The efficiency of this method is demonstrated by numerical experimental results carried out on a massively parallel distributed memory computer, the Parsytec GC/PowerPlus.
Haijun ZHOU Weixiang LI Ming CHENG Yuan SUN
Traditional intuitionistic fuzzy sets and hesitant fuzzy sets will lose some information while representing vague information, to avoid this problem, this paper constructs weighted generalized hesitant fuzzy sets by remaining multiple intuitionistic fuzzy values and giving them corresponding weights. For weighted generalized hesitant fuzzy elements in weighted generalized hesitant fuzzy sets, the paper defines some basic operations and proves their operation properties. On this basis, the paper gives the comparison rules of weighted generalized hesitant fuzzy elements and presents two kinds of aggregation operators. As for weighted generalized hesitant fuzzy preference relation, this paper proposes its definition and computing method of its corresponding consistency index. Furthermore, the paper designs an ensemble learning algorithm based on weighted generalized hesitant fuzzy sets, carries out experiments on 6 datasets in UCI database and compares with various classification algorithms. The experiments show that the ensemble learning algorithm based on weighted generalized hesitant fuzzy sets has better performance in all indicators.
Tao WANG Huaimin WANG Gang YIN Cheng YANG Xiang LI Peng ZOU
The large amounts of freely available open source software over the Internet are fundamentally changing the traditional paradigms of software development. Efficient categorization of the massive projects for retrieving relevant software is of vital importance for Internet-based software development such as solution searching, best practices learning and so on. Many previous works have been conducted on software categorization by mining source code or byte code, but were verified on only relatively small collections of projects with coarse-grained categories or clusters. However, Internet-based software development requires finer-grained, more scalable and language-independent categorization approaches. In this paper, we propose a novel approach to hierarchically categorize software projects based on their online profiles. We design a SVM-based categorization framework and adopt a weighted combination strategy to aggregate different types of profile attributes from multiple repositories. Different basic classification algorithms and feature selection techniques are employed and compared. Extensive experiments are carried out on more than 21,000 projects across five repositories. The results show that our approach achieves significant improvements by using weighted combination. Compared to the previous work, our approach presents competitive results with more finer-grained and multi-layered category hierarchy with more than 120 categories. Unlike approaches that use source code or byte code, our approach is more effective for large-scale and language-independent software categorization. In addition, experiments suggest that hierarchical categorization combined with general keyword-based searching improves the retrieval efficiency and accuracy.
Li Juan DENG Ping WEI Yan Shen DU Wan Chun LI Ying Xiang LI Hong Shu LIAO
Target determination based on Doppler frequency shift (DFS) measurements is a nontrivial problem because of the nonlinear relation between the position space and the measurements. The conventional methods such as numerical iterative algorithm and grid searching are used to obtain the solution, while the former requires an initial position estimate and the latter needs huge amount of calculations. In this letter, to avoid the problems appearing in those conventional methods, an effective solution is proposed, in which two best linear unbiased estimators (BULEs) are employed to obtain an explicit solution of the proximate target position. Subsequently, this obtained explicit solution is used to initialize the problem of original maximum likelihood estimation (MLE), which can provide a more accurate estimate.
Wenjie YU Xunbo LI Zhi ZENG Xiang LI Jian LIU
In this paper, the problem of lifetime extension of wireless sensor networks (WSNs) with redundant sensor nodes deployed in 3D vegetation-covered fields is modeled, which includes building communication models, network model and energy model. Generally, such a problem cannot be solved by a conventional method directly. Here we propose an Artificial Bee Colony (ABC) based optimal grouping algorithm (ABC-OG) to solve it. The main contribution of the algorithm is to find the optimal number of feasible subsets (FSs) of WSN and assign them to work in rotation. It is verified that reasonably grouping sensors into FSs can average the network energy consumption and prolong the lifetime of the network. In order to further verify the effectiveness of ABC-OG, two other algorithms are included for comparison. The experimental results show that the proposed ABC-OG algorithm provides better optimization performance.