The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Xiang LI(20hit)

1-20hit
  • A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/02/22
      Vol:
    E104-A No:9
      Page(s):
    1353-1356

    In this letter, we present a construction of bent functions which generalizes a work of Zhang et al. in 2016. Based on that, we obtain a cubic bent function in 10 variables and prove that, it has no affine derivative and does not belong to the completed Maiorana-McFarland class, which is opposite to all 6/8-variable cubic bent functions as they are inside the completed Maiorana-McFarland class. This is the first time a theoretical proof is given to show that the cubic bent functions in 10 variables can be outside the completed Maiorana-McFarland class. Before that, only a sporadic example with such properties was known by computer search. We also show that our function is EA-inequivalent to that sporadic one.

  • The Explicit Dual of Leander's Monomial Bent Function

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1357-1360

    Permutation polynomials and their compositional inverses are crucial for construction of Maiorana-McFarland bent functions and their dual functions, which have the optimal nonlinearity for resisting against the linear attack on block ciphers and on stream ciphers. In this letter, we give the explicit compositional inverse of the permutation binomial $f(z)=z^{2^{r}+2}+alpha zinmathbb{F}_{2^{2r}}[z]$. Based on that, we obtain the dual of monomial bent function $f(x)={ m Tr}_1^{4r}(x^{2^{2r}+2^{r+1}+1})$. Our result suggests that the dual of f is not a monomial any more, and it is not always EA-equivalent to f.

  • Energy-Efficient Secure Transmission for Cognitive Radio Networks with SWIPT

    Ke WANG  Wei HENG  Xiang LI  Jing WU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    1002-1010

    In this paper, the artificial noise (AN)-aided multiple-input single-output (MISO) cognitive radio network with simultaneous wireless information and power transfer (SWIPT) is considered, in which the cognitive user adopts the power-splitting (PS) receiver architecture to simultaneously decode information and harvest energy. To support secure communication and facilitate energy harvesting, AN is transmitted with information signal at cognitive base station (CBS). The secrecy energy efficiency (SEE) maximization problem is formulated with the constraints of secrecy rate and harvested energy requirements as well as primary user's interference requirements. However, this challenging problem is non-convex due to the fractional objective function and the coupling between the optimization variables. For tackling the challenging problem, a double-layer iterative optimization algorithm is developed. Specifically, the outer layer invokes a one-dimension search algorithm for the newly introduced tight relaxation variable, while the inner one leverages the Dinkelbach method to make the fractional optimization problem more tractable. Furthermore, closed-form expressions for the power of information signal and AN are obtained. Numerical simulations are conducted to demonstrate the efficiency of our proposed algorithm and the advantages of AN in enhancing the SEE performance.

  • Interference Management and Resource Allocation in Multi-Channel Ad Hoc Cognitive Radio Network

    Ke WANG  Wei HENG  Xiang LI  Jing WU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/09/11
      Vol:
    E104-B No:3
      Page(s):
    320-327

    Cognitive radio network (CRN) provides an effective way of improving efficiency and flexibility in spectrum usage. Due to the coexistence of secondary user (SU) and primary user (PU), managing interference is a critical issue to be addressed if we are to reap the full benefits. In this paper, we consider the problem of joint interference management and resource allocation in a multi-channel ad hoc CRN. We formulate the problem as an overlapping coalition formation game to maximize the sum rate of SU links while guaranteeing the quality of service (QoS) of PU links. In the game, each SU link can make an autonomous decision and is allowed to participate in one or more cooperative coalitions simultaneously to maximize its payoff. To obtain the solution of the formulated game, a distributed, self-organizing algorithm is proposed for performing coalition formation. We analyze the properties of the algorithm and show that SU links can cooperate to reach a final stable coalition structure. Compared with existing approaches, the proposed scheme achieves appreciable performance improvement in terms of the sum rate of SU links, which is demonstrated by simulation results.

  • Power Allocation for Secondary Users in Relay Assisted Multi-Band Underlay Cognitive Radio Network

    Wenhao JIANG  Wenjiang FENG  Shaoxiang GU  Yuxiang LIU  Zhiming WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:3
      Page(s):
    714-722

    In this paper, we study the power allocation problem in a relay assisted multi-band underlay cognitive radio network. Such a network allows unlicensed users (secondary users) to access the spectrum bands under a transmission power constraint. Due to the concave increasing property of logarithm function, it is not always wise for secondary users to expend all the transmission power in one band if their aim is to maximize achievable data rate. In particular, we study a scenario where two secondary users and a half-duplexing relay exist with two available bands. The two users choose different bands for direct data transmission and use the other band for relay transmission. By properly allocating the power on two bands, each user may be able to increase its total achievable data rate while satisfying the power constraint. We formulate the power allocation problem as a non-cooperative game and investigate its Nash equilibria. We prove the power allocation game is a supermodular game and that Nash equilibria exist. We further find the best response function of users and propose a best response update algorithm to solve the corresponding dynamic game. Numerical results show the overall performance in terms of achievable rates is improved through our proposed transmission scheme and power allocation algorithm. Our proposed algorithm also shows satisfactory performance in terms of convergence speed.

  • Performance Analysis of IEEE 802.11 DCF Based on a Macroscopic State Description

    Xiang LI  Yuki NARITA  Yuta GOTOH  Shigeo SHIODA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/01/22
      Vol:
    E101-B No:8
      Page(s):
    1923-1932

    We propose an analytical model for IEEE 802.11 wireless local area networks (WLANs). The analytical model uses macroscopic descriptions of the distributed coordination function (DCF): the backoff process is described by a few macroscopic states (medium-idle, transmission, and medium-busy), which obviates the need to track the specific backoff counter/backoff stages. We further assume that the transitions between the macroscopic states can be characterized as a continuous-time Markov chain under the assumption that state persistent times are exponentially distributed. This macroscopic description of DCF allows us to utilize a two-dimensional continuous-time Markov chain for simplifying DCF performance analysis and queueing processes. By comparison with simulation results, we show that the proposed model accurately estimates the throughput performance and average queue length under light, heavy, or asymmetric traffic.

  • A Low-Power High-Performance Vector-Pipeline DSP for Low-Rate Videophones

    Kazutoshi KOBAYASHI  Makoto EGUCHI  Takuya IWAHASHI  Takehide SHIBAYAMA  Xiang LI  Kosuke TAKAI  Hidetoshi ONODERA  

     
    PAPER

      Vol:
    E84-C No:2
      Page(s):
    193-201

    We propose a vector-pipeline processor VP-DSP for low-rate videophones which can encode and decode 10 frames/sec. of QCIF through a 29.2 kbps low-rate line. We have already fabricated a VP-DSP LSI by a 0.35 µm CMOS process. The area of the VP-DSP core is 4.26 mm2. It works properly at 25 MHz/1.6 V with a power consumption of 49 mW. Its peak performance is up to 400 MOPS, 8.2 GOPS/W.

  • Non-Orthogonal Pilot Analysis for Single-Cell Massive MIMO Circumstances

    Pengxiang LI  Yuehong GAO  Zhidu LI  Hongwen YANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/10/05
      Vol:
    E102-B No:4
      Page(s):
    901-912

    This paper analyzes the performance of single-cell massive multiple-input multiple-output (MIMO) systems with non-orthogonal pilots. Specifically, closed-form expressions of the normalized channel estimation error and achievable uplink capacity are derived for both least squares (LS) and minimum mean square error (MMSE) estimation. Then a pilot reconstruction scheme based on orthogonal Procrustes principle (OPP) is provided to reduce the total normalized mean square error (NMSE) of channel estimations. With these reconstructed pilots, a two-step pilot assignment method is formulated by considering the correlation coefficient among pilots to reduce the maximum NMSE. Based on this assignment method, a step-by-step pilot power allocation scheme is further proposed to improve the average uplink signal-to-interference and noise ratio (SINR). At last, simulation results demonstrate the superiority of the proposed approaches.

  • Congestion Avoid Movement Aware Routing Protocol in Interplanetary Backbone Networks

    Haoliang SUN  Xiaohui HU  Lixiang LIU  

     
    LETTER-Internet

      Vol:
    E95-B No:7
      Page(s):
    2467-2471

    The existing routing protocols for the interplanetary backbone network did not consider future link connection and link congestion. A novel routing protocol named CAMARP for the interplanetary backbone network is proposed in this letter. We use wait delay to consider future link connection and make the best next hop selection. A load balancing mechanism is used to avoid congestion. The proposed method leads to a better and more efficient distribution of traffic, and also leads to lower packet drop rates and higher throughput. CAMARP demonstrates good performance in the experiment.

  • GDOP and the CRB for Positioning Systems

    Wanchun LI  Ting YUAN  Bin WANG  Qiu TANG  Yingxiang LI  Hongshu LIAO  

     
    LETTER-Information Theory

      Vol:
    E100-A No:2
      Page(s):
    733-737

    In this paper, we explore the relationship between Geometric Dilution of Precision (GDOP) and Cramer-Rao Bound (CRB) by tracing back to the original motivations for deriving these two indexes. In addition, the GDOP is served as a sensor-target geometric uncertainty analysis tool whilst the CRB is served as a statistical performance evaluation tool based on the sensor observations originated from target. And CRB is the inverse matrix of Fisher information matrix (FIM). Based on the original derivations for a same positioning application, we interpret their difference in a mathematical view to show that.

  • Compressed Sensing Signal Recovery via Creditability-Estimation Based Matching Pursuit

    Yizhong LIU  Tian SONG  Yiqi ZHUANG  Takashi SHIMAMOTO  Xiang LI  

     
    PAPER-Digital Signal Processing

      Vol:
    E98-A No:6
      Page(s):
    1234-1243

    This paper proposes a novel greedy algorithm, called Creditability-Estimation based Matching Pursuit (CEMP), for the compressed sensing signal recovery. As proved in the algorithm of Stagewise Orthogonal Matching Pursuit (StOMP), two Gaussian distributions are followed by the matched filter coefficients corresponding to and without corresponding to the actual support set of the original sparse signal, respectively. Therefore, the selection for each support point is interpreted as a process of hypothesis testing, and the preliminarily selected support set is supposed to consist of rejected atoms. A hard threshold, which is controlled by an input parameter, is used to implement the rejection. Because the Type I error may happen during the hypothesis testing, not all the rejected atoms are creditable to be the true support points. The creditability of each preliminarily selected support point is evaluated by a well-designed built-in mechanism, and the several most creditable ones are adaptively selected into the final support set without being controlled by any extra external parameters. Moreover, the proposed CEMP does not necessitate the sparsity level to be a priori control parameter in operation. In order to verify the performance of the proposed algorithm, Gaussian and Pulse Amplitude Modulation sparse signals are measured in the noiseless and noisy cases, and the experiments of the compressed sensing signal recoveries by several greedy algorithms including CEMP are implemented. The simulation results show the proposed CEMP can achieve the best performances of the recovery accuracy and robustness as a whole. Besides, the experiment of the compressed sensing image recovery shows that CEMP can recover the image with the highest Peak Signal to Noise Ratio (PSNR) and the best visual quality.

  • A Novel Adaptive Channel Estimation Scheme for DS-CDMA

    Chen HE  Xiao-xiang LI  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:3
      Page(s):
    1274-1278

    This paper proposes an adaptive channel estimation scheme, which uses different moving average length and pilot gain for different mobile environments. It is based on MSE method and extensive simulations under various environments for WCDMA physical layer. The scheme applies a computationally efficient and easily implemented pilot filter on WCDMA forward channel. For different mobile channel environments, the optimal combination of moving average length and pilot gain for low SNR is achieved. The simulation results illustrate that the adaptive scheme can achieve much lower BER compared with two other adaptive schemes, especially when the speed of mobile user is high. And the BER performance of the proposed scheme is insensible to the mobile speed.

  • Design and Analysis of Multiple False Targets against Pulse Compression Radar Based on OS-CFAR

    Xiang LIU  Dongsheng LI  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E102-C No:6
      Page(s):
    495-498

    A multi-carrier and blind shift-frequency jamming(MCBSFJ) against the pulsed compression radar with order-statistic (OS) constant false alarm rate (CFAR) detector is proposed. Firstly, according to the detection principle of the OS-CFAR detector, the design requirements for jamming signals are proposed. Then, some key parameters of the jamming are derived based on the characteristics of the OS-CFAR detector. As a result, multiple false targets around the real target with the quantity, amplitude and space distribution which can be controlled are produced. The simulation results show that the jamming method can reduce the detection probability of the target effectively.

  • Lookahead Search-Based Low-Complexity Multi-Type Tree Pruning Method for Versatile Video Coding (VVC) Intra Coding

    Qi TENG  Guowei TENG  Xiang LI  Ran MA  Ping AN  Zhenglong YANG  

     
    PAPER-Coding Theory

      Pubricized:
    2022/08/24
      Vol:
    E106-A No:3
      Page(s):
    606-615

    The latest versatile video coding (VVC) introduces some novel techniques such as quadtree with nested multi-type tree (QTMT), multiple transform selection (MTS) and multiple reference line (MRL). These tools improve compression efficiency compared with the previous standard H.265/HEVC, but they suffer from very high computational complexity. One of the most time-consuming parts of VVC intra coding is the coding tree unit (CTU) structure decision. In this paper, we propose a low-complexity multi-type tree (MT) pruning method for VVC intra coding. This method consists of lookahead search and MT pruning. The lookahead search process is performed to derive the approximate rate-distortion (RD) cost of each MT node at depth 2 or 3. Subsequently, the improbable MT nodes are pruned by different strategies under different cost errors. These strategies are designed according to the priority of the node. Experimental results show that the overall proposed algorithm can achieve 47.15% time saving with only 0.93% Bjøntegaard delta bit rate (BDBR) increase over natural scene sequences, and 45.39% time saving with 1.55% BDBR increase over screen content sequences, compared with the VVC reference software VTM 10.0. Such results demonstrate that our method achieves a good trade-off between computational complexity and compression quality compared to recent methods.

  • ConvNeXt-Haze: A Fog Image Classification Algorithm for Small and Imbalanced Sample Dataset Based on Convolutional Neural Network

    Fuxiang LIU  Chen ZANG  Lei LI  Chunfeng XU  Jingmin LUO  

     
    PAPER

      Pubricized:
    2022/11/22
      Vol:
    E106-D No:4
      Page(s):
    488-494

    Aiming at the different abilities of the defogging algorithms in different fog concentrations, this paper proposes a fog image classification algorithm for a small and imbalanced sample dataset based on a convolution neural network, which can classify the fog images in advance, so as to improve the effect and adaptive ability of image defogging algorithm in fog and haze weather. In order to solve the problems of environmental interference, camera depth of field interference and uneven feature distribution in fog images, the CutBlur-Gauss data augmentation method and focal loss and label smoothing strategies are used to improve the accuracy of classification. It is compared with the machine learning algorithm SVM and classical convolution neural network classification algorithms alexnet, resnet34, resnet50 and resnet101. This algorithm achieves 94.5% classification accuracy on the dataset in this paper, which exceeds other excellent comparison algorithms at present, and achieves the best accuracy. It is proved that the improved algorithm has better classification accuracy.

  • The Improved Quasi-Minimal Residual Method on Massively Parallel Distributed Memory Computers

    Tianruo YANG  Hai Xiang LIN  

     
    PAPER-Computer Architecture

      Vol:
    E80-D No:9
      Page(s):
    919-924

    For the solutions of linear systems of equations with unsymmetric coefficient matrices, we propose an improved version of the quasi-minimal residual (IQMR) method by using the Lanczos process as a major component combining elements of numerical stability and parallel algorithm design. For Lanczos process, stability is obtained by a coupled two-term procedure that generates Lanczos vectors scaled to unit length. The algorithm is derived such that all inner products and matrixvector multiplications of a single iteration step are independent and communication time required for inner product can be overlapped efficiently with computation time. Therefore, the cost of global communication on parallel distributed memory computers can be significantly reduced. The resulting IQMR algorithm maintains the favorable properties of the Lanczos process while not increasing computational costs. The efficiency of this method is demonstrated by numerical experimental results carried out on a massively parallel distributed memory computer, the Parsytec GC/PowerPlus.

  • Weighted Generalized Hesitant Fuzzy Sets and Its Application in Ensemble Learning Open Access

    Haijun ZHOU  Weixiang LI  Ming CHENG  Yuan SUN  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2024/01/22
      Vol:
    E107-D No:5
      Page(s):
    694-703

    Traditional intuitionistic fuzzy sets and hesitant fuzzy sets will lose some information while representing vague information, to avoid this problem, this paper constructs weighted generalized hesitant fuzzy sets by remaining multiple intuitionistic fuzzy values and giving them corresponding weights. For weighted generalized hesitant fuzzy elements in weighted generalized hesitant fuzzy sets, the paper defines some basic operations and proves their operation properties. On this basis, the paper gives the comparison rules of weighted generalized hesitant fuzzy elements and presents two kinds of aggregation operators. As for weighted generalized hesitant fuzzy preference relation, this paper proposes its definition and computing method of its corresponding consistency index. Furthermore, the paper designs an ensemble learning algorithm based on weighted generalized hesitant fuzzy sets, carries out experiments on 6 datasets in UCI database and compares with various classification algorithms. The experiments show that the ensemble learning algorithm based on weighted generalized hesitant fuzzy sets has better performance in all indicators.

  • Hierarchical Categorization of Open Source Software by Online Profiles

    Tao WANG  Huaimin WANG  Gang YIN  Cheng YANG  Xiang LI  Peng ZOU  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:9
      Page(s):
    2386-2397

    The large amounts of freely available open source software over the Internet are fundamentally changing the traditional paradigms of software development. Efficient categorization of the massive projects for retrieving relevant software is of vital importance for Internet-based software development such as solution searching, best practices learning and so on. Many previous works have been conducted on software categorization by mining source code or byte code, but were verified on only relatively small collections of projects with coarse-grained categories or clusters. However, Internet-based software development requires finer-grained, more scalable and language-independent categorization approaches. In this paper, we propose a novel approach to hierarchically categorize software projects based on their online profiles. We design a SVM-based categorization framework and adopt a weighted combination strategy to aggregate different types of profile attributes from multiple repositories. Different basic classification algorithms and feature selection techniques are employed and compared. Extensive experiments are carried out on more than 21,000 projects across five repositories. The results show that our approach achieves significant improvements by using weighted combination. Compared to the previous work, our approach presents competitive results with more finer-grained and multi-layered category hierarchy with more than 120 categories. Unlike approaches that use source code or byte code, our approach is more effective for large-scale and language-independent software categorization. In addition, experiments suggest that hierarchical categorization combined with general keyword-based searching improves the retrieval efficiency and accuracy.

  • An Effective and Simple Solution for Stationary Target Localization Using Doppler Frequency Shift Measurements

    Li Juan DENG  Ping WEI  Yan Shen DU  Wan Chun LI  Ying Xiang LI  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:4
      Page(s):
    1070-1073

    Target determination based on Doppler frequency shift (DFS) measurements is a nontrivial problem because of the nonlinear relation between the position space and the measurements. The conventional methods such as numerical iterative algorithm and grid searching are used to obtain the solution, while the former requires an initial position estimate and the latter needs huge amount of calculations. In this letter, to avoid the problems appearing in those conventional methods, an effective solution is proposed, in which two best linear unbiased estimators (BULEs) are employed to obtain an explicit solution of the proximate target position. Subsequently, this obtained explicit solution is used to initialize the problem of original maximum likelihood estimation (MLE), which can provide a more accurate estimate.

  • On Maximizing the Lifetime of Wireless Sensor Networks in 3D Vegetation-Covered Fields

    Wenjie YU  Xunbo LI  Zhi ZENG  Xiang LI  Jian LIU  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2018/03/01
      Vol:
    E101-D No:6
      Page(s):
    1677-1681

    In this paper, the problem of lifetime extension of wireless sensor networks (WSNs) with redundant sensor nodes deployed in 3D vegetation-covered fields is modeled, which includes building communication models, network model and energy model. Generally, such a problem cannot be solved by a conventional method directly. Here we propose an Artificial Bee Colony (ABC) based optimal grouping algorithm (ABC-OG) to solve it. The main contribution of the algorithm is to find the optimal number of feasible subsets (FSs) of WSN and assign them to work in rotation. It is verified that reasonably grouping sensors into FSs can average the network energy consumption and prolong the lifetime of the network. In order to further verify the effectiveness of ABC-OG, two other algorithms are included for comparison. The experimental results show that the proposed ABC-OG algorithm provides better optimization performance.