The search functionality is under construction.

Author Search Result

[Author] Yang LI(82hit)

1-20hit(82hit)

  • Characterization of Silicon Mach-Zehnder Modulator in 20-Gbps NRZ-BPSK Transmission

    Kazuhiro GOI  Kenji ODA  Hiroyuki KUSAKA  Akira OKA  Yoshihiro TERADA  Kensuke OGAWA  Tsung-Yang LIOW  Xiaoguang TU  Guo-Qiang LO  Dim-Lee KWONG  

     
    PAPER

      Vol:
    E96-C No:7
      Page(s):
    974-980

    20-Gbps non return-to-zero (NRZ) – binary phase shift keying (BPSK) using the silicon Mach-Zehnder modulator is demonstrated and characterized. Measurement of a constellation diagram confirms successful modulation of 20-Gbps BPSK with the silicon modulator. Transmission performance is characterized in the measurement of bit-error-rate in accumulated dispersion range from -347 ps/nm to +334 ps/nm using SMF and a dispersion compensating fiber module. Optical signal-to-noise ratio required for bit-error-rate of 10-3 is 10.1 dB at back-to-back condition. It is 1.2-dB difference from simulated value. Obtained dispersion tolerance less than 2-dB power penalty for bit-error-rate of 10-3 is -220 ps/nm to +230 ps/nm. The symmetric dispersion tolerance indicates chirp-free modulation. Frequency chirp inherent in the modulation mechanism of the silicon MZM is also discussed with the simulation. The effect caused by the frequency chirp is limited to 3% shift in the chromatic dispersion range of 2 dB power penalty for BER 10-3. The effect inherent in the silicon modulation mechanism is confirmed to be very limited and not to cause any significant degradation in the transmission performance.

  • Construction of Binary Array Set with Zero Correlation Zone Based on Interleaving Technique

    Yifeng TU  Pingzhi FAN  Li HAO  Xiyang LI  

     
    PAPER-Information Theory

      Vol:
    E94-A No:2
      Page(s):
    766-772

    Sequences with good correlation properties are of substantial interest in many applications. By interleaving a perfect array with shift sequences, a new method of constructing binary array set with zero correlation zone (ZCZ) is presented. The interleaving operation can be performed not only row-by-row but also column-by-column on the perfect array. The resultant ZCZ binary array set is optimal or almost optimal with respect to the theoretical bound. The new method provides a flexible choice for the rectangular ZCZ and the set size.

  • Soft versus Hard Cooperative Energy Detection under Low SNR

    Junyang SHEN  Gang XIE  Siyang LIU  Lingkang ZENG  Jinchun GAO  Yuanan LIU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:11
      Page(s):
    3732-3735

    Amidst conflicting views about whether soft cooperative energy detection scheme (SCEDS) outperforms hard cooperative energy detection scheme (HCEDS) greatly in cognitive radio, we establish the bridge that mathematically connects SCEDS and HCEDS by closed approximations. Through this bridge, it is demonstrate that, if the number of detectors of HCEDS is 1.6 times as that of SCEDS, they have nearly the same performance which is confirmed by numerical simulations, enabling a quantitative evaluation of the relation between them and a resolution of the conflicting views.

  • SLA-Aware and Energy-Efficient VM Consolidation in Cloud Data Centers Using Host State Binary Decision Tree Prediction Model Open Access

    Lianpeng LI  Jian DONG  Decheng ZUO  Yao ZHAO  Tianyang LI  

     
    PAPER-Computer System

      Pubricized:
    2019/07/11
      Vol:
    E102-D No:10
      Page(s):
    1942-1951

    For cloud data center, Virtual Machine (VM) consolidation is an effective way to save energy and improve efficiency. However, inappropriate consolidation of VMs, especially aggressive consolidation, can lead to performance problems, and even more serious Service Level Agreement (SLA) violations. Therefore, it is very important to solve the tradeoff between reduction in energy use and reduction of SLA violation level. In this paper, we propose two Host State Detection algorithms and an improved VM placement algorithm based on our proposed Host State Binary Decision Tree Prediction model for SLA-aware and energy-efficient consolidation of VMs in cloud data centers. We propose two formulas of conditions for host state estimate, and our model uses them to build a Binary Decision Tree manually for host state detection. We extend Cloudsim simulator to evaluate our algorithms by using PlanetLab workload and random workload. The experimental results show that our proposed model can significantly reduce SLA violation rates while keeping energy cost efficient, it can reduce the metric of SLAV by at most 98.12% and the metric of Energy by at most 33.96% for real world workload.

  • On the Minimum Distance of Some Improper Array Codes

    Haiyang LIU  Lianrong MA  Hao ZHANG  

     
    LETTER-Coding Theory

      Vol:
    E102-A No:12
      Page(s):
    2021-2026

    For an odd prime q and an integer m≤q, we can construct a regular quasi-cyclic parity-check matrix HI(m,q) that specifies a linear block code CI(m,q), called an improper array code. In this letter, we prove the minimum distance of CI(4,q) is equal to 10 for any q≥11. In addition, we prove the minimum distance of CI(5,q) is upper bounded by 12 for any q≥11 and conjecture the upper bound is tight.

  • End-to-End Multilingual Speech Recognition System with Language Supervision Training

    Danyang LIU  Ji XU  Pengyuan ZHANG  

     
    LETTER-Speech and Hearing

      Pubricized:
    2020/03/19
      Vol:
    E103-D No:6
      Page(s):
    1427-1430

    End-to-end (E2E) multilingual automatic speech recognition (ASR) systems aim to recognize multilingual speeches in a unified framework. In the current E2E multilingual ASR framework, the output prediction for a specific language lacks constraints on the output scope of modeling units. In this paper, a language supervision training strategy is proposed with language masks to constrain the neural network output distribution. To simulate the multilingual ASR scenario with unknown language identity information, a language identification (LID) classifier is applied to estimate the language masks. On four Babel corpora, the proposed E2E multilingual ASR system achieved an average absolute word error rate (WER) reduction of 2.6% compared with the multilingual baseline system.

  • Reversible Data Hiding in the VQ-Compressed Domain

    Chin-Chen CHANG  Yung-Chen CHOU  Chih-Yang LIN  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E90-D No:9
      Page(s):
    1422-1429

    Steganographic methods usually produce distortions in cover images due to the process of embedding secret bits. These distortions are hard to remove, and thus the cover image cannot be recovered. Although the distortions are always small, they cannot be allowed for some sensitive applications. In this paper, we propose a reversible embedding scheme for VQ-compressed images, which allows the original cover image to be completely recovered after the extraction of the secret bits. The embedded payload in the proposed method comprises the secret bits plus the restoration information. In order to reduce the size of payload, we utilized the spatial correlations in the image as the restoration information and then compressed the correlations by a lossless compression method. In addition, an alternative pairing method for codewords was proposed to improve the stegoed image quality and control the embedding capacity. Experimental results showed that the proposed method has the benefit of high efficiency of the steganographic process, high image quality, and adaptive embedding capacity compared with other schemes.

  • New Construction Methods on Multiple Output Resilient Boolean Functions with High Nonlinearity

    Luyang LI  Linhui WANG  Dong ZHENG  Qinlan ZHAO  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/08/10
      Vol:
    E105-A No:2
      Page(s):
    87-92

    Construction of multiple output functions is one of the most important problems in the design and analysis of stream ciphers. Generally, such a function has to be satisfied with several criteria, such as high nonlinearity, resiliency and high algebraic degree. But there are mutual restraints among the cryptographic parameters. Finding a way to achieve the optimization is always regarded as a hard task. In this paper, by using the disjoint linear codes and disjoint spectral functions, two classes of resilient multiple output functions are obtained. It has been proved that the obtained functions have high nonlinearity and high algebraic degree.

  • Research on a Prediction Method for Carbon Dioxide Concentration Based on an Optimized LSTM Network of Spatio-Temporal Data Fusion

    Jun MENG  Gangyi DING  Laiyang LIU  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2021/07/08
      Vol:
    E104-D No:10
      Page(s):
    1753-1757

    In view of the different spatial and temporal resolutions of observed multi-source heterogeneous carbon dioxide data and the uncertain quality of observations, a data fusion prediction model for observed multi-scale carbon dioxide concentration data is studied. First, a wireless carbon sensor network is created, the gross error data in the original dataset are eliminated, and remaining valid data are combined with kriging method to generate a series of continuous surfaces for expressing specific features and providing unified spatio-temporally normalized data for subsequent prediction models. Then, the long short-term memory network is used to process these continuous time- and space-normalized data to obtain the carbon dioxide concentration prediction model at any scales. Finally, the experimental results illustrate that the proposed method with spatio-temporal features is more accurate than the single sensor monitoring method without spatio-temporal features.

  • Capsule Antenna Design Based on Transmission Factor through the Human Body

    Yang LI  Hiroyasu SATO  Qiang CHEN  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    357-363

    To design antennas for ingestible capsule endoscope systems, the transmission factors of dipole and loop antennas placed in the torso-shaped phantom filled with deionized water or human body equivalent liquid (HBEL) are investigated by numerical and experimental study. The S-parameter method is used to evaluate transmission characteristics through a torso-shaped phantom in a broadband frequency range. Good agreement of S-parameters between measured results and numerical analysis is observed and the transmission factors for both cases are obtained. Comparison of the transmission factors between HBEL and deionized water is presented to explain the relation between conductivity and the transmission characteristics. Two types of antennas, dipole antenna and loop antenna are compared. In the case of a dipole antenna placed in deionized water, it is observed that the transmission factor decreases as conductivity increases. On the other hand, there is a local maximum in the transmission factor at 675 MHz in the case of HBEL. This phenomenon is not observed in the case of a loop antenna. The transmission factor of capsule dipole antenna and capsule loop antenna are compared and the guideline in designing capsule antennas by using transmission factor is also proposed.

  • Deep Attention Residual Hashing

    Yang LI  Zhuang MIAO  Ming HE  Yafei ZHANG  Hang LI  

     
    LETTER-Image

      Vol:
    E101-A No:3
      Page(s):
    654-657

    How to represent images into highly compact binary codes is a critical issue in many computer vision tasks. Existing deep hashing methods typically focus on designing loss function by using pairwise or triplet labels. However, these methods ignore the attention mechanism in the human visual system. In this letter, we propose a novel Deep Attention Residual Hashing (DARH) method, which directly learns hash codes based on a simple pointwise classification loss function. Compared to previous methods, our method does not need to generate all possible pairwise or triplet labels from the training dataset. Specifically, we develop a new type of attention layer which can learn human eye fixation and significantly improves the representation ability of hash codes. In addition, we embedded the attention layer into the residual network to simultaneously learn discriminative image features and hash codes in an end-to-end manner. Extensive experiments on standard benchmarks demonstrate that our method preserves the instance-level similarity and outperforms state-of-the-art deep hashing methods in the image retrieval application.

  • A Learning-Based Service Function Chain Early Fault Diagnosis Mechanism Based on In-Band Network Telemetry

    Meiming FU  Qingyang LIU  Jiayi LIU  Xiang WANG  Hongyan YANG  

     
    PAPER-Information Network

      Pubricized:
    2021/10/27
      Vol:
    E105-D No:2
      Page(s):
    344-354

    Network virtualization has become a promising paradigm for supporting diverse vertical services in Software Defined Networks (SDNs). Each vertical service is carried by a virtual network (VN), which normally has a chaining structure. In this way, a Service Function Chain (SFC) is composed by an ordered set of virtual network functions (VNFs) to provide tailored network services. Such new programmable flexibilities for future networks also bring new network management challenges: how to collect and analyze network measurement data, and further predict and diagnose the performance of SFCs? This is a fundamental problem for the management of SFCs, because the VNFs could be migrated in case of SFC performance degradation to avoid Service Level Agreement (SLA) violation. Despite the importance of the problem, SFC performance analysis has not attracted much research attention in the literature. In this current paper, enabled by a novel detailed network debugging technology, In-band Network Telemetry (INT), we propose a learning based framework for early SFC fault prediction and diagnosis. Based on the SFC traffic flow measurement data provided by INT, the framework firstly extracts SFC performance features. Then, Long Short-Term Memory (LSTM) networks are utilized to predict the upcoming values for these features in the next time slot. Finally, Support Vector Machine (SVM) is utilized as network fault classifier to predict possible SFC faults. We also discuss the practical utilization relevance of the proposed framework, and conduct a set of network emulations to validate the performance of the proposed framework.

  • Development of a Mandarin-English Bilingual Speech Recognition System for Real World Music Retrieval

    Qingqing ZHANG  Jielin PAN  Yang LIN  Jian SHAO  Yonghong YAN  

     
    PAPER-Acoustic Modeling

      Vol:
    E91-D No:3
      Page(s):
    514-521

    In recent decades, there has been a great deal of research into the problem of bilingual speech recognition - to develop a recognizer that can handle inter- and intra-sentential language switching between two languages. This paper presents our recent work on the development of a grammar-constrained, Mandarin-English bilingual Speech Recognition System (MESRS) for real world music retrieval. Two of the main difficult issues in handling the bilingual speech recognition systems for real world applications are tackled in this paper. One is to balance the performance and the complexity of the bilingual speech recognition system; the other is to effectively deal with the matrix language accents in embedded language. In order to process the intra-sentential language switching and reduce the amount of data required to robustly estimate statistical models, a compact single set of bilingual acoustic models derived by phone set merging and clustering is developed instead of using two separate monolingual models for each language. In our study, a novel Two-pass phone clustering method based on Confusion Matrix (TCM) is presented and compared with the log-likelihood measure method. Experiments testify that TCM can achieve better performance. Since potential system users' native language is Mandarin which is regarded as a matrix language in our application, their pronunciations of English as the embedded language usually contain Mandarin accents. In order to deal with the matrix language accents in embedded language, different non-native adaptation approaches are investigated. Experiments show that model retraining method outperforms the other common adaptation methods such as Maximum A Posteriori (MAP). With the effective incorporation of approaches on phone clustering and non-native adaptation, the Phrase Error Rate (PER) of MESRS for English utterances was reduced by 24.47% relatively compared to the baseline monolingual English system while the PER on Mandarin utterances was comparable to that of the baseline monolingual Mandarin system. The performance for bilingual utterances achieved 22.37% relative PER reduction.

  • Combining Color Features for Real-Time Correlation Tracking

    Yulong XU  Zhuang MIAO  Jiabao WANG  Yang LI  Hang LI  Yafei ZHANG  Weiguang XU  Zhisong PAN  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    225-228

    Correlation filter-based approaches achieve competitive results in visual tracking, but the traditional correlation tracking methods failed in mining the color information of the videos. To address this issue, we propose a novel tracker combined with color features in a correlation filter framework, which extracts not only gray but also color information as the feature maps to compute the maximum response location via multi-channel correlation filters. In particular, we modify the label function of the conventional classifier to improve positioning accuracy and employ a discriminative correlation filter to handle scale variations. Experiments are performed on 35 challenging benchmark color sequences. And the results clearly show that our method outperforms state-of-the-art tracking approaches while operating in real-time.

  • Heterogeneous Graph Contrastive Learning for Stance Prediction

    Yang LI  Rui QI  

     
    PAPER-Natural Language Processing

      Pubricized:
    2022/07/25
      Vol:
    E105-D No:10
      Page(s):
    1790-1798

    Stance prediction on social media aims to infer the stances of users towards a specific topic or event, which are not expressed explicitly. It is of great significance for public opinion analysis to extract and determine users' stances using user-generated content on social media. Existing research makes use of various signals, ranging from text content to online network connections of users on these platforms. However, it lacks joint modeling of the heterogeneous information for stance prediction. In this paper, we propose a self-supervised heterogeneous graph contrastive learning framework for stance prediction in online debate forums. Firstly, we perform data augmentation on the original heterogeneous information network to generate an augmented view. The original view and augmented view are learned from a meta-path based graph encoder respectively. Then, the contrastive learning among the two views is conducted to obtain high-quality representations of users and issues. Finally, the stance prediction is accomplished by matrix factorization between users and issues. The experimental results on an online debate forum dataset show that our model outperforms other competitive baseline methods significantly.

  • MTF-Based Kalman Filtering with Linear Prediction for Power Envelope Restoration in Noisy Reverberant Environments

    Yang LIU  Shota MORITA  Masashi UNOKI  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:2
      Page(s):
    560-569

    This paper proposes a method based on modulation transfer function (MTF) to restore the power envelope of noisy reverberant speech by using a Kalman filter with linear prediction (LP). Its advantage is that it can simultaneously suppress the effects of noise and reverberation by restoring the smeared MTF without measuring room impulse responses. This scheme has two processes: power envelope subtraction and power envelope inverse filtering. In the subtraction process, the statistical properties of observation noise and driving noise for power envelope are investigated for the criteria of the Kalman filter which requires noise to be white and Gaussian. Furthermore, LP coefficients drastically affect the Kalman filter performance, and a method is developed for deriving LP coefficients from noisy reverberant speech. In the dereverberation process, an inverse filtering method is applied to remove the effects of reverberation. Objective experiments were conducted under various noisy reverberant conditions to evaluate how well the proposed Kalman filtering method based on MTF improves the signal-to-error ratio (SER) and correlation between restored power envelopes compared with conventional methods. Results showed that the proposed Kalman filtering method based on MTF can improve SER and correlation more than conventional methods.

  • Inferring User Consumption Preferences from Social Media

    Yang LI  Jing JIANG  Ting LIU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/12/09
      Vol:
    E100-D No:3
      Page(s):
    537-545

    Social Media has already become a new arena of our lives and involved different aspects of our social presence. Users' personal information and activities on social media presumably reveal their personal interests, which offer great opportunities for many e-commerce applications. In this paper, we propose a principled latent variable model to infer user consumption preferences at the category level (e.g. inferring what categories of products a user would like to buy). Our model naturally links users' published content and following relations on microblogs with their consumption behaviors on e-commerce websites. Experimental results show our model outperforms the state-of-the-art methods significantly in inferring a new user's consumption preference. Our model can also learn meaningful consumption-specific topics automatically.

  • On the Separating Redundancy of Ternary Golay Codes

    Haiyang LIU  Lianrong MA  Hao ZHANG  

     
    LETTER-Coding Theory

      Pubricized:
    2020/09/17
      Vol:
    E104-A No:3
      Page(s):
    650-655

    Let G11 (resp., G12) be the ternary Golay code of length 11 (resp., 12). In this letter, we investigate the separating redundancies of G11 and G12. In particular, we determine the values of sl(G11) for l = 1, 3, 4 and sl(G12) for l = 1, 4, 5, where sl(G11) (resp., sl(G12)) is the l-th separating redundancy of G11 (resp., G12). We also provide lower and upper bounds on s2(G11), s2(G12), and s3(G12).

  • Using Temporal Correlation to Optimize Stereo Matching in Video Sequences

    Ming LI  Li SHI  Xudong CHEN  Sidan DU  Yang LI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2019/03/01
      Vol:
    E102-D No:6
      Page(s):
    1183-1196

    The large computational complexity makes stereo matching a big challenge in real-time application scenario. The problem of stereo matching in a video sequence is slightly different with that in a still image because there exists temporal correlation among video frames. However, no existing method considered temporal consistency of disparity for algorithm acceleration. In this work, we proposed a scheme called the dynamic disparity range (DDR) to optimize matching cost calculation and cost aggregation steps by narrowing disparity searching range, and a scheme called temporal cost aggregation path to optimize the cost aggregation step. Based on the schemes, we proposed the DDR-SGM and the DDR-MCCNN algorithms for the stereo matching in video sequences. Evaluation results showed that the proposed algorithms significantly reduced the computational complexity with only very slight loss of accuracy. We proved that the proposed optimizations for the stereo matching are effective and the temporal consistency in stereo video is highly useful for either improving accuracy or reducing computational complexity.

  • Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation Open Access

    Go TAKAMI  Takeshi SUGAWARA  Kazuo SAKIYAMA  Yang LI  

     
    PAPER

      Pubricized:
    2021/09/30
      Vol:
    E105-A No:3
      Page(s):
    289-299

    Physical attacks against cryptographic devices and their countermeasures have been studied for over a decade. Physical attacks on block-cipher algorithms usually target a few rounds near the input or the output of cryptographic algorithms. Therefore, in order to reduce the implementation cost or increase the performance, countermeasures tend to be applied to the rounds that can be targeted by physical attacks. For example, for AES, the conventional physical attacks have practical complexity when the target leakage is as deep as 4 rounds. In general, the deeper rounds are targeted, the greater the cost required for attackers. In this paper, we focus on the physical attack that uses the leakage as deep as 5 rounds. Specifically, we consider the recently proposed 5-round mixture differential cryptanalysis, which is not physical attack, into the physical attack scenarios, and propose the corresponding physical attack. The proposed attack can break AES-128 with data complexity and time complexity of 225.31. As a result, it is clear that the rounds as deep as 5 must be protected for AES. Furthermore, we evaluated the proposed attack when the information extracted from side-channel leakage contains noise. In the means of theoretical analysis and simulated attacks, the relationship between the accuracy of information leakage and the complexity of the attack is evaluated.

1-20hit(82hit)