The search functionality is under construction.

Author Search Result

[Author] Yong FENG(15hit)

1-15hit
  • Impact of the Primary User's Power Allocation on the Performance of the Secondary User in Cognitive Radio Networks

    Ding XU  Zhiyong FENG  Ping ZHANG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E96-B No:2
      Page(s):
    668-672

    In spectrum sharing cognitive radio (CR) networks, secondary user (SU) is allowed to share the same spectrum band concurrently with primary user (PU), with the condition that the SU causes no harmful interference to the PU. In this letter, the ergodic and outage capacity loss constraints are proposed to protect the PU according to its service types. We investigate the performance of the SU in terms of ergodic capacity under various power allocation policies of the PU. Specifically, three PU power allocation policies are considered, namely waterfilling, truncated channel inversion with fixed rate (TIFR) and constant power allocation. We obtain the ergodic capacities of the SU under the three PU power allocation policies. The numerical results show that the PU waterfilling and TIFR power allocation policies are superior to the PU constant power allocation in terms of the capacity of the PU. In particular, it is shown that, with respect to the ergodic capacity of the SU, the PU waterfilling power allocation is superior to the PU constant power allocation, while the PU TIFR power allocation is inferior to the PU constant power allocation.

  • A Novel Recommendation Algorithm Incorporating Temporal Dynamics, Reviews and Item Correlation

    Ting WU  Yong FENG  JiaXing SANG  BaoHua QIANG  YaNan WANG  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/05/18
      Vol:
    E101-D No:8
      Page(s):
    2027-2034

    Recommender systems (RS) exploit user ratings on items and side information to make personalized recommendations. In order to recommend the right products to users, RS must accurately model the implicit preferences of each user and the properties of each product. In reality, both user preferences and item properties are changing dynamically over time, so treating the historical decisions of a user or the received comments of an item as static is inappropriate. Besides, the review text accompanied with a rating score can help us to understand why a user likes or dislikes an item, so temporal dynamics and text information in reviews are important side information for recommender systems. Moreover, compared with the large number of available items, the number of items a user can buy is very limited, which is called the sparsity problem. In order to solve this problem, utilizing item correlation provides a promising solution. Although famous methods like TimeSVD++, TopicMF and CoFactor partially take temporal dynamics, reviews and correlation into consideration, none of them combine these information together for accurate recommendation. Therefore, in this paper we propose a novel combined model called TmRevCo which is based on matrix factorization. Our model combines the dynamic user factor of TimeSVD++ with the hidden topic of each review text mined by the topic model of TopicMF through a new transformation function. Meanwhile, to support our five-scoring datasets, we use a more appropriate item correlation measure in CoFactor and associate the item factors of CoFactor with that of matrix factorization. Our model comprehensively combines the temporal dynamics, review information and item correlation simultaneously. Experimental results on three real-world datasets show that our proposed model leads to significant improvement compared with the baseline methods.

  • Outage Capacity of Spectrum Sharing Cognitive Radio with MRC Diversity and Outdated CSI under Asymmetric Fading

    Ding XU  Zhiyong FENG  Ping ZHANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:3
      Page(s):
    732-736

    Spectrum sharing cognitive radio (CR) with maximal ratio combining (MRC) diversity under asymmetric fading is studied. Specifically, the channel on the secondary transmitter (STx) to the secondary receiver (SRx) link is Nakagami-m distributed while the channel on the STx to the primary receiver (PRx) link is Rayleigh distributed, and the channel state information (CSI) on the STx-PRx link is assumed to be outdated due to feedback delay. The outage capacity of the secondary user (SU) is derived under the average interference and peak transmit power constraints. The results supported by simulations are presented and show the effects of various system parameters on the outage capacity. Particularly, it is shown that the outdated CSI has no impact on the outage capacities in the cases of low peak transmit power constraint and zero-outage probability. It is also shown that MRC diversity can significantly improve the outage capacity especially for the zero-outage capacity and the outage capacity under low outage probability.

  • Optimal Contention Window Adjustment for Asymmetry Traffic in Erroneous Channels over IEEE802.11 WLANs

    Zhengyong FENG  Guangjun WEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:5
      Page(s):
    1149-1157

    IEEE802.11 Wireless Local Area Networks (WLANs) are becoming more and more pervasive due to their simple channel access mechanism, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), but this mechanism provides all nodes including Access Point and other Stations with the same channel access probability. This characteristic does not suit the infrastructure mode which has so many downlink flows to be transmitted at the Access Point that congestion at the Access Point is more likely to occur. To resolve this asymmetry traffic problem, we develop an Optimal Contention Window Adjustment method assuming the condition of erroneous channels over WLANs. This method can be easily implemented and is compatible with the original CSMA/CA mechanism. It holds the ratio of downlink and uplink flows and at the same time achieves the maximum saturation throughput in the WLANs. We use the Markov Chain analytical model to analyze its performance and validate it through the simulations.

  • TDCTFIC: A Novel Recommendation Framework Fusing Temporal Dynamics, CNN-Based Text Features and Item Correlation

    Meng Ting XIONG  Yong FENG  Ting WU  Jia Xing SHANG  Bao Hua QIANG  Ya Nan WANG  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2019/05/14
      Vol:
    E102-D No:8
      Page(s):
    1517-1525

    The traditional recommendation system (RS) can learn the potential personal preferences of users and potential attribute characteristics of items through the rating records between users and items to make recommendations.However, for the new items with no historical rating records,the traditional RS usually suffers from the typical cold start problem. Additional auxiliary information has usually been used in the item cold start recommendation,we further bring temporal dynamics,text and relevance in our models to release item cold start.Two new cold start recommendation models TmTx(Time,Text) and TmTI(Time,Text,Item correlation) proposed to solve the item cold start problem for different cold start scenarios.While well-known methods like TimeSVD++ and CoFactor partially take temporal dynamics,comments,and item correlations into consideration to solve the cold start problem but none of them combines these information together.Two models proposed in this paper fused features such as time,text,and relevance can effectively improve the performance under item cold start.We select the convolutional neural network (CNN) to extract features from item description text which provides the model the ability to deal with cold start items.Both proposed models can effectively improve the performance with item cold start.Experimental results on three real-world data set show that our proposed models lead to significant improvement compared with the baseline methods.

  • Deep Nonlinear Metric Learning for Speaker Verification in the I-Vector Space

    Yong FENG  Qingyu XIONG  Weiren SHI  

     
    LETTER-Speech and Hearing

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    215-219

    Speaker verification is the task of determining whether two utterances represent the same person. After representing the utterances in the i-vector space, the crucial problem is only how to compute the similarity of two i-vectors. Metric learning has provided a viable solution to this problem. Until now, many metric learning algorithms have been proposed, but they are usually limited to learning a linear transformation. In this paper, we propose a nonlinear metric learning method, which learns an explicit mapping from the original space to an optimal subspace using deep Restricted Boltzmann Machine network. The proposed method is evaluated on the NIST SRE 2008 dataset. Since the proposed method has a deep learning architecture, the evaluation results show superior performance than some state-of-the-art methods.

  • Optimal Power Control of Cognitive Radio under SINR Constraint with Primary User's Cooperation

    Ding XU  Zhiyong FENG  Yizhe LI  Ping ZHANG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:9
      Page(s):
    2685-2689

    In this letter, we study the power control of a cognitive radio (CR) network, where the secondary user (SU) is allowed to share the spectrum with the primary user (PU) only if the signal to interference plus noise ratio (SINR) at the PU is higher than a predetermined level. Both PU fixed power control and PU adaptive power control are considered. Specifically, for the PU adaptive power control, the PU will cooperate with the SU by transmitting with adaptive power. The optimal power control schemes for the SU to maximize the SU throughput under the PU SINR constraint are derived. It is shown that the SU throughput achieved by the optimal power control with the PU adaptive power control is a significant improvement over the optimal power control with the PU fixed power control, especially under high power constraint and low SINR constraint.

  • Characterizing Web APIs Combining Supervised Topic Model with Ontology

    Yuanbin HAN  Shizhan CHEN  Zhiyong FENG  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E96-D No:7
      Page(s):
    1548-1551

    This paper presents a novel topic modeling (TM) approach for discovering meaningful topics for Web APIs, which is a potential dimensionality reduction way for efficient and effective classification, retrieval, organization, and management of numerous APIs. We exploit the possibility of conducting TM on multi-labeled APIs by combining a supervised TM (known as Labeled LDA) with ontology. Experiments conducting on real-world API data set show that the proposed method outperforms standard Labeled LDA with an average gain of 7.0% in measuring quality of the generated topics. In addition, we also evaluate the similarity matching between topics generated by our method and standard Labeled LDA, which demonstrates the significance of incorporating ontology.

  • Optimal Power Allocation and Outage Analysis for Cognitive MIMO Full Duplex Relay Network Based on Orthogonal Space-Time Block Codes

    Ying ZHU  Jia LIU  Zhiyong FENG  Ping ZHANG  

     
    PAPER

      Vol:
    E97-B No:8
      Page(s):
    1567-1576

    This paper investigates power allocation and outage performance for the MIMO full duplex relaying (MFDR) based on orthogonal space-time block Codes (OSTBC) in cognitive radio systems. OSTBC transmission is used as a simple way to obtain multi-antenna diversity gain. Cognitive MFDR systems offer the advantage not only of increasing spectral efficiency by spectrum sharing but also of extending the coverage through the use of relays. In cognitive MFDR systems, the primary user experiences interference from the secondary source and relay simultaneously due to the full duplexing. What is therefore needed is a way to optimize the transmission powers at the secondary source and relay. Therefore, we propose an optimal power allocation (OPA) scheme based on minimizing the outage probability in cognitive MFDR systems. We then analyze the outage probability of the secondary user in the noise-limited and interference-limited environments under Nakagami-m fading channels. Simulation results show that the proposed schemes achieve performance improvement in terms of outage probability.

  • Intercarrier-Interference-Aware Energy Saving for High-Mobility Cognitive OFDM Systems

    Wenjun XU  Xuemei ZHOU  Yanda CHEN  Zhihui LIU  Zhiyong FENG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/07/18
      Vol:
    E101-B No:1
      Page(s):
    203-212

    Cognitive orthogonal frequency-division multiplexing (OFDM) systems are spectrum-efficient yet vulnerable to intercarrier interference (ICI), especially in high-mobility scenarios. In this paper, the energy efficiency optimization problem in high-mobility cognitive OFDM system is considered. The aim is to maximize the energy efficiency by adapting subcarrier bandwidth, power allocation and sensing duration in the presence of ICI, under the constraints of the total power budget of secondary networks, the probabilistic interference limits for the protection of primary networks, and the subcarrier spacing restriction for high-mobility OFDM systems. In order to tackle the intractable non-convex optimization problem induced by ICI, an ICI-aware power allocation algorithm is proposed, by referring to noncooperative game theory. Moreover, a near-optimal subcarrier bandwidth search algorithm based on golden section methods is also presented to maximize the system energy efficiency. Simulation results show that the proposed algorithms can achieve a considerable energy efficiency improvement by up to 133% compared to the traditional static subcarrier bandwidth and power allocation schemes.

  • Protecting Primary Users in Cognitive Radio Networks with Effective Capacity Loss Constraint

    Ding XU  Zhiyong FENG  Ping ZHANG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:1
      Page(s):
    349-353

    Cognitive radio (CR) in spectrum sharing mode allows secondary user (SU) to share the same spectrum simultaneously with primary user (PU), as long as the former guarantees no harmful interference is caused to the latter. This letter proposes a new type of constraint to protect the PU systems that are carrying delay-sensitive applications, namely the PU effective capacity loss constraint, which sets an upper bound on the maximum effective capacity loss of the PU due to the SU transmission. In addition, the PU effective capacity loss constraint is approximately transformed to the interference temperature (power) constraint, to make it easier to be implemented. As an example, we obtain a closed form expression of the SU effective capacity under the approximated peak interference power constraint and the results of simulations validate the proposed PU protection criterion.

  • Feature Based Modulation Classification for Overlapped Signals

    Yizhou JIANG  Sai HUANG  Yixin ZHANG  Zhiyong FENG  Di ZHANG  Celimuge WU  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:7
      Page(s):
    1123-1126

    This letter proposes a novel modulation classification method for overlapped sources named LRGP involving multinomial logistic regression (MLR) and multi-gene genetic programming (MGGP). MGGP based feature engineering is conducted to transform the cumulants of the received signals into highly discriminative features and a MLR based classifier is trained to identify the combination of the modulation formats of the overlapped sources instead of signal separation. Extensive simulations demonstrate that LRGP yields superior performance compared with existing methods.

  • Outer vs. Inner Region: Cellular Network Interference Analysis and Spectrum Resource Distribution in TV White Space

    Long ZHANG  Zhiyong FENG  Qixun ZHANG  Lingwu YUAN  Jia LIU  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:6
      Page(s):
    1095-1109

    TV white space (TVWS) brings potential opportunities to relieve the growing spectrum scarcity. Therefore organizations like the FCC have suggested the co-channel deployment of cellular networks (CNs) on condition that a keep-out distance from the protected region of TV receivers is maintained. However the consequent CN interference has not been described. In addition, considering the wide range of TV coverage, it is also inefficient and wasteful not applying the vacant spectra for secondary user (SU) communication by opportunistic access inside the TV coverage zone. In this paper, we first investigate the aggregate interference from CNs outside the protected area to find out how the interference is generated, and then research the available spectrum resource distribution for SUs inside the TV coverage zone under aggregate interference constraints to utilize TVWS more efficiently. Specifically, we model CN in three aspects. A close-form interference probability distribution function (PDF) is proposed. Since the PDF is too complex to analyze, we approximate it as Gaussian and prove the accuracy of our approximation with Kolmogorov-Smirnov test. Then, available spectra maximization is formulated as an optimization problem under both TV and SU receiver outage probability constraints. We find that available spectra demonstrate a volcano-shaped geographical distribution and optimal network-status-aware SU transmit power exists to maximize the spectra. Our analysis reveals the characteristics of interference in TVWS and contributes to the utilization improvement of white space.

  • Adversarial Metric Learning with Naive Similarity Discriminator

    Yi-ze LE  Yong FENG  Da-jiang LIU  Bao-hua QIANG  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2020/03/10
      Vol:
    E103-D No:6
      Page(s):
    1406-1413

    Metric learning aims to generate similarity-preserved low dimensional feature vectors from input images. Most existing supervised deep metric learning methods usually define a carefully-designed loss function to make a constraint on relative position between samples in projected lower dimensional space. In this paper, we propose a novel architecture called Naive Similarity Discriminator (NSD) to learn the distribution of easy samples and predict their probability of being similar. Our purpose lies on encouraging generator network to generate vectors in fitting positions whose similarity can be distinguished by our discriminator. Adequate comparison experiments was performed to demonstrate the ability of our proposed model on retrieval and clustering tasks, with precision within specific radius, normalized mutual information and F1 score as evaluation metrics.

  • Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems

    Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2019-2026

    With the rapid development of Internet of things (IoT), Radio Frequency Identification (RFID) has become one of the most significant information technologies in the 21st century. However, more and more privacy threats and security flaws have been emerging in various vital RFID systems. Traditional RFID systems only focus attention on foundational implementation, which lacks privacy protection and effective identity authentication. To solve the privacy protection problem this paper proposes a privacy protection method with a Privacy Enhancement Model for RFID (PEM4RFID). PEM4RFID utilizes a “2+2” identity authentication mechanism, which includes a Two-Factor Authentication Protocol (TFAP) based on “two-way authentication”. Our TFAP employs “hardware information + AES-ECC encryption”, while the ”“two-way authentication” is based on improved Combined Public Key (CPK). Case study shows that our proposed PEM4RFID has characteristics of untraceability and nonrepeatability of instructions, which realizes a good trade-off between privacy and security in RFID systems.