The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Yu WAN(72hit)

41-60hit(72hit)

  • Security Violation Detection for RBAC Based Interoperation in Distributed Environment

    Xinyu WANG  Jianling SUN  Xiaohu YANG  Chao HUANG  Di WU  

     
    PAPER-Access Control

      Vol:
    E91-D No:5
      Page(s):
    1447-1456

    This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.

  • Energy-Efficient Post-Processing Technique Having High Extraction Efficiency for True Random Number Generators Open Access

    Ruilin ZHANG  Xingyu WANG  Hirofumi SHINOHARA  

     
    PAPER

      Pubricized:
    2021/01/28
      Vol:
    E104-C No:7
      Page(s):
    300-308

    In this paper, we describe a post-processing technique having high extraction efficiency (ExE) for de-biasing and de-correlating a random bitstream generated by true random number generators (TRNGs). This research is based on the N-bit von Neumann (VN_N) post-processing method. It improves the ExE of the original von Neumann method close to the Shannon entropy bound by a large N value. However, as the N value increases, the mapping table complexity increases exponentially (2N), which makes VN_N unsuitable for low-power TRNGs. To overcome this problem, at the algorithm level, we propose a waiting strategy to achieve high ExE with a small N value. At the architectural level, a Hamming weight mapping-based hierarchical structure is used to reconstruct the large mapping table using smaller tables. The hierarchical structure also decreases the correlation factor in the raw bitstream. To develop a technique with high ExE and low cost, we designed and fabricated an 8-bit von Neumann with waiting strategy (VN_8W) in a 130-nm CMOS. The maximum ExE of VN_8W is 62.21%, which is 2.49 times larger than the ExE of the original von Neumann. NIST SP 800-22 randomness test results proved the de-biasing and de-correlation abilities of VN_8W. As compared with the state-of-the-art optimized 7-element iterated von Neumann, VN_8W achieved more than 20% energy reduction with higher ExE. At 0.45V and 1MHz, VN_8W achieved the minimum energy of 0.18pJ/bit, which was suitable for sub-pJ low energy TRNGs.

  • Temperature-Aware NBTI Modeling Techniques in Digital Circuits

    Hong LUO  Yu WANG  Rong LUO  Huazhong YANG  Yuan XIE  

     
    PAPER-Integrated Electronics

      Vol:
    E92-C No:6
      Page(s):
    875-886

    Negative bias temperature instability (NBTI) has become a critical reliability phenomena in advanced CMOS technology. In this paper, we propose an analytical temperature-aware dynamic NBTI model, which can be used in two circuit operation cases: executing tasks with different temperatures, and switching between active and standby mode. A PMOS Vth degradation model and a digital circuits' temporal performance degradation estimation method are developed based on our NBTI model. The simulation results show that: 1) the execution of a low temperature task can decrease ΔVth due to NBTI by 24.5%; 2) switching to standby mode can decrease ΔVth by 52.3%; 3) for ISCAS85 benchmark circuits, the delay degradation can decrease significantly if the circuit execute low temperature task or switch to standby mode; 4) we have also observed the execution time's ratio of different tasks and the ratio of active to standby time both have a considerable impact on NBTI effect.

  • Semantic Guided Infrared and Visible Image Fusion

    Wei WU  Dazhi ZHANG  Jilei HOU  Yu WANG  Tao LU  Huabing ZHOU  

     
    LETTER-Image

      Pubricized:
    2021/06/10
      Vol:
    E104-A No:12
      Page(s):
    1733-1738

    In this letter, we propose a semantic guided infrared and visible image fusion method, which can train a network to fuse different semantic objects with different fusion weights according to their own characteristics. First, we design the appropriate fusion weights for each semantic object instead of the whole image. Second, we employ the semantic segmentation technology to obtain the semantic region of each object, and generate special weight maps for the infrared and visible image via pre-designed fusion weights. Third, we feed the weight maps into the loss function to guide the image fusion process. The trained fusion network can generate fused images with better visual effect and more comprehensive scene representation. Moreover, we can enhance the modal features of various semantic objects, benefiting subsequent tasks and applications. Experiment results demonstrate that our method outperforms the state-of-the-art in terms of both visual effect and quantitative metrics.

  • An Efficient and Universal Conical Hypervolume Evolutionary Algorithm in Three or Higher Dimensional Objective Space

    Weiqin YING  Yuehong XIE  Xing XU  Yu WU  An XU  Zhenyu WANG  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E98-A No:11
      Page(s):
    2330-2335

    The conical area evolutionary algorithm (CAEA) has a very high run-time efficiency for bi-objective optimization, but it can not tackle problems with more than two objectives. In this letter, a conical hypervolume evolutionary algorithm (CHEA) is proposed to extend the CAEA to a higher dimensional objective space. CHEA partitions objective spaces into a series of conical subregions and retains only one elitist individual for every subregion within a compact elitist archive. Additionally, each offspring needs to be compared only with the elitist individual in the same subregion in terms of the local hypervolume scalar indicator. Experimental results on 5-objective test problems have revealed that CHEA can obtain the satisfactory overall performance on both run-time efficiency and solution quality.

  • Pedestrian Detection with Sparse Depth Estimation

    Yu WANG  Jien KATO  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:8
      Page(s):
    1690-1699

    In this paper, we deal with the pedestrian detection task in outdoor scenes. Because of the complexity of such scenes, generally used gradient-feature-based detectors do not work well on them. We propose to use sparse 3D depth information as an additional cue to do the detection task, in order to achieve a fast improvement in performance. Our proposed method uses a probabilistic model to integrate image-feature-based classification with sparse depth estimation. Benefiting from the depth estimates, we map the prior distribution of human's actual height onto the image, and update the image-feature-based classification result probabilistically. We have two contributions in this paper: 1) a simplified graphical model which can efficiently integrate depth cue in detection; and 2) a sparse depth estimation method which could provide fast and reliable estimation of depth information. An experiment shows that our method provides a promising enhancement over baseline detector within minimal additional time.

  • Fine-Grained Data Management for DRAM/SSD Hybrid Main Memory Architecture

    Liyu WANG  Qiang WANG  Lan CHEN  Xiaoran HAO  

     
    LETTER-Computer System

      Pubricized:
    2016/08/30
      Vol:
    E99-D No:12
      Page(s):
    3172-3176

    Many data-intensive applications need large memory to boost system performance. The expansion of DRAM is restricted by its high power consumption and price per bit. Flash as an existing technology of Non-Volatile Memory (NVM) can make up for the drawbacks of DRAM. In this paper, we propose a hybrid main memory architecture named SSDRAM that expands RAM with flash-based SSD. SSDRAM implements a runtime library to provide several transparent interfaces for applications. Unlike using SSD as system swap device which manages data at a page level, SSDRAM works at an application object granularity to boost the efficiency of accessing data on SSD. It provides a flexible memory partition and multi-mapping strategy to manage the physical memory by micro-pages. Experimental results with a number of data-intensive workloads show that SSDRAM can provide up to 3.3 times performance improvement over SSD-swap.

  • Extracting Knowledge Entities from Sci-Tech Intelligence Resources Based on BiLSTM and Conditional Random Field

    Weizhi LIAO  Mingtong HUANG  Pan MA  Yu WANG  

     
    PAPER

      Pubricized:
    2021/04/22
      Vol:
    E104-D No:8
      Page(s):
    1214-1221

    There are many knowledge entities in sci-tech intelligence resources. Extracting these knowledge entities is of great importance for building knowledge networks, exploring the relationship between knowledge, and optimizing search engines. Many existing methods, which are mainly based on rules and traditional machine learning, require significant human involvement, but still suffer from unsatisfactory extraction accuracy. This paper proposes a novel approach for knowledge entity extraction based on BiLSTM and conditional random field (CRF).A BiLSTM neural network to obtain the context information of sentences, and CRF is then employed to integrate global label information to achieve optimal labels. This approach does not require the manual construction of features, and outperforms conventional methods. In the experiments presented in this paper, the titles and abstracts of 20,000 items in the existing sci-tech literature are processed, of which 50,243 items are used to build benchmark datasets. Based on these datasets, comparative experiments are conducted to evaluate the effectiveness of the proposed approach. Knowledge entities are extracted and corresponding knowledge networks are established with a further elaboration on the correlation of two different types of knowledge entities. The proposed research has the potential to improve the quality of sci-tech information services.

  • Generic Transformation for Signatures in the Continual Leakage Model

    Yuyu WANG  Keisuke TANAKA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1857-1869

    In ProvSec 2014, Wang and Tanaka proposed a transformation which converts weakly existentially unforgeable (wEUF) signature schemes into strongly existentially unforgeable (sEUF) ones in the bounded leakage model. To obtain the construction, they combined leakage resilient (LR) chameleon hash functions with the Generalised Boneh-Shen-Waters (GBSW) transformation proposed by Steinfeld, Pieprzyk, and Wang. However, their transformation cannot be used in a more realistic model called continual leakage model since secret keys of LR chameleon hash functions cannot be updated. In this paper, we propose a transformation which can convert wEUF signature schemes into sEUF ones in the continual leakage model. To achieve our goal, we give a new definition of continuous leakage resilient (CLR) chameleon hash function and construct it based on the CLR signature scheme proposed by Malkin, Teranishi, Vahlis, and Yung. Although our CLR chameleon hash functions satisfy the property of strong collision-resistance, due to the existence of the updating algorithm, an adversary may find the kind of collisions such that messages are the same but randomizers are different. Hence, we cannot combine our chameleon hash functions with the GBSW transformation directly, or the sEUF security of the transformed signature schemes cannot be achieved. To solve this problem, we improve the original GBSW transformation by making use of the Groth-Sahai proof system and then combine it with CLR chameleon hash functions.

  • A Scalable Bitwise Multicast Technology in Named Data Networking

    Yuli ZHA  Pengshuai CUI  Yuxiang HU  Julong LAN  Yu WANG  

     
    PAPER-Information Network

      Pubricized:
    2022/09/20
      Vol:
    E105-D No:12
      Page(s):
    2104-2111

    Named Data Networking (NDN) uses name to indicate content mechanism to divide content, and uses content names for routing and addressing. However, the traditional network devices that support the TCP/IP protocol stack and location-centric communication mechanisms cannot support functions such as in-network storage and multicast distribution of NDN effectively. The performance of NDN routers designed for specific functional platforms is limited, and it is difficult to deploy on a large scale, so the NDN network can only be implemented by software. With the development of data plane languages such as Programmable Protocol-Independent Packet Processors (P4), the practical deployment of NDN becomes achievable. To ensure efficient data distribution in the network, this paper proposes a protocol-independent multicast method according to each binary bit. The P4 language is used to define a bit vector in the data packet intrinsic metadata field, which is used to mark the requested port. When the requested content is returned, the routing node will check which port has requested the content according to the bit vector recorded in the register, and multicast the Data packet. The experimental results show that bitwise multicast technology can eliminate the number of flow tables distributed compared with the dynamic multicast group technology, and reduce the content response delay by 57% compared to unicast transmission technology.

  • Restricted Access Window Based Hidden Node Problem Mitigating Algorithm in IEEE 802.11ah Networks

    Ruoyu WANG  Min LIN  

     
    PAPER-Network

      Pubricized:
    2018/03/29
      Vol:
    E101-B No:10
      Page(s):
    2162-2171

    IEEE 802.11ah is a specification being developed for sub-1GHz license-exempt operation and is intended to provide Low Power Wide Area (LPWA) communication services and support Internet of Things (IoT) features such as large-scale networks and extended transmission range. However, these features also make the 802.11ah networks highly susceptible to channel contention and hidden node problem (HNP). To address the problems, the 11ah Task Group proposed a Restricted Access Window (RAW) mechanism. It shows outstanding performance in alleviating channel contention, but its effect on solving HNP is unsatisfactory. In this paper, we propose a simple and effective hidden node grouping algorithm (HNGA) based on IEEE 802.11ah RAW. The algorithm collects hidden node information by taking advantage of the 802.11 association process and then performs two-stage uniform grouping to prevent hidden node collisions (HNCs). Performance of the proposed algorithm is evaluated in comparison with other existing schemes in a hidden node situation. The results show that our proposed algorithm eliminates most of hidden node pairs inside a RAW group with low overhead penalty, thereby improving the performance of the network. Moreover, the algorithm is immune to HNCs caused by cross slot boundary transmissions.

  • A New Recovery Mechanism in Superscalar Microprocessors by Recovering Critical Misprediction

    Jiongyao YE  Yu WAN  Takahiro WATANABE  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E94-A No:12
      Page(s):
    2639-2648

    Current trends in modern out-of-order processors involve implementing deeper pipelines and a large instruction window to achieve high performance, which lead to the penalty of the branch misprediction recovery being a critical factor in overall processor performance. Multi path execution is proposed to reduce this penalty by executing both paths following a branch, simultaneously. However, there are some drawbacks in this mechanism, such as design complexity caused by processing both paths after a branch and performance degradation due to hardware resource competition between two paths. In this paper, we propose a new recovery mechanism, called Recovery Critical Misprediction (RCM), to reduce the penalty of branch misprediction recovery. The mechanism uses a small trace cache to save the decoded instructions from the alternative path following a branch. Then, during the subsequent predictions, the trace cache is accessed. If there is a hit, the processor forks the second path of this branch at the renamed stage so that the design complexity in the fetch stage and decode stage is alleviated. The most contribution of this paper is that our proposed mechanism employs critical path prediction to identify the branches that will be most harmful if mispredicted. Only the critical branch can save its alternative path into the trace cache, which not only increases the usefulness of a limited size of trace cache but also avoids the performance degradation caused by the forked non-critical branch. Experimental results employing SPECint 2000 benchmark show that a processor with our proposed RCM improves IPC value by 10.05% compared with a conventional processor.

  • Face Super-Resolution via Hierarchical Multi-Scale Residual Fusion Network

    Yu WANG  Tao LU  Zhihao WU  Yuntao WU  Yanduo ZHANG  

     
    LETTER-Image

      Pubricized:
    2021/03/03
      Vol:
    E104-A No:9
      Page(s):
    1365-1369

    Exploring the structural information as prior to facial images is a key issue of face super-resolution (SR). Although deep convolutional neural networks (CNNs) own powerful representation ability, how to accurately use facial structural information remains challenges. In this paper, we proposed a new residual fusion network to utilize the multi-scale structural information for face SR. Different from the existing methods of increasing network depth, the bottleneck attention module is introduced to extract fine facial structural features by exploring correlation from feature maps. Finally, hierarchical scales of structural information is fused for generating a high-resolution (HR) facial image. Experimental results show the proposed network outperforms some existing state-of-the-art CNNs based face SR algorithms.

  • Investigation on Brightness Uniformity for the LED Array Display by Using Current-Based Bias Voltage Compensation

    Jian-Long KUO  Tsung-Yu WANG  Jiann-Der LEE  

     
    PAPER

      Vol:
    E88-C No:11
      Page(s):
    2106-2110

    To understand the brightness uniformity for the driver of the LED array display, automatic electronic measurement equipment and its testing scheme will be proposed in this paper. The driving performance and dynamic characteristics will be investigated by using the proposed current-based bias voltage regulator. A complete testing procedure will be provided to assess the performance for the LED array display driver.

  • LAB-LRU: A Life-Aware Buffer Management Algorithm for NAND Flash Memory

    Liyu WANG  Lan CHEN  Xiaoran HAO  

     
    LETTER-Computer System

      Pubricized:
    2016/06/21
      Vol:
    E99-D No:10
      Page(s):
    2633-2637

    NAND flash memory has been widely used in storage systems. Aiming to design an efficient buffer policy for NAND flash memory, a life-aware buffer management algorithm named LAB-LRU is proposed, which manages the buffer by three LRU lists. A life value is defined for every page and the active pages with higher life value can stay longer in the buffer. The definition of life value considers the effect of access frequency, recency and the cost of flash read and write operations. A series of trace-driven simulations are carried out and the experimental results show that the proposed LAB-LRU algorithm outperforms the previous best-known algorithms significantly in terms of the buffer hit ratio, the numbers of flash write and read operations and overall runtime.

  • Multipath Probing and Grouping in Multihomed Networks

    Jianxin LIAO  Jingyu WANG  Tonghong LI  Xiaomin ZHU  

     
    LETTER-Information Network

      Vol:
    E94-D No:3
      Page(s):
    710-713

    We propose a novel probing scheme capable of discovering shared bottlenecks among multiple paths between two multihomed hosts simultaneously, without any specific help from the network routers, and a subsequent grouping approach for partitioning these paths into groups. Simulation results show that the probing and grouping have an excellent performance under different network conditions.

  • Efficient Candidate Scheme for Fast Codebook Search in G.723.1

    Rong-San LIN  Jia-Yu WANG  

     
    PAPER-Speech and Hearing

      Vol:
    E95-D No:1
      Page(s):
    239-246

    In multimedia communication, due to the limited computational capability of the personal information machine, a coder with low computational complexity is needed to integrate services from several media sources. This paper presents two efficient candidate schemes to simplify the most computationally demanding operation, the excitation codebook search procedure. For fast adaptive codebook search, we propose an algorithm that uses residual signals to predict the candidate gain-vectors of the adaptive codebook. For the fixed codebook, we propose a fast search algorithm using an energy function to predict the candidate pulses, and we redesign the codebook structure to twin multi-track positions architecture. Overall simulation results indicate that the average perceptual evaluation of speech quality (PESQ) score is degraded slightly, by 0.049, and our proposed methods can reduce total computational complexity by about 67% relative to the original G.723.1 encoder computation load, and with perceptually negligible degradation. Objective and subjective evaluations verify that the more efficient candidate schemes we propose can provide speech quality comparable to that using the original coder approach.

  • Theoretical and Experimental Analysis of the Spurious Modes and Quality Factors for Dual-Mode AlN Lamb-Wave Resonators

    Haiyan SUN  Xingyu WANG  Zheng ZHU  Jicong ZHAO  

     
    PAPER-Ultrasonic Electronics

      Pubricized:
    2022/08/10
      Vol:
    E106-C No:3
      Page(s):
    76-83

    In this paper, the spurious modes and quality-factor (Q) values of the one-port dual-mode AlN lamb-wave resonators at 500-1000 MHz were studied by theoretical analysis and experimental verification. Through finite element analysis, we found that optimizing the width of the lateral reflection boundary at both ends of the resonator to reach the quarter wavelength (λ/4), which can improve its spectral purity and shift its resonant frequency. The designed resonators were micro-fabricated by using lithography processes on a 6-inch wafer. The measured results show that the spurious mode can be converted and dissipated, splitting into several longitudinal modes by optimizing the width of the lateral reflection boundary, which are consistent well with the theoretical analysis. Similarly, optimizing the interdigital transducer (IDT) width and number of IDT fingers can also suppress the resonator's spurious modes. In addition, it is found that there is no significant difference in the Qs value for the two modes of the dual-mode resonator with the narrow anchor and full anchor. The acoustic wave leaked from the anchor into the substrate produces a small displacement, and the energy is limited in the resonator. Compared to the resonator with Au IDTs, the resonator with Al IDTs can achieve a higher Q value due to its lower thermo-elastic damping loss. The measured results show the optimized dual-mode lamb-wave resonator can obtain Qs value of 2946.3 and 2881.4 at 730.6 MHz and 859.5 MHz, Qp values of 632.5 and 1407.6, effective electromechanical coupling coefficient (k2eff) of 0.73% and 0.11% respectively, and has excellent spectral purity simultaneously.

  • Fully Digital Calibration Technique for Channel Mismatch of TIADC at Any Frequency

    Hongmei CHEN  Jian WANG  Lanyu WANG  Long LI  Honghui DENG  Xu MENG  Yongsheng YIN  

     
    PAPER-Electronic Circuits

      Pubricized:
    2022/10/13
      Vol:
    E106-C No:3
      Page(s):
    84-92

    This paper presents a fully digital modulation calibration technique for channel mismatch of TIADC at any frequency. By pre-inputting a test signal in TIADC, the mismatch errors are estimated and stored, and the stored values will be extracted for compensation when the input signal is at special frequency which can be detected by a threshold judgement module, thus solving the problem that the traditional modulation calibration algorithm cannot calibrate the signal at special frequency. Then, by adjusting the operation order among the error estimation coefficient, modulation function and input signal in the calibration loop, further, the order of correlation and modulation in the error estimation module, the complexity of the proposed calibration algorithm is greatly reduced and it will not increase with the number of channels of TIADC. What's more, the hardware consumption of filters in calibration algorithm is greatly reduced by introducing a CSD (Canonical Signed Digit) coding technique based on Horner's rule and sub-expression sharing. Applied to a four-channel 14bit 560MHz TIADC system, with input signal at 75.6MHz, the FPGA verification results show that, after calibration, the spurious-free dynamic range (SFDR) improves from 33.47dB to 99.81dB and signal-to-noise distortion ratio (SNDR) increases from 30.15dB to 81.89dB.

  • Umbrellalike Hierarchical Artificial Bee Colony Algorithm

    Tao ZHENG  Han ZHANG  Baohang ZHANG  Zonghui CAI  Kaiyu WANG  Yuki TODO  Shangce GAO  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2022/12/05
      Vol:
    E106-D No:3
      Page(s):
    410-418

    Many optimisation algorithms improve the algorithm from the perspective of population structure. However, most improvement methods simply add hierarchical structure to the original population structure, which fails to fundamentally change its structure. In this paper, we propose an umbrellalike hierarchical artificial bee colony algorithm (UHABC). For the first time, a historical information layer is added to the artificial bee colony algorithm (ABC), and this information layer is allowed to interact with other layers to generate information. To verify the effectiveness of the proposed algorithm, we compare it with the original artificial bee colony algorithm and five representative meta-heuristic algorithms on the IEEE CEC2017. The experimental results and statistical analysis show that the umbrellalike mechanism effectively improves the performance of ABC.

41-60hit(72hit)