The search functionality is under construction.

Author Search Result

[Author] Yuan LI(40hit)

1-20hit(40hit)

  • Process Variation Based Electrical Model of STT-Assisted VCMA-MTJ and Its Application in NV-FA

    Dongyue JIN  Luming CAO  You WANG  Xiaoxue JIA  Yongan PAN  Yuxin ZHOU  Xin LEI  Yuanyuan LIU  Yingqi YANG  Wanrong ZHANG  

     
    PAPER-Semiconductor Materials and Devices

      Pubricized:
    2022/04/18
      Vol:
    E105-C No:11
      Page(s):
    704-711

    Fast switching speed, low power consumption, and good stability are some of the important properties of spin transfer torque assisted voltage controlled magnetic anisotropy magnetic tunnel junction (STT-assisted VCMA-MTJ) which makes the non-volatile full adder (NV-FA) based on it attractive for Internet of Things. However, the effects of process variations on the performances of STT-assisted VCMA-MTJ and NV-FA will be more and more obvious with the downscaling of STT-assisted VCMA-MTJ and the improvement of chip integration. In this paper, a more accurate electrical model of STT-assisted VCMA-MTJ is established on the basis of the magnetization dynamics and the process variations in film growth process and etching process. In particular, the write voltage is reduced to 0.7 V as the film thickness is reduced to 0.9 nm. The effects of free layer thickness variation (γtf) and oxide layer thickness variation (γtox) on the state switching as well as the effect of tunnel magnetoresistance ratio variation (β) on the sensing margin (SM) are studied in detail. Considering that the above process variations follow Gaussian distribution, Monte Carlo simulation is used to study the effects of the process variations on the writing and output operations of NV-FA. The result shows that the state of STT-assisted VCMA-MTJ can be switched under -0.3%≤γtf≤6% or -23%≤γtox≤0.2%. SM is reduced by 16.0% with β increases from 0 to 30%. The error rates of writing ‘0’ in the NV-FA can be reduced by increasing Vb1 or increasing positive Vb2. The error rates of writing ‘1’ can be reduced by increasing Vb1 or decreasing negative Vb2. The reduction of the output error rates can be realized effectively by increasing the driving voltage (Vdd).

  • Two Algorithms for Random Number Generation Implemented by Using Arithmetic of Limited Precision

    Tomohiko UYEMATSU  Yuan LI  

     
    PAPER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2542-2551

    This paper presents two different algorithms for random number generation. One algorithm generates a random sequence with an arbitrary distribution from a sequence of pure random numbers, i.e. a sequence with uniform distribution. The other algorithm generates a sequence of pure random numbers from a sequence of a given i.i.d. source. Both algorithms can be regarded as an implementation of the interval algorithm by using the integer arithmetic with limited precision. We analyze the approximation error measured by the variational distance between probability distributions of the desired random sequence and the output sequence generated by the algorithms. Further, we give bounds on the expected length of input sequence per one output symbol, and compare it with that of the original interval algorithm.

  • Subspace-Based Blind Detection of Space-Time Coding

    Zhengwei GONG  Taiyi ZHANG  Haiyuan LIU  Feng LIU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:3
      Page(s):
    853-858

    Space-time coding (STC) schemes for communication systems employing multiple transmit and receive antennas have received considerable interest recently. On space-time coding, some algorithms with perfect channel state information (CSI) have been proposed. In certain fast varying situation, however, it may be difficult to estimate the channel accurately and it is natural to study the blind detection algorithm without CSI. In this paper, based on subspace, a new blind detection algorithm without CSI is proposed. Using singular value decomposition (SVD) on output signal, noise subspace and signal subspace, which keep orthogonal to each other, are obtained. By searching the intersection of the signal subspace and the limited symbol vector set, symbol detection is achieved. The simulations illustrate that the proposed algorithm significantly improves system performance by receiving more output signals relative to transmit symbols. Furthermore, the presented algorithm is robust to the fading channel that changes between two successive blocks.

  • Data Detection for OFDM Systems with Phase Noise and Channel Estimation Errors Using Variational Inference

    Feng LI  Shuyuan LI  Hailin LI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:4
      Page(s):
    1037-1044

    This paper studies a novel iterative detection algorithm for data detection in orthogonal frequency division multiplexing systems in the presence of phase noise (PHN) and channel estimation errors. By simplifying the maximum a posteriori algorithm based on the theory of variational inference, an optimization problem over variational free energy is formulated. After that, the estimation of data, PHN and channel state information is obtained jointly and iteratively. The simulations indicate the validity of this algorithm and show a better performance compared with the traditional schemes.

  • A Near-Optimal Low-Complexity Transceiver for CP-Free Multi-Antenna OFDM Systems

    Chih-Yuan LIN  Jwo-Yuh WU  Ta-Sung LEE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:1
      Page(s):
    88-99

    Conventional orthogonal frequency division multiplexing (OFDM) system utilizes cyclic prefix (CP) to remove the channel-induced inter-symbol interference (ISI) at the cost of lower spectral efficiency. In this paper, a generalized sidelobe canceller (GSC) based equalizer for ISI suppression is proposed for uplink multi-antenna OFDM systems without CP. Based on the block representation of the CP-free OFDM system, there is a natural formulation of the ISI suppression problem under the GSC framework. By further exploiting the signal and ISI signature matrix structures, a computationally efficient partially adaptive (PA) implementation of the GSC-based equalizer is proposed for complexity reduction. The proposed scheme can be extended for the design of a pre-equalizer, which pre-suppresses the ISI and realizes CP-free downlink transmission to ease the computational burden of the mobile unit (MU). Simulation results show that the proposed GSC-based solutions yield equalization performances almost identical to that obtained by the conventional CP-based OFDM systems and are highly resistant to the increase in channel delay spread.

  • A Genetic Grey-Based Neural Networks with Wavelet Transform for Search of Optimal Codebook

    Chi-Yuan LIN  Chin-Hsing CHEN  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E86-A No:3
      Page(s):
    715-721

    The wavelet transform (WT) has recently emerged as a powerful tool for image compression. In this paper, a new image compression technique combining the genetic algorithm (GA) and grey-based competitive learning network (GCLN) in the wavelet transform domain is proposed. In the GCLN, the grey theory is applied to a two-layer modified competitive learning network in order to generate optimal solution for VQ. In accordance with the degree of similarity measure between training vectors and codevectors, the grey relational analysis is used to measure the relationship degree among them. The GA is used in an attempt to optimize a specified objective function related to vector quantizer design. The physical processes of competition, selection and reproduction operating in populations are adopted in combination with GCLN to produce a superior genetic grey-based competitive learning network (GGCLN) for codebook design in image compression. The experimental results show that a promising codebook can be obtained using the proposed GGCLN and GGCLN with wavelet decomposition.

  • Uniquely Decodable Code for Two-User Multiple-Access Channel Using Complex-Valued Signal

    Yuan LI  Hidekazu MURATA  Susumu YOSHIDA  

     
    PAPER-Fundamental Theories

      Vol:
    E84-B No:3
      Page(s):
    581-588

    This paper discusses a communication system with a multiple-access channel where two users simultaneously send complex-valued signals in the same frequency-band. In this channel, ambiguity in decoding occurs when receiver trying to estimate each users' signal. In order to solve the ambiguity problem, a family of uniquely decodable code is derived in this paper. The uniquely decodable code is designed by using trellis-coded modulation (TCM) pair where the trellis structure of one TCM is a transformation of the other in the pair. It is theoretically proved that, with the proposed coding scheme, the composite received signal can be uniquely decomposed into the two constituent signals for any power ratio and any phase difference between the received two users' signals. Improvement of BER performance over non-uniquely decodable code is illustrated by computer simulation.

  • Fabrication Technology and Electronical Characteristics of Pt/TiO2-x/TiO2/TiO2+x/Pt Nano-Film Memristor

    Zhiyuan LI  Qingkun LI  Dianzhong WEN  

     
    PAPER

      Vol:
    E100-C No:5
      Page(s):
    475-481

    Key fabrication technology for the Pt/TiO2-x/TiO2/TiO2+x/Pt nano-film memristor is investigated, including preparing platinum (Pt) electrodes and TiO2-x/TiO2/TiO2+x nano-films. The effect of oxygen flow rate and deposition rate during fabrication on O:Ti ratio of thin films is demonstrated. The fabricated nano-films with different oxygen concentration are validated by the analyzed results from X-ray photoelectron spectroscopy (XPS). The obtained memristor device shows the typical resistive switching behavior and nonvolatile memory effects. An analytical device model for Pt/TiO2-x/TiO2/TiO2+x/Pt nano-film memristor is developed based on the fundamental linear relationships between drift-diffusion velocity and the electric field, and boundary conditions are also incorporated in this model. This model is able to predict the relation between variables in the form of explicit formula, which is very critical in memristor-based circuit designs. The measurement results from real devices validate the proposed analytical device model. Some deviations of the model from the measured data are also analyzed and discussed.

  • Design of Real-Time Self-Frame-Rate-Control Foreground Detection for Multiple Camera Surveillance System

    Tsung-Han TSAI  Chung-Yuan LIN  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:12
      Page(s):
    2513-2522

    Emerging video surveillance technologies are based on foreground detection to achieve event detection automatically. Integration foreground detection with a modern multi-camera surveillance system can significantly increase the surveillance efficiency. The foreground detection often leads to high computational load and increases the cost of surveillance system when a mass deployment of end cameras is needed. This paper proposes a DSP-based foreground detection algorithm. Our algorithm incorporates a temporal data correlation predictor (TDCP) which can exhibit the correlation of data and reduce computation based on this correlation. With the DSP-oriented foreground detection, an adaptive frame rate control is developed as a low cost solution for multi-camera surveillance system. The adaptive frame rate control automatically detects the computational load of foreground detection on multiple video sources and adaptively tunes the TDCP to meet the real-time specification. Therefore, no additional hardware cost is required when the number of deployed cameras is increased. Our method has been validated on a demonstration platform. Performance can achieve real-time CIF frame processing for a 16-camera surveillance system by single-DSP chip. Quantitative evaluation demonstrates that our solution provides satisfied detection rate, while significantly reducing the hardware cost.

  • Maximizing the Effective Channel Capacity of Power Controlled WCDMA Systems under Rayleigh Fading Environments

    Jiabin LIU  Shihua ZHU  Wenyuan LI  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E89-B No:3
      Page(s):
    879-885

    This paper studies the optimization of the effective channel capacity of wideband code division multiple access (WCDMA) systems under Rayleigh fading environments. Firstly, the results for Shannon capacity of fading channels with channel side information are reviewed, where the capacity is achieved by using an optimal power control scheme. Secondly, an optimal interference threshold is set for a given system outage probability Pout to minimize total interference. Finally, the effective channel capacity of WCDMA is defined and a target SIR level γ* is derived with the Lagrangian multiplier method to maximize the effective channel capacity. It is shown that is dependent on the power control interference ratio (PCIR) ρ, the number of diversity paths identified by the receiver M, and the outage probability of the system. Simulation results are provided to validate the theoretical deductions. We conclude that the total effective channel capacity will be maximized as long as M4, and ρ0.5 for a proper value of .

  • Constructing Even-Variable Symmetric Boolean Functions with High Algebraic Immunity

    Yuan LI  Hui WANG  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    362-366

    In this paper, we explicitly construct a large class of symmetric Boolean functions on 2k variables with algebraic immunity not less than d, where integer k is given arbitrarily and d is a given suffix of k in binary representation. If let d = k, our constructed functions achieve the maximum algebraic immunity. Remarkably, 2⌊ log2k ⌋ + 2 symmetric Boolean functions on 2k variables with maximum algebraic immunity are constructed, which are much more than the previous constructions. Based on our construction, a lower bound of symmetric Boolean functions with algebraic immunity not less than d is derived, which is 2⌊ log2d ⌋ + 2(k-d+1). As far as we know, this is the first lower bound of this kind.

  • A Wavelets Network Interpolation Algorithm for OFDM Channel Estimation Systems

    Haiyuan LIU  Taiyi ZHANG  Ruiping ZHANG  Feng LIU  

     
    PAPER

      Vol:
    E88-B No:2
      Page(s):
    520-525

    For the performance deficiency of the pilot symbol aided channel estimation in orthogonal frequency division multiplexing (OFDM) systems, the wavelets network interpolation channel estimator is proposed. By contrast with conventional methods, wavelets network interpolation channel estimator can guarantee the high transmission rate and lower Bit error rates (BER). Computer simulation results demonstrate that the proposed channel estimation method exhibit an improved performance compared to the conventional linear channel estimation methods and is robust to fading rate, especially in fast fading channels.

  • Subchannel and Power Allocation with Fairness Guaranteed for the Downlink of NOMA-Based Networks

    Qingyuan LIU  Qi ZHANG  Xiangjun XIN  Ran GAO  Qinghua TIAN  Feng TIAN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/06/08
      Vol:
    E103-B No:12
      Page(s):
    1447-1461

    This paper investigates the resource allocation problem for the downlink of non-orthogonal multiple access (NOMA) networks. A novel resource allocation method is proposed to deal with the problem of maximizing the system capacity while taking into account user fairness. Since the optimization problem is nonconvex and intractable, we adopt the idea of step-by-step optimization, decomposing it into user pairing, subchannel and power allocation subproblems. First, all users are paired according to their different channel gains. Then, the subchannel allocation is executed by the proposed subchannel selection algorithm (SSA) based on channel priority. Once the subchannel allocation is fixed, to further improve the system capacity, the subchannel power allocation is implemented by the successive convex approximation (SCA) approach where the nonconvex optimization problem is transformed into the approximated convex optimization problem in each iteration. To ensure user fairness, the upper and lower bounds of the power allocation coefficients are derived and combined by introducing the tuning coefficients. The power allocation coefficients are dynamically adjustable by adjusting the tuning coefficients, thus the diversified quality of service (QoS) requirements can be satisfied. Finally, simulation results demonstrate the superiority of the proposed method over the existing methods in terms of system performance, furthermore, a good tradeoff between the system capacity and user fairness can be achieved.

  • Pose-Free Face Swapping Based on a Deformable 3D Shape Morphable Model

    Yuan LIN  Shengjin WANG  

     
    PAPER-Computer Graphics

      Vol:
    E97-D No:2
      Page(s):
    305-314

    Traditional face swapping technologies require that the faces of source images and target images have similar pose and appearance (usually frontal). For overcoming this limit in applications this paper presents a pose-free face swapping method based on personalized 3D face modeling. By using a deformable 3D shape morphable model, a photo-realistic 3D face is reconstructed from a single frontal view image. With the aid of the generated 3D face, a virtual source image of the person with the same pose as the target face can be rendered, which is used as a source image for face swapping. To solve the problem of illumination difference between the target face and the source face, a color transfer merging method is proposed. It outperforms the original color transfer method in dealing with the illumination gap problem. An experiment shows that the proposed face reconstruction method is fast and efficient. In addition, we have conducted experiments of face swapping in a variety of scenarios such as children's story book, role play, and face de-identification stripping facial information used for identification, and promising results have been obtained.

  • An Efficient MAC Protocol for Improving the Network Throughput and Energy Efficiency for Ad Hoc Networks

    Chien-Yuan LIU  Chun-Hung LIN  

     
    PAPER-MAC Protocol

      Vol:
    E88-A No:9
      Page(s):
    2356-2363

    Ad hoc networks are becoming an interesting research area, as they inherently support unique network applications for the wireless communications in a rugged environment, which requires rapid deployment and is difficult to be provided by an infrastructure network. Many issues need to be addressed for the ad hoc networks. In this paper, we propose an efficient distributed coordination function on the media access control protocol to enhance the power conservation of mobile hosts by using a power control algorithm and the network throughput of an ad hoc network by using an algorithm for simultaneous frame transmissions. Extensive simulation is studied to evaluate the improvement of the proposed method. The results of the simulation exhibit significant improvement to the standard access control protocol. With slight improvement of network throughput, up to 85% of the consumed energy was able to be saved in compared to the standard protocol and up to 7 times of the energy efficiency was enhanced with the proposed method.

  • Flow Processing Optimization with Accelerated Flow Actions on High Speed Programmable Data Plane

    Zhiyuan LING  Xiao CHEN  Lei SONG  

     
    PAPER-Network System

      Pubricized:
    2022/08/10
      Vol:
    E106-B No:2
      Page(s):
    133-144

    With the development of network technology, next-generation networks must satisfy many new requirements for network functions and performance. The processing of overlong packet fields is one of the requirements and is also the basis for ID-based routing and content lookup, and packet field addition/deletion mechanisms. The current SDN switches do not provide good support for the processing of overlong fields. In this paper, we propose a series of optimization mechanisms for protocol-oblivious instructions, in which we address the problem of insufficient support for overlong data in existing SDN switches by extending the bit width of instructions and accelerating them using SIMD instruction sets. We also provide an intermediate representation of the protocol-oblivious instruction set to improve the efficiency of storing and reading instruction blocks, and further reduce the execution time of instruction blocks by preprocessing them. The experiments show that our approach improves the performance of overlong data processing by 56%. For instructions involving packet field addition and deletion, the improvement in performance reaches 455%. In normal forwarding scenarios, our solution reduces the packet forwarding latency by around 30%.

  • Secure Communication Using Scramble Phase Assisting WFRFT

    Yuan LIANG  Xinyu DA  Ruiyang XU  Lei NI  Dong ZHAI  Yu PAN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/10/03
      Vol:
    E102-B No:4
      Page(s):
    779-789

    In this paper, a scramble phase assisting weighted-type fractional Fourier transform (SPA-WFRFT) based system is proposed to guarantee the communication's security. The original transmitting signal is divided into two parts. The first part is modulated by WFRFT and subsequently makes up the constellation beguiling. The other part is used to generate the scramble phase and also to assist in the encryption of the WFRFT modulated signal dynamically. The novel constellation optimal model is built and solved through the genetic algorithm (GA) for the constellation beguiling. And the double pseudo scheme is implemented for the scramble phase generation. Theoretical analyses show that excellent security performances and high spectral efficiency can be attained. Final simulations are carried out to evaluate the performances of the SPA-WFRFT based system, and demonstrate that the proposed system can effectively degrade the unauthorized receivers' bit error rate (BER) performance while maintaining its own communication quality.

  • Survivable Virtual Network Topology Protection Method Based on Particle Swarm Optimization

    Guangyuan LIU  Daokun CHEN  

     
    LETTER-Information Network

      Pubricized:
    2020/03/04
      Vol:
    E103-D No:6
      Page(s):
    1414-1418

    Survivable virtual network embedding (SVNE) is one of major challenges of network virtualization. In order to improve the utilization rate of the substrate network (SN) resources with virtual network (VN) topology connectivity guarantee under link failure in SN, we first establishes an Integer Linear Programming (ILP) model for that under SN supports path splitting. Then we designs a novel survivable VN topology protection method based on particle swarm optimization (VNE-PSO), which redefines the parameters and related operations of particles with the embedding overhead as the fitness function. Simulation results show that the solution significantly improves the long-term average revenue of the SN, the acceptance rate of VN requests, and reduces the embedding time compared with the existing research results.

  • Theoretical Analysis of BER Performance Bounds of Trellis-Coded Co-channel Interference Canceller

    Yuan LI  Hidekazu MURATA  Susumu YOSHIDA  

     
    PAPER-Mobile Communication

      Vol:
    E81-B No:4
      Page(s):
    754-761

    Co-channel interference is a major deteriorating factor limiting the capacity of mobile communication systems. To mitigate the effect of the interference, a kind of nonlinear interference canceller named trellis-coded co-channel interference canceller (TCC) has been proposed. In TCC the trellis-coded modulation (TCM) is introduced to both the desired signal and the interference signal in order to enhance the cancelling performance. In this paper, the bit error rate (BER) performance of TCC in static channel is theoretically evaluated for the first time. An equivalent TCM (E-TCM) model is firstly established, and a BER asymptotic estimate (AE) and a BER upper bound (UB) of TCC are then evaluated respectively by analyzing E-TCM. In the evaluation of AE, the BER performance is calculated as a function of phase difference between the desired signal and the interference signal (φ), subsequently the average BER performance over φ can be evaluated. The UB of BER is calculated using a transfer function based on the matrix representation. This paper also demonstrates that AE gives higher accuracy and less calculation complexity than UB. Performance comparisons reveal the consistency of these theoretical results with that of computer simulations.

  • Constructing and Counting Boolean Functions on Even Variables with Maximum Algebraic Immunity

    Yuan LI  Min YANG  Haibin KAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:3
      Page(s):
    640-643

    A method to construct Boolean functions with maximum algebraic immunity have been proposed in . Based on that method, we propose a different method to construct Boolean functions on even variables with maximum algebraic immunity in this letter. By counting on our construction, a lower bound of the number of such Boolean functions is derived, which is the best among all the existing lower bounds.

1-20hit(40hit)