41 results on '"Yupeng, Zhang"'
Search Results
2. Random Number Generation Based DoS Attack-resilient Distributed Secondary Control Strategy
- Author
-
Shuang Qie, Jian Dou, Xuan Liu, Yue Tang, Yupeng Zhang, and Yi Zheng
- Published
- 2022
3. Accelerating Federated Learning on Non-IID Data Against Stragglers
- Author
-
Yupeng Zhang, Lingjie Duan, and Ngai-Man Cheung
- Published
- 2022
4. optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNY
- Author
-
Jinhai Chen, Zheng Gong, Yufeng Tang, Yupeng Zhang, and Bin Li
- Published
- 2022
5. Fiber-Optic Temperature Sensor Based on Difference of Thermal Expansion Coefficient Between Fused Silica and Metallic Materials
- Author
-
Xuefeng Li, Shuo Lin, Jinxing Liang, Yupeng Zhang, Hiroshi Oigawa, and Toshitsugu Ueda
- Subjects
Fabry–Perot interferometric (FFPI) ,fiber sensor ,thermal expansion coefficient ,focused ion beam milling ,Applied optics. Photonics ,TA1501-1820 ,Optics. Light ,QC350-467 - Abstract
In this paper, we report a novel fiber-optic Fabry-Perot interferometric (FFPI) temperature sensor based on the difference of thermal expansion coefficient between fused silica and metallic materials. The sensor head is made by a single-mode fiber (SMF). A gold film and a nickel film are sputtered and electroplated on the surface of the SMF. Then, a microcavity is micromachined by focused ion beam (FIB) milling. Because the thermal expansion coefficient of nickel is about 20 times of fused silica, the different thermal expansions force the sensor head to bend when the temperature is high or low. Its temperature sensitivity is over 14 pm/°C in a wide range from -79°C to +70°C. And the coefficient of determination R2 is excellent (over 0.995). Moreover, the metallic cylinder can reinforce the cavity spot of the fiber sensor, so that this kind of sensor can work in harsh environments. For the first time to the best of our knowledge, we report this type of FFPI temperature sensor based on difference of thermal expansion coefficient between fused silica and metallic materials.
- Published
- 2012
- Full Text
- View/download PDF
6. Geometric Invariant Representation Learning for 3D Point Cloud
- Author
-
Zongmin Li, Yupeng Zhang, and Yun Bai
- Published
- 2021
7. Study on the cooperative output characteristics of PV arrays under load variation
- Author
-
Jizhe Lu, Zhongxing Wu, Yupeng Zhang, Shuang Qie, and Jian Dou
- Subjects
Load management ,Electric power system ,Digital signal processor ,business.industry ,Computer science ,Distributed generation ,Control system ,Control (management) ,Process (computing) ,Control engineering ,business ,Power (physics) - Abstract
In order to efficiently manage the output power of the distributed generation system with multiple PV arrays, in this paper, a cooperative control strategy is used to control the output power ratio under load variation. Aiming at the real-time simulation requirements and real communication conditions, the validation process of the strategy is carried on a designed co-simulation platform with hardware-in-the-loop functionality. The power system model is built and simulated in RT-LAB. Cooperative control strategy is embedded in the developed hardware controllers based on digital signal processors, and the connected communication between them is accessed to a real-life switch equipment. The simulation results validate the effectiveness of the cooperative strategy and consider the real-world simulation conditions.
- Published
- 2021
8. Multiple Autonomous Underwater Vehicles Cooperative Localization Based on Asynchronous Relative Observation
- Author
-
Xiaoqiang Wu, Xixiang Liu, Yupeng Zhang, Chenlong Li, and Xiaoshuang Ma
- Subjects
0209 industrial biotechnology ,Computer science ,Covariance matrix ,Node (networking) ,Real-time computing ,02 engineering and technology ,Kalman filter ,Sensor fusion ,020901 industrial engineering & automation ,Asynchronous communication ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,State (computer science) ,Underwater ,Localization system - Abstract
The asynchronous relative observations are incorporated in the cooperative localization system of multiple Autonomous Underwater Vehicles (AUVs) in unknown environment in this paper. First, the motion model of multi-AUV cooperative localization system is established. Then, the asynchronous relative observation is obtained when two AUVs meet and the corresponding measurement model is introduced. The state and the covariance matrix of this AUVs group can be easily distributed and calculated on each AUV platform node by using the distributed extend Kalman filtering (DEKF) algorithm. The cooperative localization with the proposed DEKF algorithm was implemented and tested in the simulated environment. The theoretical analysis and simulation results showed that the asynchronous relative observation between AUVs can be effectively fused by the DEKF method.
- Published
- 2021
9. Research on Intelligent Management of Student Achievement Data Based on Improved Apriori Algorithm
- Author
-
Wang Chunfang and Yupeng Zhang
- Subjects
College English ,Disk formatting ,Apriori algorithm ,Computer science ,Vocational education ,Student achievement ,media_common.quotation_subject ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Quality (business) ,Intelligent management ,Test (assessment) ,media_common - Abstract
Teaching management personnel can use the database to deeply mine the comprehensive analysis of student performance data, further improve the level of education and teaching management, and use the improved Apriori correlation algorithm to conduct correlation analysis between courses. Students in Weifang Vocational College English lessons, computer lessons and computers. The grade test scores are used as mining objects. The improved Apriori correlation algorithm results show that the computer grade test scores are closely related to the calculated course scores and English scores, and scientific and rational suggestions are provided for the teaching arrangement of academic affairs. Improve the quality of education and teaching and make good decisions.
- Published
- 2021
10. Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
- Author
-
Yupeng Zhang, Dawn Song, Jiaheng Zhang, and Tiancheng Xie
- Subjects
Polynomial ,Cryptographic primitive ,Delegation ,Computational complexity theory ,business.industry ,Computer science ,media_common.quotation_subject ,Hash function ,Cryptography ,Merkle tree ,Verifiable secret sharing ,Zero-knowledge proof ,Arithmetic ,business ,media_common - Abstract
We present a new succinct zero knowledge argument scheme for layered arithmetic circuits without trusted setup. The prover time is O(C + nlogn) and the proof size is O(D logC +log2 n) for a D-depth circuit with n inputs and C gates. The verification time is also succinct, O(D logC + log2 n), if the circuit is structured. Our scheme only uses lightweight cryptographic primitives such as collision-resistant hash functions and is plausibly post-quantum secure. We implement a zero knowledge argument system, Virgo, based on our new scheme and compare its performance to existing schemes. Experiments show that it only takes 53 seconds to generate a proof for a circuit computing a Merkle tree with 256 leaves, at least an order of magnitude faster than all other succinct zero knowledge argument schemes. The verification time is 50ms, and the proof size is 253KB, both competitive to existing systems.Underlying Virgo is a new transparent zero knowledge verifiable polynomial delegation scheme with logarithmic proof size and verification time. The scheme is in the interactive oracle proof model and may be of independent interest.
- Published
- 2020
11. A DFT-Based Channel Estimation Algorithm with Noise Elimination for Burst OFDM Systems
- Author
-
Yupeng Zhang and Kai Liu
- Subjects
Sequence ,Computer science ,Orthogonal frequency-division multiplexing ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Noise (electronics) ,Discrete Fourier transform ,Cyclic prefix ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Fading ,Algorithm ,Computer Science::Information Theory ,Communication channel - Abstract
Accurate channel estimation can greatly improve the performance of burst OFDM system by compensating channel fading. Channel estimation based on discrete Fourier transform (DFT) is suitable for burst OFDM systems due to its low complexity and short convergence time. Traditional DFT-based channel estimation algorithm does not consider the noise influence within the length of cyclic prefix, which greatly decreases its performance. A DFT-based channel estimation algorithm with noise elimination (DCEA/NE) is proposed to estimate the instantaneous signal-to-noise ratio (SNR) using the training sequence in the burst OFDM system, and based on this, eliminate the noise influence. Simulation results show that the proposed algorithm outperforms the traditional DFT-based channel estimation algorithm.
- Published
- 2019
12. Multiple Scattering Effects in Lidar and Its Potential Application for Water Cloud Detection
- Author
-
Kai Zhang, Qun Liu, Xiaoyu Cui, Nanchao Wang, Yupeng Zhang, Dong Liu, Xue Shen, and Yudi Zhou
- Subjects
Effective radius ,Scattering ,business.industry ,Monte Carlo method ,Field of view ,Cloud computing ,Lidar ,Extinction (optical mineralogy) ,Cloud base ,Environmental science ,business ,Astrophysics::Galaxy Astrophysics ,Physics::Atmospheric and Oceanic Physics ,Remote sensing - Abstract
The water cloud plays an important role in the energy balance as well as the precipitation processes of the Earth system. The aerosol-cloud-precipitation interaction still contributes very large uncertainties for the climate prediction. Lidar is a powerful tool for cloud detection as the properties of cloud base can be obtained with high temporal-spatial resolution. Due to the effective radius of cloud droplet is quite large comparing with laser wavelength, the single scattering lidar equation cannot be used directly for cloud lidar as the multiple scattering effects cannot be ignored. Accurate forward model accounting for the multiple scattering effects is the foundation for the retrieval of cloud extinction coefficient and maybe also other micro-physical properties of cloud. In this paper, a semi-analytic Monte Carlo (MC) simulation program is developed for multiple scattering effects modeling in cloud lidar. And then MC simulations are performed for different lidar parameters (mainly different receiving field of view, FOV) with different cloud models and the simulation results are compared with the semi-analytical/analytical models based on the quasi-small-angle (QSA) approximation. The results demonstrate that the semi-analytical/analytical multiple scattering models based on QSA approximation have acceptable accuracy for ground-based cloud lidar applications in most cases. According to these simulations, we also examined the possibility for retrieving the extinction coefficients and the effective radius of water cloud simultaneously with multi-FOV lidar and optimal design of the multi-FOV lidar would be also talked.
- Published
- 2019
13. Research on Dynamic Weight Task Scheduling Algorithm Based on Thread Pool
- Author
-
Shiqun Yin and Yupeng Zhang
- Subjects
Computer science ,Distributed computing ,Pooling ,020207 software engineering ,02 engineering and technology ,Dynamic priority scheduling ,Thread (computing) ,Scheduling (computing) ,Instruction set ,020204 information systems ,Multithreading ,0202 electrical engineering, electronic engineering, information engineering ,Thread pool ,Task analysis ,Queue - Abstract
When an IT company processes a large number of tasks in a high-concurrency scenario, it usually establishes one or more task queues for these tasks, and then uses multithreading to handle these tasks concurrently. As a pooling technology, the thread pool can greatly improve the performance of applications, especially when facing a large number of concurrent application scenarios. This paper presents a dynamic thread task scheduling algorithm based on thread pool (DWTSTP). The algorithm can not only perform efficient scheduling and execution of tasks in multiple task queues, but also dynamically adjust the capacity of the thread pool to maximize the performance of the thread pool. Experiments show that the algorithm presented in this paper is superior to the traditional task scheduling method based on thread pool in task processing efficiency
- Published
- 2018
14. Research on Personalized Recommendation Algorithm Based on Time Weighted and Sparse Space Clustering
- Author
-
Shiqun Yin, Yupeng Zhang, Tao Tan, and Pengchao Sun
- Subjects
Set (abstract data type) ,business.industry ,Computer science ,Collaborative filtering ,The Internet ,Recommender system ,business ,Cluster analysis ,Algorithm ,MovieLens ,k-nearest neighbors algorithm - Abstract
Collaborative filtering algorithm is one of the most successful recommendation algorithms in personalized recommendation system, but the traditional algorithm does not consider the user's interest changes in different time periods, resulting in the set of neighbors may not be the nearest neighbor set. what is more.because of data sparsity and computational complexity, the efficiency of the algorithm is poor. time-weighting and clustering appear as a nature solution to this problem. So this paper proposes a collaborative filtering algorithm based on users' interest in different time period. First.the algorithm performs sparse subspace clustering on users solving data sparsity problem and improving the accuracy for searching similar neighbors, then we assigns each item a score that gradually decreases with time using the weighted score and find the nearest neighbor of the target user. According to the history of similar friends' watching videos, recommend high rated videos to target users. We conduct experiments using real dates from movielens to verify our algorithm and evaluate its performance. Experiments demonstrate that the improved algorithm improves the recommendation quality of the collaborative filtering recommendation system.
- Published
- 2018
15. vRAM: Faster Verifiable RAM with Program-Independent Preprocessing
- Author
-
Charalampos Papamanthou, Dimitrios Papadopoulos, Jonathan Katz, Yupeng Zhang, and Daniel Genkin
- Subjects
021110 strategic, defence & security studies ,Constant (computer programming) ,Memory management ,Computer science ,Computation ,Overhead (engineering) ,0211 other engineering and technologies ,Verifiable secret sharing ,02 engineering and technology ,State (computer science) ,Parallel computing - Abstract
We study the problem of verifiable computation (VC) for RAM programs, where a computationally weak verifier outsources the execution of a program to a powerful (but untrusted) prover. Existing efficient implementations of VC protocols require an expensive preprocessing phase that binds the parties to a single circuit. (While there are schemes that avoid preprocessing entirely, their performance remains significantly worse than constructions with preprocessing.) Thus, a prover and verifier are forced to choose between two approaches: (1) Allow verification of arbitrary RAM programs, at the expense of efficiency, by preprocessing a universal circuit which can handle all possible instructions during each CPU cycle; or (2) Sacrifice expressiveness by preprocessing an efficient circuit which is tailored to the verification of a single specific RAM program. We present vRAM, a VC system for RAM programs that avoids both the above drawbacks by having a preprocessing phase that is entirely circuit-independent (other than an upper bound on the circuit size). During the proving phase, once the program to be verified and its inputs are chosen, the circuit-independence of our construction allows the parties to use a smaller circuit tailored to verifying the specific program on the chosen inputs, i.e., without needing to encode all possible instructions in each cycle. Moreover, our construction is the first with asymptotically optimal prover overhead; i.e., the work of the prover is a constant multiplicative factor of the time to execute the program. Our experimental evaluation demonstrates that vRAM reduces the prover's memory consumption by 55-110x and its running time by 9-30x compared to existing schemes with universal preprocessing. This allows us to scale to RAM computations with more than 2 million CPU cycles, a 65x improvement compared to the state of the art. Finally, vRAM has performance comparable to (and sometimes better than) the best existing scheme with program-specific preprocessing despite the fact that the latter can deploy program-specific optimizations (and has to pay a separate preprocessing cost for every new program).
- Published
- 2018
16. Studies on time comparison technology of unified time controller of survey vessels
- Author
-
Hongyuan Liu and Yupeng Zhang
- Subjects
Generator (circuit theory) ,Consistency (database systems) ,Correctness ,Software ,Computer science ,Control theory ,business.industry ,Comparison results ,Value (computer science) ,Point (geometry) ,business - Abstract
This paper takes the alert problem of the unified time controller as the point of penetration, and then, by analyzing the time comparison principle of the controller, it could be concluded that the time comparison mechanism is flawed. When there is not any reference source of “time comparison consensus”, two pieces of reference source time whose time flags are “reliable” are not equal, and correct discrimination could not be achieved, leading to the alert of all the time. By upgrading controller software, adding new discrimination conditions, When there is not any reference source of “time comparison consensus”, clearing all the comparison results of reference source time, comparing all the reference source time and generator time, and deciding if all the time is of consistency according to the principle of large number decision, the wrong discrimination of the correct time is avoided. This method improves the time comparison mechanism of the controller, increases the precision and correctness of time difference measurement, and is of highly popularizing value for the improvement of unified time synchronization.
- Published
- 2017
17. SecureML: A System for Scalable Privacy-Preserving Machine Learning
- Author
-
Payman Mohassel and Yupeng Zhang
- Subjects
Information privacy ,Artificial neural network ,business.industry ,Computer science ,Online machine learning ,020206 networking & telecommunications ,02 engineering and technology ,Machine learning ,computer.software_genre ,Data modeling ,Server ,Softmax function ,0202 electrical engineering, electronic engineering, information engineering ,Secure multi-party computation ,020201 artificial intelligence & image processing ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Machine learning is widely used in practice to produce predictive models for applications such as image processing, speech and text recognition. These models are more accurate when trained on large amount of data collected from different sources. However, the massive data collection raises privacy concerns. In this paper, we present new and efficient protocols for privacy preserving machine learning for linear regression, logistic regression and neural network training using the stochastic gradient descent method. Our protocols fall in the two-server model where data owners distribute their private data among two non-colluding servers who train various models on the joint data using secure two-party computation (2PC). We develop new techniques to support secure arithmetic operations on shared decimal numbers, and propose MPC-friendly alternatives to non-linear functions such as sigmoid and softmax that are superior to prior work. We implement our system in C++. Our experiments validate that our protocols are several orders of magnitude faster than the state of the art implementations for privacy preserving linear and logistic regressions, and scale to millions of data samples with thousands of features. We also implement the first privacy preserving system for training neural networks.
- Published
- 2017
18. vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
- Author
-
Dimitrios Papadopoulos, Jonathan Katz, Yupeng Zhang, Charalampos Papamanthou, and Daniel Genkin
- Subjects
SQL ,Database ,Computer science ,InformationSystems_DATABASEMANAGEMENT ,02 engineering and technology ,Cryptographic protocol ,Data Transformation Services ,computer.software_genre ,User-defined function ,Spatial query ,020204 information systems ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Cloud database ,020201 artificial intelligence & image processing ,Query by Example ,Row ,computer ,computer.programming_language - Abstract
Cloud database systems such as Amazon RDS or Google Cloud SQLenable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify the correctness of responses returned by the (untrusted) server. In this paper we present vSQL, a novel cryptographic protocol for publicly verifiable SQL queries on dynamic databases. At a high level, our construction relies on two extensions of the CMT interactive-proof protocol [Cormode et al., 2012]: (i) supporting outsourced input via the use of a polynomial-delegation protocol with succinct proofs, and (ii) supporting auxiliary input (i.e., non-deterministic computation) efficiently. Compared to previous verifiable-computation systems based on interactive proofs, our construction has verification cost polylogarithmic in the auxiliary input (which for SQL queries can be as large as the database) rather than linear. In order to evaluate the performance and expressiveness of our scheme, we tested it on SQL queries based on the TPC-H benchmark on a database with 6 million rows and 13 columns. The server overhead in our scheme (which is typically the main bottleneck) is up to 120 times lower than previousapproaches based on succinct arguments of knowledge (SNARKs), and moreover we avoid the need for query-dependent pre-processing which is required by optimized SNARK-based schemes. In our construction, the server/client time and the communication cost are comparable to, and sometimessmaller than, those of existing customized solutions which only support specific queries.
- Published
- 2017
19. An Expressive (Zero-Knowledge) Set Accumulator
- Author
-
Jonathan Katz, Charalampos Papamanthou, and Yupeng Zhang
- Subjects
021110 strategic, defence & security studies ,Theoretical computer science ,Generic group model ,Computer science ,business.industry ,0211 other engineering and technologies ,Cryptography ,02 engineering and technology ,Gas meter prover ,Data structure ,Accumulator (cryptography) ,Public-key cryptography ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Zero-knowledge proof ,Hydraulic accumulator ,business - Abstract
We present a new construction of an expressive set accumulator. Unlike existing cryptographic accumulators, ours provides succinct proofs for a large collection of operations over accumulated sets, including intersection, union, set difference, SUM, COUNT, MIN, MAX, and RANGE, as well as arbitrary nestings of the above. We also show how to extend our accumulator to be zero-knowledge. The security of our accumulator is based on extractability assumptions and other assumptions that hold in the generic group model. Our construction has asymptotically optimal verification complexity and proof size, constant update complexity, and public verifiability/updatability—namely, any client who knows the public key and the last accumulator value can verify the supported operations and update the accumulator. The expressiveness of our accumulator comes at the cost of quadratic prover time. However, we show that the cryptographic operations involved are cheap compared to those incurred by generic approaches (e.g., SNARKs) that are equally expressive: our prover runs faster for sets of up to 5 million items. Our accumulator serves as a powerful cryptographic tool with many applications. For example, it can be applied to efficiently support verification of a rich collection of SQL queries when used as a drop-in replacement in existing verifiable database systems (e.g., IntegriDB, CCS 2015).
- Published
- 2017
20. Exploring LTE-V link level performance by geometry enhanced winner II channel model
- Author
-
Yi, Gong, primary, Shengchu, Wang, additional, Yupeng, Zhang, additional, Feng, Luo, additional, and Lin, Zhang, additional
- Published
- 2018
- Full Text
- View/download PDF
21. High-spectral-resolution lidar for ocean biological carbon pump studies
- Author
-
Zhongtao Cheng, Yongying Yang, Chong Liu, Yupeng Zhang, Qun Liu, Kaiwei Wang, Jing Luo, Jian Bai, Peituo Xu, Yibing Shen, Dong Liu, and Yudi Zhou
- Subjects
business.industry ,Michelson interferometer ,law.invention ,Interferometry ,Wavelength ,Optics ,Geography ,Lidar ,Brillouin scattering ,law ,Temporal resolution ,Spectral resolution ,Optical filter ,business ,Remote sensing - Abstract
Processes and strengths of the ocean's biological carbon pump are significant to the study of ocean carbon cycle. However, the development and the utilization of the ocean's biological carbon pump are greatly limited because of human's limited knowledge of the ocean. Remote sensing methods have played important roles in understanding and exploring the ocean, and the lidar is one of the most outstanding representatives for its high spatial and temporal resolution, especially the ability of the vertical detection. High-spectral-resolution lidar (HSRL) employs an ultra-narrow spectral filter to separate scattering signals between particles and water molecules without assuming a lidar ratio, and obtains the optical properties of the ocean with a high accuracy. Nevertheless, the complexity of the seawater causes variable optical properties, which gives huge potentiality to develop the HSRL working at different wavelengths in order to promote the inversion accuracy and increase the detection depth. The field-widened Michelson interferometer (FWMI), whose central transmittance can be tuned to any wavelength, can be employed as the HSRL spectral filter and solve the problem that the operating wavelength of the iodine filter cannot change. Moreover, the FWMI has a very large field of view, which gives its superiority over Fabry-Perot interferometer that is an another popular HSRL filter. The principle of the HSRL based on the FWMI designing for the ocean remote sensing will be presented in detail. Furthermore, the availability of the application of the FWMI influenced by the disturbance of the states of Brillouin scattering is analyzed and the preliminary theory shows that the HSRL instrument basing on FWMI could be employed in the marine remote sensing with a high accuracy.
- Published
- 2016
22. Fiber-Optic Temperature Sensor Based on Difference of Thermal Expansion Coefficient Between Fused Silica and Metallic Materials
- Author
-
Hiroshi Oigawa, Xuefeng Li, Yupeng Zhang, Jinxing Liang, Shuo Lin, and Toshitsugu Ueda
- Subjects
lcsh:Applied optics. Photonics ,Materials science ,Optical fiber ,Fabry–Perot interferometric (FFPI) ,focused ion beam milling ,business.industry ,fiber sensor ,lcsh:TA1501-1820 ,Sputter deposition ,Focused ion beam ,Temperature measurement ,Atomic and Molecular Physics, and Optics ,Thermal expansion ,law.invention ,Surface micromachining ,Optics ,law ,Thermal ,thermal expansion coefficient ,lcsh:QC350-467 ,Fiber ,Electrical and Electronic Engineering ,Composite material ,business ,lcsh:Optics. Light - Abstract
In this paper, we report a novel fiber-optic Fabry-Perot interferometric (FFPI) temperature sensor based on the difference of thermal expansion coefficient between fused silica and metallic materials. The sensor head is made by a single-mode fiber (SMF). A gold film and a nickel film are sputtered and electroplated on the surface of the SMF. Then, a microcavity is micromachined by focused ion beam (FIB) milling. Because the thermal expansion coefficient of nickel is about 20 times of fused silica, the different thermal expansions force the sensor head to bend when the temperature is high or low. Its temperature sensitivity is over 14 pm/°C in a wide range from -79°C to +70°C. And the coefficient of determination R2 is excellent (over 0.995). Moreover, the metallic cylinder can reinforce the cavity spot of the fiber sensor, so that this kind of sensor can work in harsh environments. For the first time to the best of our knowledge, we report this type of FFPI temperature sensor based on difference of thermal expansion coefficient between fused silica and metallic materials.
- Published
- 2012
23. Key technology and application of energy measurement data security
- Author
-
Enguo, Zhu, primary, Xingqi, Liu, additional, Heping, Zou, additional, Zhongxing, Wu, additional, and Yupeng, Zhang, additional
- Published
- 2017
- Full Text
- View/download PDF
24. Status and challenges of synthetic vision system for civil aviation of China
- Author
-
Xiujian Deng and Yupeng Zhang
- Subjects
Engineering ,Aeronautics ,business.industry ,Synthetic vision system ,Civil aviation ,Aircraft maintenance ,business ,China - Published
- 2014
25. Anonymous Camera for Privacy Protection
- Author
-
Yupeng Zhang, Yuheng Lu, Rin-ichiro Taniguchi, and Hajime Nagahara
- Subjects
Liquid crystal on silicon ,Video capture ,business.industry ,Computer science ,Privacy protection ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,RGB color model ,Computer vision ,Smart camera ,Artificial intelligence ,Raw data ,business ,Masking (Electronic Health Record) - Abstract
Privacy protection in the surveillance video data has received great attention. Although tremendous works have been proposed to provide effective privacy protection techniques, most of the algorithms are based on post-processing that deletes, obscures or encrypts the privacy information after privacy-included raw data are recorded. Consequently, they are vulnerable to raw data leak out, which may lead to unauthorized use. Therefore, it is imperative to develop a new privacy protection scheme which is capable of excluding any privacy information at the video recording phase. In this paper, we propose an anonymous camera aiming to protect the privacy of individuals at the video capturing phase by optical masking technique. It effectively reduces the risk of raw data leakage because no privacy information will be recorded by the camera. We implemented a prototype camera, which consists of an infrared camera, a RGB camera and a liquid crystal on silicon (LCoS) device. We introduce optical design and performance of the anonymous camera, the masking algorithm as well as the calibration methodology. Experimental results demonstrate that our prototype anonymous camera can perform accurate real time masking of the face for privacy protection.
- Published
- 2014
26. Time Machine: A Mobile Augmented Reality System for Tourism Based on Coded-Aperture Camera
- Author
-
Yupeng Zhang, Dandan Meng, Dongdong Weng, and Dan Feng
- Subjects
Landmark ,Panorama ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Mobile computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,GeneralLiterature_MISCELLANEOUS ,Crowds ,Kernel (image processing) ,Computer graphics (images) ,Computer vision ,Augmented reality ,Artificial intelligence ,Mobile telephony ,Coded aperture ,business ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Time Machine is an Augmented Reality (AR) system for enhancing tourists' traveling experience. Based on optimized panoramic images, we proposed a novel spatiotemporal interactive approach which imbues users the ability to interact with both the spatial world and its history. Time machine utilizes panorama of a specific place at different time for achieving interactions with temporal dimension. It also adopts interior panorama of landmark building which can be used by the user to interact with the physical world. Additionally, the panoramas optimized by aperture-coded camera can alleviate the noisy foreground information such as crowds and address defocus blurring to improve the quality of panorama.
- Published
- 2013
27. Dimension optimization for a miniature high-frequency quartz resonatore
- Author
-
Meng Zhao, Yupeng Zhang, Toshitsugu Ueda, Satoshi Ikezawa, and Jing Ji
- Subjects
Microelectromechanical systems ,Optimal design ,Coupling ,Vibration ,Resonator ,Materials science ,Acoustics ,Electronic engineering ,Finite element method ,Coupling coefficient of resonators ,Helical resonator - Abstract
In this paper, optimal design of a miniature AT-cut high-frequency quartz resonator is presented. This miniature AT-cut high-frequency quartz resonator is about only 25% of the AT-cut high-frequency resonator products in current market. It can be fabricated by our newly developed manufacturing process of MEMS quartz resonator, which cannot be realized by previous mechanical process. A three-dimensional finite element model using linear cuboid-type elements was established to carry out eigen-frequency analysis. To describe quantitatively the spurious coupling strength, we carried out the linear regression analysis to recover the ideal fundamental thickness-shear vibration without spurious vibration coupling, and introduced a parameter named coupling coefficient. To describe quantitatively the energy trapping performance of the resonator, we introduced a parameter named energy trapping rate defined by ratio of vibration energy inside and outside of electrode region. Optimal dimensions of resonator providing small coupling coefficient and large energy trapping rate were determined. The optimization method can certainly be applied in the development of the miniature high-frequency quartz resonators.
- Published
- 2013
28. Distributed load balancing in a multiple server system by shift-invariant protocol sequences
- Author
-
Wing Shing Wong and Yupeng Zhang
- Subjects
Routing protocol ,Static routing ,Zone Routing Protocol ,Dynamic Source Routing ,Computer science ,Wireless network ,business.industry ,Distributed computing ,Enhanced Interior Gateway Routing Protocol ,Path vector protocol ,Wireless Routing Protocol ,Round-robin DNS ,Geographic routing ,Load balancing (computing) ,Distance-vector routing protocol ,Link-state routing protocol ,Routing domain ,Distributed algorithm ,Interior gateway protocol ,Resource allocation ,Hazy Sighted Link State Routing Protocol ,business ,Wireless sensor network ,Computer network - Abstract
Ideally, many application systems for distributed users should be designed without requiring a centralized controller, for example cloud computing or wireless sensor networks. A fundamental challenge to developing distributed algorithms for these systems is load balancing, which is the focus of study in this paper. A common feature of these distributed algorithms is that routing decisions should be derivable without requiring much information from the system, probabilistic routing is one example coming to mind. In this paper, we propose a new routing strategy based on the idea of shift-invariant protocol sequences. We study this load balancing approach in the context of a queuing model of multi-server system. Our model and strategy can be applied to many practical systems, including wireless networks. Numerical studies were carried out to compare our strategy with other routing strategies such as probabilistic routing and random sequences routing. The results show that the proposed algorithm has better performance than these strategies.
- Published
- 2013
29. Development of a low cost diagnostic system for dental therapy
- Author
-
Chiaki Kitamura, Toshitsugu Ueda, Yupeng Zhang, Takanobu Nishino, Yoshii Shinji, Satoshi Ikezawa, Hao Chen, Lev Zimin, and Tatsuji Nishihara
- Subjects
Microscope ,business.industry ,Computer science ,Fiber (mathematics) ,Root canal ,Sample (graphics) ,law.invention ,medicine.anatomical_structure ,Optics ,Quality (physics) ,law ,Line (geometry) ,medicine ,Development (differential geometry) ,Image sensor ,business ,Biomedical engineering - Abstract
In this paper, we propose a low cost diagnostic system for dental therapy. This system is capable of carrying out real time observation inside the narrow root canals of oral cavity with high precision and without blind areas using a single graded-index image fiber (GRIN image fiber). The system uses the GRIN image fiber to irradiate the sample to be observed and return the sample image back to the CMOS image sensor of the microscope through the same image fiber, which is different from conventional system that uses separate fibers for illumination and observation. The results suggest that this device can illuminate and observe sample patterns of up to 10μm line and space widths with approximately the same quality as those illuminated by external light source. This precision is sufficient to detect cracks and collaterals of the root canals.
- Published
- 2012
30. Aspheric single-element lens using birefringent material for miniaturized imaging system
- Author
-
Toshitsugu Ueda and Yupeng Zhang
- Subjects
Engineering ,Birefringence ,business.industry ,Low-pass filter ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,law.invention ,Lens (optics) ,Optics ,Sensor array ,law ,Aliasing ,Nyquist frequency ,Spatial frequency ,Image sensor ,business - Abstract
An aspheric single-element lens made of birefringent material is proposed in this paper. This lens is capable of suppressing aliasing artifacts in a captured image, which is caused by inability of the image sensor to detect fine patterns with higher spatial frequency than the Nyquist frequency of the sensor array. At the same time, this lens possesses converging capability like a conventional convex lens and tolerable optical aberrations by employing aspheric surfaces. Compared to conventional imaging systems that use multi-lens structure to tackle optical aberrations and realize aliasing suppression by stacking up more than two optical low pass filters (OLPFs), an imaging system using our lens can greatly reduce the lens stack height and manufacturing cost. Image capturing simulation using the proposed lens indicates that aliasing artifacts are effectively reduced. This lens is expected to be used in miniaturized imaging system such as smartphone cameras and laptop cameras.
- Published
- 2012
31. Automatic Foreground-Background Segmentation Based on Depth from Coded Aperture
- Author
-
Yongtian Wang, Yang Li, Yupeng Zhang, and Dongdong Weng
- Subjects
Computer science ,Segmentation-based object categorization ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Astrophysics::Instrumentation and Methods for Astrophysics ,Scale-space segmentation ,Pattern recognition ,Astrophysics::Cosmology and Extragalactic Astrophysics ,Image segmentation ,GrabCut ,Depth map ,Computer Science::Computer Vision and Pattern Recognition ,Foreground-background ,Computer vision ,Coded aperture ,Artificial intelligence ,Range segmentation ,business - Abstract
Foreground-background segmentation is an important problem in computer vision, and it has many applications. We propose a technique of Automatic foreground-background segmentation based on depth from coded aperture. This method first calculates a coarse depth map using technique of coded aperture depth extraction, then estimate the general area of foreground. At last, in order to get the foreground, we use the GrabCut algorithm to segment the image. The entire progress is fully automatic, without any manual intervention. Experiments have proved its effectiveness. And we also did some simple examples for application.
- Published
- 2012
32. Ultra-small imaging system for cell phone camera using birefringent lenses
- Author
-
Toshitsugu Ueda and Yupeng Zhang
- Subjects
Materials science ,business.industry ,Physics::Optics ,Optical polarization ,Image plane ,law.invention ,Camera phone ,Lens (optics) ,View camera ,Optics ,Aspheric lens ,law ,Image sensor ,business ,Optical filter - Abstract
In this research, an ultra-small imaging system using birefringent lenses was presented. This system is designed for the next generation mobile phone camera with an image sensor of smaller pixel size. The system thickness is reduced to approximately 1.7mm (from the first lens' front surface to the image sensor) by employing one aspheric lens and one spherical lens made of birefringent uniaxial crystal, which also act as two optical low pass filters (OLPFs). In conventional cameras, however, the OLPFs are stacked up and assembled separately with optical lenses, which makes it difficult to reduce system thickness. Quantitative and visual results of ordinary and extra-ordinary ray separation on the image plane demonstrated that the birefringent lenses system is able to cut off all higher spatial frequencies than the Nyquist frequency of a 0.5µ×0.5µ image sensor.
- Published
- 2011
33. Failure of TCP congestion control under diversity routing
- Author
-
Vincent W. S. Chan, John Chapin, and Yupeng Zhang
- Subjects
CUBIC TCP ,TCP Vegas ,TCP acceleration ,Computer science ,Transmission Control Protocol ,Equal-cost multi-path routing ,TCP tuning ,Throughput ,TCP delayed acknowledgment ,H-TCP ,TCP sequence prediction attack ,TCP congestion-avoidance algorithm ,Network simulation ,TCP Westwood plus ,TCP Friendly Rate Control ,TCP Westwood ,TCP hole punching ,Zeta-TCP ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,TCP global synchronization ,Network congestion ,HSTCP ,business ,BIC TCP ,TCP pacing ,Computer network - Abstract
TCP does not perform well in networks with stochastic channels, with links that randomly drop packets or have long outages. Diversity routing has been proposed to improve TCP's performance in these networks. In diversity routing, a sublayer between TCP and the network replicates each transmitted packet and sends the multiple copies along parallel paths. As long as at least one of the copies reaches the receiver, TCP considers the transmission successful and maintains high throughput. Previous investigations of diversity routing have analyzed TCP's performance when there is a single flow and no congestion. In this paper, we analyze the performance of multiple flows in a congested network. The contribution of this work is the discovery of three adverse effects that occur when TCP is combined with diversity routing. The effects are: link capacity overflow, rate unfairness, and lock-out of late-arriving flows. Simulation is used to analyze the root cause of these effects. Our conclusion is that naive diversity routing fundamentally breaks the TCP congestion control mechanism and cannot be used for TCP performance improvement in networks with stochastic channels, such as many wireless and satellite networks. We propose an improvement to diversity routing that may overcome these problems, enabling use of unmodified TCP.
- Published
- 2011
34. Restoration of radially blurred image created by spherical single lens system of cell phone camera
- Author
-
Ikumi Minema, Yupeng Zhang, and Toshitsugu Ueda
- Subjects
Standard test image ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Lens flare ,Grayscale ,law.invention ,Camera phone ,Lens (optics) ,Soft focus ,Optics ,law ,Optical transfer function ,Computer vision ,Artificial intelligence ,business ,Image resolution ,Image restoration - Abstract
In this research, a method is proposed to restore the radially blurred image which is produced by a spherical double-convex single lens imaging system designed for cell phone cameras. This is a new study because the pieces of lens for cell phone camera has reduced to one compared to the widely accepted compound lens system that uses several pieces of lens nowadays. However, single lens imaging system introduces stronger aberrations than compound lens system, especially the radially increased blurring effect. To deal with it, a novel method is studied that restore the blurred image by deconvolving polar blurred image and polar Point Spread Functions (PSFs) converted from Cartesian coordinate system. Simulation results suggest the proposed method is applicable to both computer-created gray scale test image and natural color photographs.
- Published
- 2010
35. Agent-Based Web Healthcare Systems for Real-Time Chronic Disease
- Author
-
Yupeng Zhang, Thomas M. Gatton, and Malrey Lee
- Subjects
Knowledge management ,business.industry ,Computer science ,Multi-agent system ,computer.software_genre ,Expert system ,Knowledge-based systems ,Risk analysis (engineering) ,Knowledge base ,Management system ,Health care ,Case-based reasoning ,Disease management (health) ,business ,computer - Abstract
The increasing trends in the occurrence of chronic diseases, such as diabetes and hypertension, and an aging population present serious near-term problems in providing suitable healthcare within the existing medical structure. Further, ill and elderly patients experiencing mobility and transportation issues are at risk in obtaining both regular and emergency medical treatment. Mobile health monitoring systems can provide 24/7 health-care services and address these anticipated problems. However, the large number of patients and their related data cannot be efficiently processed with current systems and an efficient processing approach is needed for real-time response requirements for critical health situations. This paper proposes an efficient real-time Knowledge Base architecture for agent-based web Health Care Center (HCC) patient monitoring system for chronic disease management. The proposed system uses Case Based Reasoning (CBR) to improve diagnostic knowledge and is implemented in a diabetes monitoring and management system. An evaluation of the system’s performance is presented for evaluation and comparison to current technologies.
- Published
- 2009
36. A Hypertension Management System with Emergency Monitoring
- Author
-
Hyogun Yoon, Eungyeong Kim, Yupeng Zhang, Jaewan Lee, and Min Sang Lee
- Subjects
Telemedicine ,Knowledge management ,Health management system ,business.industry ,Remote patient monitoring ,Computer science ,Multi-agent system ,Mobile computing ,medicine.disease ,Knowledge-based systems ,Knowledge base ,medicine ,Medical emergency ,business ,Communications protocol - Abstract
This paper proposes a u-Healthcare system that can perceive emergency situations in chronic hypertension patients and initiate emergency action. The proposed system considers patient mobility and integrates a medical recommendations knowledge base and communication protocols between system agents in an RFID and Cell phone architecture. A comparison and analysis of the proposed system and the operational characteristics of an implemented system is provided. The proposed system can supply information to assist patients in normal health management as well as emergency situations.
- Published
- 2008
37. Distributed load balancing in a multiple server system by shift-invariant protocol sequences.
- Author
-
Yupeng Zhang and Wong, Wing Shing
- Published
- 2013
- Full Text
- View/download PDF
38. Failure of TCP congestion control under diversity routing.
- Author
-
Yupeng Zhang, Chapin, J., and Chan, V.W.S.
- Published
- 2011
- Full Text
- View/download PDF
39. Restoration of radially blurred image created by spherical single lens system of cell phone camera.
- Author
-
Yupeng Zhang, Minema, I., and Ueda, T.
- Published
- 2010
- Full Text
- View/download PDF
40. A Hypertension Management System with Emergency Monitoring.
- Author
-
Eungyeong Kim, Hyogun Yoon, Yupeng Zhang, Lee, M., and Jaewan Lee
- Published
- 2008
- Full Text
- View/download PDF
41. Robust and efficient detection of non-lint material in cotton fiber samples.
- Author
-
Yupeng Zhang and Smith, P.W.
- Published
- 2002
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.