72 results on '"Cheng-Chew Lim"'
Search Results
2. Characterising Network-Connected Devices Using Affiliation Graphs
- Author
-
Adriel Cheng, Hong Gunn Chew, Kyle Millar, and Cheng-Chew Lim
- Subjects
business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Data science ,University campus ,Management strategy ,Large networks ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,The Internet ,business ,Composition (language) ,Diversity (business) - Abstract
Device management in large networks is of growing importance to network administrators and security analysts alike. The composition of devices on a network can help forecast future traffic demand as well as identify devices that may pose a security risk. However, the sheer number and diversity of devices that comprise most modern networks have vastly increased the management complexity. Motivated by a need for an encryption-invariant device management strategy, we use affiliation graphs to develop a methodology that reveals key insights into the devices acting on a network using only the source and destination IP addresses. Through an empirical analysis of the devices on a university campus network, we provide an example methodology to infer a device’s characteristics (e.g., operating system) through the services it communicates with via the Internet.
- Published
- 2020
3. H-/L∞ fault detection observer design for linear parameter-varying systems * *This work was partially supported by National Natural Science Foundation of China (61403104, 61273162, U1509217), the Australian Research Council (DP170102644), and the Fundamental Research Funds for the Central Universities (HIT.KLOF.2015.076)
- Author
-
Cheng-Chew Lim, Peng Shi, Yi Shen, and Zhenhua Wang
- Subjects
0209 industrial biotechnology ,Engineering ,Disturbance (geology) ,Observer (quantum physics) ,business.industry ,02 engineering and technology ,Fault (power engineering) ,Residual ,Measure (mathematics) ,Fault detection and isolation ,Computer Science::Hardware Architecture ,020901 industrial engineering & automation ,Control and Systems Engineering ,Control theory ,Frequency domain ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Sensitivity (control systems) ,business ,human activities ,Computer Science::Operating Systems ,Computer Science::Distributed, Parallel, and Cluster Computing - Abstract
We propose an H-/L∞ fault detection observer for linear parameter varying systems with unknown disturbance and actuator fault. The fault detection observer is designed to enhance the fault sensitivity of residual and attenuate the effect of disturbance on residual such that timely and robust fault detection is achieved. The observer design method is carried out in the finite frequency domain and the design conditions are expressed as a set of linear matrix inequalities. By using L∞ performance index to measure the effect of disturbance on residual, the fault detection observer exhibits a peak-to-peak disturbance attenuation performance, which can provide a dynamic threshold for residual evaluation in fault detection. Numerical simulations are conducted to verify the effectiveness of the proposed method.
- Published
- 2017
4. Reliable H ∞ static output control of linear time‐varying delay systems against sensor failures
- Author
-
Peng Shi, Cheng-Chew Lim, and Mouquan Shen
- Subjects
Controller design ,0209 industrial biotechnology ,Engineering ,business.industry ,Mechanical Engineering ,General Chemical Engineering ,Control (management) ,Biomedical Engineering ,Aerospace Engineering ,Control engineering ,02 engineering and technology ,Linear matrix ,Industrial and Manufacturing Engineering ,Matrix (mathematics) ,020901 industrial engineering & automation ,Transformation (function) ,H-infinity methods in control theory ,Coupling (computer programming) ,Control and Systems Engineering ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Time complexity - Abstract
Summary This paper is concerned with the reliable H∞ static output control of linear time-varying delay systems with sensor faults. Time-varying delay is tackled by the input–output transformation and the resulting closed-loop system lies in the framework of scaled small gain. Some techniques are developed to separate the coupling among the Lyapunov matrix, input matrix, control gain matrix, and output matrix. Based on a relaxed Lyapunov–Krasovskii functional, sufficient conditions for the desired static output controller design with the required H∞ performance level are proposed by means of linear matrix inequalities. The effectiveness of the proposed method is validated by two examples. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
5. Steady formation analysis on multi-robot systems
- Author
-
Yutong Liu, Hongjun Yu, Peng Shi, and Cheng-Chew Lim
- Subjects
Controller design ,0209 industrial biotechnology ,Engineering ,Control and Optimization ,Computer Networks and Communications ,business.industry ,Control engineering ,02 engineering and technology ,Measure (mathematics) ,Telecommunications network ,Human-Computer Interaction ,020901 industrial engineering & automation ,Robotic systems ,Artificial Intelligence ,Control and Systems Engineering ,Control theory ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,business ,Protocol (object-oriented programming) ,Information Systems - Abstract
In this paper, a controller is designed for a group of cooperative robots to achieve the stable displacements. Communication network among the robots is assumed unavailable and each robot can only measure the displacements relative to their neighbours. The controller will enable the robots to move to a predefined formation or a special formation under a suitable protocol which we will design. We will discuss the effect of different sizes of the multi-vehicle system and conduct simulations to verify the effectiveness of the proposed controller and the formation protocols.
- Published
- 2016
6. Deep Learning for Bipartite Assignment Problems
- Author
-
Daniel Gibbons, Peng Shi, and Cheng-Chew Lim
- Subjects
Structure (mathematical logic) ,Theoretical computer science ,Artificial neural network ,Linear programming ,business.industry ,Computer science ,Deep learning ,05 social sciences ,010501 environmental sciences ,01 natural sciences ,0502 economics and business ,Bipartite graph ,Reinforcement learning ,Artificial intelligence ,050207 economics ,business ,Heuristics ,Assignment problem ,Weapon target assignment problem ,0105 earth and related environmental sciences - Abstract
Many assignment problems cannot be solved to optimality in real-time. The existing literature tends to focus on the development of handcrafted heuristics that exploit the structure of a particular assignment problem. We instead seek a general-purpose approach that can automatically learn such heuristics. In this work, we present a deep learning approach that is designed to automatically learn heuristics for a large class of assignment problems. We demonstrate the effectiveness of our approach on the weapon-target assignment (WTA) problem, which is nonlinear and NP-complete. We take non-trivial WTA problem instances and show that our approach reliably finds near-optimal solutions in milliseconds.
- Published
- 2019
7. Using Convolutional Neural Networks for Classifying Malicious Network Traffic
- Author
-
Kyle Millar, Adriel Cheng, Cheng-Chew Lim, and Hong Gunn Chew
- Subjects
Range (mathematics) ,Contextual image classification ,business.industry ,Computer science ,Deep learning ,The Internet ,Artificial intelligence ,Machine learning ,computer.software_genre ,business ,computer ,Convolutional neural network - Abstract
As the reliance on the Internet and its constituent applications increase, so too does the value in exploiting these networking systems. Methods to detect and mitigate these threats can no longer rely on singular facets of information, they must be able to adapt to new threats by learning from a diverse range of information. For its ability to learn complex inferences from large data sources, deep learning has become one of the most publicised techniques of machine learning in recent years. This chapter aims to investigate a deep learning technique typically used for image classification, the convolutional neural network (CNN), and how its methodology can be adapted to detect and classify malicious network traffic.
- Published
- 2019
8. Integrated Structural Parameter and Robust Controller Design for Attitude Tracking Maneuvers
- Author
-
Jing Xu, Peng Shi, Cheng-Chew Lim, Chenxiao Cai, and Yun Zou
- Subjects
0209 industrial biotechnology ,Engineering ,Singular perturbation ,business.industry ,020208 electrical & electronic engineering ,Control engineering ,02 engineering and technology ,Transfer function ,Computer Science Applications ,Attitude control ,020901 industrial engineering & automation ,Control and Systems Engineering ,Control theory ,Robustness (computer science) ,Control system ,0202 electrical engineering, electronic engineering, information engineering ,Torque ,Electrical and Electronic Engineering ,Robust control ,business ,Inner loop - Abstract
Complex nonlinearity and strong coupling in the pitch-yaw-roll of a rotorcraft make it difficult for the attitude control of unmanned aerial vehicles, especially in the presence of wind disturbances and plant uncertainties. To confront these problems, this paper presents a control scheme of two sequential steps, structural parameter determination and robust controller design, in order to achieve the desired attitude regulation performance and disturbance attenuation capability. For the structural parameter design, key structural parameters are specified such that the open-loop transfer functions, from torque inputs to angular velocities, exhibit positive-real properties in particular frequency ranges to incorporate robustness into the controller design. Then, a dual-loop structured controller is designed using dynamic inversion approaches and singular perturbation techniques. The controlled inner loop provides adequate decoupling such that the outer loop may control each Euler angle independently, and proportional-derivative control is used in each outer loop to achieve a desired attitude tracking performance. The effectiveness of the control scheme is verified via an attitude tracking example.
- Published
- 2016
9. Scalable formation control in stealth with limited sensing range
- Author
-
Cheng-Chew Lim, Hongjun Yu, and Peng Shi
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,Mechanical Engineering ,General Chemical Engineering ,Distributed computing ,Control (management) ,Biomedical Engineering ,Aerospace Engineering ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Displacement (vector) ,Range (mathematics) ,020901 industrial engineering & automation ,Mode (computer interface) ,Control and Systems Engineering ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Relative displacement ,Protocol (object-oriented programming) ,Simulation - Abstract
Summary In this paper, a protocol and a control law are designed for a single robot so that a team of such robots can interact and cooperate to reach the displacements from an eligible reference formation. Each robot is equipped with displacement sensors of limited sensing ranges. Communication channels are assumed to be unavailable to the team, and each robot works in stealth mode. The team is scalable such that new robots can be recruited, and existing robots can be dismissed. In order for the team size to be scalable, the extended formation based on relative displacement is established as the reference formation. Thus, using the extended formation as a reference, the control law and the protocol could be flexible. As potential conflicts deflect the robot team from the desired formation, the control law is designed to expose the conflicts to the involved neighboring robots such that the protocol can resolve them. A numerical example is given to illustrate how an extended formation is designed, and a simulation example is conducted to demonstrate the performance and merits of the proposed techniques. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
10. Substrate-integrated waveguide diplexers with improved Y-junctions
- Author
-
Christophe Fumeaux, Cheng-Chew Lim, and Cheng Zhao
- Subjects
Engineering ,Waveguide (electromagnetism) ,HFSS ,business.industry ,020208 electrical & electronic engineering ,Eigenmode expansion ,Bent molecular geometry ,020206 networking & telecommunications ,02 engineering and technology ,Substrate (electronics) ,Condensed Matter Physics ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Band-pass filter ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Electrical and Electronic Engineering ,Diplexer ,business ,Microwave - Abstract
Y-junctions are often adopted to design diplexers since their characteristics can conveniently satisfy the constraints for optimum performance of diplexer design. In order to decrease the size of the Y-junction diplexer, the two branches of the junction can be bent to yield parallel outputs. However, this parallel configuration can degrade the characteristic of the Y-junction. In this letter, two improved novel configurations of Y-junction diplexers are introduced, analyzed with an efficient mode-matching based approach and optimized for best performance. For illustration, the method is applied to two diplexers in substrate-integrated waveguide technology realized using band-pass post filters. For each diplexer, the fractional bandwidths of operation for the up and down channels are 2.70% and 2.44% at 7.4 GHz and 8.2 GHz respectively. The viability of the design approach is validated by full-wave finite-element simulations using Ansys HFSS and measurements on the two fabricated diplexers. © 2016 Wiley Periodicals, Inc. Microwave Opt Technol Lett 58:1384–1388, 2016
- Published
- 2016
11. Robot formation control in stealth mode with scalable team size
- Author
-
Peng Shi, Hongjun Yu, and Cheng-Chew Lim
- Subjects
Scheme (programming language) ,0209 industrial biotechnology ,Engineering ,business.industry ,Noise reduction ,Distributed computing ,Control engineering ,02 engineering and technology ,Computer Science Applications ,Power (physics) ,020901 industrial engineering & automation ,Control and Systems Engineering ,Control theory ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,business ,computer ,Protocol (object-oriented programming) ,computer.programming_language ,Data transmission - Abstract
In situations where robots need to keep electromagnetic silent in a formation, communication channels become unavailable. Moreover, as passive displacement sensors are used, limited sensing ranges are inevitable due to power insufficiency and limited noise reduction. To address the formation control problem for a scalable team of robots subject to the above restrictions, a flexible strategy is necessary. In this paper, under the assumption that the data transmission among the robots is not available, a novel controller and a protocol are designed that do not rely on communication. As the controller only drives the robots to a partially desired formation, a distributed coordination protocol is proposed to resolve the imperfections. It is shown that the effectiveness of the controller and the protocol rely on the formation connectivity, and a condition is given on the sensing range. Simulations are conducted to illustrate the feasibility and advantages of the new design scheme developed.
- Published
- 2016
12. Robust Constrained Control for MIMO Nonlinear Systems Based on Disturbance Observer
- Author
-
Mou Chen, Cheng-Chew Lim, and Peng Shi
- Subjects
0209 industrial biotechnology ,Engineering ,Computer simulation ,business.industry ,MIMO ,Mobile robot ,02 engineering and technology ,Computer Science Applications ,Differentiator ,Nonlinear system ,020901 industrial engineering & automation ,Control and Systems Engineering ,Control theory ,Robustness (computer science) ,Cascade ,Backstepping ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business - Abstract
In this note, a robust constrained control scheme is proposed for multi-input and multi-output (MIMO) cascade nonlinear systems with unknown external disturbance and input saturation. To efficiently observe unknown external disturbance, a novel sliding mode disturbance observer (SMDO) with finite time convergence performance is presented. A robust constrained control scheme is developed for MIMO nonlinear systems based on backstepping control techniques and the disturbance estimate of the SMDO. With the first-order sliding mode differentiator introduced to compute the derivatives of virtual control laws, the computational burden in backstepping control is reduced for a MIMO cascade nonlinear system. Numerical simulation results are presented to show the effectiveness of the proposed robust constrained control scheme.
- Published
- 2015
13. Folded Substrate-Integrated Waveguide Band-Pass Post Filter
- Author
-
Cheng-Chew Lim, Cheng Zhao, and Christophe Fumeaux
- Subjects
business.industry ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,Condensed Matter Physics ,Chebyshev filter ,Waveguide (optics) ,Cutoff frequency ,Optics ,Band-pass filter ,Filter (video) ,0202 electrical engineering, electronic engineering, information engineering ,Modal dispersion ,Electrical and Electronic Engineering ,Center frequency ,business ,Passband ,Mathematics - Abstract
This letter presents a novel concept of band-pass filter realized with metal posts in folded substrate-integrated waveguide (FSIW) technology, together with an efficient specific design procedure. As a first step, it is shown that a particular dimension of the middle vane in the FSIW yields an equivalence to a dielectric-loaded unfolded rectangular waveguide. This equivalence is investigated by comparing the modal dispersion characteristics in both folded and unfolded structures. A direct comparison of the posts placed in the FSIW and in the equivalent unfolded waveguide then further confirms their similar characteristics. As a result, the classical mode-matching method (MMM), straightforwardly applied in the equivalent unfolded structure, can be used to efficiently design a post filter in FSIW technology. For illustration, the method is applied to realize a $5^{th}$ -order Chebyshev band-pass post FSIW filter with a center frequency of 7GHz and a fractional bandwidth of 5.71%. The viability and efficiency of the design approach is successfully validated by finite-element simulations and measurements.
- Published
- 2017
14. Online Versus Offline Reinforcement Learning for False Target Control Against Known Threat
- Author
-
Duong Duc Nguyen, Arvind Rajagopalan, and Cheng-Chew Lim
- Subjects
0209 industrial biotechnology ,Focus (computing) ,Matching (statistics) ,Artificial neural network ,Computer science ,business.industry ,05 social sciences ,Regret ,02 engineering and technology ,Machine learning ,computer.software_genre ,020901 industrial engineering & automation ,0502 economics and business ,Offline learning ,Reinforcement learning ,Artificial intelligence ,business ,computer ,Target control ,Collision avoidance ,050205 econometrics - Abstract
In this article, we investigate the performances of different learning approaches for decentralised non-cooperative multi-agent system applied to defend a high-value target from multiple aerial threats for an air defence application. We focus mainly on reinforcement learning (RL) techniques for protection against known fully observable threats with high mobility. We implement two well-known algorithms from two different approaches, including the regret matching (online learning) and the Q-learning with artificial neural networks (offline learning), and compare them to understand their efficiency. Numerical experiments are provided to illustrate the performances of the different learning algorithms under various approaching directions of the threat as well as under collision avoidance with both static and moving obstacles. Finally, discussions for further improvements of these RL techniques are also provided.
- Published
- 2018
15. Deep Learning for Classifying Malicious Network Traffic
- Author
-
Kyle Millar, Cheng-Chew Lim, Adriel Cheng, and Hong Gunn Chew
- Subjects
021110 strategic, defence & security studies ,Artificial neural network ,Network packet ,business.industry ,Computer science ,Deep learning ,0211 other engineering and technologies ,Deep packet inspection ,02 engineering and technology ,Machine learning ,computer.software_genre ,Convolutional neural network ,Metadata ,Traffic classification ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Classifier (UML) ,computer - Abstract
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect and classify such malicious traffic in these networks. Deep learning has been deployed in many application domains as it is able to learn patterns from large feature sets. Given that the implementation of deep learning for network traffic classification is only just starting to emerge, the question of how best to utilise and represent network data to such a classifier still remains. This paper addresses this question by devising and evaluating three different ways of representing data to a deep neural network in the context of malicious traffic classification. We show that although deep learning does not show significant improvement over other machine learning techniques using metadata features, its use on payload data highlights the potential for deep learning to be incorporated into novel deep packet inspection techniques. Furthermore, we show that useful predictions of malicious classes can still be made when the input is limited to just the first 50 bytes of a packet’s payload.
- Published
- 2018
16. Histogram probabilistic multi‐hypothesis tracker with colour attributes
- Author
-
Fiona Fletcher, Han X. Vu, Sanjeev Arulampalam, Samuel J. Davey, and Cheng-Chew Lim
- Subjects
Alternative methods ,business.industry ,Computer science ,Probabilistic logic ,Pattern recognition ,Tracking (particle physics) ,Histogram ,Video tracking ,Scalability ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,Benchmark data ,business - Abstract
The histogram probabilistic multi-hypothesis tracking (H-PMHT) algorithm is a multi-target track-before-detect method that has been demonstrated to be scalable and efficient and shows good performance on video imagery. However, its application has been limited to intensity-only imagery. In practice, colour and information, such as texture, are often available and can be very helpful when targets are close together. This study compares two alternative methods that incorporate colour information in the H-PMHT: an existing method referred to as spectral H-PMHT and a new approach that treats the colour information as attribute data. The methods are compared with intensity-only H-PMHT on simulations and benchmark data from the VS-PETS03 archive.
- Published
- 2015
17. H ∞ fault‐tolerant control of networked control systems with actuator failures
- Author
-
Huijiao Wang, Bo Zhou, Renquan Lu, Cheng-Chew Lim, and Anke Xue
- Subjects
Engineering ,Control and Optimization ,business.industry ,Control reconfiguration ,Fault tolerance ,Networked control system ,Upper and lower bounds ,Computer Science Applications ,Human-Computer Interaction ,Control and Systems Engineering ,Control theory ,Control system ,Norm (mathematics) ,Electrical and Electronic Engineering ,Actuator ,business - Abstract
The problem of H ∞ fault-tolerant control for networked control systems (NCSs) with actuator failures is addressed in this study. The authors consider the network-induced delays, including sensor-to-controller delay and controller-to-actuator delay, to have both an upper bound and a non-zero lower bound. By using a sampled-data approach, a new model is formulated based on the updating instants of the ZOH. They derive the criteria which ensure that the sample-data NCS is stable with H ∞ norm γ. The authors design the H ∞ fault-tolerant controller that guarantees the closed-loop NCS stability with H ∞ norm γ, when all control components are operational, as well as when some actuators fail to operate. Simulation examples are given to show the effectiveness and less conservative needs of the proposed method.
- Published
- 2014
18. Adaptive neural observer‐based backstepping fault tolerant control for near space vehicle under control effector damage
- Author
-
Dezhi Xu, Peng Shi, Bin Jiang, and Cheng-Chew Lim
- Subjects
Engineering ,Control and Optimization ,Adaptive control ,Observer (quantum physics) ,Artificial neural network ,business.industry ,Control engineering ,Computer Science Applications ,Human-Computer Interaction ,Attitude control ,Tracking error ,Vehicle dynamics ,Control and Systems Engineering ,Control theory ,Backstepping ,State observer ,Electrical and Electronic Engineering ,business - Abstract
In this study, a theoretical framework for reconfigurable flight control is developed and applied to near space vehicle (NSV) attitude dynamics. First, NSV reentry mode is described. Second, an adaptive neural network observer is proposed, which ensures asymptotic convergence of the state observer error to zero under control effector damage and uncertainty. Next, a reconfigurable command-filter backstepping controller is designed based on the adaptive neural network observer. The authors focus is on the accommodation of the control effector damage, uncertainty and resulting disturbances. It is shown that the presented new control design results in asymptotic convergence of the attitude tracking error to zero. Finally, simulation results are given to demonstrate the effectiveness and potential of the proposed fault tolerant control scheme.
- Published
- 2014
19. Notice of Violation of IEEE Publication Principles: Decentralized event-triggering passive control of networked T-S fuzzy systems
- Author
-
Cheng-Chew Lim, Peng Shi, and Huijiao Wang
- Subjects
Scheme (programming language) ,0209 industrial biotechnology ,Automatic control ,Computer science ,business.industry ,Applied Mathematics ,Control (management) ,Linear system ,Control engineering ,02 engineering and technology ,Fuzzy control system ,Permission ,Fuzzy logic ,020901 industrial engineering & automation ,Computational Theory and Mathematics ,Artificial Intelligence ,Control and Systems Engineering ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,computer.programming_language - Abstract
Notice of Violation of IEEE Publication Principles "Decentralized Event-triggering Passive Control of Networked T-S Fuzzy Systems" by Huijiao Wang, Peng Shi, and Cheng-Chew Lim Submitted to the IEEE Transactions on Fuzzy Systems--August 2014 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: Decentralized Event-triggered Dissipative Control of Linear Systems via Dynamic Output Feedback" by Xian-Ming Zhang and Qing-Long Han Submitted to IEEE Transactions on Automatic Control on 7 August "Event-triggered Mixed H-infinity and Passive Control of Linear Systems via Dynamic Output Feedback" by Xian-Ming Zhang and Qing-Long Han in the Proceedings of the 39th Annual Conference of the IEEE Industrial Electronics Society (IECON), November 2013, pp. 5080-5085. In this paper, the problem of decentralized eventtriggering passive control is investigated for networked T-S fuzzy systems based on dynamic output feedback control. A mixed H1 and passivity control criterion for the closed-loop T-S fuzzy system is established. A new co-design method is developed for the decentralized event-triggered scheme and the dynamic output feedback controller. The method ensures that the resulting closedloop T-S fuzzy system is asymptotically stable with a prescribed mixed H1 and passive performance. A mass-spring-damper mechanical system is employed to illustrate the effectiveness of the proposed new design techniques.
- Published
- 2019
20. Event-triggered fault detection for discrete-time networked control systems
- Author
-
Peng Shi, Yu-Long Wang, and Cheng-Chew Lim
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,Real-time computing ,Control reconfiguration ,02 engineering and technology ,Networked control system ,Fault detection and isolation ,Fault indicator ,020901 industrial engineering & automation ,Discrete time and continuous time ,Filter (video) ,Control theory ,Control system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business - Abstract
This paper investigates the adaptively adjusted event-triggering mechanism-based fault detection for a discrete-time networked control system (NCS). The fault occurrence detection progress, the fault occurrence probability, and an adaptively adjusted event-triggering parameter are taken into account to construct a novel event-triggering mechanism. The event-triggered sensor and the event-triggered control station are used simultaneously to establish new network-based closed-loop models for the NCS subject to an actuator fault, and the sensor-to-control station and the control station-to-actuator network-induced delays. Based on the established models, the event-triggered simultaneous design of a fault detection filter and a controller is presented. A new algorithm for handling the adaptively adjusted event-triggering parameter is proposed. We analyse the performance of the simultaneous design of a fault detection filter and a controller to verify its effectiveness.
- Published
- 2016
21. Formation control of arbitrary shape with no communication
- Author
-
Peng Shi, Hongjun Yu, and Cheng-Chew Lim
- Subjects
0209 industrial biotechnology ,Engineering ,Robot kinematics ,Social robot ,Robot calibration ,business.industry ,Mobile robot ,02 engineering and technology ,Robot control ,Computer Science::Robotics ,020901 industrial engineering & automation ,Articulated robot ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,Cartesian coordinate robot ,business - Abstract
Formation control of a robot team is studied under the lack of communication channels. The robots are only equipped with displacement sensors of limited ranges. The robots are equally important and can access the objective formation in an arbitrary shape. In this paper, we present a protocol that has been designed to map the displacements from the sensors to those from the objective formation. With the available local mappings, each robot is driven by its controller to a partially desired local formation. The undesired conflicts among such local formations will trigger the protocol to produce re-mappings. Probability is used to avoid any infinite mapping loops.
- Published
- 2016
22. Folded Y-junction in substrate-integrated waveguide technology
- Author
-
Christophe Fumeaux, Cheng-Chew Lim, and Cheng Zhao
- Subjects
Engineering ,Optics ,Reflection (mathematics) ,business.industry ,Frequency band ,HFSS ,Y junction ,Optoelectronics ,Waveguide (acoustics) ,Substrate (electronics) ,business ,Diplexer ,Communication channel - Abstract
This paper presents a novel Y-junction in folded substrate-integrated waveguide technology. The structure is analyzed with finite-element method using Ansys HFSS, and the simulation results show that the reflection coefficients of the 120° branch ports for the folded substrate-integrated waveguide Y-junction can satisfy the constraints for optimum performance of diplexers. In comparison with an unfolded substrate-integrated waveguide Y-junction, the characteristics of the presented structure can meet the constraints in a wider frequency band, which means that the flexibility for the selection of the up and down channel bands is increased.
- Published
- 2016
23. Losses in substrate integrated waveguide band-pass post filters
- Author
-
Christophe Fumeaux, Cheng-Chew Lim, and Cheng Zhao
- Subjects
Waveguide filter ,Waveguide (electromagnetism) ,Materials science ,Physics::Instrumentation and Detectors ,business.industry ,Chebyshev filter ,Band-pass filter ,Electronic engineering ,Optoelectronics ,Insertion loss ,Prototype filter ,Dielectric loss ,Center frequency ,business - Abstract
Insertion loss is a crucial specification to judge the quality of a substrate integrated waveguide (SIW) band-pass filter. In this paper, six Chebyshev band-pass post filters in SIW technology are firstly designed with a lossless mode-matching code. The considered filters are designed with various orders for a center frequency of 10.5 GHz and a fractional bandwidth of 9.52%. These filters are then simulated with a full-wave electromagnetic solver in order to investigate the various contributions of ohmic and dielectric losses affecting the performance. In particular, the influence on the insertion loss of the variations of the metal cladding and vias conductivity, the dielectric loss tangent and the thickness of the substrate is quantitatively analyzed. For validation, one prototype filter is fabricated to compare the simulations to experimental results.
- Published
- 2015
24. Mode matching analysis of dimension for single-mode operation of shielded microstrip lines
- Author
-
Cheng Zhao, Christophe Fumeaux, Yingbo Zhu, Thomas Kaufmann, and Cheng-Chew Lim
- Subjects
Engineering ,Waveguide (electromagnetism) ,HFSS ,business.industry ,Acoustics ,Single-mode optical fiber ,Electromagnetic interference ,Microstrip ,Cutoff frequency ,law.invention ,law ,Transmission line ,Shielded cable ,Electronic engineering ,business - Abstract
Shielded microstrip lines are widely used in microwave and millimeter wave systems to connect devices while protecting circuits from environmental contaminants, preventing electromagnetic interference, and enhancing the mechanical strength. To avoid the influence of the metallic enclosures on the fundamental mode, the choice of dimensions for the housing is an important issue. In this paper, the influence of those dimensions on the fundamental mode is investigated rigorously using the mode matching technique. In addition, the relationships between the cutoff frequency of the second-order mode and those geometrical variables of the cross-section of the shielded transmission line are presented. With these relationships, a reasonable geometry can be efficiently determined, which is important to prevent performance degradation through higher-order mode excitations, e.g. in waveguide transitions. The analysis results are verified with finite-element simulations obtained with HFSS.
- Published
- 2015
25. Markov modelling and parameterisation of genetic evolutionary test generations
- Author
-
Cheng-Chew Lim and Adriel Cheng
- Subjects
Mathematical optimization ,Control and Optimization ,Markov chain ,Calibration (statistics) ,Computer science ,business.industry ,Applied Mathematics ,Evolutionary algorithm ,Interactive evolutionary computation ,Management Science and Operations Research ,Markov model ,Machine learning ,computer.software_genre ,Computer Science Applications ,Genetic algorithm ,Artificial intelligence ,Genetic representation ,business ,computer ,Evolutionary programming - Abstract
Genetic evolutionary algorithms are effective and optimal test generation methods. However, the methods to select the algorithm parameters are often ad hoc, relying on empirical data. We used a Markov-based method to model the genetic evolutionary test generation process, parameterise the process characteristics, and derive analytical solutions for selecting the optimisation parameters. The method eliminates preliminary test generation calibration and experimentation effort needed to select these parameters, which are used in current practice.
- Published
- 2011
26. Modeling Interrupts for Software-Based System-on-Chip Verification
- Author
-
Xiaoxi Xu and Cheng-Chew Lim
- Subjects
Hardware architecture ,Profiling (computer programming) ,Computer science ,business.industry ,Preemption ,computer.software_genre ,Computer Graphics and Computer-Aided Design ,Domain (software engineering) ,Embedded software ,Software ,Embedded system ,Component-based software engineering ,Operating system ,System on a chip ,Electrical and Electronic Engineering ,Interrupt ,business ,computer ,Formal verification - Abstract
The interrupt mechanism in a system-on-chip (SoC) joins the SoCs hardware and software behaviors. We model interrupts as logical rather than physical events and accordingly provides guidelines to compose software components including interrupt-service-routines. As a benefit, classical indeterministic behaviors (due to the parallelism) in the software domain, such as preemption and nesting, can be constructed as early as raw hardware components are being integrated. In effect, while the interrupt mechanism itself is under rigorous stress, it is simultaneously driving the exercise of the entire SoC. This effect can be observed through software profiling at the hardware integration stage.
- Published
- 2010
27. A refined MAC protocol with multipacket reception for wireless networks
- Author
-
Cheng-Chew Lim, Hyukjin Lee, and Jinho Choi
- Subjects
Protocol (science) ,Multipacket reception ,Computer Networks and Communications ,Computer science ,business.industry ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,Access control ,Multiple Access with Collision Avoidance for Wireless ,Electrical and Electronic Engineering ,business ,Throughput (business) ,Information Systems ,Computer network - Abstract
Medium access control (MAC) protocols making use of multipacket reception (MPR) capability achieve better throughput than conventional MAC protocols. When a wireless network operates with MPR capable nodes and non-MPR nodes, the MAC protocols must not only utilise the MPR capability to maximise throughput, but must also enable the co-existence with these two types of nodes. We propose a new MPR MAC protocol to achieve the co-existence requirement by adopting a request-to-send (RTS)/clear-to-send (CTS) mechanism in IEEE 802.11 MAC standards. This MPR MAC protocol also improves throughput by allowing additional data transmissions to use the MPR capability fully. We analyse the system throughput of the co-existence of different link characteristics of nodes, and optimise its throughput by adjusting contention window sizes with respect to certain throughput requirements of the nodes. Copyright © 2010 John Wiley & Sons, Ltd.
- Published
- 2010
28. On regularisation parameter transformation of support vector machines
- Author
-
Cheng-Chew Lim and Hong Gunn Chew
- Subjects
Control and Optimization ,Structured support vector machine ,Computer science ,business.industry ,Applied Mathematics ,Strategy and Management ,Computation ,Pattern recognition ,Atomic and Molecular Physics, and Optics ,Support vector machine ,Relevance vector machine ,Set (abstract data type) ,ComputingMethodologies_PATTERNRECOGNITION ,Transformation (function) ,Computer Science::Sound ,Computer Science::Computer Vision and Pattern Recognition ,Pattern recognition (psychology) ,Least squares support vector machine ,Artificial intelligence ,Business and International Management ,Electrical and Electronic Engineering ,business - Abstract
The Dual-nu Support Vector Machine (SVM) is an effective method in pattern recognition and target detection. It improves on the Dual-C SVM, and offers competitive performance in detection and computation with traditional classifiers. We show that the regularisation parameters Dual-nu and Dual-C can be set such that the same SVM solution is obtained. We present the process of determining the related parameters of one form from the solution of a trained SVM of the other form, and test the relationship with a digit recognition problem. The link between the Dual-nu and Dual-C parameters allows users to use Dual-nu for ease of training, and to switch between the two forms readily.
- Published
- 2009
29. Using Transfer-Resource Graph for Software-Based Verification of System-on-Chip
- Author
-
Cheng-Chew Lim and Xiaoxi Xu
- Subjects
Computer science ,business.industry ,Concurrency ,Distributed computing ,Petri net ,Computer Graphics and Computer-Aided Design ,Abstraction layer ,Software ,Test case ,Graph (abstract data type) ,System on a chip ,Electrical and Electronic Engineering ,business ,Formal verification - Abstract
The verification of system-on-chip is challenging due to its high level of integration. Multiple components in a system can behave concurrently and compete for resources. Hence, for simulation-based verification, we need a methodology that allows one to automatically generate test cases for testing concurrent and resource-competing behaviors. We introduce the use of a transfer-resource graph (TRG) as the model for test generation. From a high abstraction level, TRG is able to model the parallelism between heterogeneous interaction forms in a system. We show how TRG is used in generating test cases of resource competitions and how these test cases are structured in event-driven test programs. For coverage, TRG can be converted to a Petri net, allowing one to measure the completeness of concurrency in simulation.
- Published
- 2008
30. Histogram-PMHT with an evolving Poisson prior
- Author
-
Samuel J. Davey, Cheng-Chew Lim, F. Fletcher, Sanjeev Arulampalam, and Han X. Vu
- Subjects
business.industry ,Pattern recognition ,Tracking (particle physics) ,Poisson distribution ,Measure (mathematics) ,Track-before-detect ,symbols.namesake ,Signal-to-noise ratio ,Mixing (mathematics) ,Component (UML) ,Histogram ,symbols ,Artificial intelligence ,business ,Mathematics - Abstract
The Histogram-Probabilistic Multi-Hypothesis Tracker (H-PMHT) is an efficient multi-target tracking approach to the Track-Before-Detect (TkBD) problem. However, it cannot adequately deal with fluctuating targets and this can degrade track management performance. By assuming an alternative measurement model based on a Poisson distribution, the H-PMHT algorithm can be re-derived to incorporate a time-correlated estimate of the component mixing terms, allowing for an improved measure for track quality.
- Published
- 2015
31. Approximation Methods for Cylindrical Posts in Rectangular Waveguides with Mode Matching Technique
- Author
-
Thomas Kaufmann, Cheng Zhao, Cheng-Chew Lim, and Yingbo Zhu
- Subjects
Cross section (physics) ,Optics ,Rate of convergence ,Scattering ,business.industry ,HFSS ,Eigenmode expansion ,Arithmetic progression ,Mathematical analysis ,Convergence (routing) ,Scattering parameters ,business ,Mathematics - Abstract
This paper analyzes the characteristics of two cylindrical posts placed in the cross section of a rectangular waveguide based on the mode matching technique. Three methods to approximate the posts are introduced: equal width method, arithmetic sequence thickness method and equal sector method. The scattering parameter convergence of these approximation methods is investigated. Meanwhile, through comparing the difference of the scattering parameters and the accurate values, the rate of convergence for each method is also explored, according to which, the most efficient approximation method is recommended. The calculated results of a symmetric two-post structure are compared with full-wave simulations using ANSYS HFSS.
- Published
- 2014
32. Segmentation of the Face and Hands in Sign Language Video Sequences Using Color and Motion Cues
- Author
-
Nariman Habili, Cheng-Chew Lim, and Alireza Moini
- Subjects
Contextual image classification ,Pixel ,Color image ,Segmentation-based object categorization ,business.industry ,Computer science ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-space segmentation ,Image segmentation ,Facial recognition system ,Motion estimation ,Media Technology ,Computer vision ,Segmentation ,sense organs ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Change detection ,ComputingMethodologies_COMPUTERGRAPHICS ,Data compression - Abstract
We present a hand and face segmentation methodology using color and motion cues for the content-based representation of sign language video sequences. The methodology consists of three stages: skin-color segmentation; change detection; face and hand segmentation mask generation. In skin-color segmentation, a universal color-model is derived and image pixels are classified as skin or nonskin based on their Mahalanobis distance. We derive a segmentation threshold for the classifier. The aim of change detection is to localize moving objects in a video sequences. The change detection technique is based on the F test and block-based motion estimation. Finally, the results from skin-color segmentation and change detection are analyzed to segment the face and hands. The performance of the algorithm is illustrated by simulations carried out on standard test sequences.
- Published
- 2004
33. Perturbation to enhance support vector machines for classification
- Author
-
K. N. To and Cheng-Chew Lim
- Subjects
Structured support vector machine ,Contextual image classification ,business.industry ,Applied Mathematics ,Binary number ,Perturbation (astronomy) ,Pattern recognition ,Perturbation ,Support vector machine ,Relevance vector machine ,Computational Mathematics ,Machine learning ,Optimisation ,Artificial intelligence ,business ,Perturbation method ,Mathematics - Abstract
This paper presents a perturbation method to obtain a sensitivity measure of trained solution from a set of input patterns using support vector machine learning. Applying to classify images of binary classes, the sensitivity measure adds ability to extract content of interest of images for two classes in image classification.
- Published
- 2004
34. Clutter mapping for Histogram PMHT
- Author
-
Cheng-Chew Lim, F. Fletcher, Han X. Vu, Samuel J. Davey, and Sanjeev Arulampalam
- Subjects
business.industry ,Histogram ,Clutter ,Computer vision ,Pattern recognition ,Artificial intelligence ,business ,Mathematics ,Constant false alarm rate - Published
- 2014
35. Tracking Mobile Robot in Indoor Wireless Sensor Networks
- Author
-
Liping Zhang, Hamid Reza Karimi, Cheng-Chew Lim, and Yiping Chen
- Subjects
Engineering ,Article Subject ,General Mathematics ,Real-time computing ,Engineering (all) ,Mobile wireless sensor network ,Mathematics (all) ,Wireless ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,business.industry ,lcsh:Mathematics ,VDP::Technology: 500::Mechanical engineering: 570 ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,Mobile robot ,Tracking system ,Sensor fusion ,lcsh:QA1-939 ,Key distribution in wireless sensor networks ,lcsh:TA1-2040 ,Embedded system ,Received signal strength indication ,business ,lcsh:Engineering (General). Civil engineering (General) ,Wireless sensor network - Abstract
Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://10.1155/2014/837050 This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs). Our approach is based on a localization scheme with RSSI (received signal strength indication) which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot's trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot's trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme. © 2014 Liping Zhang et al.
- Published
- 2014
36. Robust control for nonhomogeneous Markov jump processes: an application to DC motor device
- Author
-
Fei Liu, Peng Shi, Cheng-Chew Lim, Yanyan Yin, Yin, Yanyan, Shi, Peng, Liu, Fei, and Lim, Cheng Chew
- Subjects
Lyapunov function ,Engineering ,Computer Networks and Communications ,business.industry ,Euclidean space ,DC motor device ,Applied Mathematics ,Network delay ,Polytope ,DC motor ,symbols.namesake ,Control and Systems Engineering ,Control theory ,Signal Processing ,symbols ,Jump ,Markov jump systems ,Robust control ,business ,closed-loop system - Abstract
This paper studies the problem of robust H ∞ controller design for a class of uncertain Markov jump systems with time-varying transition probabilities, which follows nonhomogeneous jump processes. The time varying transition probability matrix is described as a polytope set. By Lyapunov function approach, under the designed controller, a sufficient condition is presented to ensure that the resulting closed-loop system is stochastically stable and that a prescribed H ∞ performance index is satisfied. Finally, an application of a DC motor device is addressed to demonstrate the effectiveness of developed techniques.
- Published
- 2014
37. A VLSI chip implementation of an A/D converter error table compensator
- Author
-
W. Marwood, Cheng-Chew Lim, A. Beaumont-Smith, and J. Tsimbinos
- Subjects
Very-large-scale integration ,Adder ,Spurious-free dynamic range ,Computer science ,business.industry ,Clock rate ,Converters ,Chip ,Compensation (engineering) ,Microcontroller ,Differentiator ,CMOS ,Hardware and Architecture ,Filter (video) ,Lookup table ,Electronic engineering ,Hardware_INTEGRATEDCIRCUITS ,Table (database) ,Wideband ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Law ,Software ,Computer hardware - Abstract
Error table compensation can be used to improve the spurious free dynamic range performance of high speed A/D converters. This paper gives details of an error table compensator system that uses a VLSI chip incorporating a transversal filter programmed as a wideband differentiator, additional on-chip circuits including delays and an adder, and a lookup table that is stored in external memory. The cascadable 10GOPS transversal filter differentiator chip has been designed and fabricated and can operate in 32-tap symmetric, 32-tap anti-symmetric or 16-tap non-symmetric modes. It has programmable tap weights and uses 16-bit signed arithmetic with radix-16 multipliers and 4–2 compressors to reduce the transistor count. The chip was fabricated in a 0.35-μm CMOS process, measures 3.1×4.4 mm and contains 310,000 transistors. The chip is pipelined and has a maximum clock rate of 200 MHz. It is shown that the error table compensation system is capable of providing between 7 and 13 dB improvement in the dynamic range of typical high-speed A/D converters.
- Published
- 2001
38. Energy Efficiency and Reliability Considerations of a Compressive Sensing Technique in Wireless Visual Sensor Networks
- Author
-
Cheng-Chew Lim and Yinhao Ding
- Subjects
Engineering ,Compressed sensing ,business.industry ,Electrical engineering ,Electronic engineering ,Wireless ,business ,Wireless sensor network ,Reliability (statistics) ,Efficient energy use - Abstract
This chapter focuses on the energy efficiency and reliability issues when applying the novel compressive sensing technique in wireless visual sensor networks. An explanation is given for why compressive sensing is useful for visual sensor networks. The relationships between sparsity control and compression ratio, the effect of block-based sampling on reconstruction quality, complexity consideration of reconstruction process for real-time applications, and compensation for packets missing in network flows are discussed. We analyse the effectiveness of using the 2-dimensional Haar wavelet transform for sparsity control, the difference between compressive sampling in spatial and frequency domains, and the computation of the prime-dual optimisation method and the log barrier algorithm for reconstruction. The effectiveness of the approach on recovered image quality is evaluated using Euclidean distance and variance analysis.
- Published
- 2011
39. An Event-Assisted Sequencer to Accelerate Matrix Algorithms
- Author
-
Adam Burdeniuk, Cheng-Chew Lim, Michael Liebelt, and Kiet N. To
- Subjects
Pipeline transport ,Signal processing ,Kernel (image processing) ,business.industry ,Matrix algebra ,Computer science ,Data management ,Algorithm design ,Parallel computing ,business ,Field-programmable gate array ,Irregular matrix ,Algorithm - Abstract
This paper presents a sequencer that accelerates matrix algorithms arising naturally in many multimedia and signal processing applications. The accelerator has been designed to carry out data management tasks common to these algorithms. A novel event-based parameter update mechanism allows production of continuously varying patterns to access triangular, banded and other irregular matrix structures. It has been verified that the accelerator significantly reduces the workload of the attached CPU for a wide range of algorithms. The accelerator has been implemented on a Virtex-5 FPGA platform where it required 1856 slices and achieved a post place-and-route speed of 64 MHz.
- Published
- 2010
40. Weight-based clustering routing protocol for wireless sensor networks
- Author
-
Li-fang Lu and Cheng-Chew Lim
- Subjects
Routing protocol ,Zone Routing Protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Enhanced Interior Gateway Routing Protocol ,Path vector protocol ,Wireless Routing Protocol ,Order One Network Protocol ,Distance-vector routing protocol ,Computer Science::Networking and Internet Architecture ,Hazy Sighted Link State Routing Protocol ,business ,Computer network - Abstract
We propose a weight-based clustering routing protocol for wireless sensor networks. A new cluster head selection algorithm is developed in the proposed protocol. This algorithm aims at selecting better cluster heads in the network in order to minimise the energy dissipation of intra-cluster and inter-cluster data transmission. The load balance of the cluster heads is also considered when selecting cluster heads. The performance of the proposed protocol is evaluated and compared with two existing clustering-based protocols. Simulation results show that the proposed protocol achieves better energy efficiency and longer network lifetime.
- Published
- 2009
41. CRISP: A flexible integrated development platform for RFID systems
- Author
-
Behnam Jamali, Cheng-Chew Lim, and Peter H. Cole
- Subjects
Engineering ,Cognitive radio ,Hardware_GENERAL ,business.industry ,Embedded system ,Scalability ,Radio-frequency identification ,Wireless ,Software-defined radio ,business ,Software architecture ,Communications protocol ,Field-programmable gate array - Abstract
Radio Frequency Identification (RFID) is a technology to store and retrieve information remotely using electromagnetic waves. RFID is poised to drastically change the way industries collect and manage information. Research in this area has been growing in the past few years given the wide range of applications that can benefit from such a technology. In this paper we introduce the Cognitive RFID Integrated System Platform (CRISP), a framework for development and implementation of RFID communication protocols. The framework enables advanced research in the area of RFID wireless communication protocols and algorithms. As such, CRISP provides a flexible, scalable, configurable and high performance RFID research tool. In the following sections the CRISP hardware implementation and software architecture are discussed in detail. Radio configurations and applications are presented. Future research made possible by this flexible platform is also discussed.
- Published
- 2009
42. Position-based, Energy-efficient, centralised clustering protocol for wireless sensor networks
- Author
-
Cheng-Chew Lim and Li-fang Lu
- Subjects
Routing protocol ,Engineering ,Zone Routing Protocol ,business.industry ,Resource Reservation Protocol ,computer.internet_protocol ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,Order One Network Protocol ,Neighbor Discovery Protocol ,Computer Science::Networking and Internet Architecture ,Hazy Sighted Link State Routing Protocol ,business ,computer ,Computer Science::Cryptography and Security ,Computer network - Abstract
We propose a position-based, energy-efficient, and centralised clustering protocol for wireless sensor networks. The protocol aims at prolonging the network lifetime by evenly distributing energy load among sensor nodes in the network. A new cluster head selection algorithm is developed in the proposed protocol. In addition, the protocol uses a novel multi-hop routing approach for inter-cluster communication between cluster heads and the base station. The performance of the proposed protocol is evaluated and compared with three existing clustering-based protocols. Simulation results show that the proposed protocol achieves better energy efficiency and longer network lifetime.
- Published
- 2009
43. Multichannel outage-aware MAC protocols for wireless networks
- Author
-
Hyukjin Lee, Cheng-Chew Lim, and Jinho Choi
- Subjects
Channel allocation schemes ,computer.internet_protocol ,Computer science ,business.industry ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Interference (communication) ,Wireless Application Protocol ,Wireless ,Fading ,business ,computer ,Computer network ,Communication channel - Abstract
Channel outage represents channel fading and interference. Since each user may experience different fading and interference (i.e., channel outage) over distinct channels, throughput may vary depending on channel selection of users. In this paper, we propose two types of multichannel outage-aware medium access control (MAC) protocols to improve throughput: 1) frequency-domain backoff MAC protocols with outage-aware refined channel sets using distributed channel selection, and 2) time-domain backoff MAC protocols with a lowest-outage increasing heuristic using centralised channel allocation to find optimal user sets. Simulation results show the impacts of the proposed MAC protocols on throughput under multichannel outage environments with respect to various user numbers.
- Published
- 2009
44. Positioning test-benches and test-programs in interaction-oriented system-on-chip verification
- Author
-
Xiaoxi Xu, Michael Liebelt, and Cheng-Chew Lim
- Subjects
business.industry ,Computer science ,Automation ,Test (assessment) ,Intelligent verification ,Software ,Computer architecture ,Embedded system ,medicine ,Concurrent computing ,System on a chip ,medicine.symptom ,business ,Confusion - Abstract
In simulation-based system-on-chip (SoC) verification, in addition to the testbench (TB) - the basic facility for stimulation and observation, software native to the SoC also plays a part in interacting with the SoC. This software is referred to as the test-program (TP). However, the relationship between the TB, the TP and the SoC is not always intuitive and can cause conceptual confusion. This paper discusses this confusion and shows how to address it by positioning the TB and the TP naturally in the verification framework.
- Published
- 2008
45. Using Genetic Evolutionary Software Application Testing to Verify a DSP SoC
- Author
-
Cheng-Chew Lim, Adriel Cheng, Zhixiong Zhou, Ting Lei, Yihe Sun, and Hu He
- Subjects
Digital signal processor ,Software ,Test generator ,Logic synthesis ,Computer architecture ,business.industry ,Computer science ,Embedded system ,Logic testing ,Electronic design automation ,System on a chip ,business ,Digital signal processing - Abstract
A digital signal processor (DSP) system-on-chip (SoC) can be designed using a variety of architectures and techniques. This often presents different verification challenges compared to conventional SoC or processor designs. Verification of such designs should take into account the goals and applications of the DSP, and how they are eventually used. This paper proposes an application based verification methodology and demonstrates this technique on a real-life DSP SoC design. Our technique employs a library of specially devised application functions as test building blocks, followed by a genetic evolutionary test generator to compose these application functions into effective test programs.
- Published
- 2008
46. Multiuser Downlink Beamforming with Limited Feedback
- Author
-
Cheng-Chew Lim and Jinho Choi
- Subjects
Beamforming ,WSDMA ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Transmitter ,Data_CODINGANDINFORMATIONTHEORY ,Interference (wave propagation) ,Spatial multiplexing ,Channel state information ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,Electronic engineering ,Wireless ,InformationSystems_MISCELLANEOUS ,business ,Telecommunications ,Computer Science::Information Theory - Abstract
Downlink beamforming is well studied in wireless communications over the last decade, including some optimization issues. In this paper, we study the multiuser downlink beamforming when the channel state information (CSI) is provided to the transmitter with limited feedback. With limited feedback, the CSI becomes imperfect. Joint beamforming and power allocation are addressed with limited feedback. We also show that the multiuser beamforming becomes interference-limited even though the number of active users is less than the number of transmit antennas due to limited feedback. From this, we can see that there is capacity loss and the performance is limited by the residual interference due to imperfect CSI.
- Published
- 2007
47. Cluster-based multi-channel scheduling algorithms for ad hoc networks
- Author
-
Hyukjin Lee, Cheng-Chew Lim, and Jinho Choi
- Subjects
Channel allocation schemes ,Computer science ,business.industry ,Wireless ad hoc network ,Quality of service ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Time division multiple access ,Data_CODINGANDINFORMATIONTHEORY ,Network topology ,Scheduling (computing) ,ComputingMethodologies_PATTERNRECOGNITION ,Computer Science::Networking and Internet Architecture ,Cluster (physics) ,business ,Cluster analysis ,Computer Science::Information Theory ,Computer network - Abstract
We propose cluster-based multi-channel scheduling algorithms for intra-cluster and inter-cluster communications for in ad hoc networks. Depending on traffic demands of clusters, the proposed algorithms optimally distribute available non-overlapping channels to proper clusters and schedule time slots of time division multiple access (TDMA) over the allocated channels. Simulation results show that the size of TDMA slots is efficiently minimised and end-to-end throughput is maximised on different cluster formations such as distance-based cluster formation and load-based cluster formation.
- Published
- 2007
48. Fourth-Order Discrete-Time Variable Centre Frequency Bandpass Sigma-Delta Modulator
- Author
-
Cheng-Chew Lim, Michael Liebelt, Said F. Al-Sarawi, and Y. Zhu
- Subjects
Physics ,Resonator ,Optics ,Discrete time and continuous time ,Band-pass filter ,business.industry ,Electronic engineering ,Electro-optic modulator ,business ,Delta-sigma modulation ,Digital signal (signal processing) ,Transfer function ,Noise (radio) - Abstract
A design for a variable centre frequency bandpass Sigma-Delta modulator is presented. The modulator is based on a tunable discrete-time resonator using only one control parameter. The noise transfer function of the modulator is controlled by a 4-bit digital signal, which provides nine different centre frequencies distributed between 0.1-0.4 normalized frequencies. The measurement results show a stable modulator at all centre frequencies.
- Published
- 2006
49. A low-voltage operational amplifier with high slew-rate for sigma-delta modulators
- Author
-
Cheng-Chew Lim, Jinup Lim, and Joongho Choi
- Subjects
Engineering ,business.industry ,Amplifier ,Electrical engineering ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Slew rate ,Hardware_PERFORMANCEANDRELIABILITY ,Delta-sigma modulation ,law.invention ,Current mirror ,CMOS ,Software_SOFTWAREENGINEERING ,Hardware_GENERAL ,law ,Low-power electronics ,Hardware_INTEGRATEDCIRCUITS ,Operational amplifier ,Electronic engineering ,business ,Low voltage - Abstract
This paper presents the design of a low-voltage operational amplifier suitable for sigma-delta (/spl Sigma//spl Delta/) modulator applications. The circuit technique is proposed to enhance the slew-rate performance and correspondingly can help to save the power of the amplifier. The simple circuitry of a current mirror is included with a degenerate resistor that can be selectively shunted. High-speed 2nd-order /spl Sigma//spl Delta/ modulators incorporating this technique is designed in a 0.18-/spl mu/m CMOS technology and power consumption can be saved more than 20% for a power supply voltage of 1.2V.
- Published
- 2006
50. A software test program generator for verifying system-on-chips
- Author
-
Adriel Cheng, Cheng-Chew Lim, and A. Parashkevov
- Subjects
Build verification test ,Computer architecture ,business.industry ,Computer science ,Embedded system ,Software construction ,Software system ,Test Management Approach ,Software verification and validation ,business ,Test harness ,Random test generator ,Software verification - Abstract
Design verification is crucial for successful systems-on-chips (SoCs). However, validating and proving the correctness of SoCs is often a bottleneck in the design project. This paper presents a technique to test the SoC at the system level using software application based programs. Our software application level verification methodology (SALVEM) employs test programs composed of dynamic sequences of software code segments. The SALVEM system implements a test generator to create these software test programs automatically. Experiments were conducted applying SALVEM tests to the Altera Nios SoC. A feedback verification flow is also feasible in our SALVEM system. SALVEM test runs are analyzed to direct the test generator toward important SoC scenarios.
- Published
- 2006
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.