Author Search Result

[Author] Lu LI(8hit)

1-8hit
  • Dead-Beat Chaos Synchronization and Its Applications to Image Communications

    Teh-Lu LIAO  Nan-Sheng HUANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E82-A No:8
      Page(s):
    1669-1673

    This paper presents a novel dead-beat synchronization scheme and applies it to communications in discrete-time chaotic systems. A well-known Henon system is considered as an illustrative example. In addition, a Henon-based image processing application effectively exploits the proposed scheme's effectiveness.

  • Research on Building an ARM-Based Container Cloud Platform Open Access

    Lin CHEN  Xueyuan YIN  Dandan ZHAO  Hongwei LU  Lu LI  Yixiang CHEN  

     
    PAPER-General Fundamentals and Boundaries

      Pubricized:
    2023/08/07
      Vol:
    E107-A No:4
      Page(s):
    654-665

    ARM chips with low energy consumption and low-cost investment have been rapidly applied to smart office and smart entertainment including cloud mobile phones and cloud games. This paper first summarizes key technologies and development status of the above scenarios including CPU, memory, IO hardware virtualization characteristics, ARM hypervisor and container, GPU virtualization, network virtualization, resource management and remote transmission technologies. Then, in view of the current lack of publicly referenced ARM cloud constructing solutions, this paper proposes and constructs an implementation framework for building an ARM cloud, and successively focuses on the formal definition of virtualization framework, Android container system and resource quota management methods, GPU virtualization based on API remoting and GPU pass-through, and the remote transmission technology. Finally, the experimental results show that the proposed model and corresponding component implementation methods are effective, especially, the pass-through mode for virtualizing GPU resources has higher performance and higher parallelism.

  • Learning Fast Deployment for UAV-Assisted Disaster System Open Access

    Na XING  Lu LI  Ye ZHANG  Shiyi YANG  

     
    LETTER-Information Network

      Pubricized:
    2024/05/30
      Vol:
    E107-D No:10
      Page(s):
    1367-1371

    Unmanned aerial vehicle (UAV)-assisted systems have attracted a lot of attention due to its high probability of line-of-sight (LoS) connections and flexible deployment. In this paper, we aim to minimize the upload time required for the UAV to collect information from the sensor nodes in disaster scenario, while optimizing the deployment position of UAV. In order to get the deployment solution quickly, a data-driven approach is proposed in which an optimization strategy acts as the expert. Considering that images could capture the spatial configurations well, we use a convolutional neural network (CNN) to learn how to place the UAV. In the end, the simulation results demonstrate the effectiveness and generalization of the proposed method. After training, our CNN can generate UAV configuration faster than the general optimization-based algorithm.

  • A Hybrid Method for Vascular Segmentation

    Yongqiang ZHAO  Minglu LI  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E88-D No:6
      Page(s):
    1304-1305

    This letter presents a method to extract vascular structures from magnetic resonance angiography (MRA) volumes based on the geometric variational principle. A minimal function is coupled with flux maximizing geometric flows and the geodesic active surface model while the geometrical description of vessel structure is added. Furthermore, the level set method represents the surface evolution as it is intrinsic and topologically flexible.

  • PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

    Feng HONG  Minglu LI  Minyou WU  Jiadi YU  

     
    PAPER-Peer-to-Peer Computing

      Vol:
    E89-D No:2
      Page(s):
    546-554

    Routing efficiency is the critical issue when constructing peer-to-peer overlay. However, Chord has often been criticized on its careless of routing locality. A routing efficiency enhancement protocol on top of Chord is illustrated in this paper, which is called PChord. PChord aims to achieve better routing efficiency than Chord by exploiting proximity of the underlying network topology. The simulation shows that PChord has achieved lower RDP per message routing.

  • Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting

    Changlu LIN  Yong LI  Qiupu ZHANG  Dingfeng YE  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:12
      Page(s):
    3828-3832

    An anonymous identity based encryption (anonymous IBE) scheme requires that an adversary can not determine the identity of the recipient from a ciphertext encrypted by the corresponding public key. The anonymity was formalized in previous works [1],[13], and this can be considered under chosen plaintext attack and adaptive chosen ciphertext attack, yielding two notions of security, ID-II-CPA and ID-II-CCA, where II denotes "indistinguishability of identities." However, how to obtain an ID-II-CCA secure anonymous IBE in the random oracle model is still a challenging problem. We firstly propose a new notion of plaintext awareness in the two identities setting, called PATI. Secondly, we prove that the IBE scheme is ID-II-CCA secure if it is PATI secure. Finally, we propose the first generic conversion for anonymous IBE from ID-II-CPA to ID-II-CCA in the random oracle model.

  • ECA Rule-Based Workflow Modeling and Implementation for Service Composition

    Lin CHEN  Minglu LI  Jian CAO  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    624-630

    Changes in recent business and scientific environment have created a necessity for more efficient and effective workflow infrastructure. With increasing emphasis on Service-oriented architecture, service composition becomes a hot topic in workflow research. This paper proposes a novel approach of using ECA rules to realize the workflow modeling and implementation for service composition. First of all, the concept and formalization of ECA rule-based workflow is presented. Special activities and data structures are customized for the purpose of service composition. Second, an automatic event composition and decomposition algorithm is developed to ensure the correctness and validness of service composition at design time. Finally, the proposed ECA rule-based approach for service composition is illustrated through the implementation of a workflow prototype system.

  • An Online Scheduling Algorithm for Assigning Jobs in the Computational Grid

    Chuliang WENG  Minglu LI  Xinda LU  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    597-604

    The computational grid provides a promising platform for the deployment of various high-performance computing applications. Problem in implementing computational grid environments is how to effectively use various resources in the system, such as CPU cycle, memory, communication network, and data storage. There are many effective heuristic algorithms for scheduling in the computational grid, however most scheduling strategies have no theoretical guarantee at all. In this paper, a cost-based online scheduling algorithm is presented for job assignment in the grid environment with theoretical guarantee. Firstly, a scheduling framework is described, where the grid environment is characterized, and the online job model is defined. Secondly, the cost-based online scheduling algorithm is presented where costs of resources are exponential functions of their loads, and the performance of this algorithm is theoretically analyzed against the performance of the optimal offline algorithm. Finally, we implement the algorithm in the grid simulation environment, and compare the performance of the presented algorithm with the other three algorithms, and experimental results indicate that the cost-based online scheduling algorithm can outperform the other three online algorithms.

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.