References of "Chou, Hung-Pu 50056314"
     in
Bookmark and Share    
Full Text
See detailQRNG Entropy as a Service(EaaS) Platform for Quantum-Safe Entropy and key Delivery
Chou, Hung-Pu UL; Hongfu, Chou

Report (2023)

Random numbers [1] are widely used in numerical computing, statistical simulation, random sampling, etc. The security of random numbers is getting more attention. In addition to random numbers ... [more ▼]

Random numbers [1] are widely used in numerical computing, statistical simulation, random sampling, etc. The security of random numbers is getting more attention. In addition to random numbers, information and network environment security [2] are also very important in real life, such as the generation of verification code for login, QR code for online payment, etc. All random numbers that involve important identity information must have extremely high security to protect personal privacy from being leaked or illegally stolen. At present, the mechanism for generating random numbers by computers is at risk of being attacked which is subject that the generated random numbers may be predicted in some cases. Random number generation (RNG) [3] has always been one of the biggest problems. The problem with classic random number generators, i.e., pseudorandom number generators, consists in the possibility to know the deterministic process of pseudorandom generation by unwanted persons. This may result, in the case of cryptography, in compromising a myth of security. Another problem may be the incorrect handling of the generated sequence—mostly in cryptographic uses, the generated random sequence is applied once. Its multiple usage may lead to a security breach (e.g., in the case of the OTP cipher, a sufficiently long key should be truly random and used once in that protocol, otherwise it will be possible to break the code). [less ▲]

Detailed reference viewed: 82 (8 UL)
Full Text
Peer Reviewed
See detailJoint Linear Precoding and DFT Beamforming Design for Massive MIMO Satellite Communication
Ha, Vu Nguyen UL; Abdullah, Zaid UL; Eappen, Geoffrey UL et al

in IEEE Global Communications Conference GLOBECOM 2022 (2022, December)

Detailed reference viewed: 51 (10 UL)
Full Text
See detailLUQCIA project Milestone 1 Report
Chou, Hung-Pu UL; Chou, Hong-fu

Report (2022)

SNT Team finalized the provider selection for QKD equipment to be installed. The selection process included the request for equipment quotation from Toshiba Europe and Aurea technologies. • Due to ... [more ▼]

SNT Team finalized the provider selection for QKD equipment to be installed. The selection process included the request for equipment quotation from Toshiba Europe and Aurea technologies. • Due to maturity, availability, and proofness, the team selected the Cerberis XCR platform provided by the company ID Quantique. Additionally, IDQ devices allow the user to perform research and his own developments in an open architecture. • The procurement process started at the beginning of 2022, and due to the total amount, it took until the last week of June to retrieve the equipment at UniLu premises. The procurement process required a formal derogation process to avoid public tendering. The justification for the derogation was the lack of other providers of QKD equipment that allows performing development and research while at the same time providing a finalized prototype that can be used as a starting point for the custom developments. • The current delays in the supplier’s chain have created a delay in finishing some procurements of auxiliary equipment related to the Lab. • The team started the physical space request from the University Logistics to have the place to deploy the QKD experiments. The space in the JFK building is an underground room of around 70 square meters. The space on the MSO building in Esch-Sur-Alzette will be a standard office space with fibre optic connectivity. • The team has been evaluating if installing a temperature control system in the JFK lab is required. For this purpose, we have been taking temperature measurements since the beginning of the year. In any case, the vendor specifications state that there are no stringent requirements in terms of temperature control other than an average room temperature. (10 to 30 Degrees in specs).University Logistics accomplished maintenance activities in the Lab facilities on JFK, basically to the floor and the electrical and communication network. The JFK Quantum Lab settlement is accomplished: the deployment of optical network fibre from the Lab to the JFK Data centre, server installation and mount rack setup. • The team has been evaluating if installing a temperature control system in the JFK lab is required. For this purpose, we have been taking temperature measurements since the beginning of the year. In any case, the vendor specifications state that there are no stringent requirements in terms of temperature control other than an average room temperature. (10 to 30 Degrees in specs). • The team is accomplishing the first experiments on the in-situ quantum link. The experiments include the basic setup of one pair of QKD devices, the “network setup,” and the “Quantum Channel Setup.” • The team has accomplished the preliminary configuration and testing on 3 pairs of QKD devices and presented the testing report in Technical Report 1: Integration and testing results which include the initial device setting in the log file and statistic testing result. • The second training provided by IDQ was presented physically in early November. The next milestone is implementing the Evedropping and provide the testing result. [less ▲]

Detailed reference viewed: 46 (17 UL)
Full Text
See detailEarly-Stopped Approach and Analysis for the Berlekamp-Massey Algorithm
Chou, Hung-Pu UL; Hong-fu, Chou

Report (2022)

BCH codes are being widely used in commercial NAND flash controllers, and the decoding algorithm based on the Berlekamp-Massey (BM) algorithm is a classic solution for solving the key equation used for ... [more ▼]

BCH codes are being widely used in commercial NAND flash controllers, and the decoding algorithm based on the Berlekamp-Massey (BM) algorithm is a classic solution for solving the key equation used for error correction. The latency of BM decoding is the bottleneck of the Bose-Chaudhuri Hocquenghem (BCH) decoder when correcting a high number of bit errors. However, the flash memory has an error distribution that degrades with usage: few errors occur in the new memory and a low number of errors occur within a code block. With usage, the system performance degrades and BM decoding needs t iterations in order to correct a larger number t of errors. In an attempt to improve the system performance for high speed applications, early termination of the BM decoding is necessary to overcome this degradation. In this paper, a practical solution for early termination checking for BM algorithm is provided. The analysis of proposed method is presented by means of considering the weight distribution of BCH code and deriving the probability of malfunction as the event of undetectable error. The proposed method is presented to be effective by the numerical results and the probability of malfunction for the proposed method is lower than 10−26. As a result, the FPGA testing on a USB device validate the reliability of the proposed method for applying to a commercial product. [less ▲]

Detailed reference viewed: 28 (10 UL)
Full Text
Peer Reviewed
See detailAI SMEs IN INDUSTRIAL MANAGEMENT
Chou, Hung-Pu UL; WANG, Shih-Shuan; BOȘCOIANU et al

in SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE – AFASES 2022 (2022)

SMEs form the pile in the Romanian overall economy, creating a huge sum of the <br />job and added benefit within the nation, which makes them important in this context. IoT and <br />cloud are processing ... [more ▼]

SMEs form the pile in the Romanian overall economy, creating a huge sum of the <br />job and added benefit within the nation, which makes them important in this context. IoT and <br />cloud are processing Romanian but the difficulties encountered during the adoption of those <br />systems by Romanian SMEs. <br />Nevertheless, current literature will not heavily concentrate on SMEs and their particular <br />challenges nor will it include a lot of situation studies focusing upon maturity amounts of <br />impaired computing and IoT technologies. <br />The outcome of this research seeks to contribute to the field of IoT and maturation models by <br />adding more research that is specific to SMEs in Romania. The particular insights created by the <br />conclusions of this thesis goal to help SMEs and researchers in assessing maturity levels and <br />dealing with the challenges connected to the adoption of either IoT or cloud computing <br />technologies. [less ▲]

Detailed reference viewed: 36 (5 UL)
Full Text
See detailLow SLA violation and Low Energy consumption using VM Consolidation in Green Cloud Data Centers
Chou, Hung-Pu UL; Chou, Hong-fu

Report (2020)

Virtual Machines (VM) consolidation is an efficient way towards energy conservation in cloud data centers. The VM consolidation technique is applied to migrate VMs into lesser number of active Physical ... [more ▼]

Virtual Machines (VM) consolidation is an efficient way towards energy conservation in cloud data centers. The VM consolidation technique is applied to migrate VMs into lesser number of active Physical Machines (PMs), so that the PMs which have no VMs can be turned into sleep state. VM consolidation technique can reduce energy consumption of cloud data centers because of the energy consumption by the PM which is in sleep state. Because of VMs sharing the underlying physical resources, aggressive consolidation of VMs can lead to performance degradation. Furthermore, an application may encounter an unexpected resources requirement which may lead to increased response times or even failures. Before providing cloud services, cloud providers should sign Service Level Agreements (SLA) with customers. To provide reliable Quality of Service (QoS) for cloud providers is quite important of considering this research topic. To strike a tradeoff between energy and performance, minimizing energy consumption on the premise of meeting SLA is considered. One of the optimization challenges is to decide which VMs to migrate, when to migrate, where to migrate, and when and which servers to turn on/off. To achieve this goal optimally, it is important to predict the future host state accurately and make plan for migration of VMs based on the prediction. For example, if a host will be overloaded at next time unit, some VMs should be migrated from the host to keep the host from overloading, and if a host will be underloaded at next time unit, all VMs should be migrated from the host, so that the host can be turned off to save power. The design goal of the controller is to achieve the balance between server energy consumption and application performance. Because of the heterogeneity of cloud resources and various applications in the cloud environment, the workload on hosts is dynamically changing over time. It is essential to develop accurate workload prediction models for effective resource management and allocation. The disadvantage of VM consolidation process in cloud data centers is that they only concentrate on primitive system characteristics such as CPU utilization, memory and the number of active hosts. When originating their models and approaches as the decisive factors, these characteristics ignore the discrepancy in performance-to-power efficiency between heterogeneous infrastructures. Therefore, this is the reason that leads to unreasonable consolidation which may cause redundant number of VM migrations and energy waste. Advance artificial intelligence such as reinforcement learning can learn a management strategy without prior knowledge, which enables us to design a model-free resource allocation control system. For example, VM consolidation could be predicted by using artificial intelligence rather than based on the current resources utilization usage [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailA Novel Data Packing Technique for QC-LDPC Decoder Architecture applied to NAND flash controller
Chou, Hung-Pu UL; Ma, Longyu; Sham, Chiu-Wing et al

in Global Conference on Consumer Electronics (2019)

Detailed reference viewed: 42 (9 UL)
Full Text
Peer Reviewed
See detailAn Optimization Approach for an RLL-Constrained LDPC Coded Recording System Using Deliberate Flipping
Chou, Hung-Pu UL; Sham, Chiu-Wing; Hong-fu, Chou

in IEEE Communications Letters (2018)

For a recording system that has a run-length-limited (RLL) constraint, this approach imposes the hard error by flipping bits before recording. A high error coding rate limits the correcting capability of ... [more ▼]

For a recording system that has a run-length-limited (RLL) constraint, this approach imposes the hard error by flipping bits before recording. A high error coding rate limits the correcting capability of the RLL bit error. Since iterative decoding does not include the estimation technique, it has the potential capability of solving the hard error bits within several 7 iterations compared to an LDPC coded system. In this letter, we implement density evolution and the differential evolution approach to provide a performance evaluation of unequal error protection LDPC code to investigate the optimal LDPC code distribution for an RLL flipped system. [less ▲]

Detailed reference viewed: 34 (4 UL)
Full Text
Peer Reviewed
See detailUnequal Protection Approach for RLL-constrained LDPC Coded Recording System Using Deliberate Flipping
Chou, Hung-Pu UL; Sham, Chiu-Wing; Hong-fu, Chou

in Proceedings of 2017 International SoC Design Conference (ISOCC) (2017)

Detailed reference viewed: 38 (10 UL)
Full Text
Peer Reviewed
See detailAn RLL-Constrained LDPC Coded Recording System Using Deliberate Flipping and Flipped-Bit Detection
Chou, Hung-Pu UL; Ueng, Yeong-Luh; Lin, Mao-Chao et al

in IEEE Transactions on Communications (2012)

Detailed reference viewed: 42 (7 UL)
Full Text
Peer Reviewed
See detailOn soft iterative decoding for ternary recording systems with RLL constraints
Shih-Kai, Lee; Hsin-Yi, Chen; Mao-Chao, Lin et al

Poster (2010)

In this paper, we investigate the soft iterative decoding technique for ternary recoding systems with run-length-limited (RLL) constraints. We employ a simple binary-to-ternary RLL encoder following the ... [more ▼]

In this paper, we investigate the soft iterative decoding technique for ternary recoding systems with run-length-limited (RLL) constraints. We employ a simple binary-to-ternary RLL encoder following the LDPC (low density parity check) encoder. In the decoder, the iteratively passing of soft information between the LDPC decoder and a detector is used, where the detector is constructed for a combination of the RLL encoder, PLM (pulse length modulation) precoder and the partial response channel. We provide two different decoding algorithms. For one of the decoding algorithm, we are able to obtain bit-error-rate performance which is inferior to the comparable system without considering the RLL constraint for the high sign-to-noise ratio (SNR) regime and is better for the low-to-moderate SNR regime. [less ▲]

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailCapacity Approaching Run-Length-Limited Codes for Multilevel Recording Systems
Chou, Hung-Pu UL; Chen, Hsin-Yi; Lin, Mao-Chao et al

in IEEE Transactions on Magnetics (2010)

Detailed reference viewed: 42 (4 UL)