The search functionality is under construction.

Author Search Result

[Author] Xin Li(43hit)

21-40hit(43hit)

  • Optimization of Join-Type Queries in Nested Relational Databases

    Yaxin LI  Hiroyuki KITAGAWA  Nobuo OHBO  

     
    PAPER-Databases

      Vol:
    E77-D No:6
      Page(s):
    648-659

    Nested relational models were proposed as natural extensions of the relational model to support new emerging database applications. Prototype implementations of nested relational database systems (NRDBSs) have been done by some research groups. However, there remain many research issues on nested relations. One important issue is query processing, in particular query optimization. In NRDBSs, efficient execution of queries involving hierarchical data structures inherent in nested relations is required. In this paper, we focus on two join-type operations on nested relations: nested join and embed, and propose an algorithm to derive a cost optimal execution sequence of nested joins and embeds for a given query graph. The cost optimality of the derived sequence is formally proved. The complexity of the algorithm is proved to be O(N 2), when N nested relations are included in the query graph.

  • Low-Complexity Method for Angle Estimation in MIMO Radar

    Wei WANG  Xian-peng WANG  Xin LI  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:9
      Page(s):
    2976-2978

    A low-complexity method for angle estimation in Multiple-input multiple-output radar (MIMO) radar is presented. In this approach, the signal subspace can be spanned by the orthogonal vectors which are obtained by Multi-stage Wiener Filter (MSWF), then the ESPRIT method can be used to estimate direction of departures (DODs) and direction of arrivals (DOAs). Compared with the conventional ESPRIT algorithm, the proposed method does not involve estimation of the covariance matrix and its eigen-decomposition, which alleviates remarkably the computational complexity. Moreover, the proposed method achieves the similar angle estimation performance. Simulation results are presented to verify the efficiency of the proposed method.

  • Investigation on Downlink Control Channel Structure Using Cross-Carrier Scheduling for Carrier Aggregation-Based Heterogeneous Network in LTE-Advanced

    Nobuhiko MIKI  Anxin LI  Kazuaki TAKEDA  Yuan YAN  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E94-B No:12
      Page(s):
    3312-3320

    Carrier aggregation (CA) is one of the most important techniques for LTE-Advanced because of its capability to support a wide transmission bandwidth of up to 100 MHz and heterogeneous networks effectively while achieving backward compatibility with the Release 8 LTE. In order to improve the performance of control information transmission in heterogeneous networks, cross-carrier scheduling is supported, i.e., control information on one component carrier (CC) can assign radio resources on another CC. To convey the control information efficiently, a search space is defined and used in Release 8 LTE. In cross-carrier scheduling, the optimum design for the search space for different CCs is a paramount issue. This paper presents two novel methods for search space design. In the first method using one hash function, a user equipment (UE)-specific offset is introduced among search spaces associated with different CCs. Due to the UE-specific offsets, search spaces of different UEs are staggered and the probability that the search space of one UE is totally overlapped by that of another UE can be greatly reduced. In the second method using multiple hash functions, a novel randomization scheme is proposed to generate independent hash functions for search spaces of different CCs. Because of the perfect randomization effect of the proposed method, search space overlapping of different UEs is reduced. Simulation results show that both the proposed methods effectively reduce the blocking probability of the control information compared to existing methods.

  • Downlink Non-Orthogonal Multiple Access (NOMA) Combined with Single User MIMO (SU-MIMO)

    Anass BENJEBBOUR  Anxin LI  Keisuke SAITO  Yoshihisa KISHIYAMA  Takehiro NAKAMURA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1415-1425

    This paper investigates a downlink non-orthogonal multiple access (NOMA) combined with single user MIMO (SU-MIMO) for future LTE (Long-Term Evolution) enhancements. In particular, we propose practical schemes to efficiently combine NOMA with open-loop SU-MIMO (Transmission Mode 3: TM3) and closed-loop SU-MIMO (Transmission Mode 4: TM4) specified in LTE. The goal is also to clarify the performance gains of NOMA combined with SU-MIMO transmission, taking into account the LTE radio interface such as frequency-domain scheduling, adaptive modulation and coding (AMC), and NOMA specific functionalities such as, multi-user pairing/ordering, transmit power allocation and successive interference cancellation (SIC) at the receiver side. Based on computer simulations, we evaluate NOMA link-level performance and show that the impact of error propagation associated with SIC is marginal when the power ratio of cell-edge and cell-center users is sufficiently large. In addition, we evaluate NOMA system-level performance gains for different granularities of scheduling and MCS (modulation and coding scheme) selection, for both genie-aided channel quality information (CQI) estimation and approximated CQI estimation, and using different number of power sets. Evaluation results show that NOMA combined with SU-MIMO can still provide a hefty portion of its expected gains even with approximated CQI estimation and limited number of power sets, and also when LTE compliant subband scheduling and wideband MCS is applied.

  • A Novel Low Computational Complexity Power Assignment Method for Non-orthogonal Multiple Access Systems

    Anxin LI  Atsushi HARADA  Hidetoshi KAYAMA  

     
    PAPER-Resource Allocation

      Vol:
    E97-A No:1
      Page(s):
    57-68

    Multiple access (MA) technology is of most importance for beyond long term evolution (LTE) system. Non-orthogonal multiple access (NOMA) utilizing power domain and advanced receiver has been considered as a candidate MA technology recently. In this paper, power assignment method, which plays a key role in performance of NOMA, is investigated. The power assignment on the basis of maximizing geometric mean user throughput requires exhaustive search and thus has an unacceptable computational complexity for practical systems. To solve this problem, a novel power assignment method is proposed by exploiting tree search and characteristic of serial interference cancellation (SIC) receiver. The proposed method achieves the same performance as the exhaustive search while greatly reduces the computational complexity. On the basis of the proposed power assignment method, the performance of NOMA is investigated by link-level and system-level simulations in order to provide insight into suitability of using NOMA for future MA. Simulation results verify effectiveness of the proposed power assignment method and show NOMA is a very promising MA technology for beyond LTE system.

  • Research on Mechanical Fault Prediction Algorithm for Circuit Breaker Based on Sliding Time Window and ANN

    Xiaohua WANG  Mingzhe RONG  Juan QIU  Dingxin LIU  Biao SU  Yi WU  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1299-1305

    A new type of algorithm for predicting the mechanical faults of a vacuum circuit breaker (VCB) based on an artificial neural network (ANN) is proposed in this paper. There are two types of mechanical faults in a VCB: operation mechanism faults and tripping circuit faults. An angle displacement sensor is used to measure the main axle angle displacement which reflects the displacement of the moving contact, to obtain the state of the operation mechanism in the VCB, while a Hall current sensor is used to measure the trip coil current, which reflects the operation state of the tripping circuit. Then an ANN prediction algorithm based on a sliding time window is proposed in this paper and successfully used to predict mechanical faults in a VCB. The research results in this paper provide a theoretical basis for the realization of online monitoring and fault diagnosis of a VCB.

  • New Construction of Symmetric Orthogonal Arrays of Strength t

    Jiao DU  Qiaoyan WEN  Jie ZHANG  Xin LIAO  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:9
      Page(s):
    1901-1904

    Orthogonal arrays have important applications in statistics and computer science, as well as in coding theory. In this letter, a new construction method of symmetric orthogonal arrays of strength t is proposed, which is a concatenation of two orthogonal partitions according to a latin square. As far as we know, this is a new construction of symmetric orthogonal arrays of strength t, where t is a given integer. Based on the different latin squares, we also study the enumeration problem of orthogonal partitions, and a lower bound on the count of orthogonal partitions is derived.

  • Chinese Lexical Sememe Prediction Using CilinE Knowledge

    Hao WANG  Sirui LIU  Jianyong DUAN  Li HE  Xin LI  

     
    PAPER-Language, Thought, Knowledge and Intelligence

      Pubricized:
    2022/08/18
      Vol:
    E106-A No:2
      Page(s):
    146-153

    Sememes are the smallest semantic units of human languages, the composition of which can represent the meaning of words. Sememes have been successfully applied to many downstream applications in natural language processing (NLP) field. Annotation of a word's sememes depends on language experts, which is both time-consuming and labor-consuming, limiting the large-scale application of sememe. Researchers have proposed some sememe prediction methods to automatically predict sememes for words. However, existing sememe prediction methods focus on information of the word itself, ignoring the expert-annotated knowledge bases which indicate the relations between words and should value in sememe predication. Therefore, we aim at incorporating the expert-annotated knowledge bases into sememe prediction process. To achieve that, we propose a CilinE-guided sememe prediction model which employs an existing word knowledge base CilinE to remodel the sememe prediction from relational perspective. Experiments on HowNet, a widely used Chinese sememe knowledge base, have shown that CilinE has an obvious positive effect on sememe prediction. Furthermore, our proposed method can be integrated into existing methods and significantly improves the prediction performance. We will release the data and code to the public.

  • Investigation on Non-Orthogonal Multiple Access with Reduced Complexity Maximum Likelihood Receiver and Dynamic Resource Allocation

    Yousuke SANO  Kazuaki TAKEDA  Satoshi NAGATA  Takehiro NAKAMURA  Xiaohang CHEN  Anxin LI  Xu ZHANG  Jiang HUILING  Kazuhiko FUKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/02/08
      Vol:
    E100-B No:8
      Page(s):
    1301-1311

    Non-orthogonal multiple access (NOMA) is a promising multiple access scheme for further improving the spectrum efficiency compared to orthogonal multiple access (OMA) in the 5th Generation (5G) mobile communication systems. As inter-user interference cancellers for NOMA, two kinds of receiver structures are considered. One is the reduced complexity-maximum likelihood receiver (R-ML) and the other is the codeword level interference canceller (CWIC). In this paper, we show that the R-ML is superior to the CWIC in terms of scheduling flexibility. In addition, we propose a link to system (L2S) mapping scheme for the R-ML to conduct a system level evaluation, and show that the proposed scheme accurately predicts the block error rate (BLER) performance of the R-ML. The proposed L2S mapping scheme also demonstrates that the system level throughput performance of the R-ML is higher than that for the CWIC thanks to the scheduling flexibility.

  • Quantum Steganography with High Efficiency with Noisy Depolarizing Channels

    Xin LIAO  Qiaoyan WEN  Tingting SONG  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:10
      Page(s):
    2039-2044

    Quantum steganography is to send secret quantum information through a quantum channel, such that an unauthorized user will not be aware of the existence of secret data. The depolarizing channel can hide quantum information by disguising it as channel errors of a quantum error-correcting code. We improve the efficiency of quantum steganography with noisy depolarizing channels, by modifying the twirling procedure and adding quantum teleportation. The proposed scheme not only meets the requirements of quantum steganography but also has higher efficiency.

  • 60 GHz Millimeter-Wave CMOS Integrated On-Chip Open Loop Resonator Bandpass Filters on Patterned Ground Shields

    Ramesh K. POKHAREL  Xin LIU  Dayang A.A. MAT  Ruibing DONG  Haruichi KANAYA  Keiji YOSHIDA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E96-C No:2
      Page(s):
    270-276

    This paper presents the design of a second-order and a fourth-order bandpass filter (BPF) for 60 GHz millimeter-wave applications in 0.18 µm CMOS technology. The proposed on-chip BPFs employ the folded open loop structure designed on pattern ground shields. The adoption of a folded structure and utilization of multiple transmission zeros in the stopband permit the compact size and high selectivity for the BPF. Moreover, the pattern ground shields obviously slow down the guided waves which enable further reduction in the physical length of the resonator, and this, in turn, results in improvement of the insertion losses. A very good agreement between the electromagnetic (EM) simulations and measurement results has been achieved. As a result, the second-order BPF has the center frequency of 57.5 GHz, insertion loss of 2.77 dB, bandwidth of 14 GHz, return loss less than 27.5 dB and chip size of 650 µm810 µm (including bonding pads) while the fourth-order BPF has the center frequency of 57 GHz, insertion loss of 3.06 dB, bandwidth of 12 GHz, return loss less than 30 dB with chip size of 905 µm810 µm (including bonding pads).

  • Joint Frequency and Power Allocation in Wireless Mesh Networks: A Self-Pricing Game Model

    Xin LIU  Jin-long WANG  Qihui WU  Yang YANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:10
      Page(s):
    2857-2867

    We investigate the problem of joint frequency and power allocation in wireless mesh networks, using a self-pricing game based solution. In traditional pricing game models, the price factor is determined from the global information of the network, which causes heavy communication overhead. To overcome this problem, we propose a self-pricing game model, in which the price factor is determined by the distributed access points processing their individual information; moreover, it is implemented in an autonomous and distributed fashion. The existence and the efficiency of Nash equilibrium (NE) of the proposed game are studied. It is shown that the proposed game based solution achieves near cooperative network throughput while it reduces the communication overhead significantly. Also, a forcing convergence algorithm is proposed to counter the vibration of channel selection. Simulation results verify the effectiveness and robustness of the proposed scheme.

  • Highly Robust Double Node Upset Resilient Hardened Latch Design

    Huaguo LIANG  Xin LI  Zhengfeng HUANG  Aibin YAN  Xiumin XU  

     
    PAPER-Electronic Circuits

      Vol:
    E100-C No:5
      Page(s):
    496-503

    With the scaling of technology, nanoscale CMOS integrated circuits are becoming more sensitive to single event double node upsets induced by charge sharing. A novel highly robust hardened latch design is presented that is fully resilient to single event double node upsets and single node upsets. The proposed latch employs multiple redundant C-elements to form a dual interlocked structure in which the redundant C-elements can bring the affected nodes back to the correct states regardless of the energy of the striking particle. Detailed HSPICE results confirm that the proposed latch features complete resilience to double node upsets and achieves an improved trade-off in terms of robustness, area, delay and power in comparison with previous latches. Extensive Monte Carlo simulations validate the proposed latch features as less sensitive to process, supply voltage and temperature variations.

  • Image Retrieval with Scale Invariant Visual Phrases

    Deying FENG  Jie YANG  Cheng YANG  Congxin LIU  

     
    LETTER-Multimedia DB

      Vol:
    E96-D No:5
      Page(s):
    1063-1067

    We propose a retrieval method using scale invariant visual phrases (SIVPs). Our method encodes spatial information into the SIVPs which capture translation, rotation and scale invariance, and employs the SIVPs to determine the spatial correspondences between query image and database image. To compute the spatial correspondences efficiently, the SIVPs are introduced into the inverted index, and SIVP verification is investigated to refine the candidate images returned from inverted index. Experimental results demonstrate that our method improves the retrieval accuracy while increasing the retrieval efficiency.

  • Multipath Probing and Grouping in Multihomed Networks

    Jianxin LIAO  Jingyu WANG  Tonghong LI  Xiaomin ZHU  

     
    LETTER-Information Network

      Vol:
    E94-D No:3
      Page(s):
    710-713

    We propose a novel probing scheme capable of discovering shared bottlenecks among multiple paths between two multihomed hosts simultaneously, without any specific help from the network routers, and a subsequent grouping approach for partitioning these paths into groups. Simulation results show that the probing and grouping have an excellent performance under different network conditions.

  • Reliability-Security Tradeoff for Secure Transmission with Untrusted Relays

    Dechuan CHEN  Weiwei YANG  Jianwei HU  Yueming CAI  Xin LIU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E99-A No:12
      Page(s):
    2597-2599

    In this paper, we identify the tradeoff between security and reliability in the amplify-and-forward (AF) distributed beamforming (DBF) cooperative network with K untrusted relays. In particular, we derive the closed-form expressions for the connection outage probability (COP), the secrecy outage probability (SOP), the tradeoff relationship, and the secrecy throughput. Analytical and simulation results demonstrate that increasing K leads to the enhancement of the reliability performance, but the degradation of the security performance. This tradeoff also means that there exists an optimal K maximizing the secrecy throughput.

  • A Novel Differential Evolution Algorithm Based on Local Fitness Landscape Information for Optimization Problems

    Jing LIANG  Ke LI  Kunjie YU  Caitong YUE  Yaxin LI  Hui SONG  

     
    PAPER-Core Methods

      Pubricized:
    2023/02/13
      Vol:
    E106-D No:5
      Page(s):
    601-616

    The selection of mutation strategy greatly affects the performance of differential evolution algorithm (DE). For different types of optimization problems, different mutation strategies should be selected. How to choose a suitable mutation strategy for different problems is a challenging task. To deal with this challenge, this paper proposes a novel DE algorithm based on local fitness landscape, called FLIDE. In the proposed method, fitness landscape information is obtained to guide the selection of mutation operators. In this way, different problems can be solved with proper evolutionary mechanisms. Moreover, a population adjustment method is used to balance the search ability and population diversity. On one hand, the diversity of the population in the early stage is enhanced with a relative large population. One the other hand, the computational cost is reduced in the later stage with a relative small population. The evolutionary information is utilized as much as possible to guide the search direction. The proposed method is compared with five popular algorithms on 30 test functions with different characteristics. Experimental results show that the proposed FLIDE is more effective on problems with high dimensions.

  • Investigation on Propagation Characteristics of PD-induced Electromagnetic Wave in T-Shaped GIS Based on FDTD Method

    Mingzhe RONG  Tianhui LI  Xiaohua WANG  Dingxin LIU  Anxue ZHANG  

     
    PAPER

      Vol:
    E97-C No:9
      Page(s):
    880-887

    When ultra-high-frequency (UHF) method is applied in partial discharge (PD) detection for GIS, the propagation process and rules of electromagnetic (EM) wave need to be understood clearly for conducting diagnosis and assessment about the real insulation status. The preceding researches are mainly concerning about the radial component of the UHF signal, but the propagation of the signal components in axial and radial directions and that perpendicular to the radial direction of the GIS tank are rarely considered. So in this paper, for a 252,kV GIS with T-shaped structure (TS), the propagation and attenuation of PD-induced EM wave in different circumferential angles and directions are investigated profoundly in time and frequency domain based on Finite Difference Time Domain (FDTD) method. The attenuation rules of the peak to peak value (Vpp) and cumulative energy are concluded. By comparing the results of straight branch and T branch, the influence of T-shaped structure over the propagation of different signal components are summarized. Moreover, the new circumferential and axial location methods proposed in the previous work are verified to be still applicable. This paper discusses the propagation mechanism of UHF signal in T-shaped tank, which provides some referential significance towards the utilization of UHF technique and better implementation of PD detection.

  • Inverse Distance Weighting Method Based on a Dynamic Voronoi Diagram for Thermal Reconstruction with Limited Sensor Data on Multiprocessors

    Xin LI  Mengtian RONG  Tao LIU  Liang ZHOU  

     
    PAPER-Electronic Components

      Vol:
    E94-C No:8
      Page(s):
    1295-1301

    With exponentially increasing power densities due to technology scaling and ever increasing demand for performance, chip temperature has become an important issue that limits the performance of computer systems. Typically, it is essential to use a set of on-chip thermal sensors to monitor temperatures during the runtime. The runtime thermal measurements are then employed by dynamic thermal management techniques to manage chip performance appropriately. In this paper, we propose an inverse distance weighting method based on a dynamic Voronoi diagram for the reconstruction of full thermal characterization of integrated circuits with non-uniform thermal sensor placements. Firstly we utilize the proposed method to transform the non-uniformly spaced samples to virtual uniformly spaced data. Then we apply three classical interpolation algorithms to reconstruct the full thermal signals in the uniformly spaced samples mode. To evaluate the effectiveness of our method, we develop an experiment for reconstructing full thermal status of a 16-core processor. Experimental results show that the proposed method significantly outperforms spectral analysis techniques, and can obtain full thermal characterization with an average absolute error of 1.72% using 9 thermal sensors per core.

  • Conceptual Knowledge Enhanced Model for Multi-Intent Detection and Slot Filling Open Access

    Li HE  Jingxuan ZHAO  Jianyong DUAN  Hao WANG  Xin LI  

     
    PAPER

      Pubricized:
    2023/10/25
      Vol:
    E107-D No:4
      Page(s):
    468-476

    In Natural Language Understanding, intent detection and slot filling have been widely used to understand user queries. However, current methods tend to rely on single words and sentences to understand complex semantic concepts, and can only consider local information within the sentence. Therefore, they usually cannot capture long-distance dependencies well and are prone to problems where complex intentions in sentences are difficult to recognize. In order to solve the problem of long-distance dependency of the model, this paper uses ConceptNet as an external knowledge source and introduces its extensive semantic information into the multi-intent detection and slot filling model. Specifically, for a certain sentence, based on confidence scores and semantic relationships, the most relevant conceptual knowledge is selected to equip the sentence, and a concept context map with rich information is constructed. Then, the multi-head graph attention mechanism is used to strengthen context correlation and improve the semantic understanding ability of the model. The experimental results indicate that the model has significantly improved performance compared to other models on the MixATIS and MixSNIPS multi-intent datasets.

21-40hit(43hit)