The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

2681-2700hit(42807hit)

  • Transparent Glass Quartz Antennas on the Windows of 5G-Millimeter-Wave-Connected Cars

    Osamu KAGAYA  Yasuo MORIMOTO  Takeshi MOTEGI  Minoru INOMATA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/07/14
      Vol:
    E104-B No:1
      Page(s):
    64-72

    This paper proposes a transparent glass quartz antenna for 5G-millimeter-wave-connected vehicles and clarifies the characteristics of signal reception when the glass antennas are placed on the windows of a vehicle traveling in an urban environment. Synthetic fused quartz is a material particularly suited for millimeter-wave devices owing to its excellent low transmission loss. Realizing synthetic fused quartz devices requires accurate micromachining technology specialized for the material coupled with the material technology. This paper presents a transparent antenna comprising a thin mesh pattern on a quartz substrate for installation on a vehicle window. A comparison of distributed transparent antennas and an omnidirectional antenna shows that the relative received power of the distributed antenna system is higher than that of the omnidirectional antenna. In addition, results show that the power received is similar when using vertically and horizontally polarized antennas. The design is verified in a field test using transparent antennas on the windows of a real vehicle.

  • Precoded Physical Layer Network Coding with Coded Modulation in MIMO-OFDM Bi-Directional Wireless Relay Systems Open Access

    Satoshi DENNO  Kazuma YAMAMOTO  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/07/14
      Vol:
    E104-B No:1
      Page(s):
    99-108

    This paper proposes coded modulation for physical layer network coding in multiple input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) bi-directional wireless relay systems where precoding is applied. The proposed coded modulation enables the relays to decode the received signals, which improves the transmission performance. Soft input decoding for the proposed coded modulation is proposed. Furthermore, we propose two precoder weight optimization techniques, called “per subcarrier weight optimization” and “total weight optimization”. This paper shows a precoder configuration based on the optimization with the lattice reduction or the sorted QR-decomposition. The performance of the proposed network coding is evaluated by computer simulation in a MIMO-OFDM two-hop wireless relay system with the 16 quadrature amplitude modulation (QAM) or the 256QAM. The proposed coded modulation attains a coding gain of about 2dB at the BER of 10-4. The total weight optimization achieves about 1dB better BER performance than the other at the BER of 10-4.

  • Boundary Integral Equations Combined with Orthogonality of Modes for Analysis of Two-Dimensional Optical Slab Waveguide: Single Mode Waveguide

    Masahiro TANAKA  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2020/06/22
      Vol:
    E104-C No:1
      Page(s):
    1-10

    New boundary integral equations are proposed for two-port slab waveguides which satisfy single mode condition. The boundary integral equations are combined with the orthogonality of guided mode and non-guided field. They are solved by the standard boundary element method with no use of mode expansion technique. Reflection and transmission coefficients of guided mode are directly determined by the boundary element method. To validate the proposed method, step waveguides for TE wave incidence and triangular rib waveguides for TM wave incidence are investigated by numerical calculations.

  • A Simple f0/2f0 Microstrip Diplexer with Low and Wideband Insertion-Loss Characteristics

    Ken'ichi HOSOYA  Ryosuke EMURA  

     
    PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2020/06/22
      Vol:
    E104-C No:1
      Page(s):
    11-21

    An f0/2f0 (frequency ratio of two) microstrip diplexer with simple circuit configuration as well as low and wideband insertion-loss characteristics is proposed. It is a parallel combination of a coupled line for f0 port and a wave-trap circuit composed of a transmission line and an open stub for 2f0 port. All the lines and stub have a quarter-wave length for f0. Matching circuits are not needed. Circuit and electro-magnetic simulation results prove that the proposed f0/2f0 diplexer exhibits well-balanced properties of insertion loss (IL), IL bandwidth, and isolation, as compared to conventional simple f0/2f0 diplexers composed of two wave-trap circuits or two coupled lines. The proposed diplexer is fabricated on a resin substrate in a microstrip configuration at frequencies of f0/2f0=2.5/5 GHz. Measured results are in good agreement with simulations and support the above conclusion. The proposed diplexer exhibits ILs of 0.46/0.56 dB with 47/47% relative bandwidth (for f0/2f0), which are lower and wider than f0/2f0 diplexers in literatures at the same frequency bands.

  • Effect of Tunnel Pits Radius Variation on the Electric Characteristics of Aluminum Electrolytic Capacitor

    Daisaku MUKAIYAMA  Masayoshi YAMAMOTO  

     
    PAPER-Electronic Components

      Pubricized:
    2020/07/14
      Vol:
    E104-C No:1
      Page(s):
    22-33

    Aluminum Electrolytic Capacitors are widely used as the smoothing capacitors in power converter circuits. Recently, there are a lot of studies to detect the residual life of the smoothing Aluminum Electrolytic Capacitors from the information of the operational circuit, such as the ripple voltage and the ripple current of the smoothing capacitor. To develop this kind of technology, more precise impedance models of Aluminum Electrolytic Capacitors become desired. In the case of the low-temperature operation of the power converters, e.g., photovoltaic inverters, the impedance of the smoothing Aluminum Electrolytic Capacitor is the key to avoid the switching element failure due to the switching surge. In this paper, we introduce the impedance calculation model of Aluminum Electrolytic Capacitors, which provides accurate impedance values in wide temperature and frequency ranges.

  • Concept Demonstration of 3D Waveguides Shuffle Converter for Multi-Core Fiber/Single-Mode Fiber Fan-in Fan-out Configuration Toward Over 1,000 Port Count

    Haisong JIANG  Yasuhiro HINOKUMA  Sampad GHOSH  Ryota KUWAHATA  kiichi HAMAMOTO  

     
    BRIEF PAPER-Optoelectronics

      Pubricized:
    2020/05/25
      Vol:
    E104-C No:1
      Page(s):
    34-36

    A novel shuffle converter by using 3D waveguide of MCF (multi-core fiber)/SMF (single mode fiber) ribbon fan-in fan-out configuration towards over 1,000 port count optical matrix switch has been proposed. The shuffle converter enables to avoid waveguide crossing section in the optical matrix switch configuration, and the principle device showed sufficient crosstalk of less than -54.2 dB, and insertion loss of 2.1 dB successfully.

  • Preventing Fake Information Generation Against Media Clone Attacks Open Access

    Noboru BABAGUCHI  Isao ECHIZEN  Junichi YAMAGISHI  Naoko NITTA  Yuta NAKASHIMA  Kazuaki NAKAMURA  Kazuhiro KONO  Fuming FANG  Seiko MYOJIN  Zhenzhong KUANG  Huy H. NGUYEN  Ngoc-Dung T. TIEU  

     
    INVITED PAPER

      Pubricized:
    2020/10/19
      Vol:
    E104-D No:1
      Page(s):
    2-11

    Fake media has been spreading due to remarkable advances in media processing and machine leaning technologies, causing serious problems in society. We are conducting a research project called Media Clone aimed at developing methods for protecting people from fake but skillfully fabricated replicas of real media called media clones. Such media can be created from fake information about a specific person. Our goal is to develop a trusted communication system that can defend against attacks of media clones. This paper describes some research results of the Media Clone project, in particular, various methods for protecting personal information against generating fake information. We focus on 1) fake information generation in the physical world, 2) anonymization and abstraction in the cyber world, and 3) modeling of media clone attacks.

  • Native Build System for Unity Builds with Sophisticated Bundle Strategies

    Takafumi KUBOTA  Kenji KONO  

     
    PAPER-Software Engineering

      Pubricized:
    2020/10/15
      Vol:
    E104-D No:1
      Page(s):
    126-137

    Build systems are essential tools for developing large software projects. Traditionally, build systems have been designed for high incremental-build performance. However, the longer build times of recent large C++ projects have imposed a requirement on build systems: i.e., unity builds. Unity builds are a build technique for speeding up sequential compilation of many source files by bundling multiple source files into one. Unity builds lead to a significant reduction in build time through removal of redundant parsing of shared header files. However, unity builds have a negative effect on incremental builds because each compiler task gets larger. Our previous study reported existing unity builds overlook many better bundle configurations that improve unity-build performance without increasing the incremental-build time. Motivated by the problem, we present a novel build system for better performance in unity builds. Our build system aims to achieve competitive unity-build performance in full builds with mitigating the negative effect on incremental builds. To accomplish this goal, our build system uses sophisticated bundle strategies developed on the basis of hints extracted from the preprocessed code of each source file. Thanks to the strategies, our build system finds better bundle configurations that improve both of the full-build performance and the incremental-build performance in unity builds. For example, in comparison with the state-of-the-art unity builds of WebKit, our build system improves build performance by 9% in full builds, by 39% in incremental builds, and by 23% in continuous builds that include both types of the builds.

  • Quantitative Evaluation of Software Component Behavior Discovery Approach

    Cong LIU  

     
    LETTER

      Pubricized:
    2020/05/21
      Vol:
    E104-D No:1
      Page(s):
    117-120

    During the execution of software systems, their execution data can be recorded. By fully exploiting these data, software practitioners can discover behavioral models describing the actual execution of the underlying software system. The recorded unstructured software execution data may be too complex, spanning over several days, etc. Applying existing discovery techniques results in spaghetti-like models with no clear structure and no valuable information for comprehension. Starting from the observation that a software system is composed of a set of logical components, Liu et al. propose to decompose the software behavior discovery problem into smaller independent ones by discovering a behavioral model per component in [1]. However, the effectiveness of the proposed approach is not fully evaluated and compared with existing approaches. In this paper, we evaluate the quality (in terms of understandability/complexity) of discovered component behavior models in a quantitative manner. Based on evaluation, we show that this approach can reduce the complexity of the discovered model and gives a better understanding.

  • Spatio-Temporal Self-Attention Weighted VLAD Neural Network for Action Recognition

    Shilei CHENG  Mei XIE  Zheng MA  Siqi LI  Song GU  Feng YANG  

     
    LETTER-Biocybernetics, Neurocomputing

      Pubricized:
    2020/10/01
      Vol:
    E104-D No:1
      Page(s):
    220-224

    As characterizing videos simultaneously from spatial and temporal cues have been shown crucial for video processing, with the shortage of temporal information of soft assignment, the vector of locally aggregated descriptor (VLAD) should be considered as a suboptimal framework for learning the spatio-temporal video representation. With the development of attention mechanisms in natural language processing, in this work, we present a novel model with VLAD following spatio-temporal self-attention operations, named spatio-temporal self-attention weighted VLAD (ST-SAWVLAD). In particular, sequential convolutional feature maps extracted from two modalities i.e., RGB and Flow are receptively fed into the self-attention module to learn soft spatio-temporal assignments parameters, which enabling aggregate not only detailed spatial information but also fine motion information from successive video frames. In experiments, we evaluate ST-SAWVLAD by using competitive action recognition datasets, UCF101 and HMDB51, the results shcoutstanding performance. The source code is available at:https://github.com/badstones/st-sawvlad.

  • Load Balancing for Energy-Harvesting Mobile Edge Computing

    Ping ZHAO  Jiawei TAO  Abdul RAUF  Fengde JIA  Longting XU  

     
    LETTER-Mobile Information Network and Personal Communications

      Pubricized:
    2020/07/27
      Vol:
    E104-A No:1
      Page(s):
    336-342

    With the development of cloud computing, the Mobile Edge Computing has emerged and attracted widespread attentions. In this paper, we focus on the load balancing in MEC with energy harvesting. We first introduce the load balancing in MEC as a problem of minimizing both the energy consumption and queue redundancy. Thereafter, we adapt such a optimization problem to the Lyapunov algorithm and solve this optimization problem. Finally, extensive simulation results validate that the obtained strategy improves the capabilities of MEC systems.

  • Fuzzy Output Support Vector Machine Based Incident Ticket Classification

    Libo YANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2020/10/14
      Vol:
    E104-D No:1
      Page(s):
    146-151

    Incident ticket classification plays an important role in the complex system maintenance. However, low classification accuracy will result in high maintenance costs. To solve this issue, this paper proposes a fuzzy output support vector machine (FOSVM) based incident ticket classification approach, which can be implemented in the context of both two-class SVMs and multi-class SVMs such as one-versus-one and one-versus-rest. Our purpose is to solve the unclassifiable regions of multi-class SVMs to output reliable and robust results by more fine-grained analysis. Experiments on both benchmark data sets and real-world ticket data demonstrate that our method has better performance than commonly used multi-class SVM and fuzzy SVM methods.

  • Practical Video Authentication Scheme to Analyze Software Characteristics

    Wan Yeon LEE  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2020/09/30
      Vol:
    E104-D No:1
      Page(s):
    212-215

    We propose a video authentication scheme to verify whether a given video file is recorded by a camera device or touched by a video editing tool. The proposed scheme prepares software characteristics of camera devices and video editing tools in advance, and compares them with the metadata of the given video file. Through practical implementation, we show that the proposed scheme has benefits of fast analysis time, high accuracy and full automation.

  • Fundamental Limits of Biometric Identification System Under Noisy Enrollment

    Vamoua YACHONGKA  Hideki YAGI  

     
    PAPER-Information Theory

      Pubricized:
    2020/07/14
      Vol:
    E104-A No:1
      Page(s):
    283-294

    In this study, we investigate fundamental trade-off among identification, secrecy, template, and privacy-leakage rates in biometric identification system. Ignatenko and Willems (2015) studied this system assuming that the channel in the enrollment process of the system is noiseless and they did not consider the template rate. In the enrollment process, however, it is highly considered that noise occurs when bio-data is scanned. In this paper, we impose a noisy channel in the enrollment process and characterize the capacity region of the rate tuples. The capacity region is proved by a novel technique via two auxiliary random variables, which has never been seen in previous studies. As special cases, the obtained result shows that the characterization reduces to the one given by Ignatenko and Willems (2015) where the enrollment channel is noiseless and there is no constraint on the template rate, and it also coincides with the result derived by Günlü and Kramer (2018) where there is only one individual.

  • Strongly Secure Identity-Based Key Exchange with Single Pairing Operation

    Junichi TOMIDA  Atsushi FUJIOKA  Akira NAGAI  Koutarou SUZUKI  

     
    PAPER

      Vol:
    E104-A No:1
      Page(s):
    58-68

    This paper proposes an id-eCK secure identity-based authenticated key exchange (ID-AKE) scheme, where the id-eCK security implies that a scheme resists against leakage of all combinations of master, static, and ephemeral secret keys except ones trivially break the security. Most existing id-eCK secure ID-AKE schemes require two symmetric pairing operations or a greater number of asymmetric pairing, which is faster than symmetric one, operations to establish a session key. However, our scheme is realized with a single asymmetric pairing operation for each party, and this is an advantage in efficiency. The proposed scheme is based on the ID-AKE scheme by McCullagh and Barreto, which is vulnerable to an active attack. To achieve id-eCK security, we apply the HMQV construction and the NAXOS technique to the McCullagh-Barreto scheme. The id-eCK security is proved under the external Diffie-Hellman for target group assumption and the q-gap-bilinear collision attack assumption.

  • Relationship between Code Reading Speed and Programmers' Age

    Yukasa MURAKAMI  Masateru TSUNODA  Masahide NAKAMURA  

     
    LETTER

      Pubricized:
    2020/09/17
      Vol:
    E104-D No:1
      Page(s):
    121-125

    According to the aging society, it is getting more important for software industry to secure human resources including senior developers. To enhance the performance of senior developers, we should clarify the strengths and weaknesses of senior developers, and based on that, we should reconsider software engineering education and development support tools. To a greater or lesser extent, many cognitive abilities would be affected by aging, and we focus on the human memory as one of such abilities. We performed preliminary analysis based on the assumption. In the preliminary experiment, we prepared programs in which the influence of human memory performance (i.e., the number of variables remembered in the short-term memory) on reading speed is different, and measured time for subjects to understand the programs. As a result, we observed that the code reading speed of senior subjects was slow, when they read programs in which the influence of human memory performance is larger.

  • Optical Wireless Communication: A Candidate 6G Technology? Open Access

    Shintaro ARAI  Masayuki KINOSHITA  Takaya YAMAZATO  

     
    INVITED PAPER

      Vol:
    E104-A No:1
      Page(s):
    227-234

    We discuss herein whether an optical wireless communication (OWC) system can be a candidate for post 5G or 6G cellular communication. Almost once per decade, cellular mobile communication is transformed by a significant evolution, with each generation developing a distinctive concept or technology. Interestingly, similar trends have occurred in OWC systems based on visible light and light fidelity (Li-Fi). Unfortunately, OWC is currently relegated to a limited role in any 5G scenario, but the debate whether this is unavoidable has yet to be settled. Whether OWC is adopted post 5G or 6G is not the vital issue; rather, the aim should be that OWC coexists with 5G and 6G communication technologies. In working toward this goal, research and development in OWC will continue to extend its benefits and standardize its systems so that it can be widely deployed in the market. For example, given that a standard already exists for a visible-light beacon identifier and Li-Fi, a service using this standard should be developed to satisfy user demand. Toward this end, we propose herein a method for visible-light beacon identification that involves using a rolling shutter to receive visible-light communications with a smartphone camera. In addition, we introduce a rotary LED transmitter for image-sensor communication.

  • DC-Balanced Improvement of Interlaken Protocol

    Sarat YOOWATTANA  Mongkol EKPANYAPONG  

     
    PAPER-Network

      Pubricized:
    2020/07/14
      Vol:
    E104-B No:1
      Page(s):
    27-34

    High-speed serial data communication is essential for connecting peripherals in high-performance computing systems. Interlaken is a high-speed serial data communication protocol that has been widely adopted in various applications as it can run on multiple medias such as PCBs, blackplans or over cables. The Interlaken uses 64b/67b line coding to maintain the run length (RL) and the running disparity (RD) with the advantage of an inversion bit that indicates whether the receiver must flip the data or not. By using the inversion bit, it increases 1bit overhead to every data word. This paper proposes 64b/i67b line coding technique for encoding and decoding to improve the cumulative running disparity of 64b/67b without additional bit overhead. The results have been obtained from simulations that use random data and the Squash data set, and the proposed method reduces the maximum cumulative running disparity value up to 33%.

  • REAP: A Method for Pruning Convolutional Neural Networks with Performance Preservation

    Koji KAMMA  Toshikazu WADA  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2020/10/02
      Vol:
    E104-D No:1
      Page(s):
    194-202

    This paper presents a pruning method, Reconstruction Error Aware Pruning (REAP), to reduce the redundancy of convolutional neural network models for accelerating their inference. In REAP, we have the following steps: 1) Prune the channels whose outputs are redundant and can be reconstructed from the outputs of other channels in each convolutional layer; 2) Update the weights of the remaining channels by least squares method so as to compensate the error caused by pruning. This is how we compress and accelerate the models that are initially large and slow with little degradation. The ability of REAP to maintain the model performances saves us lots of time and labors for retraining the pruned models. The challenge of REAP is the computational cost for selecting the channels to be pruned. For selecting the channels, we need to solve a huge number of least squares problems. We have developed an efficient algorithm based on biorthogonal system to obtain the solutions of those least squares problems. In the experiments, we show that REAP can conduct pruning with smaller sacrifice of the model performances than several existing methods including the previously state-of-the-art one.

  • Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher

    Lijun GAO  Feng LIN  Maode MA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2020/06/29
      Vol:
    E104-B No:1
      Page(s):
    13-19

    In recent years, with the continuous development of the Internet of Things, radio frequency identification (RFID) technology has also been widely concerned. The computing power of low cost tags is limited because of their high hardware requirements. Symmetric encryption algorithms and asymmetric encryption algorithms, such as RSA, DES, AES, etc., cannot be suitable for low cost RFID protocols. Therefore, research on RFID security authentication protocols with low cost and high security has become a focus. Recently, an ultralightweight RFID authentication protocol LP2UF was proposed to provide security and prevent all possible attacks. However, it is discovered that a type of desynchronization attack can successfully break the proposed scheme. To overcome the vulnerability against desynchronization attacks, we propose here a new ultra-lightweight RFID two-way authentication protocol based on stream cipher technology that uses only XOR. The stream cipher is employed to ensure security between readers and tags. Analysis shows that our protocol can effectively resist position tracking attacks, desynchronization attacks, and replay attacks.

2681-2700hit(42807hit)