The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

4881-4900hit(42807hit)

  • FOREWORD

    Masahiro Mambo  

     
    FOREWORD

      Vol:
    E101-A No:9
      Page(s):
    1323-1323
  • The Stable Roommates Problem with Unranked Entries

    Hiroaki SUTO  Aleksandar SHURBEVSKI  Hiroshi NAGAMOCHI  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1412-1419

    The family of stable matching problems have been well-studied across a wide field of research areas, including economics, mathematics and computer science. In general, an instance of a stable matching problem is given by a set of participants who have expressed their preferences of each other, and asks to find a “stable” matching, that is, a pairing of the participants such that no unpaired participants prefer each other to their assigned partners. In the case of the Stable Roommates Problem (SR), it is known that given an even number n of participants, there might not exist a stable matching that pairs all of the participants, but there exist efficient algorithms to determine if this is possible or not, and if it is possible, produce such a matching. Common extensions of SR allow for the participants' preference lists to be incomplete, or include indifference. Allowing indifference in turn, gives rise to different possible definitions of stability, super, strong, and weak stability. While instances asking for super and strongly stable matching can be efficiently solved even if preference lists are incomplete, the case of weak stability is NP-complete. We examine a restricted case of indifference, introducing the concept of unranked entries. For this type of instances, we show that the problem of finding a weakly stable matching remains NP-complete even if each participant has a complete preference list with at most two unranked entries, or is herself unranked for up to three other participants. On the other hand, for instances where there are m acceptable pairs and there are in total k unranked entries in all of the participants' preference lists, we propose an O(2kn2)-time and polynomial space algorithm that finds a stable matching, or determines that none exists in the given instance.

  • Computational Complexity of Usowan Puzzles

    Chuzo IWAMOTO  Masato HARUISHI  

     
    LETTER

      Vol:
    E101-A No:9
      Page(s):
    1537-1540

    Usowan is one of Nikoli's pencil puzzles. We study the computational complexity of Usowan puzzles. It is shown that deciding whether a given instance of the Usowan puzzle has a solution is NP-complete.

  • FOREWORD

    Tomotaka NAGAOSA  

     
    FOREWORD

      Vol:
    E101-A No:9
      Page(s):
    1280-1280
  • A Study on Loop Gain Measurement Method Using Output Impedance in DC-DC Buck Converter

    Nobukazu TSUKIJI  Yasunori KOBORI  Haruo KOBAYASHI  

     
    PAPER-Energy in Electronics Communications

      Pubricized:
    2018/02/23
      Vol:
    E101-B No:9
      Page(s):
    1940-1948

    We propose a method to derive the loop gain from the open-loop and closed-loop output impedances in a dc-dc buck converter with voltage mode and current mode controls. This enables the loop gain to be measured without injecting a signal into the feedback loop, i.e. without breaking the feedback loop; hence the proposed method can be applied to the control circuits implemented on an IC. Our simulation and experiment show that the loop gain determined by the proposed method closely matches that yielded by the conventional method, which has to break the feedback loop. These results confirm that the proposed method can accurately estimate the phase margin.

  • Comfortable Intelligence for Evaluating Passenger Characteristics in Autonomous Wheelchairs

    Taishi SAWABE  Masayuki KANBARA  Norihiro HAGITA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1308-1316

    In recent years, autonomous driving technologies are being developed for vehicles and personal mobility devices including golf carts and autonomous wheelchairs for various use cases, not only outside areas but inside areas like shopping malls, hospitals and airpots. The main purpose of developing these autonomous vehicles is to avoid the traffic accidents caused by human errors, to assist people with walking, and to improve human comfort by relieving them from driving. Most relevant research focuses on the efficiency and safety of autonomous driving, however, in order to use by the widespread of people in the society, it is important to consider passenger comfort inside vehicles as well as safety and efficiency. Therefore, in this work, we emphasize the importance of considering passenger comfort in designing the control loop of autonomous navigation for the concept of comfortable intelligence in the future autonomous mobility. Moreover, passenger characteristics, in terms of ride comfort in an autonomous vehicle, have not been investigated with regard to safety and comfort, depending on each passenger's driving experience, habits, knowledge, personality, and preference. There are still few studies on the optimization of autonomous driving control reflecting passenger characteristics and different stress factors during the ride. In this study, passenger stress characteristics with different stress factors were objectively analyzed using physiological indices (heart rate and galvanic skin response sensors) during autonomous wheelchair usages. Two different experimental results from 12 participants suggest that there are always at least two types of passengers: one who experiences stress and the other who does not, depending on the stress factors considered. Moreover, with regard to the classification result for the stress reduction method, there are two types of passenger groups, for whom the solution method is, respectively, either effective or ineffective.

  • Depth Two (n-2)-Majority Circuits for n-Majority

    Kazuyuki AMANO  Masafumi YOSHIDA  

     
    LETTER

      Vol:
    E101-A No:9
      Page(s):
    1543-1545

    We present an explicit construction of a MAJn-2 °MAJn-2 circuit computing MAJn for every odd n≥7. This gives a partial solution to an open problem by Kulikov and Podolskii (Proc. of STACS 2017, Article No.49).

  • On LCD MRD Codes

    Minjia SHI  Daitao HUANG  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:9
      Page(s):
    1599-1602

    We investigate linear complementary dual (LCD) rank-metric codes in this paper. We construct a class of LCD generalized Gabidulin codes by a self-dual basis of an extension field over the base field. Moreover, a class of LCD MRD codes, which are obtained by Cartesian products of a generalized Gabidulin code, is constructed.

  • A Fused Continuous Floating-Point MAC on FPGA

    Min YUAN  Qianjian XING  Zhenguo MA  Feng YU  Yingke XU  

     
    LETTER-Circuit Theory

      Vol:
    E101-A No:9
      Page(s):
    1594-1598

    In this letter, we present a novel single-precision floating-point multiply-accumulator (FNA-MAC) to achieve lower hardware resource, reduced computing latency and improved computing accuracy for continuous dot product operations. By further fusing the normalization and alignment in the traditional FMA algorithm, the proposed architecture eliminates the first N-1 normalization and rounding operations for an N-point dot product, and preserves the precision of interim results in a significant bit size that is twice of that in the traditional methods. The normalization and rounding of the final result is processed at the cost of consuming an additional multiply-add operation. The simulation results show that the improvement in computational accuracy is significant. Meanwhile, when comparing to a recently published FMA design, the proposed FNA-MAC can reduce the slice look-up table/flip-flop resource and computing latency by a fact of 18%, 33.3%, respectively.

  • Inserting Layer-5 to Provide Applications with Richer Functions through Common API

    Hiroki WATANABE  Takao KONDO  Kunitake KANEKO  Fumio TERAOKA  

     
    PAPER-Network

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    1967-1981

    Recently, application demands placed on the network have become more multifaceted. Highly functional application-to-application communication services such as bandwidth aggregation, fault tolerant communication, and delay/disruption tolerant networking (DTN) were developed independently in the network layer, the transport layer, and the application layer. As a result, protocol layering has become complicated. This paper proposes to insert Layer-5 (L5) between the application layer and the transport layer to separate communication policies and communication mechanisms to make protocol layering clearer. The transport layer (L4) provides end-to-end communication mechanisms such as reliable byte stream while L5 realizes communication policies such as bandwidth aggregation by combining the communication mechanisms in L4. This paper proposes five types of L5-paths as communication policies: (1) the L5 bundled path for bandwidth aggregation or fault tolerant communication, (2) the L5 spatially-spliced path for communication with middleboxes, (3) the L5 temporally-spliced path for DTN, (4) the L5 spliced-bundled path, and (5) the L5 bundled over spatially-spliced path. An application can select and use an appropriate L5-path depending on the network circumstances through a common API. A prototype of L5 is implemented in the Linux user space as a library to make deployment and maintenance easier. An evaluation shows that establishment time of L5-paths is short enough and performance of L5-paths is comparable or superior to existing technologies.

  • Data Recovery Aware Garbage Collection Mechanism in Flash-Based Storage Devices

    Joon-Young PAIK  Rize JIN  Tae-Sun CHUNG  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2404-2408

    In terms of system reliability, data recovery is a crucial capability. The lack of data recovery leads to the permanent loss of valuable data. This paper aims at improving data recovery in flash-based storage devices where extremely poor data recovery is shown. For this, we focus on garbage collection that determines the life span of data which have high possibility of data recovery requests by users. A new garbage collection mechanism with awareness of data recovery is proposed. First, deleted or overwritten data are categorized into shallow invalid data and deep invalid data based on the possibility of data recovery requests. Second, the proposed mechanism selects victim area for reclamation of free space, considering the shallow invalid data that have the high possibility of data recovery requests. Our proposal prohibits more shallow invalid data from being eliminated during garbage collections. The experimental results show that our garbage collection mechanism can improve data recovery with minor performance degradation.

  • Coding Theoretic Construction of Quantum Ramp Secret Sharing

    Ryutaroh MATSUMOTO  

     
    PAPER-Coding Theory

      Vol:
    E101-A No:8
      Page(s):
    1215-1222

    We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Necessary and sufficient conditions for qualified sets and forbidden sets are given in terms of combinatorial properties of nested linear codes. An algebraic geometric construction for quantum secret sharing is also given.

  • In-Storage Anti-Virus System via On-Demand Inspection

    Jaehwan LEE  Youngrang KIM  Ji Sun SHIN  

     
    LETTER-Computer System

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2132-2135

    We propose a new signature-based, on-demand anti-virus solution using in-storage processing (ISP) to inspect the inside of a storage device. In-storage anti-virus systems are able to isolate malicious effects from main computing platforms, and they reduce the system overhead for virus detection. We implement our in-storage anti-virus platform using cost-effective, open-source hardware, and we verify that is practically applicable to storage devices.

  • Winding Ratio Design of Transformer in Equivalent Circuit of Circular Patch Array Absorber

    Ryosuke SUGA  Tomohiko NAKAMURA  Daisuke KITAHARA  Kiyomichi ARAKI  Osamu HASHIMOTO  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    651-654

    An equivalent circuit of a circular patch array absorber has been proposed, however the method to identify a winding ratio of a transformer in its circuit have never been reported. In this paper, it is indicated that the ratio is proportionate to the area ratio between patch and unit cell of the absorber, and the design method of the winding ratio is proposed. The winding ratio derived by the proposed method is agreed well with that by using electromagnetic simulator within 3% error. Moreover, the operating frequency and 15 dB bandwidth of the fabricated absorber designed by proposed method are agreed with those derived by the circuit simulation within 0.4% and 0.1% errors. Thus the validity of the proposed method is verified.

  • A Novel Recommendation Algorithm Incorporating Temporal Dynamics, Reviews and Item Correlation

    Ting WU  Yong FENG  JiaXing SANG  BaoHua QIANG  YaNan WANG  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/05/18
      Vol:
    E101-D No:8
      Page(s):
    2027-2034

    Recommender systems (RS) exploit user ratings on items and side information to make personalized recommendations. In order to recommend the right products to users, RS must accurately model the implicit preferences of each user and the properties of each product. In reality, both user preferences and item properties are changing dynamically over time, so treating the historical decisions of a user or the received comments of an item as static is inappropriate. Besides, the review text accompanied with a rating score can help us to understand why a user likes or dislikes an item, so temporal dynamics and text information in reviews are important side information for recommender systems. Moreover, compared with the large number of available items, the number of items a user can buy is very limited, which is called the sparsity problem. In order to solve this problem, utilizing item correlation provides a promising solution. Although famous methods like TimeSVD++, TopicMF and CoFactor partially take temporal dynamics, reviews and correlation into consideration, none of them combine these information together for accurate recommendation. Therefore, in this paper we propose a novel combined model called TmRevCo which is based on matrix factorization. Our model combines the dynamic user factor of TimeSVD++ with the hidden topic of each review text mined by the topic model of TopicMF through a new transformation function. Meanwhile, to support our five-scoring datasets, we use a more appropriate item correlation measure in CoFactor and associate the item factors of CoFactor with that of matrix factorization. Our model comprehensively combines the temporal dynamics, review information and item correlation simultaneously. Experimental results on three real-world datasets show that our proposed model leads to significant improvement compared with the baseline methods.

  • DOA Estimation of Quasi-Stationary Signals Exploiting Virtual Extension of Coprime Array Imbibing Difference and Sum Co-Array

    Tarek Hasan AL MAHMUD  Zhongfu YE  Kashif SHABIR  Yawar Ali SHEIKH  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1876-1883

    Using local time frames to treat non-stationary real world signals as stationary yields Quasi-Stationary Signals (QSS). In this paper, direction of arrival (DOA) estimation of uncorrelated non-circular QSS is analyzed by applying a novel technique to achieve larger consecutive lags using coprime array. A scheme of virtual extension of coprime array is proposed that exploits the difference and sum co-array which can increase consecutive co-array lags in remarkable number by using less number of sensors. In the proposed method, cross lags as well as self lags are exploited for virtual extension of co-arrays both for differences and sums. The method offers higher degrees of freedom (DOF) with a larger number of non-negative consecutive lags equal to MN+2M+1 by using only M+N-1 number of sensors where M and N are coprime with congenial interelement spacings. A larger covariance matrix can be achieved by performing covariance like computations with the Khatri-Rao (KR) subspace based approach which can operate in undetermined cases and even can deal with unknown noise covariances. This paper concentrates on only non-negative consecutive lags and subspace based method like Multiple Signal Classification (MUSIC) based approach has been executed for DOA estimation. Hence, the proposed method, named Virtual Extension of Coprime Array imbibing Difference and Sum (VECADS), in this work is promising to create larger covariance matrix with higher DOF for high resolution DOA estimation. The coprime distribution yielded by the proposed approach can yield higher resolution DOA estimation while avoiding the mutual coupling effect. Simulation results demonstrate its effectiveness in terms of the accuracy of DOA estimation even with tightly aligned sources using fewer sensors compared with other techniques like prototype coprime, conventional coprime, Coprime Array with Displaced Subarrays (CADiS), CADiS after Coprime Array with Compressed Inter-element Spacing (CACIS) and nested array seizing only difference co-array.

  • Power Allocation for Zero-Forcing Strategy in Two-User X Channel

    Xianglan JIN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1916-1922

    In an X channel, multiple transmitters transmit independent signals to different receivers. Separate zero-forcing (ZF) precoding is used at transmitters in the two-user X channel with two transmitters and two receivers. A closed-form optimal power allocation is derived under the sum power constraint (SPC) to maximize the squared minimum distance. The ZF strategy with optimal power allocation achieves a significant signal to noise ratio (SNR) improvement. Under the individual power constraint (IPC), a suboptimal power allocation that achieves better performance compared to the existing algorithms is also proposed.

  • FOREWORD Open Access

    Hidenori NAKAZATO  

     
    FOREWORD

      Vol:
    E101-B No:8
      Page(s):
    1752-1752
  • Effects of Finite Superstrate and Asymmetrical Ground on High Gain Superstrate Antenna

    Jae-Gon LEE  Taek-Sun KWON  Jeong-Hae LEE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1884-1890

    In this paper, we present the effects of finite superstrates and asymmetrical grounds on the performance of high gain superstrate antennas. First, when the source of a superstrate antenna is located at an edge of a ground plane, that is, an asymmetric ground plane, the gain of the superstrate antenna can be made to match the gain of the superstrate antenna with a symmetrical ground plane using the PEC (E-plane asymmetric) or the AMC wall (H-plane asymmetric) near the edge. Second, the gain of the superstrate antenna, which has a ground plane with dimensions sufficiently close to infinite, is found to be roughly proportional to the reflection magnitude of a partially reflective surface (PRS). It is found that when the square ground size has a finite dimension of two wavelengths or less, the reflection magnitude of the PRS should have the optimum value for achieving maximum gain. Finally, the gain of the superstrate antenna is studied when the ground plane differs from a PRS. For the above three cases, the performances of the superstrate antenna are verified and compared by analysis, full-wave simulation, and measurement.

  • Optimal Design of Dielectric Flat Lens Based on Topology Optimization Concept

    Kenji TAGUCHI  Tatsuya KASHIWA  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    647-650

    In this paper, the topology optimization method is first applied to obtain high gain characteristics of dielectric flat lens. The topology optimization method used in this study is based on the gradient method with adjoint variable method. The FDTD method is used as the analysis method of electromagnetic fields. Results are compared with those obtained by using metaheuristic methods GA and PSO. As a result, it is shown that the proposed method can efficiently design a high gain dielectric flat lens in a wide frequency band.

4881-4900hit(42807hit)