The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

5921-5940hit(42807hit)

  • A Simplified QRD-M Algorithm in MIMO-OFDM Systems

    Jong-Kwang KIM  Jae-Hyun RO  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:10
      Page(s):
    2195-2199

    The Long Term Evolution (LTE) of mobile communication standard was designed by the 3rd generation partnership project (3GPP) to serve the requirements. Nowadays, the combining of the orthogonal frequency division multiplexing (OFDM) and the multiple input multiple output (MIMO) is supported in LTE system. The MIMO-OFDM is considered to improve data rate and channel capacity without additional bandwidth. Because the receivers get all transmission signals from all transmitters at the same time, many detection schemes have been developed for accurate estimation and low complexity. Among the detection schemes, the QR decomposition with M algorithm (QRD-M) achieves optimal error performance with low complexity. Nevertheless, the conventional QRD-M has high complexity for implementation. To overcome the problem, this letter proposes the low complexity QRD-M detection scheme in MIMO-OFDM systems. The proposed scheme has two elements which decide layer value and the limited candidates. The two elements are defined by the number of transmit antennas and the cardinality of modulation set respectively. From simulation results, the proposed scheme has the same error performance with the conventional QRD-M and very lower complexity than the conventional QRD-M.

  • Optimizing the System Performance of Relay Enhanced Cellular Networks through Time Partitioning

    Liqun ZHAO  Hongpeng WANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:10
      Page(s):
    2204-2206

    In this letter, an effective algorithm is proposed to improve the performance of relay enhanced cellular networks, which is to allocate appropriate resources to each access point with quality of service constraint. First we derive the ergodic rate for backhaul link based on a poison point process model, and then allocate resources to each link according to the quality of service requirements and ergodic rate of links. Numerical results show that the proposed algorithm can not only improve system throughput but also improve the rate distribution of user equipment.

  • Efficient Regular Path Query Evaluation by Splitting with Unit-Subquery Cost Matrix

    Van-Quyet NGUYEN  Kyungbaek KIM  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2017/07/12
      Vol:
    E100-D No:10
      Page(s):
    2648-2652

    A widely-used query on a graph is a regular path query (RPQ) whose answer is a set of tuples of nodes connected by paths corresponding to a given regular expression. Traditionally, evaluating an RPQ on a large graph takes substantial memory spaces and long response time. Recently, several studies have focused on improving response time for evaluating an RPQ by splitting an original RPQ into smaller subqueries, evaluating them in parallel and combining partial answers. In these works, how to choose split labels in an RPQ is one of key points of the performance of RPQ evaluation, and rare labels of a graph can be used as split labels. However there is still a room for improvement, because a rare label cannot guarantee the minimum evaluation cost all the time. In this paper, we propose a novel approach of selecting split labels by estimating evaluation cost of each split subquery with a unit-subquery cost matrix (USCM), which can be obtained from a graph in prior to evaluate an RPQ. USCM presents the evaluation cost of a unit-subquery which is the smallest possible subquery, and we can estimate the evaluation cost of an RPQ by decomposing into a set of unit-subqueries. Experimental results show that our proposed approach outperforms rare label based approaches.

  • Fraud Detection in Comparison-Shopping Services: Patterns and Anomalies in User Click Behaviors

    Sang-Chul LEE  Christos FALOUTSOS  Dong-Kyu CHAE  Sang-Wook KIM  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/07/10
      Vol:
    E100-D No:10
      Page(s):
    2659-2663

    This paper deals with a novel, interesting problem of detecting frauds in comparison-shopping services (CSS). In CSS, there exist frauds who perform excessive clicks on a target item. They aim at making the item look very popular and subsequently ranked high in the search and recommendation results. As a result, frauds may distort the quality of recommendations and searches. We propose an approach of detecting such frauds by analyzing click behaviors of users in CSS. We evaluate the effectiveness of the proposed approach on a real-world clickstream dataset.

  • Ground Plane Detection with a New Local Disparity Texture Descriptor

    Kangru WANG  Lei QU  Lili CHEN  Jiamao LI  Yuzhang GU  Dongchen ZHU  Xiaolin ZHANG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2017/06/27
      Vol:
    E100-D No:10
      Page(s):
    2664-2668

    In this paper, a novel approach is proposed for stereo vision-based ground plane detection at superpixel-level, which is implemented by employing a Disparity Texture Map in a convolution neural network architecture. In particular, the Disparity Texture Map is calculated with a new Local Disparity Texture Descriptor (LDTD). The experimental results demonstrate our superior performance in KITTI dataset.

  • Image Retrieval Framework Based on Dual Representation Descriptor

    Yuichi YOSHIDA  Tsuyoshi TOYOFUKU  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2017/07/06
      Vol:
    E100-D No:10
      Page(s):
    2605-2613

    Descriptor aggregation techniques such as the Fisher vector and vector of locally aggregated descriptors (VLAD) are used in most image retrieval frameworks. It takes some time to extract local descriptors, and the geometric verification requires storage if a real-valued descriptor such as SIFT is used. Moreover, if we apply binary descriptors to such a framework, the performance of image retrieval is not better than if we use a real-valued descriptor. Our approach tackles these issues by using a dual representation descriptor that has advantages of being both a real-valued and a binary descriptor. The real value of the dual representation descriptor is aggregated into a VLAD in order to achieve high accuracy in the image retrieval, and the binary one is used to find correspondences in the geometric verification stage in order to reduce the amount of storage needed. We implemented a dual representation descriptor extracted in semi-real time by using the CARD descriptor. We evaluated the accuracy of our image retrieval framework including the geometric verification on three datasets (holidays, ukbench and Stanford mobile visual search). The results indicate that our framework is as accurate as the framework that uses SIFT. In addition, the experiments show that the image retrieval speed and storage requirements of our framework are as efficient as those of a framework that uses ORB.

  • Experimental Verification of a Doppler Velocity Measurement Method with Second-Time-Around Echo Suppression for Synthetic Bandwidth Radars

    Kentaro ISODA  Teruyuki HARA  

     
    PAPER-Sensing

      Pubricized:
    2017/03/15
      Vol:
    E100-B No:10
      Page(s):
    1968-1975

    Range resolution is one of the metrics of radar performance. Synthetic bandwidth radar has been proposed for high-range-resolution. The transmitted frequency and down-conversion frequency of this type of radar are shifted by fixed amounts from pulse to pulse. Received signals are synthesized by taking IFFT for high-range-resolution. However, this type of radar has a problem with second-time-around echoes since multiple pulses are utilized. Moreover, a range shift occurs due to Doppler velocity. Thus second-time-around echo suppression and Doppler velocity compensation are required for accurate target range measurement. We show in this paper a Doppler velocity measurement method with second-time-around echo suppression for synthetic bandwidth radars. Our proposed method interleaves the transmission of ascending and descending frequency sequences. The Doppler velocity is measured by using a Fourier transform of the multiplication of the signals received using both sequences. The transmitted frequency difference of the adjacent pulses is wider than the bandwidth of the matched filter, so the second-time-around echoes are down-converted to the outside band of the matched filter and suppressed. We verify the principle of the proposed method using numerical simulations and experiments. The results show that second-time-around echoes were suppressed by 7.8dB, the Doppler velocity could be obtained and the range shift due to Doppler velocity was reduced by 7.37 times compared to the conventional SBR.

  • Two Classes of Optimal Constant Composition Codes from Zero Difference Balanced Functions

    Bing LIU  Xia LI  Feng CHENG  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:10
      Page(s):
    2183-2186

    Constant composition codes (CCCs) are a special class of constant-weight codes. They include permutation codes as a subclass. The study and constructions of CCCs with parameters meeting certain bounds have been an interesting research subject in coding theory. A bridge from zero difference balanced (ZDB) functions to CCCs with parameters meeting the Luo-Fu-Vinck-Chen bound has been established by Ding (IEEE Trans. Information Theory 54(12) (2008) 5766-5770). This provides a new approach for obtaining optimal CCCs. The objective of this letter is to construct two classes of ZDB functions whose parameters not covered in the literature, and then obtain two classes of optimal CCCs meeting the Luo-Fu-Vinck-Chen bound from these new ZDB functions.

  • Input and Output Privacy-Preserving Linear Regression

    Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  

     
    PAPER-Privacy, anonymity, and fundamental theory

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2339-2347

    We build a privacy-preserving system of linear regression protecting both input data secrecy and output privacy. Our system achieves those goals simultaneously via a novel combination of homomorphic encryption and differential privacy dedicated to linear regression and its variants (ridge, LASSO). Our system is proved scalable over cloud servers, and its efficiency is extensively checked by careful experiments.

  • Adaptive K-Best BFTS Signal Detection Algorithm Based on the Channel Condition for MIMO-OFDM Signal Detector

    Jong-Kwang KIM  Seung-Jin CHOI  Jae-Hyun RO  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:10
      Page(s):
    2207-2211

    The breadth-first tree searching (BFTS) detection algorithm such as the QR decomposition with M algorithm (QRD-M) which is the generally K-best detection algorithm is suboptimal, but has high complexity. In this letter, the K-best BFTS detection algorithm having reduced complexity is proposed. The proposed detection algorithm calculates the channel condition to decide the thresholds for regulating complexity and performance and from the simulation results, it has good error performance with very low complexity.

  • Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior

    Yoshiaki SHIRAISHI  Masaki KAMIZONO  Masanori HIROTOMO  Masami MOHRI  

     
    PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2449-2457

    In the case of drive-by download attacks, most malicious web sites identify the software environment of the clients and change their behavior. Then we cannot always obtain sufficient information appropriate to the client organization by automatic dynamic analysis in open services. It is required to prepare for expected incidents caused by re-accessing same malicious web sites from the other client in the organization. To authors' knowledge, there is no study of utilizing analysis results of malicious web sites for digital forensic on the incident and hedging the risk of expected incident in the organization. In this paper, we propose a system for evaluating the impact of accessing malicious web sites by using the results of multi-environment analysis. Furthermore, we report the results of evaluating malicious web sites by the multi-environment analysis system, and show how to utilize analysis results for forensic analysis and risk hedge based on actual cases of analyzing malicious web sites.

  • Relay Selection Scheme for Improved Performance in the Wireless Communication Systems Based on OFDM

    Sang-Young KIM  Won-Chang KIM  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:10
      Page(s):
    2200-2203

    This letter proposes a relay selection scheme in order to improve a performance in the wireless cooperative communication system. The cooperative communication uses the relays in order to obtain a improved performance. The relay selection scheme has a great influence on the performance of the wireless cooperative communication. Because the diversity gain is affected by the superposition of the channels, a superposition of the channels is important in the wireless cooperative communication. The constructive superposition of the channels can improve the performance of the wireless cooperative communication. Because the conventional schemes do not consider the superposition of the channels, the conventional schemes are not suitable for the cooperative communication using the multiple relays. The new scheme considers the superposition of channels and selects the relays that can achieve the constructive superposition. Therefore, the new scheme can provide the improved performance by using the phase information between channels. The simulation results show that the bit error performance of the proposed scheme is better than the conventional schemes.

  • Interpersonal Coevolution of Body Movements in Daily Face-to-Face Communication

    Taiki OGATA  Naoki HIGO  Takayuki NOZAWA  Eisuke ONO  Kazuo YANO  Koji ARA  Yoshihiro MIYAKE  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2017/07/18
      Vol:
    E100-D No:10
      Page(s):
    2547-2555

    People's body movements in daily face-to-face communication influence each other. For instance, during a heated debate, the participants use more gestures and other body movements, while in a calm discussion they use fewer gestures. This “coevolution” of interpersonal body movements occurs on multiple time scales, like minutes or hours. However, the multi-time-scale coevolution in daily communication is not clear yet. In this paper, we explore the minute-to-minute coevolution of interpersonal body movements in daily communication and investigate the characteristics of this coevolution. We present quantitative data on upper-body movements from thousand test subjects from seven organizations gathered over several months via wearable sensors. The device we employed measured upper-body movements with an accelerometer and the duration of face-to-face communication with an infrared ray sensor on a minute-by-minute basis. We defined a coevolution measure between two people as the number of per-minute changes of their body movement and compared the indices for face-to-face and non-face-to-face situations. We found that on average, the amount of people's body movements changed correspondingly for face-to-face communication and that the average rate of coevolution in the case of face-to-face communication was 3-4% higher than in the case of non-face-to-face situation. These results reveal minute-to-minute coevolution of upper-body movements between people in daily communication. The finding suggests that the coevolution of body movement arises in multiple time scales.

  • A Support System for Solving Problems of Two-Triangle Congruence Using ‘Backward Chaining’

    Ryosuke ONDA  Yuki HIRAI  Kay PENNY  Bipin INDURKHYA  Keiichi KANEKO  

     
    PAPER-Educational Technology

      Pubricized:
    2017/07/07
      Vol:
    E100-D No:10
      Page(s):
    2567-2577

    We developed a system called DELTA that supports the students' use of backward chaining (BC) to prove the congruence of two triangles. DELTA is designed as an interactive learning environment and supports the use of BC by providing hints and a function to automatically check the proofs inputted by the students. DELTA also has coloring, marking, and highlighting functions to support students' attempts to prove the congruence of two triangles. We evaluated the efficacy of DELTA with 36 students in the second grade of a junior high school in Japan. We found that (1) the mean number of problems, which the experimental group (EG) completely solved, was statistically higher than that of the control group on the post-test; (2) the EG effectively used the BC strategy to solve problems; and (3) the students' attempt to use both the forward chaining strategy and the BC strategy led to solving the problems completely.

  • Proposal of Waveguide-Type Polarization Switch Based on Microring Resonator

    Keita SUZUKI  Tomoki HIRAYAMA  Yasuo KOKUBUN  Taro ARAKAWA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    767-774

    We proposed and theoretically discussed a polarization switch based on a multiple quantum well (MQW) microring resonator (MRR) with an L-shaped waveguide as a dynamic polarization control device. The L-shaped waveguide was useful to obtain the rotation angle of the principal axis of 45° even when the core layer has form birefringence such as an MQW. The MRR functions as both a polarization converter and a wavelength filter. As an MQW core layer, a multiple five-layer asymmetric coupled quantum well (FACQW) was assumed. Polarization switching of an inputted light with a selected wavelength was successfully demonstrated at an operation voltage as low as 0.2 V using the electrorefractive index change in the MRR waveguide. The maximum polarization extinction ratio was more than 35 dB. The high-speed and low-voltage polarization switching can be realized with the proposed MRR polarization switch.

  • New Optimal Constant Weight Codes from Difference Balanced Functions

    Wei SU  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:10
      Page(s):
    2180-2182

    Constant weight codes have mathematical interest and practical applications such as coding for bandwidth-efficient channels and construction of spherical codes for modulation. In this letter, by using difference balanced functions with d-form property, we constructed a class of constant composition code with new parameters, which achieves the equal sign of generalized Johnson bound.

  • Model Based Fallback Control for Networked Control System via Switched Lyapunov Function

    Tsubasa SASAKI  Kenji SAWADA  Seiichi SHIN  Shu HOSOKAWA  

     
    PAPER-Systems and Control

      Vol:
    E100-A No:10
      Page(s):
    2086-2094

    This paper aims to propose a Fallback Control System isolated from cyber-attacks against networked control systems. The fallback control system implements maintaining functionality after an incident. Since cyber-attacks tamper with the communication contents of the networked control systems, the fallback control system is installed in a control target side. The fallback control system detects the incident without the communication contents on field network. This system detects an incident based on a bilinear observer and a switched Lyapunov function. When an incident is detected, normal operation is switched to fallback operation automatically. In this paper, a practical experiment with Ball-Sorter simulating a simple defective discriminator as a part of Factory Automation systems is shown. Assumed cyber-attacks against Ball-Sorter are Man In The Middle attack and Denial of Service attack.

  • A Simply Structured Transverse Slot Linear Array Antenna in a Quasi-TEM Mode Waveguide

    Yuanfeng SHE  Masanobu HIROSE  Yuto KATO  Takayuki ISHIZONE  Satoru KUROKAWA  Shinya IWASAWA  Sintaro ARATA  

     
    BRIEF PAPER

      Vol:
    E100-C No:10
      Page(s):
    924-927

    This article proposes a simply structured transverse slot linear array antenna with a low cross-polarization in X band on a quasi-TEM (transverse electromagnetic) mode waveguide. The fabrication technology of this antenna is very simple and suitable for mass production. A center fed linear slot array has been designed and measured. The quasi-TEM wave is propagating in the conventional waveguide with dielectrics at sidewalls. The simulation and the measurement results show that the baffle plates enhance the gain and reduce the beamwidth effectively. The uncertainties of the electric properties of the dielectric and fabrication errors are also discussed.

  • Transient Analysis of Anisotropic Dielectrics and Ferromagnetic Materials Based on Unconditionally Stable Perfectly-Matched-Layer (PML) Complex-Envelope (CE) Finite-Difference Time-Domain (FDTD) Method

    Sang-Gyu HA  Jeahoon CHO  Kyung-Young JUNG  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/03/14
      Vol:
    E100-B No:10
      Page(s):
    1879-1883

    Anisotropic dielectrics and ferromagnetic materials are widely used in dispersion-engineered metamaterials. For example, nonreciprocal magnetic photonic crystals (MPhCs) are periodic structures whose unit cell is composed of two misaligned anisotropic dielectric layers and one ferromagnetic layer and they have extraordinary characteristics such as wave slowdown and field amplitude increase. We develop an unconditionally stable complex-envelop alternating-direction-implicit finite-difference time-domain method (CE-ADI-FDTD) suitable for the transient analysis of anisotropic dielectrics and ferromagnetic materials. In the proposed algorithm, the perfectly-matched-layer (PML) is straightforwardly incorporated in Maxwell's curl equations. Numerical examples show that the proposed PML-CE-ADI-FDTD method can reduce the CPU time significantly for the transient analysis of anisotropic dielectrics and ferromagnetic materials while maintaining computational accuracy.

  • A 100-MHz 51.2-Gb/s Packet Lookup Engine with Automatic Table Update Function

    Kousuke IMAMURA  Ryota HONDA  Yoshifumi KAWAMURA  Naoki MIURA  Masami URANO  Satoshi SHIGEMATSU  Tetsuya MATSUMURA  Yoshio MATSUDA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:10
      Page(s):
    2123-2134

    The development of an extremely efficient packet inspection algorithm for lookup engines is important in order to realize high throughput and to lower energy dissipation. In this paper, we propose a new lookup engine based on a combination of a mismatch detection circuit and a linked-list hash table. The engine has an automatic rule registration and deletion function; the results are that it is only necessary to input rules, and the various tables included in the circuits, such as the Mismatch Table, Index Table, and Rule Table, will be automatically configured using the embedded hardware. This function utilizes a match/mismatch assessment for normal packet inspection operations. An experimental chip was fabricated using 40-nm 8-metal CMOS process technology. The chip operates at a frequency of 100MHz under a power supply voltage of VDD =1.1V. A throughput of 100Mpacket/s (=51.2Gb/s) is obtained at an operating frequency of 100MHz, which is three times greater than the throughput of 33Mpacket/s obtained with a conventional lookup engine without a mismatch detection circuit. The measured energy dissipation was a 1.58pJ/b·Search.

5921-5940hit(42807hit)