The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

2381-2400hit(18690hit)

  • Nonlinear Phase-Shift Cancellation by Taking the Geometric Mean of WDM-Signal Phase-Conjugate Pair

    Takahisa KODAMA  Akira MIZUTORI  Takayuki KOBAYASHI  Takayuki MIZUNO  Masafumi KOGA  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2018/02/09
      Vol:
    E101-B No:8
      Page(s):
    1845-1852

    This paper investigates approaches that can cancel nonlinear phase noise effectively for the phase-conjugate pair diversity transmission of 16-QAM WDM signals through multi-core fiber. The geometric mean is introduced for the combination of the phase-conjugate pair. A numerical simulation suggests that span-by-span chromatic dispersion compensation is more effective at cancelling phase noise in long distance transmission than lumped compensation at the receiver. Simulations suggest the span-wise compensation described herein yields Q-value enhancement of 7.8 and 6.8dB for CD values of 10 and 20.6ps/nm/km, respectively, whereas the lumped compensation equivalent attains only 3.5dB. A 1050km recirculating loop experiment confirmed a Q-value enhancement of 4.1dB for 20.6ps/nm/km, span-wise compensation transmission.

  • Study on Single-Polarized Holey Fibers with Double-Hole Unit Cores for Cross-Talk Free Polarization Splitter

    Zejun ZHANG  Yasuhide TSUJI  Masashi EGUCHI  Chun-ping CHEN  

     
    PAPER

      Vol:
    E101-C No:8
      Page(s):
    620-626

    A single-polarization single-mode (SPSM) photonic crystal fiber (PCF) based on double-hole unit core is proposed in this paper for application to cross-talk free polarization splitter (PS). Birefringence of the PCF is obtained by adopting double-hole unit cells into the core to destroy its symmetry. With an appropriate cladding hole size, single x- or y-polarized PCF can be achieved by arranging the double-hole unit in the core along the x- or y-axis, respectively. Moreover, our proposed SPSM PCF has the potential to be applied to consist a cross-talk free PS. The simulation result by employing a vectorial finite element beam propagation method (FE-BPM) demonstrates that an arbitrary polarized incident light can be completely separated into two orthogonal single-polarized components through the PS. The structural tolerance and wavelength dependence of the PS have also been discussed in detail.

  • Safety Technologies in Autonomous Decentralized Railway Control System and its Future Studies Open Access

    Shinichi RYOKI  Takashi KUNIFUJI  Toshihiro ITOH  

     
    INVITED PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1768-1774

    Along with the sophistication of society, the requirements for infrastructure systems are also becoming more sophisticated. Conventionally, infrastructure systems have been accepted if they were safe and stable, but nowadays they are required for serviceability as a matter of course. For this reason, not only the expansion of the scope of the control system but also the integration with the information service system has been frequently carried out. In this paper, we describe safety technology based on autonomous decentralized technology as one of the measures to secure safety in a control system integrating such information service functions. And we propose its future studies.

  • Full-Duplex Cooperative Cognitive Radio Networks with Simultaneous Transmit and Receive Antennas in MIMO Channels

    Sangwoo PARK  Iickho SONG  Seungwon LEE  Seokho YOON  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/01/31
      Vol:
    E101-B No:8
      Page(s):
    1903-1915

    We propose a cooperative cognitive radio network (CCRN) with secondary users (SUs) employing two simultaneous transmit and receive (STAR) antennas. In the proposed framework of full-duplex (FD) multiple-input-multiple-output (MIMO) CCRN, the region of achievable rate is expanded via FD communication among SUs enabled by the STAR antennas adopted for the SUs. The link capacity of the proposed framework is analyzed theoretically. It is shown through numerical analysis that the proposed FD MIMO-CCRN framework can provide a considerable performance gain over the conventional frameworks of CCRN and MIMO-CCRN.

  • Adaptive Beamforming Based on Compressed Sensing with Gain/Phase Uncertainties

    Bin HU  Xiaochuan WU  Xin ZHANG  Qiang YANG  Di YAO  Weibo DENG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:8
      Page(s):
    1257-1262

    A new method for adaptive digital beamforming technique with compressed sensing (CS) for sparse receiving arrays with gain/phase uncertainties is presented. Because of the sparsity of the arriving signals, CS theory can be adopted to sample and recover receiving signals with less data. But due to the existence of the gain/phase uncertainties, the sparse representation of the signal is not optimal. In order to eliminating the influence of the gain/phase uncertainties to the sparse representation, most present study focus on calibrating the gain/phase uncertainties first. To overcome the effect of the gain/phase uncertainties, a new dictionary optimization method based on the total least squares (TLS) algorithm is proposed in this paper. We transfer the array signal receiving model with the gain/phase uncertainties into an EIV model, treating the gain/phase uncertainties effect as an additive error matrix. The method we proposed in this paper reconstructs the data by estimating the sparse coefficients using CS signal reconstruction algorithm and using TLS method toupdate error matrix with gain/phase uncertainties. Simulation results show that the sparse regularized total least squares algorithm can recover the receiving signals better with the effect of gain/phase uncertainties. Then adaptive digital beamforming algorithms are adopted to form antenna beam using the recovered data.

  • Convergence Properties of Iterative Full-Wave Electromagnetic FEM Analyses with Node Block Preconditioners

    Toshio MURAYAMA  Akira MUTO  Amane TAKEI  

     
    PAPER

      Vol:
    E101-C No:8
      Page(s):
    612-619

    In this paper we report the convergence acceleration effect of the extended node patch preconditioner for the iterative full-wave electromagnetic finite element method with more than ten million degrees of freedom. The preconditioner, which is categorized into the multiplicative Schwarz scheme, effectively works with conventional numerical iterative matrix solving methods on a parallel computer. We examined the convergence properties of the preconditioner combined with the COCG, COCR and GMRES algorithms for the analysis domain encompassed by absorbing boundary conditions (ABC) such as perfectly matched layers (PML). In those analyses the properties of the convergence are investigated numerically by sweeping frequency range and the number of PMLs. Memory-efficient nature of the preconditioner is numerically confirmed through the experiments and upper bounds of the required memory size are theoretically proved. Finally it is demonstrated that this extended node patch preconditioner with GMRES algorithm works well with the problems up to one hundred million degrees of freedom.

  • Facilitating Dynamic RT-QoS for Massive-Scale Autonomous Cyber-Physical Systems Open Access

    David W. McKEE  Xue OUYANG  Jie XU  

     
    INVITED PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1760-1767

    With the evolution of autonomous distributed systems such as smart cities, autonomous vehicles, smart control and scheduling systems there is an increased need for approaches to manage the execution of services to deliver real-time performance. As Cloud-hosted services are increasingly used to provide intelligence and analytic functionality to Internet of Things (IoT) systems, Quality of Service (QoS) techniques must be used to guarantee the timely service delivery. This paper reviews state-of-the-art QoS and Cloud techniques for real-time service delivery and data analysis. A review of straggler mitigation and a classification of real-time QoS techniques is provided. Then a mathematical framework is presented capturing the relationship between the host execution environment and the executing service allowing the response-times to predicted throughout execution. The framework is shown experimentally to reduce the number of QoS violations by 21% and provides alerts during the first 14ms provide alerts for 94% of future violations.

  • Proof and Evaluation of Improved Slack Reclamation for Response Time Analysis of Real-Time Multiprocessor Systems

    Hyeongboo BAEK  Donghyouk LIM  Jinkyu LEE  

     
    LETTER-Software System

      Pubricized:
    2018/05/02
      Vol:
    E101-D No:8
      Page(s):
    2136-2140

    RTA (Response time analysis) is a popular technique to guarantee timing requirements for a real-time system, and therefore the RTA framework has been widely studied for popular scheduling algorithms such as EDF (Earliest Deadline First) and FP (Fixed Priority). While a number of extended techniques of RTA have been introduced, some of them cannot be used since they have not been proved and evaluated in terms of their correctness and empirical performance. In this letter, we address the state of the art technique of slack reclamation of the existing generic RTA framework for multiprocessors. We present its mathematical proof of correctness and empirical performance evaluation, which have not been revealed to this day.

  • PCANet-II: When PCANet Meets the Second Order Pooling

    Chunxiao FAN  Xiaopeng HONG  Lei TIAN  Yue MING  Matti PIETIKÄINEN  Guoying ZHAO  

     
    LETTER-Pattern Recognition

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2159-2162

    PCANet, as one noticeable shallow network, employs the histogram representation for feature pooling. However, there are three main problems about this kind of pooling method. First, the histogram-based pooling method binarizes the feature maps and leads to inevitable discriminative information loss. Second, it is difficult to effectively combine other visual cues into a compact representation, because the simple concatenation of various visual cues leads to feature representation inefficiency. Third, the dimensionality of histogram-based output grows exponentially with the number of feature maps used. In order to overcome these problems, we propose a novel shallow network model, named as PCANet-II. Compared with the histogram-based output, the second order pooling not only provides more discriminative information by preserving both the magnitude and sign of convolutional responses, but also dramatically reduces the size of output features. Thus we combine the second order statistical pooling method with the shallow network, i.e., PCANet. Moreover, it is easy to combine other discriminative and robust cues by using the second order pooling. So we introduce the binary feature difference encoding scheme into our PCANet-II to further improve robustness. Experiments demonstrate the effectiveness and robustness of our proposed PCANet-II method.

  • Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud

    Yanli CHEN  Yuanyuan HU  Minhui ZHU  Geng YANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1798-1808

    This work is conducted to solve the current problem in the attribute-based keyword search (ABKS) scheme about how to securely and efficiently delegate the search rights to other users when the authorized user is not online. We first combine proxy re-encryption (PRE) with the ABKS technology and propose a scheme called attribute-based keyword search with proxy re-encryption (PABKS). The scheme not only realizes the functions of data search and fine-grained access control, but also supports search function sharing. In addition, we randomly blind the user's private key to the server, which ensures the confidentiality and security of the private key. Then, we also prove that the scheme is selective access structure and chosen keyword attack (IND-sAS-CKA) secured in the random oracle model. A performance analysis and security proof show that the proposed scheme can achieve efficient and secure data search in the cloud.

  • Multilevel Thresholding Color Image Segmentation Using a Modified Artificial Bee Colony Algorithm

    Sipeng ZHANG  Wei JIANG  Shin'ichi SATOH  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/05/09
      Vol:
    E101-D No:8
      Page(s):
    2064-2071

    In this paper, a multilevel thresholding color image segmentation method is proposed using a modified Artificial Bee Colony(ABC) algorithm. In this work, in order to improve the local search ability of ABC algorithm, Krill Herd algorithm is incorporated into its onlooker bees phase. The proposed algorithm is named as Krill herd-inspired modified Artificial Bee Colony algorithm (KABC algorithm). Experiment results verify the robustness of KABC algorithm, as well as its improvement in optimizing accuracy and convergence speed. In this work, KABC algorithm is used to solve the problem of multilevel thresholding for color image segmentation. To deal with luminance variation, rather than using gray scale histogram, a HSV space-based pre-processing method is proposed to obtain 1D feature vector. KABC algorithm is then applied to find thresholds of the feature vector. At last, an additional local search around the quasi-optimal solutions is employed to improve segmentation accuracy. In this stage, we use a modified objective function which combines Structural Similarity Index Matrix (SSIM) with Kapur's entropy. The pre-processing method, the global optimization with KABC algorithm and the local optimization stage form the whole color image segmentation method. Experiment results show enhance in accuracy of segmentation with the proposed method.

  • Predicting Taxi Destination by Regularized RNN with SDZ

    Lei ZHANG  Guoxing ZHANG  Zhizheng LIANG  Qingfu FAN  Yadong LI  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/05/02
      Vol:
    E101-D No:8
      Page(s):
    2141-2144

    The traditional Markov prediction methods of the taxi destination rely only on the previous 2 to 3 GPS points. They negelect long-term dependencies within a taxi trajectory. We adopt a Recurrent Neural Network (RNN) to explore the long-term dependencies to predict the taxi destination as the multiple hidden layers of RNN can store these dependencies. However, the hidden layers of RNN are very sensitive to small perturbations to reduce the prediction accuracy when the amount of taxi trajectories is increasing. In order to improve the prediction accuracy of taxi destination and reduce the training time, we embed suprisal-driven zoneout (SDZ) to RNN, hence a taxi destination prediction method by regularized RNN with SDZ (TDPRS). SDZ can not only improve the robustness of TDPRS, but also reduce the training time by adopting partial update of parameters instead of a full update. Experiments with a Porto taxi trajectory data show that TDPRS improves the prediction accuracy by 12% compared to RNN prediction method in literature[4]. At the same time, the prediction time is reduced by 7%.

  • From Easy to Difficult: A Self-Paced Multi-Task Joint Sparse Representation Method

    Lihua GUO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2018/05/16
      Vol:
    E101-D No:8
      Page(s):
    2115-2122

    Multi-task joint sparse representation (MTJSR) is one kind of efficient multi-task learning (MTL) method for solving different problems together using a shared sparse representation. Based on the learning mechanism in human, which is a self-paced learning by gradually training the tasks from easy to difficult, I apply this mechanism into MTJSR, and propose a multi-task joint sparse representation with self-paced learning (MTJSR-SP) algorithm. In MTJSR-SP, the self-paced learning mechanism is considered as a regularizer of optimization function, and an iterative optimization is applied to solve it. Comparing with the traditional MTL methods, MTJSR-SP has more robustness to the noise and outliers. The experimental results on some datasets, i.e. two synthesized datasets, four datasets from UCI machine learning repository, an oxford flower dataset and a Caltech-256 image categorization dataset, are used to validate the efficiency of MTJSR-SP.

  • Multiport Signal-Flow Analysis to Improve Signal Quality of Time-Interleaved Digital-to-Analog Converters

    Youngcheol PARK  

     
    PAPER-Electronic Instrumentation and Control

      Vol:
    E101-C No:8
      Page(s):
    685-689

    This letter describes a method that characterizes and improves the performance of a time-interleaved (TI) digital-to-analog converter (DAC) system by using multiport signal-flow graphs at microwave frequencies. A commercial signal generator with two TI DACs was characterized through s-parameter measurements and was compared to the conventional method. Moreover, prefilters were applied to correct the response, resulting in an error-vector magnitude improvement of greater than 8 dB for a 64-quadrature-amplitude-modulated signal of 4.8 Gbps. As a result, the bandwidth limitation and the complex post processing of the conventional method could be minimized.

  • A Scalable SDN Architecture for Underwater Networks Security Authentication

    Qiuli CHEN  Ming HE  Xiang ZHENG  Fei DAI  Yuntian FENG  

     
    PAPER-Information Network

      Pubricized:
    2018/05/16
      Vol:
    E101-D No:8
      Page(s):
    2044-2052

    Software-defined networking (SDN) is recognized as the next-generation networking paradigm. The software-defined architecture for underwater acoustic sensor networks (SDUASNs) has become a hot topic. However, the current researches on SDUASNs is still in its infancy, which mainly focuses on network architecture, data transmission and routing. There exists some shortcomings that the scale of the SDUASNs is difficult to expand, and the security maintenance is seldom dabble. Therefore, a scalable software-definition architecture for underwater acoustic sensor networks (SSDUASNs) is introduced in this paper. It realizes an organic combination of the knowledge level, control level, and data level. The new nodes can easily access the network, which could be conducive to large-scale deployment. Then, the basic security authentication mechanism called BSAM is designed based on our architecture. In order to reflect the advantages of flexible and programmable in SSDUASNs, security authentication mechanism with pre-push (SAM-PP) is proposed in the further. In the current UASNs, nodes authentication protocol is inefficient as high consumption and long delay. In addition, it is difficult to adapt to the dynamic environment. The two mechanisms can effectively solve these problems. Compared to some existing schemes, BSAM and SAM-PP can effectively distinguish between legal nodes and malicious nodes, save the storage space of nodes greatly, and improve the efficiency of network operation. Moreover, SAM-PP has a further advantage in reducing the authentication delay.

  • Design and Implementation of Deep Neural Network for Edge Computing

    Junyang ZHANG  Yang GUO  Xiao HU  Rongzhen LI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2018/05/02
      Vol:
    E101-D No:8
      Page(s):
    1982-1996

    In recent years, deep learning based image recognition, speech recognition, text translation and other related applications have brought great convenience to people's lives. With the advent of the era of internet of everything, how to run a computationally intensive deep learning algorithm on a limited resources edge device is a major challenge. For an edge oriented computing vector processor, combined with a specific neural network model, a new data layout method for putting the input feature maps in DDR, rearrangement of the convolutional kernel parameters in the nuclear memory bank is proposed. Aiming at the difficulty of parallelism of two-dimensional matrix convolution, a method of parallelizing the matrix convolution calculation in the third dimension is proposed, by setting the vector register with zero as the initial value of the max pooling to fuse the rectified linear unit (ReLU) activation function and pooling operations to reduce the repeated access to intermediate data. On the basis of single core implementation, a multi-core implementation scheme of Inception structure is proposed. Finally, based on the proposed vectorization method, we realize five kinds of neural network models, namely, AlexNet, VGG16, VGG19, GoogLeNet, ResNet18, and performance statistics and analysis based on CPU, gtx1080TI and FT2000 are presented. Experimental results show that the vector processor has better computing advantages than CPU and GPU, and can calculate large-scale neural network model in real time.

  • Understanding Support of Causal Relationship between Events in Historical Learning

    Tomoko KOJIRI  Fumito NATE  Keitaro TOKUTAKE  

     
    PAPER-Educational Technology

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2072-2081

    In historical learning, to grasp the causal relationship between historical events and to understand factors that bring about important events are significant for fostering the historical thinking. However, some students are not able to find historical events that have causal relationships. The view of observing the historical events is different among individuals, so it is not appropriate to define the historical events that have causal relationships and impose students to remember them. The students need to understand the definition of the causal relationships and find the historical events that satisfy the definition according to their viewpoints. The objective of this paper is to develop a support system for understanding the meaning of a causal relationship and creating causal relation graphs that represent the causal relationships between historical events. When historical events have a causal relationship, a state change caused by one event becomes the cause of the other event. To consider these state changes is critically important to connect historical events. This paper proposes steps for considering causal relationships between historical events by arranging the state changes of historical people along with them. It also develops the system that supports students to create the causal relation graph according to the state changes. In our system, firstly, the interface for arranging state changes of historical people according to the historical events is given. Then, the interface for drawing the causal relation graph of historical events is provided in which state changes are automatically indicated on the created links in the causal relation graph. By observing the indicated state changes on the links, students are able to check by themselves whether their causal relation graphs correctly represent the causal relationships between historical events.

  • An Efficient Misalignment Method for Visual Tracking Based on Sparse Representation

    Shan JIANG  Cheng HAN  Xiaoqiang DI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2123-2131

    Sparse representation has been widely applied to visual tracking for several years. In the sparse representation framework, tracking problem is transferred into solving an L1 minimization issue. However, during the tracking procedure, the appearance of target was affected by external environment. Therefore, we proposed a robust tracking algorithm based on the traditional sparse representation jointly particle filter framework. First, we obtained the observation image set from particle filter. Furthermore, we introduced a 2D transformation on the observation image set, which enables the tracking target candidates set more robust to handle misalignment problem in complex scene. Moreover, we adopt the occlusion detection mechanism before template updating, reducing the drift problem effectively. Experimental evaluations on five public challenging sequences, which exhibit occlusions, illuminating variations, scale changes, motion blur, and our tracker demonstrate accuracy and robustness in comparisons with the state-of-the-arts.

  • Optimal Design of Dielectric Flat Lens Based on Topology Optimization Concept

    Kenji TAGUCHI  Tatsuya KASHIWA  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    647-650

    In this paper, the topology optimization method is first applied to obtain high gain characteristics of dielectric flat lens. The topology optimization method used in this study is based on the gradient method with adjoint variable method. The FDTD method is used as the analysis method of electromagnetic fields. Results are compared with those obtained by using metaheuristic methods GA and PSO. As a result, it is shown that the proposed method can efficiently design a high gain dielectric flat lens in a wide frequency band.

  • Reachability Analysis of Multi-Hop D2D Communications at Disaster

    Noriaki KAMIYAMA  Keisuke ISHIBASHI  Yoko HOSHIAI  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/02/20
      Vol:
    E101-B No:8
      Page(s):
    1833-1844

    During a disaster, users will not be able to communicate with their families and friends using mobile terminals, e.g., smartphones, in many cases due to failures of base stations and backhaul of cellular networks. Even when cellular networks normally operate without failure, they will become seriously congested due to dramatically increased traffic demand. To solve these problems, device-to-device (D2D) communications, in which mobile terminals directly communicate without cellular networks, have been investigated. Multi-hop D2D communication using multiple mobile terminals as relay nodes will be effective in maintaining connectivity during a disaster. It is preferable to estimate the success probability of multi-hop D2D communication by using a simple method that offers optimal parameter control, e.g., the ratio of mobile terminals using D2D communications and the maximum hop length. Moreover, when evaluating the reachability of multi-hop D2D communication, we need to consider the evacuation behavior during a disaster because success probability depends on the geographical distribution of mobile terminals. Therefore, in this paper, we derive a formula for estimating the success probability of multi-hop D2D communication in a simple manner and analyze its reachability using a multi-agent simulation that reproduces the evacuation behavior expected during an earthquake in Tokyo Shinjuku Ward.

2381-2400hit(18690hit)