The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

1921-1940hit(18690hit)

  • Design and Evaluation of Information Bottleneck LDPC Decoders for Digital Signal Processors Open Access

    Jan LEWANDOWSKY  Gerhard BAUCH  Matthias TSCHAUNER  Peter OPPERMANN  

     
    INVITED PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1363-1370

    Receiver implementations with very low quantization resolution will play an important role in 5G, as high precision quantization and signal processing are costly in terms of computational resources and chip area. Therefore, low resolution receivers with quasi optimum performance will be required to meet complexity and latency constraints. The Information Bottleneck method allows for a novel, information centric approach to design such receivers. The method was originally introduced by Naftali Tishby et al. and mostly used in the machine learning field so far. Interestingly, it can also be applied to build surprisingly good digital communication receivers which work fundamentally different than state-of-the-art receivers. Instead of minimizing the quantization error, receiver components with maximum preservation of relevant information for a given bit width can be designed. All signal processing in the resulting receivers is performed using only simple lookup operations. In this paper, we first provide a brief introduction to the design of receiver components with the Information Bottleneck method. We keep referring to decoding of low-density parity-check codes as a practical example. The focus of the paper lies on practical decoder implementations on a digital signal processor which illustrate the potential of the proposed technique. An Information Bottleneck decoder with 4bit message passing decoding is found to outperform 8bit implementations of the well-known min-sum decoder in terms of bit error rate and to perform extremely close to an 8bit belief propagation decoder, while offering considerably higher net decoding throughput than both conventional decoders.

  • Adaptive FIR Filtering for PAPR Reduction in OFDM Systems

    Hikaru MORITA  Teruyuki MIYAJIMA  Yoshiki SUGITANI  

     
    PAPER-Digital Signal Processing

      Vol:
    E102-A No:8
      Page(s):
    938-945

    This study proposes a Peak-to-Average Power Ratio (PAPR) reduction method using an adaptive Finite Impulse Response (FIR) filter in Orthogonal Frequency Division Multiplexing systems. At the transmitter, an iterative algorithm that minimizes the p-norm of a transmitted signal vector is used to update the weight coefficients of the FIR filter to reduce PAPR. At the receiver, the FIR filter used at the transmitter is estimated using pilot symbols, and its effect can be compensated for by using an equalizer for proper demodulation. Simulation results show that the proposed method is superior to conventional methods in terms of the PAPR reduction and computational complexity. It also shows that the proposed method has a trade-off between PAPR reduction and bit error rate performance.

  • NVRAM-Aware Mapping Table Management for Flash Storage Devices

    Yongju SONG  Sungkyun LEE  Dong Hyun KANG  Young Ik EOM  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2019/04/26
      Vol:
    E102-D No:8
      Page(s):
    1576-1580

    Flash storage suffers from severe performance degradation due to its inherent internal synchronization overhead. Especially, flushing an L2P (logical address to physical address) mapping table significantly contributes to the performance degradation. To relieve the problem, we propose an efficient L2P mapping table management scheme on the flash storage, which works along with a small-sized NVRAM. It flushes L2P mapping table from DRAM to NVRAM or flash memory selectively. In our experiments, the proposed scheme shows up to 9.37× better performance than conventional schemes.

  • Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match

    Bing-lin ZHAO  Fu-dong LIU  Zheng SHAN  Yi-hang CHEN  Jian LIU  

     
    LETTER-Information Network

      Pubricized:
    2019/05/20
      Vol:
    E102-D No:8
      Page(s):
    1581-1585

    Nowadays, malware is a serious threat to the Internet. Traditional signature-based malware detection method can be easily evaded by code obfuscation. Therefore, many researchers use the high-level structure of malware like function call graph, which is impacted less from the obfuscation, to find the malware variants. However, existing graph match methods rely on approximate calculation, which are inefficient and the accuracy cannot be effectively guaranteed. Inspired by the successful application of graph convolutional network in node classification and graph classification, we propose a novel malware similarity metric method based on graph convolutional network. We use graph convolutional network to compute the graph embedding vectors, and then we calculate the similarity metric of two graph based on the distance between two graph embedding vectors. Experimental results on the Kaggle dataset show that our method can applied to the graph based malware similarity metric method, and the accuracy of clustering application with our method reaches to 97% with high time efficiency.

  • Consistency Checking between Java Equals and hashCode Methods Using Software Analysis Workbench

    Kozo OKANO  Satoshi HARAUCHI  Toshifusa SEKIZAWA  Shinpei OGATA  Shin NAKAJIMA  

     
    PAPER-Software System

      Pubricized:
    2019/05/14
      Vol:
    E102-D No:8
      Page(s):
    1498-1505

    Java is one of important program language today. In Java, in order to build sound software, we have to carefully implement two fundamental methods hashCode and equals. This requirement, however, is not easy to follow in real software development. Some existing studies for ensuring the correctness of these two methods rely on static analysis, which are limited to loop-free programs. This paper proposes a new solution to this important problem, using software analysis workbench (SAW), an open source tool. The efficiency is evaluated through experiments. We also provide a useful situation where cost of regression testing is reduced when program refactoring is conducted.

  • Bicycle Behavior Recognition Using 3-Axis Acceleration Sensor and 3-Axis Gyro Sensor Equipped with Smartphone

    Yuri USAMI  Kazuaki ISHIKAWA  Toshinori TAKAYAMA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER-Intelligent Transport System

      Vol:
    E102-A No:8
      Page(s):
    953-965

    It becomes possible to prevent accidents beforehand by predicting dangerous riding behavior based on recognition of bicycle behaviors. In this paper, we propose a bicycle behavior recognition method using a three-axis acceleration sensor and three-axis gyro sensor equipped with a smartphone when it is installed on a bicycle handlebar. We focus on the periodic handlebar motions for balancing while running a bicycle and reduce the sensor noises caused by them. After that, we use machine learning for recognizing the bicycle behaviors, effectively utilizing the motion features in bicycle behavior recognition. The experimental results demonstrate that the proposed method accurately recognizes the four bicycle behaviors of stop, run straight, turn right, and turn left and its F-measure becomes around 0.9. The results indicate that, even if the smartphone is installed on the noisy bicycle handlebar, our proposed method can recognize the bicycle behaviors with almost the same accuracy as the one when a smartphone is installed on a rear axle of a bicycle on which the handlebar motion noises can be much reduced.

  • OpenACC Parallelization of Stochastic Simulations on GPUs

    Pilsung KANG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2019/05/17
      Vol:
    E102-D No:8
      Page(s):
    1565-1568

    We present an OpenACC-based parallelization implementation of stochastic algorithms for simulating biochemical reaction networks on modern GPUs (graphics processing units). To investigate the effectiveness of using OpenACC for leveraging the massive hardware parallelism of the GPU architecture, we carefully apply OpenACC's language constructs and mechanisms to implementing a parallel version of stochastic simulation algorithms on the GPU. Using our OpenACC implementation in comparison to both the NVidia CUDA and the CPU-based implementations, we report our initial experiences on OpenACC's performance and programming productivity in the context of GPU-accelerated scientific computing.

  • Performance Analysis of Fiber-Optic Relaying with Simultaneous Transmission and Reception on the Same Carrier Frequency Open Access

    Hiroki UTATSU  Hiroyuki OTSUKA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1771-1780

    Denser infrastructures can reduce terminal-to-infrastructure distance and thus improve the link budget in mobile communication systems. One such infrastructure, relaying can reduce the distance between the donor evolved node B (eNB) and user equipment (UE). However, conventional relaying suffers from geographical constraints, i.e., installation site, and difficulty in simultaneous transmission and reception on the same carrier frequency. Therefore, we propose a new type of fiber-optic relaying in which the antenna facing the eNB is geographically separated from the antenna facing the UE, and the two antennas are connected by an optical fiber. This structure aims to extend coverage to heavily shadowed areas. Our primary objective is to establish a design method for the proposed fiber-optic relaying in the presence of self-interference, which is the interference between the backhaul and access links, when the backhaul and access links simultaneously operate on the same carrier frequency. In this paper, we present the performance of the fiber-optic relaying in the presence of intra- and inter-cell interferences as well as self-interference. The theoretical desired-to-undesired-signal ratio for both uplink and downlink is investigated as parameters of the optical fiber length. We demonstrate the possibility of fiber-optic relaying with simultaneous transmission and reception on the same carrier frequency for the backhaul and access links. We validate the design method for the proposed fiber-optic relay system using these results.

  • Experimental Evaluation of Synchronized SS-CDMA Transmission Timing Control Method for QZSS Short Message Communication

    Suguru KAMEDA  Kei OHYA  Hiroshi OGUMA  Noriharu SUEMATSU  

     
    PAPER-Satellite Communications

      Pubricized:
    2019/01/25
      Vol:
    E102-B No:8
      Page(s):
    1781-1790

    We have already proposed synchronized spread spectrum code division multiple access (SS-CDMA) for the Quasi-Zenith Satellite System (QZSS) safety confirmation system to be used in times of great disaster. In this system, the satellite reception timings of all uplink signals are synchronized using a transmission timing control method in order to realize high-density user multiple access. An issue that should be addressed in order for this system to be viable is the error that can occur in the satellite reception timing. This error occurs due to the terminal time deviation and the error in calculating the propagation delay to the satellite. In this paper, we measure the terminal time deviation and the propagation delay calculation error at the same time by using the same receivers and evaluate the satellite reception timing error of the uplink signal. By this measurement, it is shown that satellite reception timing error within 50ns can be realized in 99.98% of mobile terminals. This shows that the synchronized SS-CDMA with the transmission timing control method has a potential to realize the QZSS short message system with high-density user multiple access.

  • SCSE: Boosting Symbolic Execution via State Concretization

    Huibin WANG  Chunqiang LI  Jianyi MENG  Xiaoyan XIANG  

     
    PAPER-Software Engineering

      Pubricized:
    2019/04/26
      Vol:
    E102-D No:8
      Page(s):
    1506-1516

    Symbolic execution is capable of automatically generating tests that achieve high coverage. However, its practical use is limited by the scalability problem. To mitigate it, this paper proposes State Concretization based Symbolic Execution (SCSE). SCSE speeds up symbolic execution via state concretization. Specifically, by introducing a concrete store, our approach avoids invoking the constraint solver to check path feasibility at conditional instructions. Intuitively, there is no need to check the feasibility of a path along a concrete execution since it is always feasible. With state concretization, the number of solver queries greatly decreases, thus improving the efficiency of symbolic execution. Through experimental evaluation on real programs, we show that state concretization helps to speed up symbolic execution significantly.

  • Localization Method Using Received Signal Strength for Wireless Power Transmission of the Capsule Endoscope Open Access

    Daijiro HIYOSHI  Masaharu TAKAHASHI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/02/18
      Vol:
    E102-B No:8
      Page(s):
    1660-1667

    In recent years, capsule endoscopy has attracted attention as one of the medical devices that examine internal digestive tracts without burdening patients. Wireless power transmission of the capsule endoscope has been researched now, and the power transmission efficiency can be improved by knowing the capsule location. In this paper, we develop a localization method wireless power transmission. Therefore, a simple algorithm for using received signal strength (RSS) has been developed so that position estimation can be performed in real time, and the performance is evaluated by performing three-dimensional localization with eight receiving antennas.

  • Iterative Adversarial Inference with Re-Inference Chain for Deep Graphical Models

    Zhihao LIU  Hui YIN  Hua HUANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/05/07
      Vol:
    E102-D No:8
      Page(s):
    1586-1589

    Deep Graphical Model (DGM) based on Generative Adversarial Nets (GANs) has shown promise in image generation and latent variable inference. One of the typical models is the Iterative Adversarial Inference model (GibbsNet), which learns the joint distribution between the data and its latent variable. We present RGNet (Re-inference GibbsNet) which introduces a re-inference chain in GibbsNet to improve the quality of generated samples and inferred latent variables. RGNet consists of the generative, inference, and discriminative networks. An adversarial game is cast between the generative and inference networks and the discriminative network. The discriminative network is trained to distinguish between (i) the joint inference-latent/data-space pairs and re-inference-latent/data-space pairs and (ii) the joint sampled-latent/generated-data-space pairs. We show empirically that RGNet surpasses GibbsNet in the quality of inferred latent variables and achieves comparable performance on image generation and inpainting tasks.

  • Saccade Information Based Directional Heat Map Generation for Gaze Data Visualization

    Yinwei ZHAN  Yaodong LI  Zhuo YANG  Yao ZHAO  Huaiyu WU  

     
    LETTER-Computer Graphics

      Pubricized:
    2019/05/15
      Vol:
    E102-D No:8
      Page(s):
    1602-1605

    Heat map is an important tool for eye tracking data analysis and visualization. It is very intuitive to express the area watched by observer, but ignores saccade information that expresses gaze shift. Based on conventional heat map generation method, this paper presents a novel heat map generation method for eye tracking data. The proposed method introduces a mixed data structure of fixation points and saccades, and considers heat map deformation for saccade type data. The proposed method has advantages on indicating gaze transition direction while visualizing gaze region.

  • A Novel Frame Aggregation Scheduler to Solve the Head-of-Line Blocking Problem for Real-Time UDP Traffic in Aggregation-Enabled WLANs

    Linjie ZHU  Bin WU  Zhiwei WEI  Yu TANG  

     
    LETTER-Information Network

      Pubricized:
    2019/03/29
      Vol:
    E102-D No:7
      Page(s):
    1408-1411

    In this letter, a novel frame aggregation scheduler is proposed to solve the head-of-line blocking problem for real-time user datagram protocol (UDP) traffic in error-prone and aggregation-enabled wireless local area networks (WLANs). The key to the proposed scheduler is to break the restriction of in-order delivery over the WLAN. The simulation results show that the proposed scheduler can achieve high UDP goodput and low delay compared to the conventional scheduler.

  • Unsupervised Cross-Database Micro-Expression Recognition Using Target-Adapted Least-Squares Regression

    Lingyan LI  Xiaoyan ZHOU  Yuan ZONG  Wenming ZHENG  Xiuzhen CHEN  Jingang SHI  Peng SONG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2019/03/26
      Vol:
    E102-D No:7
      Page(s):
    1417-1421

    Over the past several years, the research of micro-expression recognition (MER) has become an active topic in affective computing and computer vision because of its potential value in many application fields, e.g., lie detection. However, most previous works assumed an ideal scenario that both training and testing samples belong to the same micro-expression database, which is easily broken in practice. In this letter, we hence consider a more challenging scenario that the training and testing samples come from different micro-expression databases and investigated unsupervised cross-database MER in which the source database is labeled while the label information of target database is entirely unseen. To solve this interesting problem, we propose an effective method called target-adapted least-squares regression (TALSR). The basic idea of TALSR is to learn a regression coefficient matrix based on the source samples and their provided label information and also enable this learned regression coefficient matrix to suit the target micro-expression database. We are thus able to use the learned regression coefficient matrix to predict the micro-expression categories of the target micro-expression samples. Extensive experiments on CASME II and SMIC micro-expression databases are conducted to evaluate the proposed TALSR. The experimental results show that our TALSR has better performance than lots of recent well-performing domain adaptation methods in dealing with unsupervised cross-database MER tasks.

  • A New Hybrid Ant Colony Optimization Based on Brain Storm Optimization for Feature Selection

    Haomo LIANG  Zhixue WANG  Yi LIU  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2019/04/12
      Vol:
    E102-D No:7
      Page(s):
    1396-1399

    Machine learning algorithms are becoming more and more popular in current era. Data preprocessing especially feature selection is helpful for improving the performance of those algorithms. A new powerful feature selection algorithm is proposed. It combines the advantages of ant colony optimization and brain storm optimization which simulates the behavior of human beings. Six classical datasets and five state-of-art algorithms are used to make a comparison with our algorithm on binary classification problems. The results on accuracy, percent rate, recall rate, and F1 measures show that the developed algorithm is more excellent. Besides, it is no more complex than the compared approaches.

  • Entropy Based Illumination-Invariant Foreground Detection

    Karthikeyan PANJAPPAGOUNDER RAJAMANICKAM  Sakthivel PERIYASAMY  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2019/04/18
      Vol:
    E102-D No:7
      Page(s):
    1434-1437

    Background subtraction algorithms generate a background model of the monitoring scene and compare the background model with the current video frame to detect foreground objects. In general, most of the background subtraction algorithms fail to detect foreground objects when the scene illumination changes. An entropy based background subtraction algorithm is proposed to address this problem. The proposed method adapts to illumination changes by updating the background model according to differences in entropy value between the current frame and the previous frame. This entropy based background modeling can efficiently handle both sudden and gradual illumination variations. The proposed algorithm is tested in six video sequences and compared with four algorithms to demonstrate its efficiency in terms of F-score, similarity and frame rate.

  • Simultaneous Estimation of Dish Locations and Calories with Multi-Task Learning Open Access

    Takumi EGE  Keiji YANAI  

     
    PAPER

      Pubricized:
    2019/04/25
      Vol:
    E102-D No:7
      Page(s):
    1240-1246

    In recent years, a rise in healthy eating has led to various food management applications which have image recognition function to record everyday meals automatically. However, most of the image recognition functions in the existing applications are not directly useful for multiple-dish food photos and cannot automatically estimate food calories. Meanwhile, methodologies on image recognition have advanced greatly because of the advent of Convolutional Neural Network (CNN). CNN has improved accuracies of various kinds of image recognition tasks such as classification and object detection. Therefore, we propose CNN-based food calorie estimation for multiple-dish food photos. Our method estimates dish locations and food calories simultaneously by multi-task learning of food dish detection and food calorie estimation with a single CNN. It is expected to achieve high speed and small network size by simultaneous estimation in a single network. Because currently there is no dataset of multiple-dish food photos annotated with both bounding boxes and food calories, in this work we use two types of datasets alternately for training a single CNN. For the two types of datasets, we use multiple-dish food photos annotated with bounding boxes and single-dish food photos with food calories. Our results showed that our multi-task method achieved higher accuracy, higher speed and smaller network size than a sequential model of food detection and food calorie estimation.

  • Standardization and Technology Trends in Optical, Wireless and Virtualized Access Systems Open Access

    Tomoya HATANO  Jun-ichi KANI  Yoichi MAEDA  

     
    INVITED PAPER

      Pubricized:
    2019/01/22
      Vol:
    E102-B No:7
      Page(s):
    1263-1269

    This paper reviews access system standardization activities and related technologies from the viewpoints of optical-based PON access, mobile access systems including LPWAN, and access network virtualization. Future study issues for the next access systems are also presented.

  • MTTF-Aware Design Methodology of Adaptively Voltage Scaled Circuit with Timing Error Predictive Flip-Flop

    Yutaka MASUDA  Masanori HASHIMOTO  

     
    PAPER

      Vol:
    E102-A No:7
      Page(s):
    867-877

    Adaptive voltage scaling is a promising approach to overcome manufacturing variability, dynamic environmental fluctuation, and aging. This paper focuses on error prediction based adaptive voltage scaling (EP-AVS) and proposes a mean time to failure (MTTF) aware design methodology for EP-AVS circuits. Main contributions of this work include (1) optimization of both voltage-scaled circuit and voltage control logic, and (2) quantitative evaluation of power saving for practically long MTTF. Experimental results show that the proposed EP-AVS design methodology achieves 38.0% power saving while satisfying given target MTTF.

1921-1940hit(18690hit)