The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

2541-2560hit(20498hit)

  • Optimization of the Window Function in an Adaptive Noise Canceller

    Yusuke MATSUBARA  Naohiro TODA  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:11
      Page(s):
    1854-1860

    Adaptive noise cancellation using adaptive filters is a known method for removing noise that interferes with signal measurements. The adaptive noise canceller performs filtering based on the current situation through a windowing process. The shape of the window function determines the tracking performance of the adaptive noise canceller with respect to the fluctuation of the property of the unknown system that noise (reference signal) passes. However, the shape of the window function in the field of adaptive filtering has not yet been considered in detail. This study mathematically treats the effect of the window function on the adaptive noise canceller and proposes an optimization method for the window function in situations where offline processing can be performed, such as biomedical signal measurements. We also demonstrate the validity of the optimized window function through numerical experiments.

  • Non-Cooperative Detection Method of MIMO-LFM Signals with FRFT Based on Entropy of Slice

    Yifei LIU  Jun ZHU  Bin TANG  Qi ZHANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:11
      Page(s):
    1940-1943

    To improve detection performance for a reconnaissance receiver, which is designed to detect the non-cooperative MIMO-LFM radar signal under low SNR condition, this letter proposed a novel signal detection method. This method is based on Fractional Fourier Transform with entropy weight (FRFTE) and autocorrelation algorithm. In addition, the flow chart and feasibility of the proposed algorithm are analyzed. Finally, applying our method to Wigner Hough Transform (WHT), we demonstrate the superiority of this method by simulation results.

  • A Modulus Factorization Algorithm for Self-Orthogonal and Self-Dual Integer Codes

    Hajime MATSUI  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:11
      Page(s):
    1952-1956

    Integer codes are defined by error-correcting codes over integers modulo a fixed positive integer. In this paper, we show that the construction of integer codes can be reduced into the cases of prime-power moduli. We can efficiently search integer codes with small prime-power moduli and can construct target integer codes with a large composite-number modulus. Moreover, we also show that this prime-factorization reduction is useful for the construction of self-orthogonal and self-dual integer codes, i.e., these properties in the prime-power moduli are preserved in the composite-number modulus. Numerical examples of integer codes and generator matrices demonstrate these facts and processes.

  • Dynamic Channel Assignment with Consideration of Interference and Fairness for Dense Small-Cell Networks

    Se-Jin KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:11
      Page(s):
    1984-1987

    This letter proposes a novel dynamic channel assignment (DCA) scheme with consideration of interference and fairness for the downlink of dense small-cell networks based on orthogonal frequency division multiple access-frequency division duplex. In the proposed scheme, a small-cell gateway fairly assigns subchannels to the small-cell user equipment (SUE) according to the co-tier interference from neighboring small-cell access points. From the simulation results, it is shown that the proposed DCA scheme outperforms other DCA schemes in terms of the fairness of each SUE capacity.

  • A Novel Supervised Bimodal Emotion Recognition Approach Based on Facial Expression and Body Gesture

    Jingjie YAN  Guanming LU  Xiaodong BAI  Haibo LI  Ning SUN  Ruiyu LIANG  

     
    LETTER-Image

      Vol:
    E101-A No:11
      Page(s):
    2003-2006

    In this letter, we propose a supervised bimodal emotion recognition approach based on two important human emotion modalities including facial expression and body gesture. A effectively supervised feature fusion algorithms named supervised multiset canonical correlation analysis (SMCCA) is presented to established the linear connection between three sets of matrices, which contain the feature matrix of two modalities and their concurrent category matrix. The test results in the bimodal emotion recognition of the FABO database show that the SMCCA algorithm can get better or considerable efficiency than unsupervised feature fusion algorithm covering canonical correlation analysis (CCA), sparse canonical correlation analysis (SCCA), multiset canonical correlation analysis (MCCA) and so on.

  • End-to-End Redundancy and Maintenance Condition Design for Nationwide Optical Transport Network

    Yoshihiko UEMATSU  Shohei KAMAMURA  Hiroshi YAMAMOTO  Aki FUKUDA  Rie HAYASHI  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2018/05/22
      Vol:
    E101-B No:11
      Page(s):
    2267-2276

    To achieve high end-to-end availability in nationwide optical transport network across thousands of office buildings, it is important to properly make each function redundant, and execute protection switching, repair failed functions and recover redundancy to prevent multiple simultaneous failures. High redundancy leads to high system cost and high power consumption, and tight conditions for recovery leads to high maintenance cost. Therefore it is important to optimize the balance between redundancy and maintenance condition based on appropriate availability indicators. We previously proposed a resource-pool control mechanism for a nationwide optical transport network that can optimize the balance. This paper proposes an end-to-end availability evaluation scheme for a nationwide optical transport network with our mechanism, by which network operators can design the pool-resource amount of each function and the maintenance conditions for each network area properly to satisfy the end-to-end availability requirement. Although the maintenance conditions are usually discussed based on failure-recovery times, they should be discussed based on cost- or load-based volumes for this design. This paper proposes a maintenance-operation-load evaluation scheme, which derives the required number of maintenance staff members from failure-recovery times. We also discuss the design of the pool-resource amount and maintenance conditions for each network area of a nationwide network based on the proposed evaluation schemes.

  • Pilot Cluster ICI Suppression in OFDM Systems Based on Coded Symbols

    Yong DING  Shan OUYANG  Yue-Lei XIE  Xiao-Mao CHEN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/04/27
      Vol:
    E101-B No:11
      Page(s):
    2320-2330

    When trying to estimate time-varying multipath channels by applying a basis expansion model (BEM) in orthogonal frequency division multiplexing (OFDM) systems, pilot clusters are contaminated by inter-carrier interference (ICI). The pilot cluster ICI (PC-ICI) degrades the estimation accuracy of BEM coefficients, which degrades system performance. In this paper, a PC-ICI suppression scheme is proposed, in which two coded symbols defined as weighted sums of data symbols are inserted on both sides of each pilot cluster. Under the assumption that the channel has Flat Doppler spectrum, the optimized weight coefficients are obtained by an alternating iterative optimization algorithm, so that the sum of the PC-ICI generated by the encoded symbols and the data symbols is minimized. By approximating the optimized weight coefficients, they are independent of the channel tap power. Furthermore, it is verified that the proposed scheme is robust to the estimation error of the normalized Doppler frequency offset and can be applied to channels with other types of Doppler spectra. Numerical simulation results show that, compared with the conventional schemes, the proposed scheme achieves significant improvements in the performance of PC-ICI suppression, channel estimation and system bit-error-ratio (BER).

  • Resource Allocation in Multi-Cell Massive MIMO System with Time-Splitting Wireless Power Transfer

    Jia-Cheng ZHU  Dong-Hua CHEN  Yu-Cheng HE  Lin ZHOU  Jian-Jun MU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/05/16
      Vol:
    E101-B No:11
      Page(s):
    2331-2339

    Wireless information and power transfer technology is a promising means of supplying power for remote terminals in future communication systems. This paper investigates time-splitting (TS) recource allocation schemes for multi-cell massive MIMO systems with downlink (DL) wireless power transfer and uplink (UL) user information transmission under a harvest-then-transmit protocol. In order to jointly optimize the power and time allocation, two power minimization problems are formulated under different constraints on the minimal quality-of-service (QoS) requirement. Then, these original non-convex problems are transformed into their convex approximated ones which can be solved iteratively by successive convex approximation. Simulation results show that by exploiting the diversity effect of large-scale antenna arrays, the complexity-reduced asymptotic recourse allocation scheme almost match the power efficiency of the nonasymptotic scheme.

  • A New Classification-Like Scheme for Spectrum Sensing Using Spectral Correlation and Stacked Denoising Autoencoders

    Hang LIU  Xu ZHU  Takeo FUJII  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/04/25
      Vol:
    E101-B No:11
      Page(s):
    2348-2361

    In this paper, we propose a novel primary user detection scheme for spectrum sensing in cognitive radio. Inspired by the conventional signal classification approach, the spectrum sensing is translated into a classification problem. On the basis of feature-based classification, the spectral correlation of a second-order cyclostationary analysis is applied as the feature extraction method, whereas a stacked denoising autoencoders network is applied as the classifier. Two training methods for signal detection, interception-based detection and simulation-based detection, are considered, for different prior information and implementation conditions. In an interception-based detection method, inspired by the two-step sensing, we obtain training data from the interception of actual signals after a sophisticated sensing procedure, to achieve detection without priori information. In addition, benefiting from practical training data, this interception-based detection is superior under actual transmission environment conditions. The alternative, a simulation-based detection method utilizes some undisguised parameters of the primary user in the spectrum of interest. Owing to the diversified predetermined training data, simulation-based detection exhibits transcendental robustness against harsh noise environments, although it demands a more complicated classifier network structure. Additionally, for the above-described training methods, we discuss the classifier complexity over implementation conditions and the trade-off between robustness and detection performance. The simulation results show the advantages of the proposed method over conventional spectrum-sensing schemes.

  • Optimization of Flashing Period for Line Display Using Saccade Eyeball Movement Open Access

    Kousuke KANAZAWA  Shota KAZUNO  Makiko OKUMURA  

     
    INVITED PAPER

      Vol:
    E101-C No:11
      Page(s):
    851-856

    In this paper, we developed saccade-induced line displays including flashing period controllers. The displays speeded up the flashing period of one line using LED drivers and Arduino Uno equipped with AVR microcomputers. It was shown that saccades were easily induced when the observer alternately looks at the two fast flashing line displays apart. Also, we were able to find the optimum flashing period using a controller that can speed up the flashing period and change its speed. We found that the relationship between the viewing angle of the observer and the optimum flashing period is almost proportional.

  • Polymer Distribution Control of Polymer-Dispersed Liquid Crystals by Uni-Directionally Diffused UV Irradiation Process Open Access

    Yuya HORII  Yosei SHIBATA  Takahiro ISHINABE  Hideo FUJIKAKE  

     
    INVITED PAPER

      Vol:
    E101-C No:11
      Page(s):
    857-862

    Recently, a control technique of light distribution pattern has become important to improve the functionality and the light utilization efficiency of electronic displays, illumination devices and so on. As a light control technique, polymer-dispersed liquid crystals (PDLCs) have been commonly used so far. However, a precise control of the light diffusion distribution of conventional PDLC has been difficult due to the random polymer network structure, which results in the low light utilization efficiency. On the other hand, reverse-mode PDLCs with homogeneously aligned molecules can anisotropically diffuse light. The reverse-mode PDLC, however, has polarization dependency in the haze value due to homogeneously aligned molecules, which also results in the low light utilization efficiency. Therefore, it is necessary to establish the optimization method of light diffusion distribution without the molecules alignment treatment, and we have proposed a novel PDLC with structure-controlled polymer network which was fabricated by the irradiation with uni-directionally diffused UV light. In this paper, we investigated the effect of the process temperature during UV irradiation on the internal structure and light diffusion distribution of the proposed PDLC. As a result, in case that the mixture during UV irradiation was in isotropic phase, we clarified that the structure-controlled PDLCs with alternating striped LCs/polymer pattern could be obtained because the mixture was sufficiently irradiated with uni-directionally diffused UV light. For the high haze, this structure-controlled PDLC should be fabricated as low temperature as possible with maintaining the mixture in isotropic phase so that the mixture was not a nano-scaled molecular mixing state. Also, this PDLC had no polarization dependency in the haze value and could electrically switch the light distribution pattern between anisotropic light diffusion and light transmission. From the above results, we concluded that the proposed PDLC could precisely control the light diffusion distribution, and realize the high light utilization efficiency.

  • Geometric Deformation Analysis of Ray-Sampling Plane Method for Projection-Type Holographic Display Open Access

    Koki WAKUNAMI  Yasuyuki ICHIHASHI  Ryutaro OI  Makoto OKUI  Boaz Jessie JACKIN  Kenji YAMAMOTO  

     
    INVITED PAPER

      Vol:
    E101-C No:11
      Page(s):
    863-869

    Computer-generated hologram based on ray-sampling plane method was newly applied to the projection-type holographic display that consists of the holographic projection and the holographic optical element screen. In the proposed method, geometric deformation characteristic of the holographic image via the display system was mathematically derived and canceled out by the coordinate transformation of ray-sampling condition to avoid the image distortion. In the experiment, holographic image reconstruction with the arbitral depth expression without image distortion could be optically demonstrated.

  • Formation of Polymer Wall Structure on Plastic Substrate by Transfer Method of Fluororesin for Flexible Liquid Crystal Displays

    Seiya KAWAMORITA  Yosei SHIBATA  Takahiro ISHINABE  Hideo FUJIKAKE  

     
    BRIEF PAPER

      Vol:
    E101-C No:11
      Page(s):
    888-891

    In this paper, we examined the transfer method of fluororesin as the novel formation method of polymer wall in order to realize the lattice-shaped polymer walls without patterned light irradiation using photomask. We clarified that the transfer method was effective for formation of polymer wall structure on flexible substrate.

  • Axis-Symmetric Twisted-Vertical Alignment-Mode Using Mortar-Shaped Structure for High-Contrast Reflective LCDs with Fast Response

    Yutaro KUGE  Yosei SHIBATA  Takahiro ISHINABE  Hideo FUJIKAKE  

     
    BRIEF PAPER

      Vol:
    E101-C No:11
      Page(s):
    892-896

    We have proposed a mortar-shaped structure to improve response time and alignment uniformity of twisted vertically aligned (TVA) mode liquid crystal displays (LCDs) for high-contrast reflective color LCDs. From the results of the simulation, we clarified that response time, alignment uniformity and viewing angle range of TVA-mode LCDs were improved by controlling the liquid crystal alignment axis-symmetrically in each pixel.

  • High Speed and Narrow-Bandpass Liquid Crystal Filter for Real-Time Multi Spectral Imaging Systems

    Kohei TERASHIMA  Kazuhiro WAKO  Yasuyuki FUJIHARA  Yusuke AOYAGI  Maasa MURATA  Yosei SHIBATA  Shigetoshi SUGAWA  Takahiro ISHINABE  Rihito KURODA  Hideo FUJIKAKE  

     
    BRIEF PAPER

      Vol:
    E101-C No:11
      Page(s):
    897-900

    We have developed the high speed bandpass liquid crystal filter with narrow full width at half maximum (FWHM) of 5nm for real-time multi spectral imaging systems. We have successfully achieved short wavelength-switching time of 30ms by the optimization of phase retardation of thin liquid crystal cells.

  • Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences

    Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Kazuhiko OHKUBO  Shigeki GOTO  

     
    PAPER-Mobile Application and Web Security

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2600-2611

    Security researchers/vendors detect malicious websites based on several website features extracted by honeyclient analysis. However, web-based attacks continue to be more sophisticated along with the development of countermeasure techniques. Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code. The evasive code indirectly identifies vulnerable clients by abusing the differences among JavaScript implementations. Attackers deliver malware only to targeted clients on the basis of the evasion results while avoiding honeyclient analysis. Therefore, we are faced with a problem in that honeyclients cannot analyze malicious websites. Nevertheless, we can observe the evasion nature, i.e., the results in accessing malicious websites by using targeted clients are different from those by using honeyclients. In this paper, we propose a method of extracting evasive code by leveraging the above differences to investigate current evasion techniques. Our method analyzes HTTP transactions of the same website obtained using two types of clients, a real browser as a targeted client and a browser emulator as a honeyclient. As a result of evaluating our method with 8,467 JavaScript samples executed in 20,272 malicious websites, we discovered previously unknown evasion techniques that abuse the differences among JavaScript implementations. These findings will contribute to improving the analysis capabilities of conventional honeyclients.

  • A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices

    Yong JIN  Masahiko TOMOISHI  Satoshi MATSUURA  Yoshiaki KITAGUCHI  

     
    PAPER-Mobile Application and Web Security

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2612-2621

    Data breach and data destruction attack have become the critical security threats for the ICT (Information and Communication Technology) infrastructure. Both the Internet service providers and users are suffering from the cyber threats especially those to confidential data and private information. The requirements of human social activities make people move carrying confidential data and data breach always happens during the transportation. The Internet connectivity and cryptographic technology have made the usage of confidential data much secure. However, even with the high deployment rate of the Internet infrastructure, the concerns for lack of the Internet connectivity make people carry data with their mobile devices. In this paper, we describe the main patterns of data breach occur on mobile devices and propose a secure in-depth file system concealed by GPS-based mounting authentication to mitigate data breach on mobile devices. In the proposed in-depth file system, data can be stored based on the level of credential with corresponding authentication policy and the mounting operation will be only successful on designated locations. We implemented a prototype system using Veracrypt and Perl language and confirmed that the in-depth file system worked exactly as we expected by evaluations on two locations. The contribution of this paper includes the clarification that GPS-based mounting authentication for a file system can reduce the risk of data breach for mobile devices and a realization of prototype system.

  • Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement

    Hiroki KUZUNO  Giannis TZIAKOURIS  

     
    PAPER-Forensics and Risk Analysis

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2644-2657

    Bitcoin is the leading cryptocurrency in the world with a total marketcap of nearly USD 33 billion, [1] with 370,000 transactions recorded daily[2]. Pseudo-anonymous, decentralized peer-to-peer electronic cash systems such as Bitcoin have caused a paradigm shift in the way that people conduct financial transactions and purchase goods. Although cryptocurrencies enable users to securely and anonymously exchange money, they can also facilitate illegal criminal activities. Therefore, it is imperative that law enforcement agencies develop appropriate analytical processes that will allow them to identify and investigate criminal activities in the Blockchain (a distributed ledger). In this paper, INTERPOL, through the INTERPOL Global Complex for Innovation, proposes a Bitcoin analytical framework and a software system that will assist law enforcement agencies in the real-time analysis of the Blockchain while providing digital crime analysts with tracing and visualization capabilities. By doing so, it is feasible to render transactions decipherable and comprehensible for law enforcement investigators and prosecutors. The proposed solution is evaluated against three criminal case studies linked to Darknet markets, ransomware and DDoS extortion.

  • Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space

    Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/08/02
      Vol:
    E101-D No:11
      Page(s):
    2773-2783

    This paper presents an efficient acceleration algorithm for Lloyd-type k-means clustering, which is suitable to a large-scale and high-dimensional data set with potentially numerous classes. The algorithm employs a novel projection-based filter (PRJ) to avoid unnecessary distance calculations, resulting in high-speed performance keeping the same results as a standard Lloyd's algorithm. The PRJ exploits a summable lower bound on a squared distance defined in a lower-dimensional space to which data points are projected. The summable lower bound can make the bound tighter dynamically by incremental addition of components in the lower-dimensional space within each iteration although the existing lower bounds used in other acceleration algorithms work only once as a fixed filter. Experimental results on large-scale and high-dimensional real image data sets demonstrate that the proposed algorithm works at high speed and with low memory consumption when large k values are given, compared with the state-of-the-art algorithms.

  • NEST: Towards Extreme Scale Computing Systems

    Yunfeng LU  Huaxi GU  Xiaoshan YU  Kun WANG  

     
    LETTER-Information Network

      Pubricized:
    2018/08/20
      Vol:
    E101-D No:11
      Page(s):
    2827-2830

    High-performance computing (HPC) has penetrated into various research fields, yet the increase in computing power is limited by conventional electrical interconnections. The proposed architecture, NEST, exploits wavelength routing in arrayed waveguide grating routers (AWGRs) to achieve a scalable, low-latency, and high-throughput network. For the intra pod and inter pod communication, the symmetrical topology of NEST reduces the network diameter, which leads to an increase in latency performance. Moreover, the proposed architecture enables exponential growth of network size. Simulation results demonstrate that NEST shows 36% latency improvement and 30% throughput improvement over the dragonfly on an average.

2541-2560hit(20498hit)