The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

2981-3000hit(20498hit)

  • Inter-Terminal Interference Evaluation of Full Duplex MIMO Using Measured Channel

    Yuta KASHINO  Masakuni TSUNEZAWA  Naoki HONMA  Kentaro NISHIMORI  

     
    PAPER-MIMO

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    434-440

    In-band full-duplex (FD) Multiple-Input and Multiple-Output (MIMO) communication performs uplink and downlink transmission at the same time using the same frequency. In this system, the spectral efficiency is theoretically double that of conventional duplex schemes, such as Time Division Duplex (TDD) and Frequency Division Duplex (FDD). However, this system suffers interference because the uplink and downlink streams coexist within the same channel. Especially at the terminal side, it is quite difficult for the terminal to eliminate the interference signals from other terminals since it has no knowledge about the contents of the interference signals. This paper presents an inter-terminal interference suppression method between the uplink and downlink signals assuming the multi-user environment. This method uses eigen-beamforming at the transmitting terminal to direct the null to the other terminal. Since this beamforming technique reduces the degrees of freedom available, the interference suppression performance and transmitting data-rate have a trade-off relation. This study investigates the system capacity characteristics in multi-user full-duplex MIMO communication using the propagation channel information measured in an actual outdoor experiment and shows that the proposed communication scheme offers higher system capacity than the conventional scheme.

  • A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks

    Jae Kwan LEE  Tae Ho CHO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/07/27
      Vol:
    E101-B No:2
      Page(s):
    489-499

    Wireless Sensor Networks (WSNs) are randomly deployed in a hostile environment and left unattended. These networks are composed of small auto mouse sensor devices which can monitor target information and send it to the Base Station (BS) for action. The sensor nodes can easily be compromised by an adversary and the compromised nodes can be used to inject false vote or false report attacks. To counter these two kinds of attacks, the Probabilistic Voting-based Filtering Scheme (PVFS) was proposed by Li and Wu, which consists of three phases; 1) Key Initialization and assignment, 2) Report generation, and 3) En-route filtering. This scheme can be a successful countermeasure against these attacks, however, when one or more nodes are compromised, the re-distribution of keys is not handled. Therefore, after a sensor node or Cluster Head (CH) is compromised, the detection power and effectiveness of PVFS is reduced. This also results in adverse effects on the sensor network's lifetime. In this paper, we propose a Fuzzy Rule-based Key Redistribution Method (FRKM) to address the limitations of the PVFS. The experimental results confirm the effectiveness of the proposed method by improving the detection power by up to 13.75% when the key-redistribution period is not fixed. Moreover, the proposed method achieves an energy improvement of up to 9.2% over PVFS.

  • Nuclei Detection Based on Secant Normal Voting with Skipping Ranges in Stained Histopathological Images

    XueTing LIM  Kenjiro SUGIMOTO  Sei-ichiro KAMATA  

     
    PAPER-Biological Engineering

      Pubricized:
    2017/11/14
      Vol:
    E101-D No:2
      Page(s):
    523-530

    Seed detection or sometimes known as nuclei detection is a prerequisite step of nuclei segmentation which plays a critical role in quantitative cell analysis. The detection result is considered as accurate if each detected seed lies only in one nucleus and is close to the nucleus center. In previous works, voting methods are employed to detect nucleus center by extracting the nucleus saliency features. However, these methods still encounter the risk of false seeding, especially for the heterogeneous intensity images. To overcome the drawbacks of previous works, a novel detection method is proposed, which is called secant normal voting. Secant normal voting achieves good performance with the proposed skipping range. Skipping range avoids over-segmentation by preventing false seeding on the occlusion regions. Nucleus centers are obtained by mean-shift clustering from clouds of voting points. In the experiments, we show that our proposed method outperforms the comparison methods by achieving high detection accuracy without sacrificing the computational efficiency.

  • CAPTCHA Image Generation Systems Using Generative Adversarial Networks

    Hyun KWON  Yongchul KIM  Hyunsoo YOON  Daeseon CHOI  

     
    LETTER-Information Network

      Pubricized:
    2017/10/26
      Vol:
    E101-D No:2
      Page(s):
    543-546

    We propose new CAPTCHA image generation systems by using generative adversarial network (GAN) techniques to strengthen against CAPTCHA solvers. To verify whether a user is human, CAPTCHA images are widely used on the web industry today. We introduce two different systems for generating CAPTCHA images, namely, the distance GAN (D-GAN) and composite GAN (C-GAN). The D-GAN adds distance values to the original CAPTCHA images to generate new ones, and the C-GAN generates a CAPTCHA image by composing multiple source images. To evaluate the performance of the proposed schemes, we used the CAPTCHA breaker software as CAPTCHA solver. Then, we compared the resistance of the original source images and the generated CAPTCHA images against the CAPTCHA solver. The results show that the proposed schemes improve the resistance to the CAPTCHA solver by over 67.1% and 89.8% depending on the system.

  • On Random Walk Based Weighted Graph Sampling

    Jiajun ZHOU  Bo LIU  Lu DENG  Yaofeng CHEN  Zhefeng XIAO  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2017/11/01
      Vol:
    E101-D No:2
      Page(s):
    535-538

    Graph sampling is an effective method to sample a representative subgraph from a large-scale network. Recently, researches have proven that several classical sampling methods are able to produce graph samples but do not well match the distribution of the graph properties in the original graph. On the other hand, the validation of these sampling methods and the scale of a good graph sample have not been examined on weighted graphs. In this paper, we propose the weighted graph sampling problem. We consider the proper size of a good graph sample, propose novel methods to verify the effectiveness of sampling and test several algorithms on real datasets. Most notably, we get new practical results, shedding a new insight on weighted graph sampling. We find weighted random walk performs best compared with other algorithms and a graph sample of 20% is enough for weighted graph sampling.

  • End-to-End Exposure Fusion Using Convolutional Neural Network

    Jinhua WANG  Weiqiang WANG  Guangmei XU  Hongzhe LIU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/11/22
      Vol:
    E101-D No:2
      Page(s):
    560-563

    In this paper, we describe the direct learning of an end-to-end mapping between under-/over-exposed images and well-exposed images. The mapping is represented as a deep convolutional neural network (CNN) that takes multiple-exposure images as input and outputs a high-quality image. Our CNN has a lightweight structure, yet gives state-of-the-art fusion quality. Furthermore, we know that for a given pixel, the influence of the surrounding pixels gradually increases as the distance decreases. If the only pixels considered are those in the convolution kernel neighborhood, the final result will be affected. To overcome this problem, the size of the convolution kernel is often increased. However, this also increases the complexity of the network (too many parameters) and the training time. In this paper, we present a method in which a number of sub-images of the source image are obtained using the same CNN model, providing more neighborhood information for the convolution operation. Experimental results demonstrate that the proposed method achieves better performance in terms of both objective evaluation and visual quality.

  • Dual-Circularly Polarized Offset Parabolic Reflector Antenna with Microstrip Antenna Array for 12-GHz Band Satellite Broadcasting Reception

    Masafumi NAGASAKA  Susumu NAKAZAWA  Shoji TANAKA  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    340-348

    Japan Broadcasting Corporation (NHK) started test satellite broadcasting of ultra-high-definition television (UHDTV) on August 1st, 2016. The test broadcasting is being provided in the 12-GHz (11.7 to 12.75GHz) band with right-hand circular polarization. In 2018, left-hand circular polarization in the same frequency band will be used for satellite broadcasting of UHDTV. Because UHDTV satellite broadcasting uses the 16APSK modulation scheme, which requires a higher carrier-to-noise ratio than that used for HDTV in Japan, it is important to mitigate the cross-polarization interference. Therefore, we fabricated and tested a dual-circularly polarized offset parabolic reflector antenna that has a feed antenna composed of a 2×2 microstrip antenna array, which is sequentially rotated to enhance the polarization purity. Measured results showed that the fabricated antenna complied with our requirements, a voltage standing wave ratio of less than 1.4, antenna gain of 34.5dBi (i.e., the aperture efficiency was 69%), and cross-polarization discrimination of 28.7dB.

  • Wideband Adaptive Beamforming Algorithm for Conformal Arrays Based on Sparse Covariance Matrix Reconstruction

    Pei CHEN  Dexiu HU  Yongjun ZHAO  Chengcheng LIU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    548-554

    Aiming at solving the performance degradation caused by the covariance matrix mismatch in wideband beamforming for conformal arrays, a novel adaptive beamforming algorithm is proposed in this paper. In this algorithm, the interference-plus-noise covariance matrix is firstly reconstructed to solve the desired signal contamination problem. Then, a sparse reconstruction method is utilized to reduce the high computational cost and the requirement of sampling data. A novel cost function is formulated by the focusing matrix and singular value decomposition. Finally, the optimization problem is efficiently solved in a second-order cone programming framework. Simulation results using a cylindrical array demonstrate the effectiveness and robustness of the proposed algorithm and prove that this algorithm can achieve superior performance over the existing wideband beamforming methods for conformal arrays.

  • Three Dimensional FPGA Architecture with Fewer TSVs

    Motoki AMAGASAKI  Masato IKEBE  Qian ZHAO  Masahiro IIDA  Toshinori SUEYOSHI  

     
    PAPER-Device and Architecture

      Pubricized:
    2017/11/17
      Vol:
    E101-D No:2
      Page(s):
    278-287

    Three-dimensional (3D) field-programmable gate arrays (FPGAs) are expected to offer higher logic density as well as improved delay and power performance by utilizing 3D integrated circuit technology. However, because through-silicon-vias (TSVs) for conventional 3D FPGA interlayer connections have a large area overhead, there is an inherent tradeoff between connectivity and small size. To find a balance between cost and performance, and to explore 3D FPGAs with realistic 3D integration processes, we propose two types of 3D FPGA and construct design tool sets for architecture exploration. In previous research, we created a TSV-free 3D FPGA with a face-down integration method; however, this was limited to two layers. In this paper, we discuss the face-up stacking of several face-down stacked FPGAs. To minimize the number of TSVs, we placed TSVs peripheral to the FPGAs for 3D-FPGA with 4 layers. According to our results, a 2-layer 3D FPGA has reasonable performance when limiting the design to two layers, but a 4-layer 3D FPGA is a better choice when area is emphasized.

  • A Compact Matched Filter Bank for an Optical ZCZ Sequence Set with Zero-Correlation Zone 2z

    Yasuaki OHIRA  Takahiro MATSUMOTO  Hideyuki TORII  Yuta IDA  Shinya MATSUFUJI  

     
    LETTER

      Vol:
    E101-A No:1
      Page(s):
    195-198

    In this paper, we propose a new structure for a compact matched filter bank (MFB) for an optical zero-correlation zone (ZCZ) sequence set with Zcz=2z. The proposed MFB can reduces operation elements such as 2-input adders and delay elements. The number of 2-input adders decrease from O(N2) to O(N log2 N), delay elements decrease from O(N2) to O(N). In addition, the proposed MFBs for the sequence of length 32, 64, 128 and 256 with Zcz=2,4 and 8 are implemented on a field programmable gate array (FPGA). As a result, the numbers of logic elements (LEs) of the proposed MFBs for the sequences with Zcz=2 of length 32, 64, 128 and 256 are suppressed to about 76.2%, 84.2%, 89.7% and 93.4% compared to that of the conventional MFBs, respectively.

  • A Simple and Effective Generalization of Exponential Matrix Discriminant Analysis and Its Application to Face Recognition

    Ruisheng RAN  Bin FANG  Xuegang WU  Shougui ZHANG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2017/10/18
      Vol:
    E101-D No:1
      Page(s):
    265-268

    As an effective method, exponential discriminant analysis (EDA) has been proposed and widely used to solve the so-called small-sample-size (SSS) problem. In this paper, a simple and effective generalization of EDA is presented and named as GEDA. In GEDA, a general exponential function, where the base of exponential function is larger than the Euler number, is used. Due to the property of general exponential function, the distance between samples belonging to different classes is larger than that of EDA, and then the discrimination property is largely emphasized. The experiment results on the Extended Yale and CMU-PIE face databases show that, GEDA gets more advantageous recognition performance compared to EDA.

  • Statistical Property Guided Feature Extraction for Volume Data

    Li WANG  Xiaoan TANG  Junda ZHANG  Dongdong GUAN  

     
    LETTER-Pattern Recognition

      Pubricized:
    2017/10/13
      Vol:
    E101-D No:1
      Page(s):
    261-264

    Feature visualization is of great significances in volume visualization, and feature extraction has been becoming extremely popular in feature visualization. While precise definition of features is usually absent which makes the extraction difficult. This paper employs probability density function (PDF) as statistical property, and proposes a statistical property guided approach to extract features for volume data. Basing on feature matching, it combines simple liner iterative cluster (SLIC) with Gaussian mixture model (GMM), and could do extraction without accurate feature definition. Further, GMM is paired with a normality test to reduce time cost and storage requirement. We demonstrate its applicability and superiority by successfully applying it on homogeneous and non-homogeneous features.

  • Performance Analysis of Content-Centric Networking on an Arbitrary Network Topology

    Ryo NAKAMURA  Hiroyuki OHSAKI  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    24-34

    In this paper, we use the MCA (Multi-Cache Approximation) algorithm to numerically determine cache hit probability in a multi-cache network. We then analytically obtain performance metrics for Content-Centric networking (CCN). Our analytical model contains multiple routers, multiple repositories (e.g., storage servers), and multiple entities (e.g., clients). We obtain three performance metrics: content delivery delay (i.e., the average time required for an entity to retrieve a content through a neighboring router), throughput (i.e., number of contents delivered from an entity per unit of time), and availability (i.e., probability that an entity can successfully retrieve a content from a network). Through several numerical examples, we investigate how network topology affects the performance of CCN. A notable finding is that content caching becomes more beneficial in terms of content delivery time and availability (resp., throughput) as distance between the entity and the requesting repository narrows (resp., widens).

  • Temporal and Spatial Expansion of Urban LOD for Solving Illegally Parked Bicycles in Tokyo

    Shusaku EGAMI  Takahiro KAWAMURA  Akihiko OHSUGA  

     
    PAPER

      Pubricized:
    2017/09/15
      Vol:
    E101-D No:1
      Page(s):
    116-129

    The illegal parking of bicycles is a serious urban problem in Tokyo. The purpose of this study was to sustainably build Linked Open Data (LOD) to assist in solving the problem of illegally parked bicycles (IPBs) by raising social awareness, in cooperation with the Office for Youth Affairs and Public Safety of the Tokyo Metropolitan Government (Tokyo Bureau). We first extracted information on the problem factors and designed LOD schema for IPBs. Then we collected pieces of data from the Social Networking Service (SNS) and the websites of municipalities to build the illegally parked bicycle LOD (IPBLOD) with more than 200,000 triples. We then estimated the temporal missing data in the LOD based on the causal relations from the problem factors and estimated spatial missing data based on geospatial features. As a result, the number of IPBs can be inferred with about 70% accuracy, and places where bicycles might be illegally parked are estimated with about 31% accuracy. Then we published the complemented LOD and a Web application to visualize the distribution of IPBs in the city. Finally, we applied IPBLOD to large social activity in order to raise social awareness of the IPB issues and to remove IPBs, in cooperation with the Tokyo Bureau.

  • Strategic Dual Image Method for Non-Axisymmetric Three-dimensional Magnetic Field Problems

    Kengo SUGAHARA  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E101-C No:1
      Page(s):
    52-55

    Strategic Dual Image method (SDI) for three-dimensional magnetic field problems is proposed. The basic idea of the SDI method is that the open boundary solution is in-between the Dirichlet and Neumann solutions. The relationship between the specific topology (e.g. sphere, and ellipsoid) of the boundary and the averaging weight has been discussed in the previous literature, however no discussions on the arbitrary topology. In this paper, combined with “the perturbation approach using equivalence theorem”, the methodology to derive the averaging weight of Dirichlet and Neumann solutions on the arbitrary topology has been proposed. Some numerical examples are also demonstrated.

  • Recent Developments in Post-Quantum Cryptography

    Tsuyoshi TAKAGI  

     
    INVITED PAPER

      Vol:
    E101-A No:1
      Page(s):
    3-11

    The security of current public-key cryptosystems relies on the hardness of factoring large integers or solving discrete logarithm problems. However, these mathematical problems can be solved in polynomial time using a quantum computer. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. In this expository article, we give an overview of recent research on post-quantum cryptography. In particular, we describe the construction and security of multivariate polynomial cryptosystems and lattice-based cryptosystems, which are the main candidates of post-quantum cryptography.

  • Legitimate Surveillance with a Wireless Powered Monitor in Rayleigh Fading Channels

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:1
      Page(s):
    293-297

    This letter investigates the performance of a legitimate surveillance system, where a wireless powered legitimate monitor aims to eavesdrop a suspicious communication link. Power splitting technique is adopted at the monitor for simultaneous information eavesdropping and energy harvesting. In order to maximize the successful eavesdropping probability, the power splitting ratio is optimized under the minimum harvested energy constraint. Assuming that perfect channel state information (CSI) or only the channel distribution information (CDI) is available, the closed-form maximum successful eavesdropping probability is obtained in Rayleigh fading channels. It is shown that the minimum harvested energy constraint has no impact on the eavesdropping performance if the minimum harvested energy constraint is loose. It is also shown that the eavesdropping performance loss due to partial knowledge of CSI is negligible when the eavesdropping link channel condition is much better than that of the suspicious communication link channel.

  • A Joint Neural Model for Fine-Grained Named Entity Classification of Wikipedia Articles

    Masatoshi SUZUKI  Koji MATSUDA  Satoshi SEKINE  Naoaki OKAZAKI  Kentaro INUI  

     
    PAPER

      Pubricized:
    2017/09/15
      Vol:
    E101-D No:1
      Page(s):
    73-81

    This paper addresses the task of assigning labels of fine-grained named entity (NE) types to Wikipedia articles. Information of NE types are useful when extracting knowledge of NEs from natural language text. It is common to apply an approach based on supervised machine learning to named entity classification. However, in a setting of classifying into fine-grained types, one big challenge is how to alleviate the data sparseness problem since one may obtain far fewer instances for each fine-grained types. To address this problem, we propose two methods. First, we introduce a multi-task learning framework, in which NE type classifiers are all jointly trained with a neural network. The neural network has a hidden layer, where we expect that effective combinations of input features are learned across different NE types. Second, we propose to extend the input feature set by exploiting the hyperlink structure of Wikipedia. While most of previous studies are focusing on engineering features from the articles' contents, we observe that the information of the contexts the article is mentioned can also be a useful clue for NE type classification. Concretely, we propose to learn article vectors (i.e. entity embeddings) from Wikipedia's hyperlink structure using a Skip-gram model. Then we incorporate the learned article vectors into the input feature set for NE type classification. To conduct large-scale practical experiments, we created a new dataset containing over 22,000 manually labeled articles. With the dataset, we empirically show that both of our ideas gained their own statistically significant improvement separately in classification accuracy. Moreover, we show that our proposed methods are particularly effective in labeling infrequent NE types. We've made the learned article vectors publicly available. The labeled dataset is available if one contacts the authors.

  • On Mitigating On-Off Attacks in Wireless Sensor Networks

    Zhe WEI  Fang WANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:1
      Page(s):
    298-301

    In wireless sensor networks, the on-off attacker nodes can present good behaviors and then opportunistically and selectively behave badly to compromise the network. Such misbehaving nodes are usually difficult to be spotted by the network system in a short term. To address this issue, in this study, we propose a reputation scheme to mitigate the on-off attack. In addition, a penalty module is properly designed so that the reputation scheme can effectively respond to the on-off misbehaviors and make such nodes quickly detected by the system, hence the minimization of their influence. We confirm the feasibility and effectiveness of the proposed scheme through simulation tests.

  • Current Trends in Space Optical Communication Around the World and Its R&D Activities in JAXA

    Tomohiro ARAKI  

     
    INVITED PAPER

      Vol:
    E101-A No:1
      Page(s):
    161-166

    Space optical communication has been considered one of the major candidates for high-rate data transmission and it reaches the practical stage to operate as a high-rate data transmission system. In this paper, the author reports the latest situation of space optical communication around the world, flight demonstrations, technological research and standardization. Research and development activities at Japan aerospace exploration agency (JAXA) are also presented.

2981-3000hit(20498hit)