The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7381-7400hit(20498hit)

  • Typing ZINC Machine with Generalized Algebraic Data Types

    Kwanghoon CHOI  Seog PARK  

     
    PAPER-Software System

      Vol:
    E94-D No:6
      Page(s):
    1190-1200

    The Krivine-style evaluation mechanism is well-known in the implementation of higher-order functions, allowing to avoid some useless closure building. There have been a few type systems that can verify the safety of the mechanism. The incorporation of the proposed ideas into an existing compiler, however, would require significant changes in the type system of the compiler due to the use of some dedicated form of types and typing rules in the proposals. This limitation motivates us to propose an alternative light-weight Krivine typing mechanism that does not need to extend any existing type system significantly. This paper shows how GADTs (Generalized algebraic data types) can be used for typing a ZINC machine following the Krivine-style evaluation mechanism. This idea is new as far as we know. Some existing typed compilers like GHC (Glasgow Haskell compiler) already support GADTs; they can benefit from the Krivine-style evaluation mechanism in the operational semantics with no particular extension in their type systems for the safety. We show the GHC type checker allows to prove mechanically that ZINC instructions are well-typed, which highlights the effectiveness of GADTs.

  • Transformation and Chained Structure for a Class of Nonlinear Affine Control Systems

    Tatsuya KAI  

     
    LETTER-Nonlinear Problems

      Vol:
    E94-A No:6
      Page(s):
    1468-1472

    This letter is devoted to derivation of a transformation law which converts a class of nonlinear affine control systems with n-states and 2-iputs into simpler systems with chained structure. First, we give a problem formulation that we consider throughout this letter. We next introduce a transformation law and gives its mathematical certification. Then, we apply the transformation method to an example and consider control design based on chained structure for the example in order to confirm the effectiveness of our approach.

  • Dual-Band Aperture-Coupled Shorted-Patch Antenna with a U-Shaped Slot

    Kun-Joon LEE  Tae-Hak LEE  Young-Sik KIM  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:6
      Page(s):
    1748-1751

    A dual-band patch antenna with a shorting wall and a U-shaped slot is presented in this paper. The shorted-patch is coupled with the aperture slot that is closely placed to the shorting wall for achieving good impedance matching. A U-shaped slot is embedded in the shorted-patch and is located near the radiating edge to yield a dual-band operation. By changing the side slot length of the U-shaped slot, the tunable frequency ratio of the proposed antenna is varied from 1.73 to 2.05.

  • A POMDP Based Distributed Adaptive Opportunistic Spectrum Access Strategy for Cognitive Ad Hoc Networks

    Yichen WANG  Pinyi REN  Zhou SU  

     
    LETTER

      Vol:
    E94-B No:6
      Page(s):
    1621-1624

    In this letter, we propose a Partially Observable Markov Decision Process (POMDP) based Distributed Adaptive Opportunistic Spectrum Access (DA-OSA) Strategy for Cognitive Ad Hoc Networks (CAHNs). In each slot, the source and destination choose a set of channels to sense and then decide the transmission channels based on the sensing results. In order to maximize the throughput for each link, we use the theories of sequential decision and optimal stopping to determine the optimal sensing channel set. Moreover, we also establish the myopic policy and exploit the monotonicity of the reward function that we use, which can be used to reduce the complexity of the sequential decision.

  • Background Calibration Techniques for Low-Power and High-Speed Data Conversion Open Access

    Atsushi IWATA  Yoshitaka MURASAKA  Tomoaki MAEDA  Takafumi OHMOTO  

     
    INVITED PAPER

      Vol:
    E94-C No:6
      Page(s):
    923-929

    Progress of roles and schemes of calibration techniques in data converters are reviewed. Correction techniques of matching error and nonlinearity in analog circuits have been developed by digital assist using high-density and low-power digital circuits. The roles of the calibration are not only to improve accuracy but also to reduce power dissipation and chip area. Among various calibration schemes, the background calibration has significant advantages to achieve robustness to fast ambient change. Firstly the nonlinearity calibrations for pipeline ADCs are reviewed. They have required new solutions for redundancy of the circuits, an error estimation algorithm and reference signals. Currently utilizing the calibration techniques, the performance of 100 Msps and 12 bit has been achieved with 10 mW power dissipation. Secondly the background calibrations of matching error in flash ADC and DAC with error feedback to the analog circuits are described. The flash ADC utilizes the comparator offset correction with successive approximation algorithm. The DAC adopts a self current matching scheme with an analog memory. Measured dissipation power of the ADC is 0.38 mW at 300 MHz clock. Effects of the background calibration to suppress crosstalk noise are also discussed.

  • TSC-IRNN: Time- and Space-Constraint In-Route Nearest Neighbor Query Processing Algorithms in Spatial Network Databases

    Yong-Ki KIM  Jae-Woo CHANG  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E94-D No:6
      Page(s):
    1201-1209

    Although a large number of query processing algorithms in spatial network database (SNDB) have been studied, there exists little research on route-based queries. Since moving objects move only in spatial networks, route-based queries, like in-route nearest neighbor (IRNN), are essential for Location-based Service (LBS) and Telematics applications. However, the existing IRNN query processing algorithm has a problem in that it does not consider time and space constraints. Therefore, we, in this paper, propose IRNN query processing algorithms which take both time and space constraints into consideration. Finally, we show the effectiveness of our IRNN query processing algorithms considering time and space constraints by comparing them with the existing IRNN algorithm.

  • Voronoi Game on a Path

    Masashi KIYOMI  Toshiki SAITOH  Ryuhei UEHARA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E94-D No:6
      Page(s):
    1185-1189

    The Voronoi game is a two-person perfect information game modeling a competitive facility location. The original version of the game is played on a continuous domain. Only two special cases (1-dimensional case and 1-round case) have been extensively investigated. Recently, the discrete Voronoi game of which the game arena is given as a graph was introduced. In this note, we give a complete analysis of the discrete Voronoi game on a path. There are drawing strategies for both the first and the second players, except for some trivial cases.

  • Built-In Measurements in Low-Cost Digital-RF Transceivers Open Access

    Oren ELIEZER  Robert Bogdan STASZEWSKI  

     
    INVITED PAPER

      Vol:
    E94-C No:6
      Page(s):
    930-937

    Digital RF solutions have been shown to be advantageous in various design aspects, such as accurate modeling, design reuse, and scaling when migrating to the next CMOS process node. Consequently, the majority of new low-cost and feature cell phones are now based on this approach. However, another equally important aspect of this approach to wireless transceiver SoC design, which is instrumental in allowing fast and low-cost productization, is in creating the inherent capability to assess performance and allow for low-cost built-in calibration and compensation, as well as characterization and final-testing. These internal capabilities can often rely solely on the SoCs existing processing resources, representing a zero cost adder, requiring only the development of the appropriate algorithms. This paper presents various examples of built-in measurements that have been demonstrated in wireless transceivers offered by Texas Instruments in recent years, based on the digital-RF processor (DRPTM) technology, and highlights the importance of the various types presented; built-in self-calibration and compensation, built-in self-characterization, and built-in self-testing (BiST). The accompanying statistical approach to the design and productization of such products is also discussed, and fundamental terms related with these, such as 'soft specifications', are defined.

  • A Timed-Based Approach for Genetic Algorithm: Theory and Applications

    Amir MEHRAFSA  Alireza SOKHANDAN  Ghader KARIMIAN  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E94-D No:6
      Page(s):
    1306-1320

    In this paper, a new algorithm called TGA is introduced which defines the concept of time more naturally for the first time. A parameter called TimeToLive is considered for each chromosome, which is a time duration in which it could participate in the process of the algorithm. This will lead to keeping the dynamism of algorithm in addition to maintaining its convergence sufficiently and stably. Thus, the TGA guarantees not to result in premature convergence or stagnation providing necessary convergence to achieve optimal answer. Moreover, the mutation operator is used more meaningfully in the TGA. Mutation probability has direct relation with parent similarity. This kind of mutation will decrease ineffective mating percent which does not make any improvement in offspring individuals and also it is more natural. Simulation results show that one run of the TGA is enough to reach the optimum answer and the TGA outperforms the standard genetic algorithm.

  • A Scheme of IEEE 802.11e HCCA Polling and Queue Management for Bandwidth Guarantee per Session

    Young-Hwan KIM  Jung-Bong SUK  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1680-1689

    Video applications such as video conferencing among multiple users and video surveillance systems require multiple video connections and QoS guarantee. These days the video systems equipped with IEEE 802.11 LAN interfaces allows a broadband wireless access to the Internet at a reasonable price. However, according to the current IEEE 802.11e HCCA standard, if more than two video sessions are to be established simultaneously, some of them must share the TXOP because the available number of TSIDs for video transmission is restricted to two. In order to resolve this problem, we devise a scheme which can establish up to 13 video sessions by slightly modifying the frame structure while maintaining the compatibility with the current standard. Our scheme is implemented on the NCTUns 4.0 network simulator, and evaluated numerically in terms of throughput, delay, and PSNR. Also real video clips are used as input to our simulation. The results showed that our scheme guarantees the transmission bandwidth requested by each video session.

  • Solving Generalized Small Inverse Problems

    Noboru KUNIHIRO  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1274-1284

    We introduce a “generalized small inverse problem (GSIP)” and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x0, x1, ..., xn)=x0 h(x1, ..., xn)+C=0 (mod ; M) for an n-variate polynomial h, non-zero integers C and M. Our algorithm is based on lattice-based Coppersmith technique. We provide a strategy for construction of a lattice basis for solving f=0, which is systematically transformed from a lattice basis for solving h=0. Then, we derive an upper bound such that the target problem can be solved in polynomial time in log M in an explicit form. Since GSIPs include some RSA-related problems, our algorithm is applicable to them. For example, the small key attacks by Boneh and Durfee are re-found automatically.

  • Extracting User Interest for User Recommendation Based on Folksonomy

    Junki SAITO  Takashi YUKAWA  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E94-D No:6
      Page(s):
    1329-1332

    In the present paper, a method for extracting user interest by constructing a hierarchy of words from social bookmarking (SBM) tags and emphasizing nouns based on the hierarchical structure (folksonomy) is proposed. Co-occurrence of the SBM tags basically have a semantic relationship. As a result of an experimental evaluation using the user profiles on Twitter, the authors discovered that the SBM tags and their word hierarchy have a rich vocabulary for extracting user interest.

  • Eigenmode Analysis of Propagation Constant for a Microstrip Line with Dummy Fills on a Si CMOS Substrate

    Yuya ONO  Takuichi HIRANO  Kenichi OKADA  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER

      Vol:
    E94-C No:6
      Page(s):
    1008-1015

    In this paper we present eigenmode analysis of the propagation constant for a microstrip line with dummy fills on a Si CMOS substrate. The effect of dummy fills is not negligible, particularly in the millimeter-wave band, although it has been ignored below frequencies of a few GHz. The propagation constant of a microstrip line with a periodic structure on a Si CMOS substrate is analyzed by eigenmode analysis for one period of the line. The calculated propagation constant and characteristic impedance were compared with measured values for a chip fabricated by the 0.18 µm CMOS process. The agreement between the analysis and measurement was very good. The dependence of loss on the arrangement of dummy fills was also investigated by eigenmode analysis. It was found that the transmission loss becomes large when dummy fills are arranged at places where the electromagnetic field is strong.

  • An Improvement of Twisted Ate Pairing Efficient for Multi-Pairing and Thread Computing

    Yumi SAKEMI  Yasuyuki NOGAMI  Shoichi TAKEUCHI  Yoshitaka MORIKAWA  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1356-1367

    In the case of Barreto-Naehrig pairing-friendly curves of embedding degree 12 of order r, recent efficient Ate pairings such as R-ate, optimal, and Xate pairings achieve Miller loop lengths of(1/4) ⌊log2 r⌋. On the other hand, the twisted Ate pairing requires (3/4) ⌊log2 r⌋ loop iterations, and thus is usually slower than the recent efficient Ate pairings. This paper proposes an improved twisted Ate pairing using Frobenius maps and a small scalar multiplication. The proposed idea splits the Miller's algorithm calculation into several independent parts, for which multi-pairing techniques apply efficiently. The maximum number of loop iterations in Miller's algorithm for the proposed twisted Ate pairing is equal to the (1/4) ⌊log2 r ⌋ attained by the most efficient Ate pairings.

  • A Handover Decision Strategy with a Novel Modified Load-Based Adaptive Hysteresis Adjustment in 3GPP LTE System

    Doo-Won LEE  Gye-Tae GIL  Dong-Hoi KIM  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1130-1136

    This paper introduces a hard handover strategy with a novel adaptive hysteresis adjustment that is needed to reduce handover drop rate in 3GPP long term evolution (LTE). First of all, we adopt a Hybrid handover scheme considering both the received signal strength (RSS) and the load information of the adjacent evolved Node Bs (eNBs) as a factor for deciding the target eNB. The Hybrid scheme causes the load status between the adjacent eNBs to be largely similar. Then, we propose a modified load-based adaptive hysteresis scheme to find a suitable handover hysteresis value utilizing the feature of the small load difference between the target and serving eNBs obtained from the result of the Hybrid scheme. As a result, through the proposed modified load-based adaptive hysteresis scheme, the best target cell is very well selected according to the dynamically changing communication environments. The simulation results show that the proposed scheme provides good performance in terms of handover drop rate.

  • Annihilators and Algebraic Immunity of Symmetric Boolean Functions

    Jie PENG  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:6
      Page(s):
    1434-1440

    In this paper, we deal with the algebraic immunity of the symmetric Boolean functions. The algebraic immunity is a property which measures the resistance against the algebraic attacks on symmetric ciphers. It is well known that the algebraic immunity of the symmetric Boolean functions is completely determined by a narrow class of annihilators with low degree which is denoted by G(n,). We study and determine the weight support of part of these functions. Basing on this, we obtain some relations between the algebraic immunity of a symmetric Boolean function and its simplified value vector. For applications, we put forward an upper bound on the number of the symmetric Boolean functions with algebraic immunity at least d and prove that the algebraic immunity of the symmetric palindromic functions is not high.

  • A New Framework with FDPP-LX Crossover for Real-Coded Genetic Algorithm

    Zhi-Qiang CHEN  Rong-Long WANG  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E94-A No:6
      Page(s):
    1417-1425

    This paper presents a new and robust framework for real-coded genetic algorithm, called real-code conditional genetic algorithm (rc-CGA). The most important characteristic of the proposed rc-CGA is the implicit self-adaptive feature of the crossover and mutation mechanism. Besides, a new crossover operator with laplace distribution following a few promising descent directions (FPDD-LX) is proposed for the rc-CGA. The proposed genetic algorithm (rc-CGA+FPDD-LX) is tested using 31 benchmark functions and compared with four existing algorithms. The simulation results show excellent performance of the proposed rc-CGA+FPDD-LX for continuous function optimization.

  • Coexistence of WiFi and WiMAX Systems Based on Coexistence Zone within WiMAX Frame Structure and Modified Power Saving Mode of WiFi System

    Jongwoo KIM  Suwon PARK  Seung Hyong RHEE  Yong-Hoon CHOI  Ho Young HWANG  Young-uk CHUNG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:6
      Page(s):
    1781-1784

    Various co-sited wireless communication systems may share the same frequency band. This causes mutual interference between the wireless communication systems, and degrades the performance of each wireless communication system. In this paper, we analyze the effect of mutual interference between WiFi and WiMAX systems sharing the same frequency band. We propose novel methods based on a proposed coexistence zone within the WiMAX frame structure and a modified power saving mode of the WiFi system to solve the problem. We evaluate the performance of the proposed methods by computer simulation.

  • Optimal Power Allocation for Amplify-and-Forward Relaying Systems Using Maximum Ratio Transmission at the Source

    Jianxiong HUANG  Taiyi ZHANG  Runping YUAN  Jing ZHANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1774-1777

    This letter investigates the performance of amplify-and-forward relaying systems using maximum ratio transmission at the source. A closed-form expression for the outage probability and a closed-form lower bound for the average bit error probability of the system are derived. Also, the approximate expressions for the outage probability and average bit error probability in the high signal-to-noise ratio regime are given, based on which the optimal power allocation strategies to minimize the outage probability and average bit error probability are developed. Furthermore, numerical results illustrate that optimizing the allocation of power can improve the system performance, especially in the high signal-to-noise ratio regime.

  • Optimum Frame Synchronization for OFDM Systems

    Heon HUH  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:6
      Page(s):
    1732-1735

    Orthogonal frequency division multiplexing has emerged as a promising air interface scheme for wireless broadband communications. For OFDM systems, frame synchronization has received much attention in the literature, though simple correlators are still widely used in real systems. In this letter, we present the analytical expression of the optimal frame synchronizer for OFDM systems. Frame synchronization is posed as a maximum a posteriori probability estimation. We show that the resulting frame synchronizer consists of a correlation term and a correction term. The correction term accounts for the random data surrounding a synchronization word. Numerical results show the performance gain of the proposed frame synchronizer over a correlation scheme.

7381-7400hit(20498hit)