The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7681-7700hit(20498hit)

  • An Investigation on Crosstalk in Multi-Core Fibers by Introducing Random Fluctuation along Longitudinal Direction

    Katsuhiro TAKENAGA  Yoko ARAKAWA  Shoji TANIGAWA  Ning GUAN  Shoichiro MATSUO  Kunimasa SAITOH  Masanori KOSHIBA  

     
    PAPER

      Vol:
    E94-B No:2
      Page(s):
    409-416

    The length dependence of the crosstalk in multi-core fibers has been investigated by introducing random fluctuation along longitudinal direction. The power coupling coefficients in the coupled-power theory in heterogeneous multi-core fiber with seven cores were estimated based on consideration of the power coupling coefficients of the homogeneous multi-core fiber. The crosstalk can be quantitatively evaluated by employing coupled-power theory instead of coupled-mode theory.

  • Quantitative Analysis on Usability of Button-Input Interfaces

    Yoshinobu MAEDA  Kentaro TANI  Nao ITO  Michio MIYAKAWA  

     
    PAPER-Human Communications

      Vol:
    E94-A No:2
      Page(s):
    789-794

    In this paper we show that the performance workload of button-input interfaces do not monotonically increase with the number of buttons, but there is an optimal number of buttons in the sense that the performance workload is minimized. As the number of buttons increases, it becomes more difficult to search for the target button, and, as such, the user's cognitive workload is increased. As the number of buttons decreases, the user's cognitive workload decreases but his operational workload increases, i.e., the amount of operations becomes larger because one button has to be used for plural functions. The optimal number of buttons emerges by combining the cognitive and operational workloads. The experiments used to measure performance were such that we were able to describe a multiple regression equation using two observable variables related to the cognitive and operational workloads. As a result, our equation explained the data well and the optimal number of buttons was found to be about 8, similar to the number adopted by commercial cell phone manufacturers. It was clarified that an interface with a number of buttons close to the number of letters in the alphabet was not necessarily easy to use.

  • Ultra-High Capacity Optical Transmission Technologies for 100 Tbit/s Optical Transport Networks Open Access

    Akihide SANO  Takayuki KOBAYASHI  Eiji YOSHIDA  Yutaka MIYAMOTO  

     
    INVITED PAPER

      Vol:
    E94-B No:2
      Page(s):
    400-408

    This paper describes ultra-high capacity wavelength-division multiplexed (WDM) transmission technologies for 100-Tbit/s-class optical transport networks (OTNs). First, we review recent advances in ultra-high capacity transmission technologies focusing on spectrally-efficient multi-level modulation techniques and ultra-wideband optical amplification techniques. Next, we describe an ultra-high capacity WDM transmission experiment, in which high speed polarization-division multiplexed (PDM) 16-ary quadrature amplitude modulation (16-QAM), generated by an optical synthesis technique, in combination with coherent detection based on digital signal processing with pilotless algorithms, realize the high spectral efficiency (SE) of 6.4 b/s/Hz. Furthermore, ultra-wideband hybrid optical amplification utilizing distributed Raman amplification (DRA) and C- and extended L-band erbium-doped fiber amplifiers (EDFAs) is shown to realize 10.8-THz total signal bandwidth. By using these techniques, 69.1-Tbit/s transmission is demonstrated over 240-km of pure silica-core fibers (PSCFs). Furthermore, we describe PDM 64-QAM transmission over 160 km of PSCFs with the SE of 9.0 b/s/Hz.

  • Sanitizable Signatures Reconsidered

    Dae Hyun YUM  Pil Joong LEE  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:2
      Page(s):
    717-724

    A sanitizable signature scheme allows a semi-trusted party, designated by a signer, to modify pre-determined parts of a signed message without interacting with the original signer. To date, many sanitizable signature schemes have been proposed based on various cryptographic techniques. However, previous works are usually built upon the paradigm of dividing a message into submessages and applying a cryptographic primitive to each submessage. This methodology entails the computation time (and often signature length) in linear proportion to the number of sanitizable submessages. We present a new approach to constructing sanitizable signatures with constant overhead for signing and verification, irrespective of the number of submessages, both in computational cost and in signature size.

  • Transmission Performance of an In-Body to Off-Body UWB Communication Link

    Jianqing WANG  Kenichiro MASAMI  Qiong WANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E94-B No:1
      Page(s):
    150-157

    The objective of this study is to investigate the feasibility of an ultra wideband (UWB) impulse radio system for in-body to off-body wireless communication for biomedical applications. At first, a UWB antenna is designed in the UWB low band for implant use in the chest. Then the channel model is extracted and established based on the finite difference time domain (FDTD) simulation with an anatomical human body model. The established channel model consists of a small set of parameters for generating discrete time impulse responses. The generated model shows good agreement with the FDTD-calculated result in terms of key communication metrics. For effective communication over the multipath-affected channel, the pulse position modulation is employed and a 2-finger RAKE structure with a constant temporal delay is proposed in the receiver. The bit error rate performance has shown the validity of the system in the in-body to off-body chest channel.

  • A Two-Stage Spatiotemporal Approach for Mining Traffic Flows across Multiple Networks

    Weisong HE  Guangmin HU  Yingjie ZHOU  Haiyan JIN  

     
    LETTER-Graphs and Networks

      Vol:
    E94-A No:1
      Page(s):
    440-442

    In this letter, a new definition of two-stage spatiotemporal approach, called ICA-WFS (Independent-Component-Analysis-Weighted-Frequent-Substructure) is proposed. To facilitate capturing abnormal behavior across multiple networks and dimensionality reduction at a single Point of Presence (PoP), ICA is applied. With application of WFS, an complete graph is examined, unusual substructures of which are reported. Experiments are conducted and, together with application of backbone network (Internet2) Netflow data, show some positive results.

  • A Clock Generator with Clock Period, Duty-Ratio and I/Q-Balance Adjustment Capabilities for On-Chip Timing-Margin Tests

    Shunichi KAERIYAMA  Mikihiro KAJITA  Masayuki MIZUNO  

     
    PAPER-Integrated Electronics

      Vol:
    E94-C No:1
      Page(s):
    102-109

    A 4-phase clock generator, which can dynamically change clock frequencies, duty ratios and I/Q balance, is proposed for on-chip timing margin testing. The clock generator macro is integrated into the microprocessor chip of the supercomputer SX-9, which is fabricated with a 65 nm CMOS technology. It demonstrates frequency syntheses of 1.68 GHz to 3 GHz range, an instant frequency change capability for timing margin testing, duty ratio and I/Q balance adjustments of -12.5 ps to 9.4 ps with a 3.125 ps step resolution.

  • Separation of Mixtures of Complex Sinusoidal Signals with Independent Component Analysis

    Tetsuo KIRIMOTO  Takeshi AMISHIMA  Atsushi OKAMURA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    215-221

    ICA (Independent Component Analysis) has a remarkable capability of separating mixtures of stochastic random signals. However, we often face problems of separating mixtures of deterministic signals, especially sinusoidal signals, in some applications such as radar systems and communication systems. One may ask if ICA is effective for deterministic signals. In this paper, we analyze the basic performance of ICA in separating mixtures of complex sinusoidal signals, which utilizes the fourth order cumulant as a criterion of independency of signals. We theoretically show that ICA can separate mixtures of deterministic sinusoidal signals. Then, we conduct computer simulations and radio experiments with a linear array antenna to confirm the theoretical result. We will show that ICA is successful in separating mixtures of sinusoidal signals with frequency difference less than FFT resolution and with DOA (Direction of Arrival) difference less than Rayleigh criterion.

  • Efficient Implementation of Inner-Outer Flexible GMRES for the Method of Moments Based on a Volume-Surface Integral Equation Open Access

    Hidetoshi CHIBA  Toru FUKASAWA  Hiroaki MIYASHITA  Yoshihiko KONISHI  

     
    PAPER-Numerical Techniques

      Vol:
    E94-C No:1
      Page(s):
    24-31

    This paper presents flexible inner-outer Krylov subspace methods, which are implemented using the fast multipole method (FMM) for solving scattering problems with mixed dielectric and conducting object. The flexible Krylov subspace methods refer to a class of methods that accept variable preconditioning. To obtain the maximum efficiency of the inner-outer methods, it is desirable to compute the inner iterations with the least possible effort. Hence, generally, inaccurate matrix-vector multiplication (MVM) is performed in the inner solver within a short computation time. This is realized by using a particular feature of the multipole techniques. The accuracy and computational cost of the FMM can be controlled by appropriately selecting the truncation number, which indicates the number of multipoles used to express far-field interactions. On the basis of the abovementioned fact, we construct a less-accurate but much cheaper version of the FMM by intentionally setting the truncation number to a sufficiently low value, and then use it for the computation of inaccurate MVM in the inner solver. However, there exists no definite rule for determining the suitable level of accuracy for the FMM within the inner solver. The main focus of this study is to clarify the relationship between the overall efficiency of the flexible inner-outer Krylov solver and the accuracy of the FMM within the inner solver. Numerical experiments reveal that there exits an optimal accuracy level for the FMM within the inner solver, and that a moderately accurate FMM operator serves as the optimal preconditioner.

  • Reducing the Inaccuracy Caused by Inappropriate Time Window in Probabilistic Fault Localization

    Jianxin LIAO  Cheng ZHANG  Tonghong LI  Xiaomin ZHU  

     
    PAPER-Network Management/Operation

      Vol:
    E94-B No:1
      Page(s):
    128-138

    To reduce the inaccuracy caused by inappropriate time window, we propose two probabilistic fault localization schemes based on the idea of "extending time window." The global window extension algorithm (GWE) uses a window extension strategy for all candidate faults, while the on-demand window extension algorithm (OWE) uses the extended window only for a small set of faults when necessary. Both algorithms can increase the metric values of actual faults and thus improve the accuracy of fault localization. Simulation results show that both schemes perform better than existing algorithms. Furthermore, OWE performs better than GWE at the cost of a bit more computing time.

  • Resource Reduction Method for the LTE-Advanced Uplink ACK/NACK Signal and SR

    Seigo NAKAO  Kenji TAKAGI  Masaru FUKUOKA  Daichi IMAMURA  Hidekazu MURATA  Koji YAMAMOTO  Susumu YOSHIDA  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:1
      Page(s):
    364-367

    Advanced Evolved Universal Terrestrial Radio Access (Advanced E-UTRA), called LTE-Advanced, has been standardized in the 3rd Generation Partnership Project (3GPP) as a candidate for IMT-Advanced. LTE-Advanced supports spatial orthogonal-resource transmit diversity (SORTD) [1],[2] for ACK/NACK signals and scheduling requests (SRs), which are used to control downlink hybrid automatic repeat requests (HARQs) and manage uplink radio resources based on uplink data traffic, respectively. Both ACK/NACK signals and SRs are carried via a physical uplink control channel (PUCCH) [3], and a common PUCCH format is used for both ACK/NACK signals and SRs. If SORTD is used, the base station assigns mutually orthogonal resources to each antenna included in the user equipment (UE) for ACK/NACK signals and SRs; hence, the number of required resources increases with the number of transmitting antennas in the UE. In this paper, we study the resource reduction method for ACK/NACK signal and SR in case of SORTD using the concept of common resource. In addition, we investigate a phase rotation scheme for common resources to improve the SR detection performance.

  • Fresnel Zone Criterion to Implement Locality in the Method of Moments and PO-MoM Hybrid Method for the Reduction of Unknowns

    Keita ITO  Tetsu SHIJO  Makoto ANDO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E94-C No:1
      Page(s):
    72-79

    Locality of high frequency electromagnetic scattering phenomena is embodied and imported to the Method of Moments (MoM) to reduce computational load. The proposed method solves currents on small areas only around inner and edge stationary phase points (SPPs) on the scatterer surfaces. The range of MoM area is explicitly specified in terms of Fresnel zone number as a function of frequency, source and observer positions. Based upon this criterion, scatterer of arbitrary size and shape can be solved with almost frequency independent number of unknowns. In some special cases like focusing systems, locality disappears and the method reduces to the standard MoM. The hybrid method called PO-MoM is complementarily introduced to cope with these cases, where Fresnel zone number with analogous but different definition is used. The selective use of Local-MoM and PO-MoM provides frequency insensitive number of unknowns for general combination of source and observation points. Numerical examples of RCS calculation for two dimensional flat and curved surfaces are presented to demonstrate the accuracy and reduction of unknowns of this method. The Fresnel zone, introduced in the scattering analysis for the first time, is a useful indicator of the locality or the boundary for MoM areas.

  • A Fully Secure Spatial Encryption Scheme

    Daisuke MORIYAMA  Hiroshi DOI  

     
    PAPER-Public Key Cryptography

      Vol:
    E94-A No:1
      Page(s):
    28-35

    Spatial encryption is one of the generalized identity based encryption proposed by Boneh and Hamburg in 2008. Spatial encryption provides a framework for generating many identity based cryptosystems such as broadcast encryption, forward secure encryption or ring signature. While this may appear to be an attractive feature, all existing spatial encryption schemes are only selectively secure. In this paper, we present a fully secure spatial encryption scheme based on the three composite order bilinear groups.

  • A 35-GHz, 0.8-A/W and 26-µm Misalignment Tolerance Microlens-Integrated p-i-n Photodiodes

    Yong LEE  Kazuyuki NAGATSUMA  Kazuhiko HOSOMI  Takuma BAN  Kazunori SHINODA  Koichiro ADACHI  Shinji TSUJI  Yasunobu MATSUOKA  Shigehisa TANAKA  Reiko MITA  Toshiki SUGAWARA  Masahiro AOKI  

     
    BRIEF PAPER-Lasers, Quantum Electronics

      Vol:
    E94-C No:1
      Page(s):
    116-119

    We fabricated a p-i-n photodiode (PD) with an integrated microlens, and demonstrated its high performance capabilities including high speed (35 GHz), high responsivity (0.8 A/W), and large misalignment tolerance (26 µm), and an error-free 25-Gbit/s 10-km single-mode fiber transmission by using a 100-Gbit/s Ethernet quadplexer receiver module with the PDs.

  • Numerical Analysis of Two-Dimensional Photonic Crystal Waveguide Devices Using Periodic Boundary Conditions

    Yoshimasa NAKATAKE  Koki WATANABE  

     
    PAPER-Numerical Techniques

      Vol:
    E94-C No:1
      Page(s):
    32-38

    This paper presents a formulation of two-dimensional photonic crystal waveguide devices formed by circular cylinders. The device structures are considered as cascade connections of straight waveguides. Decomposing the structure into layers of the cylinder arrays, the input/output properties of the devices are obtained using an analysis method of multilayer structure. We introduce periodic boundary conditions in the direction perpendicular to the wave propagation, and the Floquet-modes of each layer are calculated by the Fourier series expansion method with the help of the recursive transition-matrix algorithm. Then, the input/output properties of the devices are obtained by recursive calculation of scattering matrix with each layer. The presented formulation is validated by numerical experiments by comparing with the previous works.

  • Scattering of a Plane Wave from the End-Face of a Three-Dimensional Waveguide System

    Asami TAKI  Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E94-C No:1
      Page(s):
    63-67

    The scattering of a plane wave from the end-face of a three-dimensional waveguide system composed of a large number of cores is treated by the volume integral equation for the electric field and the first order term of a perturbation solution for TE and TM wave incidence is analytically derived. The far scattered field does not almost depend on the polarization of an incident wave and the angle dependence is described as the Fourier transform of the incident field in the cross section of cores. To clarify the dependence of the scattering pattern on the arrangement of cores some numerical examples are shown.

  • An Efficient Transmit Power and Bit Rate Allocation Algorithm for OFDM Based Cognitive Radio Systems

    Yuehuai MA  Youyun XU  Jin-Long WANG  

     
    LETTER-Network

      Vol:
    E94-B No:1
      Page(s):
    302-306

    We consider the problem of transmit power and bit rate allocation for OFDM based cognitive radio systems. An efficient allocation algorithm which mainly consists of two steps is proposed to maximize the sum rate of secondary users. In the first step of the algorithm, original nonlinear problem is converted to a convex problem which is solved by dual methods, and in the second step the final resource allocation results is obtained via iterative power rescale operation. Numerical results show the effectiveness of the proposed algorithm.

  • Data Management for Large-Scale Position-Tracking Systems

    Fumiaki INOUE  Yongbing ZHANG  Yusheng JI  

     
    PAPER-Scalability & Timeliness

      Vol:
    E94-B No:1
      Page(s):
    45-54

    We propose a distributed data management approach in this paper for a large-scale position-tracking system composed of multiple small systems based on wireless tag technologies such as RFID and Wi-Fi tags. Each of these small systems is called a domain, and a domain server manages the position data of the users belonging to its managing domain and also to the other domains but temporarily residing in its domain. The domain servers collaborate with each other to globally manage the position data, realizing the global position tracking. Several domains can be further grouped to form a larger domain, called a higher-domain, so that the whole system is constructed in a hierarchical structure. We implemented the proposed approach in an experimental environment, and conducted a performance evaluation on the proposed approach and compared it with an existing approach wherein a central server is used to manage the position data of all the users. The results showed that the position data processing load is distributed among the domain servers and the traffic for position data transmission over the backbone network can be significantly restrained.

  • Efficient Context-Sensitive Intrusion Detection Based on State Transition Table

    Jingyu HUA  Mingchu LI  Yizhi REN  Kouichi SAKURAI  

     
    PAPER-Network Security

      Vol:
    E94-A No:1
      Page(s):
    255-264

    Those host-based intrusion detection models like VPStatic first construct a model of acceptable behaviors for each monitored program via static analysis, and then perform intrusion detection by comparing them with programs' runtime behaviors. These models usually share the highly desirable feature that they do not produce false alarms but face the conflicts between accuracy and efficiency. For instance, the high accuracy of the VPStatic model is at the cost of high space complexity. In this paper, we use a statically-constructed state transition table (STT), which records expected transitions among system calls as well as their stack states (return address lists), as a behavior model to perform context-sensitive intrusion detection. According to our analysis, our STT model improves the space efficiency of the VPStatic model without decreasing its high precision and time efficiency. Experiments show that for three test programs, memory uses of our STT models are all much less than half of the VPStatic models'. Thereby, we alleviate the conflicts between the accuracy and the efficiency.

  • Improving Power Spectra Estimation in 2-Dimensional Areas Using Number of Active Sound Sources

    Yusuke HIOKA  Ken'ichi FURUYA  Yoichi HANEDA  Akitoshi KATAOKA  

     
    PAPER-Engineering Acoustics

      Vol:
    E94-A No:1
      Page(s):
    273-281

    An improvement of estimating sound power spectra located in a particular 2-dimensional area is proposed. We previously proposed a conventional method that estimates sound power spectra using multiple fixed beamformings in order to emphasize speech located in a particular 2-dimensional area. However, the method has one drawback that the number of areas where the active sound sources are located must be restricted. This restriction makes the method less effective when many noise source located in different areas are simultaneously active. In this paper, we reveal the cause of this restriction and determine the maximum number of areas for which the method is able to simultaneously estimate sound power spectra. Then we also introduce a procedure for investigating areas that include active sound sources to reduce the number of unknown power spectra to be estimated. The effectiveness of the proposed method is examined by experimental evaluation applied to sounds recorded in a practical environment.

7681-7700hit(20498hit)