The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

1601-1620hit(20498hit)

  • A Field Equivalence between Physical Optics and GO-Based Equivalent Current Methods for Scattering from Circular Conducting Cylinders

    Ngoc Quang TA  Hiroshi SHIRAI  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2020/04/08
      Vol:
    E103-C No:9
      Page(s):
    382-387

    Plane wave scattering from a circular conducting cylinder and a circular conducting strip has been formulated by equivalent surface currents which are postulated from the scattering geometrical optics (GO) field. Thus derived radiation far fields are found to be the same as those formulated by a conventional physical optics (PO) approximation for both E and H polarizations.

  • A Ruby-Based Hardware/Software Co-Design Environment with Functional Reactive Programming: Mulvery

    Daichi TERUYA  Hironori NAKAJO  

     
    PAPER-Computer System

      Pubricized:
    2020/05/22
      Vol:
    E103-D No:9
      Page(s):
    1929-1938

    Computation methods using custom circuits are frequently employed to improve the throughput and power efficiency of computing systems. Hardware development, however, can incur significant development costs because designs at the register-transfer level (RTL) with a hardware description language (HDL) are time-consuming. This paper proposes a hardware and software co-design environment, named Mulvery, which is designed for non-professional hardware designer We focus on the similarities between functional reactive programming (FRP) and dataflow in computation. This study provides an idea to design hardware with a dynamic typing language, such as Ruby, using FRP and provides the proof-of-concept of the method. Mulvery, which is a hardware and software co-design tool based on our method, reduces development costs. Mulvery exhibited high performance compared with software processing techniques not equipped with hardware knowledge. According to the experiment, the method allows us to design hardware without degradation of performance. The sample application applied a Laplacian filter to an image with a size of 128×128 and processed a convolution operation within one clock.

  • Joint Adversarial Training of Speech Recognition and Synthesis Models for Many-to-One Voice Conversion Using Phonetic Posteriorgrams

    Yuki SAITO  Kei AKUZAWA  Kentaro TACHIBANA  

     
    PAPER-Speech and Hearing

      Pubricized:
    2020/06/12
      Vol:
    E103-D No:9
      Page(s):
    1978-1987

    This paper presents a method for many-to-one voice conversion using phonetic posteriorgrams (PPGs) based on an adversarial training of deep neural networks (DNNs). A conventional method for many-to-one VC can learn a mapping function from input acoustic features to target acoustic features through separately trained DNN-based speech recognition and synthesis models. However, 1) the differences among speakers observed in PPGs and 2) an over-smoothing effect of generated acoustic features degrade the converted speech quality. Our method performs a domain-adversarial training of the recognition model for reducing the PPG differences. In addition, it incorporates a generative adversarial network into the training of the synthesis model for alleviating the over-smoothing effect. Unlike the conventional method, ours jointly trains the recognition and synthesis models so that they are optimized for many-to-one VC. Experimental evaluation demonstrates that the proposed method significantly improves the converted speech quality compared with conventional VC methods.

  • Visual Recognition Method Based on Hybrid KPCA Network

    Feng YANG  Zheng MA  Mei XIE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2020/05/28
      Vol:
    E103-D No:9
      Page(s):
    2015-2018

    In this paper, we propose a deep model of visual recognition based on hybrid KPCA Network(H-KPCANet), which is based on the combination of one-stage KPCANet and two-stage KPCANet. The proposed model consists of four types of basic components: the input layer, one-stage KPCANet, two-stage KPCANet and the fusion layer. The role of one-stage KPCANet is to calculate the KPCA filters for convolution layer, and two-stage KPCANet is to learn PCA filters in the first stage and KPCA filters in the second stage. After binary quantization mapping and block-wise histogram, the features from two different types of KPCANets are fused in the fusion layer. The final feature of the input image can be achieved by weighted serial combination of the two types of features. The performance of our proposed algorithm is tested on digit recognition and object classification, and the experimental results on visual recognition benchmarks of MNIST and CIFAR-10 validated the performance of the proposed H-KPCANet.

  • Neural Networks Probability-Based PWL Sigmoid Function Approximation

    Vantruong NGUYEN  Jueping CAI  Linyu WEI  Jie CHU  

     
    LETTER-Biocybernetics, Neurocomputing

      Pubricized:
    2020/06/11
      Vol:
    E103-D No:9
      Page(s):
    2023-2026

    In this letter, a piecewise linear (PWL) sigmoid function approximation based on the statistical distribution probability of the neurons' values in each layer is proposed to improve the network recognition accuracy with only addition circuit. The sigmoid function is first divided into three fixed regions, and then according to the neurons' values distribution probability, the curve in each region is segmented into sub-regions to reduce the approximation error and improve the recognition accuracy. Experiments performed on Xilinx's FPGA-XC7A200T for MNIST and CIFAR-10 datasets show that the proposed method achieves 97.45% recognition accuracy in DNN, 98.42% in CNN on MNIST and 72.22% on CIFAR-10, up to 0.84%, 0.57% and 2.01% higher than other approximation methods with only addition circuit.

  • A Robust Low-Complexity Generalized Harmonic Canceling Model for Wideband RF Power Amplifiers

    Xiaoran CHEN  Xin QIU  Xurong CHAI  Fuqi MU  

     
    LETTER-Digital Signal Processing

      Vol:
    E103-A No:9
      Page(s):
    1120-1126

    Broadband amplifiers have been used in modern wireless communication systems. However, the accompanying disadvantage is that there is more nonlinear interference in the available operating frequency band. In addition to the in-band intermodulation distortion which affecting adjacent frequency bands the most important is harmonic distortion. In this letter we present a robust and low complex digital harmonic canceling model called cross-disturbing harmonic (CDH) model for broadband power amplifiers (PAs). The approach introducing cross terms is used to enhance the robustness of the model, thereby significantly increase the stability of the system. The CDH model still has excellent performance when actively reducing the number of coefficients. Comparisons are conducted between the CDH model and the other state-of-the-art model called memory polynomial harmonic (MPM) model. Experimental results show that the CDH model can achieve comparable performance as the MPM model but with much fewer (43%) coefficients.

  • Top-N Recommendation Using Low-Rank Matrix Completion and Spectral Clustering

    Qian WANG  Qingmei ZHOU  Wei ZHAO  Xuangou WU  Xun SHAO  

     
    PAPER-Internet

      Pubricized:
    2020/03/16
      Vol:
    E103-B No:9
      Page(s):
    951-959

    In the age of big data, recommendation systems provide users with fast access to interesting information, resulting to a significant commercial value. However, the extreme sparseness of user assessment data is one of the key factors that lead to the poor performance of recommendation algorithms. To address this problem, we propose a spectral clustering recommendation scheme with low-rank matrix completion and spectral clustering. Our scheme exploits spectral clustering to achieve the division of a similar user group. Meanwhile, the low-rank matrix completion is used to effectively predict un-rated items in the sub-matrix of the spectral clustering. With the real dataset experiment, the results show that our proposed scheme can effectively improve the prediction accuracy of un-rated items.

  • Energy-Efficient Secure Transmission for Cognitive Radio Networks with SWIPT

    Ke WANG  Wei HENG  Xiang LI  Jing WU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    1002-1010

    In this paper, the artificial noise (AN)-aided multiple-input single-output (MISO) cognitive radio network with simultaneous wireless information and power transfer (SWIPT) is considered, in which the cognitive user adopts the power-splitting (PS) receiver architecture to simultaneously decode information and harvest energy. To support secure communication and facilitate energy harvesting, AN is transmitted with information signal at cognitive base station (CBS). The secrecy energy efficiency (SEE) maximization problem is formulated with the constraints of secrecy rate and harvested energy requirements as well as primary user's interference requirements. However, this challenging problem is non-convex due to the fractional objective function and the coupling between the optimization variables. For tackling the challenging problem, a double-layer iterative optimization algorithm is developed. Specifically, the outer layer invokes a one-dimension search algorithm for the newly introduced tight relaxation variable, while the inner one leverages the Dinkelbach method to make the fractional optimization problem more tractable. Furthermore, closed-form expressions for the power of information signal and AN are obtained. Numerical simulations are conducted to demonstrate the efficiency of our proposed algorithm and the advantages of AN in enhancing the SEE performance.

  • A Fast Length Matching Routing Pattern Generation Method for Set-Pair Routing Problem Using Selective Pin-Pair Connections Open Access

    Shimpei SATO  Kano AKAGI  Atsushi TAKAHASHI  

     
    PAPER

      Vol:
    E103-A No:9
      Page(s):
    1037-1044

    Routing problems derived from silicon-interposer and etc. are often formulated as a set-pair routing problem where the combination of pin-pairs to be connected is flexible. In this routing problem, a length matching routing pattern is often required due to the requirement of the signal propagation delays be the same. We propose a fast length matching routing method for the set-pair routing problem. The existing algorithm generates a good length matching routing pattern in practical time. However, due to the limited searching range, there are length matching routing patterns that cannot find due to the limited searching range of the algorithm. Also, it needs heavy iterative steps to improve a solution, and the computation time is practical but not fast. In the set-pair routing, although pin-pairs to be connected is flexible, it is expected that combinations of pin-pairs which realize length matching are restricted. In our method, such a combination of pin-pairs is selected in advance, then routing is performed to realize the connection of the selected pin-pairs. Heavy iterative steps are not used for both the selection and the routing, then a routing pattern is generated in a short time. In the experiments, we confirm that the quality of routing patterns generated by our method is almost equivalent to the existing algorithm. Furthermore, our method finds length matching routing patterns that the existing algorithm cannot find. The computation time is about 360 times faster than the existing algorithm.

  • A Capacitance Measurement Device for Running Hardware Devices and Its Evaluations

    Makoto NISHIZAWA  Kento HASEGAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E103-A No:9
      Page(s):
    1018-1027

    In IoT (Internet-of-Things) era, the number and variety of hardware devices becomes continuously increasing. Several IoT devices are utilized at infrastructure equipments. How to maintain such IoT devices is a serious concern. Capacitance measurement is one of the powerful ways to detect anomalous states in the structure of the hardware devices. Particularly, measuring capacitance while the hardware device is running is a major challenge but no such researches proposed so far. This paper proposes a capacitance measuring device which measures device capacitance in operation. We firstly combine the AC (alternating current) voltage signal with the DC (direct current) supply voltage signal and generates the fluctuating signal. We supply the fluctuating signal to the target device instead of supplying the DC supply voltage. By effectively filtering the observed current in the target device, the filtered current can be proportional to the capacitance value and thus we can measure the target device capacitance even when it is running. We have implemented the proposed capacitance measuring device on the printed wiring board with the size of 95mm × 70mm and evaluated power consumption and accuracy of the capacitance measurement. The experimental results demonstrate that power consumption of the proposed capacitance measuring device is reduced by 65% in low-power mode from measuring mode and proposed device successfully measured capacitance in 0.002μF resolution.

  • A Coil Design and Control Method of Independent Active Shielding System for Leakage Magnetic Field Reduction of Wireless UAV Charger Open Access

    Jedok KIM  Jangyong AHN  Sungryul HUH  Kibeom KIM  Seungyoung AHN  

     
    INVITED PAPER

      Pubricized:
    2020/06/26
      Vol:
    E103-B No:9
      Page(s):
    889-898

    This paper proposes a single coil active shielding method of wireless unmanned aerial vehicle charger for leakage magnetic field reduction. A proposed shielding system eliminates the leakage magnetic field generated from the transmitting and receiving coils by generating the cancelling magnetic field. In order to enhance shielding effectiveness and preserve power transfer efficiency, shielding coil design parameters including radius and turns will analyze. Based on the analysis of coil design, shielding effectiveness and power transfer efficiency will estimate. In addition, shielding current control method corresponding to leakage magnetic field strength and phase will describe. A proposed shielding system has verified by simulations and experiments in terms of the total shielding effectiveness and power transfer efficiency measurements. The simulation and experimental results show that a proposed active shielding system has achieved 68.85% of average leakage magnetic field reduction with 1.92% of power transfer efficiency degradation. The shielding effectiveness and power transfer efficiency variation by coil design has been experimentally verified.

  • Design of Physical Layer Key Generation Encryption Method Using ACO-OFDM in VLC Networks

    Yahya AL-MOLIKI  Mohammed ALRESHEEDI  Yahya AL-HARTHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/11
      Vol:
    E103-B No:9
      Page(s):
    969-978

    Security in visible-light communication (VLC) has seen increasing importance in recent years. Asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) is recognized as one of the most powerful and efficient OFDM techniques. Therefore, it is well suited for use in both uplink and downlink connections. A security protocol based on this technique can facilitate secure uplink and downlink connections. In the present study, a low-complexity physical-layer key-generation encryption method is designed using the ACO-OFDM technique for indoor VLC networks. The security method is contingent on the generation of secret keys from the cyclic prefix OFDM samples positioned in the low-channel impact area to encrypt all signal frames before transmission, throughout the session. Numerical results indicate that the key-generation mechanism should be implemented during downlink data transmission throughout a session period to provide keys for both downlink and uplink connections. In this setup, the handset of the user employs the secret keys generated during downlink data transmission to encrypt its uplink transmission. This setup conserves the battery life of the handset. Additionally, the results indicate that the proposed security method can achieve a zero key mismatch rate with on-the-fly key creation.

  • P-Cube: A New Two-Layer Topology for Data Center Networks Exploiting Dual-Port Servers Open Access

    Moeen AL-MAKHLAFI  Huaxi GU  Xiaoshan YU  Yunfeng LU  

     
    PAPER-Network

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    940-950

    Connecting a large number of servers with high bandwidth links is one of the most crucial and challenging tasks that the Data Center Network (DCN) must fulfill. DCN faces a lot of difficulties like the effective exploitation of DC components that, if highlighted, can aid in constructing high performance, scalable, reliable, and cost-effective DCN. In this paper, we investigate the server-centric structure. We observe that current DCs use servers that mostly come with dual ports. Effective exploitation of the ports of interest for building the topology structure can help in realizing the potentialities of reducing expensive topology. Our new network topology, named “Parallel Cubes” (PCube), is a duplicate defined structure that utilizes the ports in the servers and mini-switches to form a highly effective, scalable, and efficient network structure. P-Cube provides high performance in network latency and throughput and fault tolerance. Additionally, P-Cube is highly scalable to encompass hundreds of thousands of servers with a low stable diameter and high bisection width. We design a routing algorithm for P-Cube network that utilizes the P-Cube structure to strike a balance among the numerous links in the network. Finally, numerical results are provided to show that our proposed topology is a promising structure as it outperforms other topologies and it is superior to Fat-tree, BCube and DCell by approximately 24%, 16%, 8% respectively in terms of network throughput and latency. Moreover, P-Cube extremely outperforms Fat-tree, and BCube structures in terms of total cost, complexity of cabling and power consumption.

  • A Novel Backoff Scheme and Its Throughput Analysis for Full Duplex MAC Protocols in Wireless LANs

    Shota SAKAKURA  Chikara FUJIMURA  Kosuke SANADA  Hiroyuki HATANO  Kazuo MORI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    989-1001

    Wireless full duplex (FD) communication can double the point-to-point throughput. To fully realize the benefits of the FD technique in wireless local area networks (WLANs), it is important to design the medium access control (MAC) protocols for FD communications. In FD MAC protocols, when a node wins the channel contention and transmits a primary transmission, its destination node can start a secondary transmission triggered by the primary transmission. Each secondary transmitter transmits a data frame even if its backoff timer is not zero. However, the backoff scheme in the FD MAC protocols follows the conventional scheme based on the distributed coordination function (DCF). Therefore, the nodes with FD MAC initialize the contention window (CW) size to minimum CW (CWmin) after their successful secondary transmissions. Therefore, CW initialization in the FD MAC causes further collisions at stations (STAs), which degrades network throughput. This paper proposes a novel backoff scheme for FD MAC protocols. In the proposed scheme, the CW size and backoff timer are not initialized but kept the current value after secondary transmissions. The proposed scheme can mitigate frame collisions at STAs and increase FD-transmission opportunity in the network, and then enhance the throughput significantly. This paper presents comprehensive performance evaluation in simulations, including non-saturation and saturation conditions, and co-existence conditions with legacy half duplex (HD) STAs. For performance analysis, this paper establishes Markov-chain models for the proposed scheme. The analytical results show theoretically that the operation of the proposed scheme enhances network throughput. The simulation results and analytical results show the effectiveness of the proposed scheme.

  • Complexity-Reduced Adaptive PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Signals Open Access

    Taku SUZUKI  Mikihito SUZUKI  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/23
      Vol:
    E103-B No:9
      Page(s):
    1019-1029

    This paper proposes a computational complexity-reduced algorithm for an adaptive peak-to-average power ratio (PAPR) reduction method previously developed by members of our research group that uses the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. The proposed algorithm is an extension of the peak cancellation (PC) signal-based method that has been mainly investigated for per-antenna PAPR reduction. This method adds the PC signal, which is designed so that the out-of-band radiation is removed/reduced, directly to the time-domain transmission signal at each antenna. The proposed method, referred to as PCCNC (PC with channel-null constraint), performs vector-level signal processing in the PC signal generation so that the PC signal is transmitted only to the null space in the MIMO channel. We investigate three methods to control the beamforming (BF) vector in the PC signal, which is a key factor in determining the achievable PAPR performance of the algorithm. Computer simulation results show that the proposed PCCNC achieves approximately the same throughput-vs.-PAPR performance as the previous method while dramatically reducing the required computational cost.

  • Optimal Power Allocation for Green CR over Fading Channels with Rate Constraint

    Cong WANG  Tiecheng SONG  Jun WU  Wei JIANG  Jing HU  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2020/03/16
      Vol:
    E103-B No:9
      Page(s):
    1038-1048

    Green cognitive radio (CR) plays an important role in offering secondary users (SUs) with more spectrum with smaller energy expenditure. However, the energy efficiency (EE) issues associated with green CR for fading channels have not been fully studied. In this paper, we investigate the average EE maximization problem for spectrum-sharing CR in fading channels. Unlike previous studies that considered either the peak or the average transmission power constraints, herein, we considered both of these constraints. Our aim is to maximize the average EE of SU by optimizing the transmission power under the joint peak and average transmit power constraints, the rate constraint of SU and the quality of service (QoS) constraint of primary user (PU). Specifically, the QoS for PU is guaranteed based on either the average interference power constraint or the PU outage constraint. To address the non-convex optimization problem, an iterative optimal power allocation algorithm that can tackle the problem efficiently is proposed. The optimal transmission powers are identified under both of perfect and imperfect channel side information (CSI). Simulations show that our proposed scheme can achieve higher EE over the existing scheme and the EE achieved under perfect CSI is better than that under imperfect CSI.

  • Development of Artificial Neural Network Based Automatic Stride Length Estimation Method Using IMU: Validation Test with Healthy Subjects

    Yoshitaka NOZAKI  Takashi WATANABE  

     
    LETTER-Biological Engineering

      Pubricized:
    2020/06/10
      Vol:
    E103-D No:9
      Page(s):
    2027-2031

    Rehabilitation and evaluation of motor function are important for motor disabled patients. In stride length estimation using an IMU attached to the foot, it is necessary to detect the time of the movement state, in which acceleration should be integrated. In our previous study, acceleration thresholds were used to determine the integration section, so it was necessary to adjust the threshold values for each subject. The purpose of this study was to develop a method for estimating stride length automatically using an artificial neural network (ANN). In this paper, a 4-layer ANN with feature extraction layers trained by autoencoder was tested. In addition, the methods of searching for the local minimum of acceleration or ANN output after detecting the movement state section by ANN were examined. The proposed method estimated the stride length for healthy subjects with error of -1.88 ± 2.36%, which was almost the same as the previous threshold based method (-0.97 ± 2.68%). The correlation coefficients between the estimated stride length and the reference value were 0.981 and 0.976 for the proposed and previous methods, respectively. The error ranges excluding outliers were between -7.03% and 3.23%, between -7.13% and 5.09% for the proposed and previous methods, respectively. The proposed method would be effective because the error range was smaller than the conventional method and no threshold adjustment was required.

  • Evaluation of EEG Activation Pattern on the Experience of Visual Perception in the Driving

    Keiichiro INAGAKI  Tatsuya MARUNO  Kota YAMAMOTO  

     
    LETTER-Biological Engineering

      Pubricized:
    2020/06/03
      Vol:
    E103-D No:9
      Page(s):
    2032-2034

    The brain processes numerous information related to traffic scenes for appropriate perception, judgment, and operation in vehicle driving. Here, the strategy for perception, judgment, and operation is individually different for each driver, and this difference is thought to be arise from experience of driving. In the present work, we measure and analyze human brain activity (EEG: Electroencephalogram) related to visual perception during vehicle driving to clarify the relationship between experience of driving and brain activity. As a result, more experts generate α activities than beginners, and also confirm that the β activities is reduced than beginners. These results firstly indicate that experience of driving is reflected into the activation pattern of EEG.

  • Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks

    Jin Myoung KIM  Hae Young LEE  

     
    LETTER-Information Network

      Pubricized:
    2020/05/29
      Vol:
    E103-D No:9
      Page(s):
    2007-2010

    In the statistic en-route filtering, each report generation node must collect a certain number of endorsements from its neighboring nodes. However, at some point, a node may fail to collect an insufficient number of endorsements since some of its neighboring nodes may have dead batteries. This letter presents a report generation method that can enhance the generation process of sensing reports under such a situation. Simulation results show the effectiveness of the proposed method.

  • Time Allocation in Ambient Backscatter Assisted RF-Powered Cognitive Radio Network with Friendly Jamming against Eavesdropping

    Ronghua LUO  Chen LIU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    1011-1018

    In this paper, we study a radio frequency (RF)-powered backscatter assisted cognitive radio network (CRN), where an eavesdropper exists. This network includes a primary transmitter, a pair of secondary transmitter and receiver, a friendly jammer and an eavesdropper. We assume that the secondary transmitter works in ambient backscatter (AmBack) mode and the friendly jammer works in harvest-then-transmit (HTT) mode, where the primary transmitter serves as energy source. To enhance the physical layer security of the secondary user, the friendly jammer uses its harvested energy from the primary transmitter to transmit jamming noise to the eavesdropper. Furthermore, for maximizing the secrecy rate of secondary user, the optimal time allocation including the energy harvesting and jamming noise transmission phases is obtained. Simulation results verify the superiority of the proposed scheme.

1601-1620hit(20498hit)