The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

201-220hit(8214hit)

  • Flux Modulation Enhancement of dc-SQUID Based on Intrinsic Josephson Junctions Made of Bi2Sr2CaCuO8+δ Thin Films Open Access

    Kensuke NAKAJIMA  Hironobu YAMADA  Mihoko TAKEDA  

     
    INVITED PAPER

      Pubricized:
    2022/11/29
      Vol:
    E106-C No:6
      Page(s):
    289-292

    Direct-current superconducting quantum interference device (dc-SQUID) based on intrinsic Josephson junction (IJJ) has been fabricated using Bi2Sr2CaCu2O8+δ (Bi-2212) films grown on MgO substrates with surface steps. The superconducting loop parallel to the film surface across the step edge contains two IJJ stacks along the edge. The number of crystallographically stacked IJJ for each SQUIDs were 40, 18 and 3. Those IJJ SQUIDs except for one with 40 stacked IJJs revealed clear periodic modulation of the critical current for the flux quanta through the loops. It is anticipated that phase locking of IJJ has an effect on the modulation depth of the IJJ dc-SQUID.

  • Possibilities and Challenges of Superconducting Qubits in the Intrinsic Josephson Junctions Open Access

    Haruhisa KITANO  

     
    INVITED PAPER

      Pubricized:
    2022/12/12
      Vol:
    E106-C No:6
      Page(s):
    293-300

    Intrinsic Josephson junctions (IJJs) in the high-Tc cuprate superconductors have several fascinating properties, which are superior to the usual Josephson junctions obtained from conventional superconductors with low Tc, as follows; (1) a very thin thickness of the superconducting layers, (2) a strong interaction between junctions since neighboring junctions are closely connected in an atomic scale, (3) a clean interface between the superconducting and insulating layers, realized in a single crystal with few disorders. These unique properties of IJJs can enlarge the applicable areas of the superconducting qubits, not only the increase of qubit-operation temperature but the novel application of qubits including the macroscopic quantum states with internal degree of freedom. I present a comprehensive review of the phase dynamics in current-biased IJJs and argue the challenges of superconducting qubits utilizing IJJs.

  • Counting and Tracking People to Avoid from Crowded in a Restaurant Using mmWave Radar

    Shenglei LI  Reiko HISHIYAMA  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2023/03/24
      Vol:
    E106-D No:6
      Page(s):
    1142-1154

    One key to implementing the smart city is letting the smart space know where and how many people are. The visual method is a scheme to recognize people with high accuracy, but concerns arise regarding potential privacy leakage and user nonacceptance. Besides, being functional in a limited environment in an emergency should also be considered. We propose a real-time people counting and tracking system based on a millimeter wave radar (mmWave) as an alternative to the optical solutions in a restaurant. The proposed method consists of four main procedures. First, capture the point cloud of obstacles and generate them using a low-cost, commercial off-the-shelf (COTS) mmWave radar. Next, cluster the individual point with similar properties. Then the same people in sequential frames would be associated with the tracking algorithm. Finally, the estimated people would be counted, tracked, and shown in the next frame. The experiment results show that our proposed system provided a median position error of 0.17 m and counting accuracy of 83.5% for ten insiders in various scenarios in an actual restaurant environment. In addition, the real-time estimation and visualization of people's numbers and positions show a potential capability to help prevent crowds during the pandemic of Covid-19 and analyze customer visitation patterns for efficient management and target marketing.

  • Design and Implementation of a Simulator to Emulate Elder Behavior in a Nursing Home

    You-Chiun WANG  Yi-No YAO  

     
    PAPER-Rehabilitation Engineering and Assistive Technology

      Pubricized:
    2023/03/13
      Vol:
    E106-D No:6
      Page(s):
    1155-1164

    Many countries are facing the aging problem caused by the growth of the elderly population. Nursing home (NH) is a common solution to long-term care for the elderly. This paper develops a simulator to model elder behavior in an NH, which considers public areas where elders interact and imitates their general, group, and special activities. Elders have their preferences to decide activities taken by them. The simulator takes account of the movement of elders and abnormal events. Based on the simulator, two seeking methods are proposed for caregivers to search lost elders efficiently, which helps them fast find out elders who may incur accidents.

  • Fixed Point Preserving Model Reduction of Boolean Networks Focusing on Complement and Absorption Laws

    Fuma MOTOYAMA  Koichi KOBAYASHI  Yuh YAMASHITA  

     
    PAPER

      Pubricized:
    2022/10/24
      Vol:
    E106-A No:5
      Page(s):
    721-728

    A Boolean network (BN) is well known as a discrete model for analysis and control of complex networks such as gene regulatory networks. Since complex networks are large-scale in general, it is important to consider model reduction. In this paper, we consider model reduction that the information on fixed points (singleton attractors) is preserved. In model reduction studied here, the interaction graph obtained from a given BN is utilized. In the existing method, the minimum feedback vertex set (FVS) of the interaction graph is focused on. The dimension of the state is reduced to the number of elements of the minimum FVS. In the proposed method, we focus on complement and absorption laws of Boolean functions in substitution operations of a Boolean function into other one. By simplifying Boolean functions, the dimension of the state may be further reduced. Through a numerical example, we present that by the proposed method, the dimension of the state can be reduced for BNs that the dimension of the state cannot be reduced by the existing method.

  • Thermal-Comfort Aware Online Co-Scheduling Framework for HVAC, Battery Systems, and Appliances in Smart Buildings

    Daichi WATARI  Ittetsu TANIGUCHI  Francky CATTHOOR  Charalampos MARANTOS  Kostas SIOZIOS  Elham SHIRAZI  Dimitrios SOUDRIS  Takao ONOYE  

     
    INVITED PAPER

      Pubricized:
    2022/10/24
      Vol:
    E106-A No:5
      Page(s):
    698-706

    Energy management in buildings is vital for reducing electricity costs and maximizing the comfort of occupants. Excess solar generation can be used by combining a battery storage system and a heating, ventilation, and air-conditioning (HVAC) system so that occupants feel comfortable. Despite several studies on the scheduling of appliances, batteries, and HVAC, comprehensive and time scalable approaches are required that integrate such predictive information as renewable generation and thermal comfort. In this paper, we propose an thermal-comfort aware online co-scheduling framework that incorporates optimal energy scheduling and a prediction model of PV generation and thermal comfort with the model predictive control (MPC) approach. We introduce a photovoltaic (PV) energy nowcasting and thermal-comfort-estimation model that provides useful information for optimization. The energy management problem is formulated as three coordinated optimization problems that cover fast and slow time-scales by considering predicted information. This approach reduces the time complexity without a significant negative impact on the result's global nature and its quality. Experimental results show that our proposed framework achieves optimal energy management that takes into account the trade-off between electricity expenses and thermal comfort. Our sensitivity analysis indicates that introducing a battery significantly improves the trade-off relationship.

  • Conflict Reduction of Acyclic Flow Event Structures

    Toshiyuki MIYAMOTO  Marika IZAWA  

     
    PAPER

      Pubricized:
    2022/10/26
      Vol:
    E106-A No:5
      Page(s):
    707-714

    Event structures are a well-known modeling formalism for concurrent systems with causality and conflict relations. The flow event structure (FES) is a variant of event structures, which is a generalization of the prime event structure. In an FES, two events may be in conflict even though they are not syntactically in conflict; this is called a semantic conflict. The existence of semantic conflict in an FES motivates reducing conflict relations (i.e., conflict reduction) to obtain a simpler structure. In this paper, we study conflict reduction in acyclic FESs. A necessary and sufficient condition for conflict reduction is given; algorithms to compute semantic conflict, local configurations, and conflict reduction are proposed. A great time reduction was observed in computational experiments when comparing the proposed with the naive method.

  • Detection of False Data Injection Attacks in Distributed State Estimation of Power Networks

    Sho OBATA  Koichi KOBAYASHI  Yuh YAMASHITA  

     
    PAPER

      Pubricized:
    2022/10/24
      Vol:
    E106-A No:5
      Page(s):
    729-735

    In a power network, it is important to detect a cyber attack. In this paper, we propose a method for detecting false data injection (FDI) attacks in distributed state estimation. An FDI attack is well known as one of the typical cyber attacks in a power network. As a method of FDI attack detection, we consider calculating the residual (i.e., the difference between the observed and estimated values). In the proposed detection method, the tentative residual (estimated error) in ADMM (Alternating Direction Method of Multipliers), which is one of the powerful methods in distributed optimization, is applied. First, the effect of an FDI attack is analyzed. Next, based on the analysis result, a detection parameter is introduced based on the residual. A detection method using this parameter is then proposed. Finally, the proposed method is demonstrated through a numerical example on the IEEE 14-bus system.

  • Blind Carrier Frequency Offset Estimation in Weighted Fractional Fourier Transform Communication Systems

    Toshifumi KOJIMA  Kouji OHUCHI  

     
    LETTER

      Pubricized:
    2022/11/07
      Vol:
    E106-A No:5
      Page(s):
    807-811

    In this study, a blind carrier frequency offset (CFO) estimation method is proposed using the time-frequency symmetry of the transmitted signals of a weighted Fourier transform (WFrFT) communication system. Blind CFO estimation is achieved by focusing on the property that results in matching the signal waveforms before and after the Fourier transform when the WFrFT parameter is set to a certain value. Numerical simulations confirm that the proposed method is more resistant to Rayleigh fading than the conventional estimation methods.

  • BayesianPUFNet: Training Sample Efficient Modeling Attack for Physically Unclonable Functions

    Hiromitsu AWANO  Makoto IKEDA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/10/31
      Vol:
    E106-A No:5
      Page(s):
    840-850

    This paper proposes a deep neural network named BayesianPUFNet that can achieve high prediction accuracy even with few challenge-response pairs (CRPs) available for training. Generally, modeling attacks are a vulnerability that could compromise the authenticity of physically unclonable functions (PUFs); thus, various machine learning methods including deep neural networks have been proposed to assess the vulnerability of PUFs. However, conventional modeling attacks have not considered the cost of CRP collection and analyzed attacks based on the assumption that sufficient CRPs were available for training; therefore, previous studies may have underestimated the vulnerability of PUFs. Herein, we show that the application of Bayesian deep neural networks that incorporate Bayesian statistics can provide accurate response prediction even in situations where sufficient CRPs are not available for learning. Numerical experiments show that the proposed model uses only half the CRP to achieve the same response prediction as that of the conventional methods. Our code is openly available on https://github.com/bayesian-puf-net/bayesian-puf-net.git.

  • Investigations on c-Bent4 Functions via the Unitary Transform and c-Correlation Functions

    Niu JIANG  Zepeng ZHUO  Guolong CHEN  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/11/11
      Vol:
    E106-A No:5
      Page(s):
    851-857

    In this paper, some properties of Boolean functions via the unitary transform and c-correlation functions are presented. Based on the unitary transform, we present two classes of secondary constructions for c-bent4 functions. Also, by using the c-correlation functions, a direct link between c-autocorrelation function and the unitary transform of Boolean functions is provided, and the relationship among c-crosscorrelation functions of arbitrary four Boolean functions can be obtained.

  • Cluster Structure of Online Users Generated from Interaction Between Fake News and Corrections Open Access

    Masaki AIDA  Takumi SAKIYAMA  Ayako HASHIZUME  Chisa TAKANO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2022/11/21
      Vol:
    E106-B No:5
      Page(s):
    392-401

    The problem caused by fake news continues to worsen in today's online social networks. Intuitively, it seems effective to issue corrections as a countermeasure. However, corrections can, ironically, strengthen attention to fake news, which worsens the situation. This paper proposes a model for describing the interaction between fake news and the corrections as a reaction-diffusion system; this yields the mechanism by which corrections increase attention to fake news. In this model, the emergence of groups of users who believe in fake news is understood as a Turing pattern that appears in the activator-inhibitor model. Numerical calculations show that even if the network structure has no spatial bias, the interaction between fake news and the corrections creates groups that are strongly interested in discussing fake news. Also, we propose and evaluate a basic strategy to counter fake news.

  • Shared Backup Allocation Model of Middlebox Based on Workload-Dependent Failure Rate

    Han ZHANG  Fujun HE  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2022/11/11
      Vol:
    E106-B No:5
      Page(s):
    427-438

    With the network function virtualization technology, a middlebox can be deployed as software on commercial servers rather than on dedicated physical servers. A backup server is necessary to ensure the normal operation of the middlebox. The workload can affect the failure rate of backup server; the impact of workload-dependent failure rate on backup server allocation considering unavailability has not been extensively studied. This paper proposes a shared backup allocation model of middlebox with consideration of the workload-dependent failure rate of backup server. Backup resources on a backup server can be assigned to multiple functions. We observe that a function has four possible states and analyze the state transitions within the system. Through the queuing approach, we compute the probability of each function being available or unavailable for a certain assignment, and obtain the unavailability of each function. The proposed model is designed to find an assignment that minimizes the maximum unavailability among functions. We develop a simulated annealing algorithm to solve this problem. We evaluate and compare the performances of proposed and baseline models under different experimental conditions. Based on the results, we observe that, compared to the baseline model, the proposed model reduces the maximum unavailability by an average of 29% in our examined cases.

  • Field Evaluation of Adaptive Path Selection for Platoon-Based V2N Communications

    Ryusuke IGARASHI  Ryo NAKAGAWA  Dan OKOCHI  Yukio OGAWA  Mianxiong DONG  Kaoru OTA  

     
    PAPER-Network

      Pubricized:
    2022/11/17
      Vol:
    E106-B No:5
      Page(s):
    448-458

    Vehicles on the road are expected to connect continuously to the Internet at sufficiently high speeds, e.g., several Mbps or higher, to support multimedia applications. However, even when passing through a well-facilitated city area, Internet access can be unreliable and even disconnected if the travel speed is high. We therefore propose a network path selection technique to meet network throughput requirements. The proposed technique is based on the attractor selection model and enables vehicles to switch the path from a route connecting directly to a cellular network to a relay type through neighboring vehicles for Internet access. We also develop a mechanism that prevents frequent path switching when the performance of all available paths does not meet the requirements. We conduct field evaluations by platooning two vehicles in a real-world driving environment and confirm that the proposed technique maintains the required throughput of up to 7Mbps on average. We also evaluated our proposed technique by extensive computer simulations of up to 6 vehicles in a platoon. The results show that increasing platoon length yields a greater improvement in throughput, and the mechanism we developed decreases the rate of path switching by up to 25%.

  • Prioritization of Lane-Specific Traffic Jam Detection for Automotive Navigation Framework Utilizing Suddenness Index and Automatic Threshold Determination

    Aki HAYASHI  Yuki YOKOHATA  Takahiro HATA  Kouhei MORI  Masato KAMIYA  

     
    PAPER

      Pubricized:
    2023/02/03
      Vol:
    E106-D No:5
      Page(s):
    895-903

    Car navigation systems provide traffic jam information. In this study, we attempt to provide more detailed traffic jam information that considers the lane in which a traffic jam is in. This makes it possible for users to avoid long waits in queued traffic going toward an unintended destination. Lane-specific traffic jam detection utilizes image processing, which incurs long processing time and high cost. To reduce these, we propose a “suddenness index (SI)” to categorize candidate areas as sudden or periodic. Sudden traffic jams are prioritized as they may lead to accidents. This technology aggregates the number of connected cars for each mesh on a map and quantifies the degree of deviation from the ordinary state. In this paper, we evaluate the proposed method using actual global positioning system (GPS) data and found that the proposed index can cover 100% of sudden lane-specific traffic jams while excluding 82.2% of traffic jam candidates. We also demonstrate the effectiveness of time savings by integrating the proposed method into a demonstration framework. In addition, we improved the proposed method's ability to automatically determine the SI threshold to select the appropriate traffic jam candidates to avoid manual parameter settings.

  • A Novel SSD-Based Detection Algorithm Suitable for Small Object

    Xi ZHANG  Yanan ZHANG  Tao GAO  Yong FANG  Ting CHEN  

     
    PAPER-Core Methods

      Pubricized:
    2022/01/06
      Vol:
    E106-D No:5
      Page(s):
    625-634

    The original single-shot multibox detector (SSD) algorithm has good detection accuracy and speed for regular object recognition. However, the SSD is not suitable for detecting small objects for two reasons: 1) the relationships among different feature layers with various scales are not considered, 2) the predicted results are solely determined by several independent feature layers. To enhance its detection capability for small objects, this study proposes an improved SSD-based algorithm called proportional channels' fusion SSD (PCF-SSD). Three enhancements are provided by this novel PCF-SSD algorithm. First, a fusion feature pyramid model is proposed by concatenating channels of certain key feature layers in a given proportion for object detection. Second, the default box sizes are adjusted properly for small object detection. Third, an improved loss function is suggested to train the above-proposed fusion model, which can further improve object detection performance. A series of experiments are conducted on the public database Pascal VOC to validate the PCF-SSD. On comparing with the original SSD algorithm, our algorithm improves the mean average precision and detection accuracy for small objects by 3.3% and 3.9%, respectively, with a detection speed of 40FPS. Furthermore, the proposed PCF-SSD can achieve a better balance of detection accuracy and efficiency than the original SSD algorithm, as demonstrated by a series of experimental results.

  • An Improved Insulator and Spacer Detection Algorithm Based on Dual Network and SSD

    Yong LI  Shidi WEI  Xuan LIU  Yinzheng LUO  Yafeng LI  Feng SHUANG  

     
    PAPER-Smart Industry

      Pubricized:
    2022/10/17
      Vol:
    E106-D No:5
      Page(s):
    662-672

    The traditional manual inspection is gradually replaced by the unmanned aerial vehicles (UAV) automatic inspection. However, due to the limited computational resources carried by the UAV, the existing deep learning-based algorithm needs a large amount of computational resources, which makes it impossible to realize the online detection. Moreover, there is no effective online detection system at present. To realize the high-precision online detection of electrical equipment, this paper proposes an SSD (Single Shot Multibox Detector) detection algorithm based on the improved Dual network for the images of insulators and spacers taken by UAVs. The proposed algorithm uses MnasNet and MobileNetv3 to form the Dual network to extract multi-level features, which overcomes the shortcoming of single convolutional network-based backbone for feature extraction. Then the features extracted from the two networks are fused together to obtain the features with high-level semantic information. Finally, the proposed algorithm is tested on the public dataset of the insulator and spacer. The experimental results show that the proposed algorithm can detect insulators and spacers efficiently. Compared with other methods, the proposed algorithm has the advantages of smaller model size and higher accuracy. The object detection accuracy of the proposed method is up to 95.1%.

  • MolHF: Molecular Heterogeneous Attributes Fusion for Drug-Target Affinity Prediction on Heterogeneity

    Runze WANG  Zehua ZHANG  Yueqin ZHANG  Zhongyuan JIANG  Shilin SUN  Guixiang MA  

     
    PAPER-Smart Healthcare

      Pubricized:
    2022/05/31
      Vol:
    E106-D No:5
      Page(s):
    697-706

    Recent studies in protein structure prediction such as AlphaFold have enabled deep learning to achieve great attention on the Drug-Target Affinity (DTA) task. Most works are dedicated to embed single molecular property and homogeneous information, ignoring the diverse heterogeneous information gains that are contained in the molecules and interactions. Motivated by this, we propose an end-to-end deep learning framework to perform Molecular Heterogeneous features Fusion (MolHF) for DTA prediction on heterogeneity. To address the challenges that biochemical attributes locates in different heterogeneous spaces, we design a Molecular Heterogeneous Information Learning module with multi-strategy learning. Especially, Molecular Heterogeneous Attention Fusion module is present to obtain the gains of molecular heterogeneous features. With these, the diversity of molecular structure information for drugs can be extracted. Extensive experiments on two benchmark datasets show that our method outperforms the baselines in all four metrics. Ablation studies validate the effect of attentive fusion and multi-group of drug heterogeneous features. Visual presentations demonstrate the impact of protein embedding level and the model ability of fitting data. In summary, the diverse gains brought by heterogeneous information contribute to drug-target affinity prediction.

  • Detection Method of Fat Content in Pig B-Ultrasound Based on Deep Learning

    Wenxin DONG  Jianxun ZHANG  Shuqiu TAN  Xinyue ZHANG  

     
    PAPER-Smart Agriculture

      Pubricized:
    2022/02/07
      Vol:
    E106-D No:5
      Page(s):
    726-734

    In the pork fat content detection task, traditional physical or chemical methods are strongly destructive, have substantial technical requirements and cannot achieve nondestructive detection without slaughtering. To solve these problems, we propose a novel, convenient and economical method for detecting the fat content of pig B-ultrasound images based on hybrid attention and multiscale fusion learning, which extracts and fuses shallow detail information and deep semantic information at multiple scales. First, a deep learning network is constructed to learn the salient features of fat images through a hybrid attention mechanism. Then, the information describing pork fat is extracted at multiple scales, and the detailed information expressed in the shallow layer and the semantic information expressed in the deep layer are fused later. Finally, a deep convolution network is used to predict the fat content compared with the real label. The experimental results show that the determination coefficient is greater than 0.95 on the 130 groups of pork B-ultrasound image data sets, which is 2.90, 6.10 and 5.13 percentage points higher than that of VGGNet, ResNet and DenseNet, respectively. It indicats that the model could effectively identify the B-ultrasound image of pigs and predict the fat content with high accuracy.

  • Compression of Vehicle and Pedestrian Detection Network Based on YOLOv3 Model

    Lie GUO  Yibing ZHAO  Jiandong GAO  

     
    PAPER-Intelligent Transportation Systems

      Pubricized:
    2022/06/22
      Vol:
    E106-D No:5
      Page(s):
    735-745

    The commonly used object detection algorithm based on convolutional neural network is difficult to meet the real-time requirement on embedded platform due to its large size of model, large amount of calculation, and long inference time. It is necessary to use model compression to reduce the amount of network calculation and increase the speed of network inference. This paper conducts compression of vehicle and pedestrian detection network by pruning and removing redundant parameters. The vehicle and pedestrian detection network is trained based on YOLOv3 model by using K-means++ to cluster the anchor boxes. The detection accuracy is improved by changing the proportion of categorical losses and regression losses for each category in the loss function because of the unbalanced number of targets in the dataset. A layer and channel pruning algorithm is proposed by combining global channel pruning thresholds and L1 norm, which can reduce the time cost of the network layer transfer process and the amount of computation. Network layer fusion based on TensorRT is performed and inference is performed using half-precision floating-point to improve the speed of inference. Results show that the vehicle and pedestrian detection compression network pruned 84% channels and 15 Shortcut modules can reduce the size by 32% and the amount of calculation by 17%. While the network inference time can be decreased to 21 ms, which is 1.48 times faster than the network pruned 84% channels.

201-220hit(8214hit)