The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

2281-2300hit(8214hit)

  • Sliding Window-Based Transmit Antenna Selection Technique for Large-Scale MU-MIMO Networks

    Tae-Won BAN  Bang Chul JUNG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:7
      Page(s):
    1640-1641

    In this letter, a novel antenna selection (AS) technique is proposed for the downlink of large-scale multi-user multiple input multiple output (MU-MIMO) networks, where a base station (BS) is equipped with large-scale antennas (N) and communicates simultaneously with K(K ≪ N) mobile stations (MSs). In the proposed scheme, the S antennas (S ≤ N) are selected by utilizing the concept of a sliding window. It is shown that the sum-rate of our proposed scheme is comparable to that of the conventional scheme, while the proposed scheme can significantly reduce the complexity of the BS.

  • Reliable Decentralized Diagnosis of Discrete Event Systems Using the Conjunctive Architecture

    Takashi YAMAMOTO  Shigemasa TAKAI  

     
    PAPER-Concurrent Systems

      Vol:
    E97-A No:7
      Page(s):
    1605-1614

    In this paper, we study conjunctive decentralized diagnosis of discrete event systems (DESs). In most existing works on decentralized diagnosis of DESs, it is implicitly assumed that diagnosis decisions of all local diagnosers are available to detect a failure. However, it may be possible that some local diagnosis decisions are not available, due to some reasons. Letting n be the number of local diagnosers, the notion of (n,k)-conjunctive codiagnosability guarantees that the occurrence of any failure is detected in the conjunctive architecture as long as at least k of the n local diagnosis decisions are available. We propose an algorithm for verifying (n,k)-conjunctive codiagnosability. To construct a reliable conjunctive decentralized diagnoser, we need to compute the delay bound within which the occurrence of any failure can be detected as long as at least k of the n local diagnosis decisions are available. We show how to compute the delay bound.

  • Bounded Strong Satisfiability Checking of Reactive System Specifications

    Masaya SHIMAKAWA  Shigeki HAGIHARA  Naoki YONEZAKI  

     
    PAPER-Software System

      Vol:
    E97-D No:7
      Page(s):
    1746-1755

    Many fatal accidents involving safety-critical reactive systems have occurred in unexpected situations that were not considered during the design and test phases of development. To prevent such accidents, reactive systems should be designed to respond appropriately to any request from an environment at any time. Verifying this property during the specification phase reduces development reworking. This property of a specification is commonly known as realizability. Realizability checking for reactive system specifications involves complex and intricate analysis. The complexity of realizability problems is 2EXPTIME-complete. To detect typical simple deficiencies in specifications efficiently, we introduce the notion of bounded strong satisfiability (a necessary condition for realizability), and present a method for checking this property. Bounded strong satisfiability is the property that, for all input patterns represented by loop structures of a given size k, there is a response that satisfies a given specification. We report a checking method based on a satisfiability solver, and show that the complexity of the bounded strong satisfiability problem is co-NEXPTIME-complete. Moreover, we report experimental results showing that our method is more efficient than existing approaches.

  • Three Benefits Brought by Perturbation Back-Propagation Algorithm in 224Gb/s DP-16QAM Transmission

    Shoichiro ODA  Takahito TANIMURA  Takeshi HOSHIDA  Yuichi AKIYAMA  Hisao NAKASHIMA  Kyosuke SONE  Zhenning TAO  Jens C. RASMUSSEN  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1342-1349

    Nonlinearity compensation algorithm and soft-decision forward error correction (FEC) are considered as key technologies for future high-capacity and long-haul optical transmission system. In this report, we experimentally demonstrate the following three benefits brought by low complexity perturbation back-propagation nonlinear compensation algorithm in 224Gb/s DP-16QAM transmission over large-Aeff pure silica core fiber; (1) improvement of pre-FEC bit error ratio, (2) reshaping noise distribution to more Gaussian, and (3) reduction of cycle slip probability.

  • Fundamental LOD-BOR-FDTD Method for the Analysis of Plasmonic Devices

    Jun SHIBAYAMA  Takuto OIKAWA  Tomoyuki HIRANO  Junji YAMAUCHI  Hisamatsu NAKANO  

     
    BRIEF PAPER

      Vol:
    E97-C No:7
      Page(s):
    707-709

    The body-of-revolution finite-difference time-domain method (BOR-FDTD) based on the locally one-dimensional (LOD) scheme is extended to a frequency-dependent version for the analysis of the Drude and Drude-Lorentz models. The formulation is simplified with a fundamental scheme, in which the number of arithmetic operations is reduced by 40% in the right-hand sides of the resultant equations. Efficiency improvement of the LOD-BOR-FDTD is discussed through the analysis of a plasmonic rod waveguide and a plasmonic grating.

  • A Novel User Selection Method That Maximizes the Determinant of Channel Auto-Correlation for Multi-User MIMO Systems with Zero-Forcing Precoder

    Hyunwook YANG  Yeongyu HAN  Seungwon CHOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1429-1434

    In a multi-user multiple-input multiple-output (MU-MIMO) system that adopts zero-forcing (ZF) as a precoder, the best selection is the combination of users who provide the smallest trace of the inverse of the channel auto-correlation matrix. Noting that the trace of the matrix is closely related to the determinant, we search for users that yield the largest determinant of their channel auto-correlation matrix. The proposed technique utilizes the determinant row-exchange criterion (DREC) for computing the determinant-changing ratio, which is generated whenever a user is replaced by one of a group of pre-selected users. Based on the ratio computed by the DREC, the combination of users providing the largest changing ratio is selected. In order to identify the optimal combination, the DREC procedure is repeated until user replacement provides no increase in the determinant. Through computer simulations of four transmit antennas, we show that the bit error rate (BER) per signal-to-noise ratio (SNR) as well as the sum-rate performance provided by the proposed method is comparable to that of the full search method. Furthermore, using the proposed method, a partial replacement of users can be performed easily with a new user who provides the largest determinant.

  • Player Tracking in Far-View Soccer Videos Based on Composite Energy Function

    Kazuya IWAI  Sho TAKAHASHI  Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E97-D No:7
      Page(s):
    1885-1892

    In this paper, an accurate player tracking method in far-view soccer videos based on a composite energy function is presented. In far-view soccer videos, player tracking methods that perform processing based only on visual features cannot accurately track players since each player region becomes small, and video coding causes color bleeding between player regions and the soccer field. In order to solve this problem, the proposed method performs player tracking on the basis of the following three elements. First, we utilize visual features based on uniform colors and player shapes. Second, since soccer players play in such a way as to maintain a formation, which is a positional pattern of players, we use this characteristic for player tracking. Third, since the movement direction of each player tends to change smoothly in successive frames of soccer videos, we also focus on this characteristic. Then we adopt three energies: a potential energy based on visual features, an elastic energy based on formations and a movement direction-based energy. Finally, we define a composite energy function that consists of the above three energies and track players by minimizing this energy function. Consequently, the proposed method achieves accurate player tracking in far-view soccer videos.

  • Data Mining Intrusion Detection in Vehicular Ad Hoc Network

    Xiaoyun LIU  Gongjun YAN  Danda B. RAWAT  Shugang DENG  

     
    PAPER

      Vol:
    E97-D No:7
      Page(s):
    1719-1726

    The past decade has witnessed a growing interest in vehicular networking. Initially motivated by traffic safety, vehicles equipped with computing, communication and sensing capabilities will be organized into ubiquitous and pervasive networks with a significant Internet presence while on the move. Large amount of data can be generated, collected, and processed on the vehicular networks. Big data on vehicular networks include useful and sensitive information which could be exploited by malicious intruders. But intrusion detection in vehicular networks is challenging because of its unique features of vehicular networks: short range wireless communication, large amount of nodes, and high mobility of nodes. Traditional methods are hard to detect intrusion in such sophisticated environment, especially when the attack pattern is unknown, therefore, it can result unacceptable false negative error rates. As a novel attempt, the main goal of this research is to apply data mining methodology to recognize known attacks and uncover unknown attacks in vehicular networks. We are the first to attempt to adapt data mining method for intrusion detection in vehicular networks. The main contributions include: 1) specially design a decentralized vehicle networks that provide scalable communication and data availability about network status; 2) applying two data mining models to show feasibility of automated intrusion detection system in vehicular networks; 3) find the detection patterns of unknown intrusions.

  • A Novel Technique for Duplicate Detection and Classification of Bug Reports

    Tao ZHANG  Byungjeong LEE  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:7
      Page(s):
    1756-1768

    Software products are increasingly complex, so it is becoming more difficult to find and correct bugs in large programs. Software developers rely on bug reports to fix bugs; thus, bug-tracking tools have been introduced to allow developers to upload, manage, and comment on bug reports to guide corrective software maintenance. However, the very high frequency of duplicate bug reports means that the triagers who help software developers in eliminating bugs must allocate large amounts of time and effort to the identification and analysis of these bug reports. In addition, classifying bug reports can help triagers arrange bugs in categories for the fixers who have more experience for resolving historical bugs in the same category. Unfortunately, due to a large number of submitted bug reports every day, the manual classification for these bug reports increases the triagers' workload. To resolve these problems, in this study, we develop a novel technique for automatic duplicate detection and classification of bug reports, which reduces the time and effort consumed by triagers for bug fixing. Our novel technique uses a support vector machine to check whether a new bug report is a duplicate. The concept profile is also used to classify the bug reports into related categories in a taxonomic tree. Finally, we conduct experiments that demonstrate the feasibility of our proposed approach using bug reports extracted from the large-scale open source project Mozilla.

  • Improved Attacks on Multi-Prime RSA with Small Prime Difference

    Hui ZHANG  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:7
      Page(s):
    1533-1541

    We consider some attacks on multi-prime RSA (MPRSA) with a modulus N = p1p2 . . . pr (r ≥ 3). It is believed that the small private exponent attack on the MPRSA is less effective than that on RSA (see Hinek et al.'s work at SAC 2003), which means smaller private exponents can be used in the MPRSA to speed up the decryption process. Our work shows that even if a private exponent is significantly beyond Hinek et al.'s bound, it still may be insecure if the prime difference Δ (Δ = pr - p1 = Nγ, supposing p1 < p2 < … < pr) is small, i.e. 0 < γ < 1/r. Specifically, by taking full advantage of prime properties, our small private exponent attack reveals that the MPRSA is insecure when $delta<1-sqrt{1+2gamma-3/r}$ (if $gammage rac{3}{2r}- rac{1+delta}{4}$) or $deltale rac{3}{r}- rac{1}{4}-2gamma$ (if $gamma < rac{3}{2r}- rac{1+delta}{4}$), where δ is the exponential of the private exponent d with base N, i.e., d = Nδ. In addition, we present a Fermat-like factoring attack which factors N efficiently when Δ < N1/r2. These proposed attacks surpass previous works (e.g. Bahig et al.'s at ICICS 2012), and are proved effective in practice.

  • Scene Text Character Recognition Using Spatiality Embedded Dictionary

    Song GAO  Chunheng WANG  Baihua XIAO  Cunzhao SHI  Wen ZHOU  Zhong ZHANG  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E97-D No:7
      Page(s):
    1942-1946

    This paper tries to model spatial layout beyond the traditional spatial pyramid (SP) in the coding/pooling scheme for scene text character recognition. Specifically, we propose a novel method to build a dictionary called spatiality embedded dictionary (SED) in which each codeword represents a particular character stroke and is associated with a local response region. The promising results outperform other state-of-the-art algorithms.

  • Analysis on Effectiveness of Fractional Frequency Reuse for Uplink Using SC-FDMA in Cellular Systems

    Masashi FUSHIKI  Takeo OHSEKI  Satoshi KONISHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1457-1466

    Single Carrier — Frequency Domain Multiple Access (SC-FDMA) is a multiple access technique employed in LTE uplink transmission. SC-FDMA can improve system throughput by frequency selective scheduling (FSS). In cellular systems using SC-FDMA in the uplink, interference arising from user equipments (UEs) in neighboring cells degrades the system throughput, especially the throughput of cell-edge UEs. In order to overcome this drawback, many papers have considered fractional frequency reuse (FFR) techniques and analyzed their effectiveness. However, these studies have come to different conclusions regarding the effectiveness of FFR because the throughput gain of FFR depends on the frequency reuse design and evaluation conditions. Previous papers have focused on the frequency reuse design. Few papers have examined the conditions where FFR is effective, and only the UE traffic conditions have been evaluated. This paper reveals other conditions where FFR is effective by demonstrating the throughput gain of FFR. In order to analyze the throughput gain of FFR, we focus on the throughput relationship between FFR and FSS. System level simulation results demonstrate that FFR is effective when the following conditions are met: (i) the number of UEs is small and (ii) the multipath delay spread is large or close to 0.

  • Plug-and-Play Optical Interconnection Using Digital Coherent Technology for Resilient Network Based on Movable and Deployable ICT Resource Unit

    Tetsuro KOMUKAI  Hirokazu KUBOTA  Toshikazu SAKANO  Toshihiko HIROOKA  Masataka NAKAZAWA  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1334-1341

    Triggered by the Great East Japan Earthquake in March 2011, the authors have been studying a resilient network whose key element is a movable and deployable ICT resource unit. The resilient network needs a function of robust and immediate connection to a wide area network active outside the damaged area. This paper proposes an application of digital coherent technology for establishing optical interconnection between the movable ICT resource unit and existing network nodes through a photonic network, rapidly, easily and with the minimum in manual work. We develop a prototype of a 100Gbit/s digital coherent transponder which is installable to our movable and deployable ICT resource unit and experimentally confirm the robust and immediate connection by virtue of the plug and play function.

  • Analysis of Electromagnetic Scattering from a Conducting Spherical Shell by the 3D Point Matching Method with Mode Expansion

    Shinichiro OHNUKI  Kenichiro KOBAYASHI  Seiya KISHIMOTO  Tsuneki YAMASAKI  

     
    BRIEF PAPER

      Vol:
    E97-C No:7
      Page(s):
    714-717

    Electromagnetic scattering problems of canonical 2D structures can be analyzed with a high degree of accuracy by using the point matching method with mode expansion. In this paper, we will extend our previous method to 3D electromagnetic scattering problems and investigate the radar cross section of spherical shells and the computational accuracy.

  • Connection Choice Codes

    Chih-Ming CHEN  Ying-ping CHEN  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:7
      Page(s):
    1350-1357

    Luby Transform (LT) codes are the first practical implementation of digital fountain codes. In LT codes, encoding symbols are independently generated so as to realize the universal property which means that performance is independent of channel parameters. The universal property makes LT codes able to provide reliable delivery simultaneously via channels of different quality while it may also limit the flexibility of LT codes. In certain application scenarios, such as real-time multimedia transmission, most receivers have tolerable channels whose erasure rates are not fixed, and channels of high erasure rate are outside the design box. In this paper, Connection Choice (CC) codes are proposed to trade the universal property for better performance. The key to CC codes is replacement of random selection with tournament selection. Tournament selection can equalize the frequency of input symbols to join encoding and change the degree distribution of input symbols. Our study indicates that CC codes with appropriate degree distributions provide better performance than the best known LT code when channels of high erasure rate can be ignored. CC codes enable system designers to customize digital fountain codes by taking into account the distribution of the erasure rate and create a new possibility for setting trade-offs between performance and erasure rate.

  • Design of A Wideband Filter With Attenuation Poles Using A Novel Parallel-Coupled Three-line Unit Based on Cross-Coupling

    Chun-Ping CHEN  Junya ODA  Tetsuo ANADA  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    689-696

    To implement a wideband bandpass filter with improved skirt-selectivity and out-band characteristics, a new parallel-coupled three-line unit with two short-circuited stubs symmetrically-loaded at the center line is proposed. Unlike most traditional ones, the passband of the proposed parallel-coupled three-line structure is based on the cross-coupling between non-adjacent lines rather than the direct-coupling between adjacent ones, whereas a pair of attenuation poles is found in the stopbands. After revealing its work mechanism, an efficient filter-design-scheme is correspondingly proposed for the presented structure. Firstly, based on a chebyshev-filter synthesis theory, a wideband passband filter consisting of a parallel-coupled two-line and two short-circuited stubs loaded at the input- and output- ports is designed. Furthermore, by putting a properly-designed 3/4-wavelength stepped-impedance resonator (SIR) in between the parallel-coupled two lines, two attenuation poles are then realized at the frequencies very close to the cutoff ones. Accordingly, the roll-off characteristics of the filter are significantly-improved to greater than 100,dB/GHz. Furthermore, two-section open-ended stubs are used to replace the short-circuited ones to realize a pair of extra attenuation poles in stopbands. To validate the proposed techniques, a wideband filter with a bandwidth of 3--5,GHz (Fractional bandwidth (FBW) $= (5,GHz-3,GHz)/4,GHz =50%)$ was designed, simulated, fabricated and measured. The measured responses of the filter agree well with the simulation and theoretical ones, which validates the effectiveness of the newly-proposed three-line unit and the corresponding design scheme.

  • Facial Expression Recognition Based on Sparse Locality Preserving Projection

    Jingjie YAN  Wenming ZHENG  Minghai XIN  Jingwei YAN  

     
    LETTER-Image

      Vol:
    E97-A No:7
      Page(s):
    1650-1653

    In this letter, a new sparse locality preserving projection (SLPP) algorithm is developed and applied to facial expression recognition. In comparison with the original locality preserving projection (LPP) algorithm, the presented SLPP algorithm is able to simultaneously find the intrinsic manifold of facial feature vectors and deal with facial feature selection. This is realized by the use of l1-norm regularization in the LPP objective function, which is directly formulated as a least squares regression pattern. We use two real facial expression databases (JAFFE and Ekman's POFA) to testify the proposed SLPP method and certain experiments show that the proposed SLPP approach respectively gains 77.60% and 82.29% on JAFFE and POFA database.

  • Irregular Triangular Quadrature Amplitude Modulations

    Sung-Joon PARK  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:7
      Page(s):
    1358-1364

    The recently suggested regular-type triangular quadrature amplitude modulation (TQAM) provides considerable power gain over square quadrature amplitude modulation (SQAM) at the expense of a slight increase in detection complexity. However, the power gain of the TQAM is limited due to the constraint that signal points should be regularly located at the vertexes of contiguous equilateral triangles. In this paper, we investigate two irregular (optimum and suboptimum) TQAMs where signal points are irregularly distributed while preserving the equilateral triangular lattice, and calculate achievable power gains of the proposed constellations. We also address optimum and suboptimum bit stream mapping methods and suggest a simple and optimum detection method for the constellations to be meaningful in practical implementation, and present analytical and simulation results. The proposed constellations can provide the asymptotic power gains of 0.825dB and 0.245dB over SQAM and regular TQAM, respectively.

  • Decomposing Approach for Error Vectors of k-Error Linear Complexity of Certain Periodic Sequences

    Ming SU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:7
      Page(s):
    1542-1555

    The k-error linear complexity of periodic sequences is an important security index of stream cipher systems. By using an interesting decomposing approach, we investigate the intrinsic structure for the set of 2n-periodic binary sequences with fixed complexity measures. For k ≤ 4, we construct the complete set of error vectors that give the k-error linear complexity. As auxiliary results we obtain the counting functions of the k-error linear complexity of 2n-periodic binary sequences for k ≤ 4, as well as the expectations of the k-error linear complexity of a random sequence for k ≤ 3. Moreover, we study the 2t-error linear complexity of the set of 2n-periodic binary sequences with some fixed linear complexity L, where t < n-1 and the Hamming weight of the binary representation of 2n-L is t. Also, we extend some results to pn-periodic sequences over Fp. Finally, we discuss some potential applications.

  • InGaAs/Si Heterojunction Tunneling Field-Effect Transistor on Silicon Substrate

    Sung YUN WOO  Young JUN YOON  Jae HWA SEO  Gwan MIN YOO  Seongjae CHO  In MAN KANG  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    677-682

    In this work, a gate-all-around (GAA) tunneling field-effect transistor (TFET) with InGaAs/Si heterojunction for high-performance and low-standby power operations is studied. Gallium (Ga) compositon ($x)$ in In$_{1-x}$Ga$_{x}$As source substantially affects the physical properties related with device performances including lattice constant, bandgap energy, effective tunneling mass, channel mobility, and others. Thus, it is worthy investigating the effect of Ga fraction on performances of the proposed heterojunction TFET. For this goal, the device design and its performance evaluation are carried out by technology computer-aided design (TCAD). Direct-current (DC) performances are investigated in terms of on-state current ($I_{ m{on}})$, off-state current ($I_{ m{off}})$, current ratio ($I_{ m{on}}$/$I_{ m{off}})$, and subthreshold swing ($S$). Furthermore, it is shown that the device with an n-type Si insertion layer between source and channel demonstrates the enhanced DC characteristics.

2281-2300hit(8214hit)