The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

1021-1040hit(8214hit)

  • Parallel Feature Network For Saliency Detection

    Zheng FANG  Tieyong CAO  Jibin YANG  Meng SUN  

     
    LETTER-Image

      Vol:
    E102-A No:2
      Page(s):
    480-485

    Saliency detection is widely used in many vision tasks like image retrieval, compression and person re-identification. The deep-learning methods have got great results but most of them focused more on the performance ignored the efficiency of models, which were hard to transplant into other applications. So how to design a efficient model has became the main problem. In this letter, we propose parallel feature network, a saliency model which is built on convolution neural network (CNN) by a parallel method. Parallel dilation blocks are first used to extract features from different layers of CNN, then a parallel upsampling structure is adopted to upsample feature maps. Finally saliency maps are obtained by fusing summations and concatenations of feature maps. Our final model built on VGG-16 is much smaller and faster than existing saliency models and also achieves state-of-the-art performance.

  • Influence of Polarity of Polarization Charge Induced by Spontaneous Orientation of Polar Molecules on Electron Injection in Organic Semiconductor Devices

    Yuya TANAKA  Takahiro MAKINO  Hisao ISHII  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    172-175

    On surfaces of tris-(8-hydroxyquinolate) aluminum (Alq) and tris(7-propyl-8-hydroxyquinolinato) aluminum (Al7p) thin-films, positive and negative polarization charges appear, respectively, owing to spontaneous orientation of these polar molecules. Alq is a typical electron transport material where electrons are injected from cathode. Because the polarization charge exists at the Alq/cathode interface, it is likely that it affects the electron injection process because of Coulomb interaction. In order to evaluate an impact of polarization charge on electron injection from cathode, electron only devices (EODs) composed of Alq or Al7p were prepared and evaluated by displacement current measurement. We found that Alq-EOD has lower resistance than Al7p-EOD, indicating that the positive polarization charge at Alq/cathode interface enhances the electron injection due to Coulomb attraction, while the electron injection is suppressed by the negative polarization charge at the Al7p/Al interface. These results clearly suggest that it is necessary to design organic semiconductor devices by taking polarization charge into account.

  • BER Analysis of WFRFT-Based Systems with Order Offset

    Yuan LIANG  Xinyu DA  Ruiyang XU  Lei NI  Dong ZHAI  Yu PAN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/07/25
      Vol:
    E102-B No:2
      Page(s):
    277-284

    We propose a novel bit error rate (BER) analysis model of weighted-type fractional Fourier transform (WFRFT)-based systems with WFRFT order offset Δα. By using the traditional BPSK BER analysis method, we deduce the equivalent signal noise ratio (SNR), model the interference in the channel as a Gaussian noise with non-zero mean, and provide a theoretical BER expression of the proposed system. Simulation results show that its theoretical BER performance well matches the empirical performance, which demonstrates that the theoretical BER analysis proposed in this paper is reliable.

  • Proactive Failure Detection Learning Generation Patterns of Large-Scale Network Logs

    Tatsuaki KIMURA  Akio WATANABE  Tsuyoshi TOYONO  Keisuke ISHIBASHI  

     
    PAPER-Network Management/Operation

      Pubricized:
    2018/08/13
      Vol:
    E102-B No:2
      Page(s):
    306-316

    Recent carrier-grade networks use many network elements (switches, routers) and servers for various network-based services (e.g., video on demand, online gaming) that demand higher quality and better reliability. Network log data generated from these elements, such as router syslogs, are rich sources for quickly detecting the signs of critical failures to maintain service quality. However, log data contain a large number of text messages written in an unstructured format and contain various types of network events (e.g., operator's login, link down); thus, genuinely important log messages for network operation are difficult to find automatically. We propose a proactive failure-detection system for large-scale networks. It automatically finds abnormal patterns of log messages from a massive amount of data without requiring previous knowledge of data formats used and can detect critical failures before they occur. To handle unstructured log messages, the system has an online log-template-extraction part for automatically extracting the format of a log message. After template extraction, the system associates critical failures with the log data that appeared before them on the basis of supervised machine learning. By associating each log message with a log template, we can characterize the generation patterns of log messages, such as burstiness, not just the keywords in log messages (e.g. ERROR, FAIL). We used real log data collected from a large production network to validate our system and evaluated the system in detecting signs of actual failures of network equipment through a case study.

  • A Study on Optimal Beam Patterns for Single User Massive MIMO Transmissions Open Access

    Maki ARAI  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/07/30
      Vol:
    E102-B No:2
      Page(s):
    324-336

    This paper proposes optimal beam patterns of analog beamforming for SU (Single User) massive MIMO (Multi-Input Multi-Output) transmission systems. For hybrid beamforming in SU massive MIMO systems, there are several design parameters such as beam patterns, the number of beams (streams), the shape of array antennas, and so on. In conventional hybrid beamforming, rectangular patch array antennas implemented on a planar surface with linear phase shift beam patterns have been used widely. However, it remains unclear whether existing configurations are optimal or not. Therefore, we propose a method using OBPB (Optimal Beam Projection Beamforming) for designing configuration parameters of the hybrid beamforming. By using the method, the optimal beam patterns are derived first, and are projected on the assumed surface to calculate the achievable number of streams and the resulting channel capacity. The results indicate OBPB with a spherical surface yields at least 3.5 times higher channel capacity than conventional configurations.

  • Correlation Distributions between an m-Sequence and Its Niho Decimation Sequences of Short Period

    Yongbo XIA  Shiyuan HE  Shaoping CHEN  

     
    PAPER-Information Theory

      Vol:
    E102-A No:2
      Page(s):
    450-457

    Let d=2pm-1 be the Niho decimation over $mathbb{F}_{p^{2m}}$ satisfying $gcd(d,p^{2m}-1)=3$, where m is an odd positive integer and p is a prime with p ≡ 2(mod 3). The cross-correlation function between the p-ary m-sequence of period p2m-1 and its every d-decimation sequence with short period $ rac{p^{2m}-1}{3}$ is investigated. It is proved that for each d-decimation sequence, the cross-correlation function takes four values and the corresponding correlation distribution is completely determined. This extends the results of Niho and Helleseth for the case gcd(d, p2m-1)=1.

  • Probing Internal Electric Field in Organic Photoconductors by Using Electric-Field-Induced Optical Second-Harmonic Generation

    Dai TAGUCHI  Takaaki MANAKA  Mitsumasa IWAMOTO  Kazuko SAKUMA  Kaname WATARIGUCHI  Masataka KAWAHARA  

     
    PAPER

      Vol:
    E102-C No:2
      Page(s):
    113-118

    Organic photoconductors (OPC) have been an important research and development topics for high quality electrophotography. By using electric field induced optical second harmonic generation (EFISHG) measurement, we can probe carrier processes in electrophotographic processes such as photo carrier generation, carrier separation, and carrier transportation for copier image production. We here selectively probe charge generation and accumulation in charge generation layer and charge transport layer in multilayer structure OPCs. We studied charge accumulation in OPC under illumination (wavelength 635nm) of double-layer-type OPC with structure of hole transport layer coated on charge generation layer. The result showed that light absorption efficiently produces free holes and electrons in the charge generation layer, followed by excessive hole accumulation at the CG/CT interface due to photo-conducting effect of CG layer. The short-wavelength irradiation at 405nm induced photovoltaic effect. These results demonstrated that the EFISHG measurement is useful to selectively probe carrier process in one layer of the multilayer OPC and to the discussion of carrier process for electrophotographic image productions.

  • Peptide Addition Effect of the Active Layer Precursor Solution Containing Poor Solvent on Photoelectrochemical Characteristics of the Thin Film Organic Photovoltaic Cells

    Hirokazu YAMANE  Shinji SHINDO  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    192-195

    The thin film organic photovoltaic cells (OPVs) using organic semiconductors are inferior to oxgen-resistance and water-resistance, and the OPVs have a drawback that the photoelectric conversion efficiency (η) is low. For high efficiency of the OPVs, control of bulk heterojunction (BHJ) structure in the active layer is demanded. Therefore, it is thought that we can control the BHJ structure easily if we can bring a change in the aggregated structure and the crystallinity of the BHJ structure by introducing the third component that is different from the organic semiconductor into the activity layer. In this study, we introduced peptide consisting of phenylalanine of 2 molecules into the active layer prepared by poor solvent addition effect for the organic thin film solar cells and intended to try high efficiency of the organic thin film solar cells and examined the electrochemistry characteristic of the cells.

  • Adaptive Wireless Power Transfer System without Feedback Information Using Single Matching Network

    Jae-Ho LEE  Dong-Wook SEO  

     
    PAPER-Wireless Power Transfer

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    257-265

    It is well known that the power transfer efficiency (PTE) of a wireless power transfer (WPT) system is maximized at a specific coupling coefficient under the fixed system parameters. For an adaptive WPT system, various attempts have been made to achieve the maximum PTE by changing the system parameters. Applying the input matching networks to the WPT system is one of the most popular implementation methods to change the source impedance and improve the PTE. In this paper, we derive the optimum source condition for the given load and the achievable maximum PTE under the optimum source condition in a closed-form. Furthermore, we propose a method to estimate the input impedance, without feedback information, and an input matching network structure that transforms the source impedance into the optimum source obtained from the estimated input impedance. The proposed technique is successfully implemented at a resonant frequency of 13.56MHz. The experimental results are in close agreement with the theoretical achievable maximum PTE and show that the use of only a single matching network can sufficiently achieve a PTE close to the ideal maximum PTE.

  • Efficient Algorithms to Augment the Edge-Connectivity of Specified Vertices by One in a Graph

    Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E102-A No:2
      Page(s):
    379-388

    The k-edge-connectivity augmentation problem for a specified set of vertices (kECA-SV for short) is defined by “Given a graph G=(V, E) and a subset Γ ⊆ V, find a minimum set E' of edges such that G'=(V, E ∪ E') has at least k edge-disjoint paths between any pair of vertices in Γ.” Let σ be the edge-connectivity of Γ (that is, G has at least σ edge-disjoint paths between any pair of vertices in Γ). We propose an algorithm for (σ+1)ECA-SV which is done in O(|Γ|) maximum flow operations. Then the time complexity is O(σ2|Γ||V|+|E|) if a given graph is sparse, or O(|Γ||V||BG|log(|V|2/|BG|)+|E|) if dense, where |BG| is the number of pairs of adjacent vertices in G. Also mentioned is an O(|V||E|+|V|2 log |V|) time algorithm for a special case where σ is equal to the edge-connectivity of G and an O(|V|+|E|) time one for σ ≤ 2.

  • Application of Gold Powder Made from Gold Leaf for Conductive Inks

    Sayaka YAMASHITA  Heisuke SAKAI  Hideyuki MURATA  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    176-179

    In this work, gold powder made from gold leaf investigated to have the potential as a filler of conductive ink. The resistance of a conductive film decreased from 6.2kΩ to 1 Ω by adding only 2.0wt% of gold powder to conductive polymer (PEDOT:PSS) ink. The change of the resistance depends on the characteristics of gold powder. Gold powder with smaller and uniform sizes and good dispersibility is beneficial to form a continuous percolation network.

  • Predictive Pinning Control with Communication Delays for Consensus of Multi-Agent Systems

    Koichi KOBAYASHI  

     
    PAPER

      Vol:
    E102-A No:2
      Page(s):
    359-364

    In this paper, based on the policy of model predictive control, a new method of predictive pinning control is proposed for the consensus problem of multi-agent systems. Pinning control is a method that the external control input is added to some agents (pinning nodes), e.g., leaders. By the external control input, consensus to a certain target value (not the average of the initial states) and faster consensus are achieved. In the proposed method, the external control input is calculated by the controller node connected to only pinning nodes. Since the states of all agents are required in calculation of the external control input, communication delays must be considered. The proposed algorithm includes not only calculation of the external control input but also delay compensation. The effectiveness of the proposed method is presented by a numerical example.

  • A Statistical Reputation Approach for Reliable Packet Routing in Ad-Hoc Sensor Networks

    Fang WANG  Zhe WEI  

     
    LETTER-Information Network

      Pubricized:
    2018/11/06
      Vol:
    E102-D No:2
      Page(s):
    396-401

    In this study, we propose a statistical reputation approach for constructing a reliable packet route in ad-hoc sensor networks. The proposed method uses reputation as a measurement for router node selection through which a reliable data route is constructed for packet delivery. To refine the reputation, a transaction density is defined here to showcase the influence of node transaction frequency over the reputation. And to balance the energy consumption and avoid choosing repetitively the same node with high reputation, node remaining energy is also considered as a reputation factor in the selection process. Further, a shortest-path-tree routing protocol is designed so that data packets can reach the base station through the minimum intermediate nodes. Simulation tests illustrate the improvements in the packet delivery ratio and the energy utilization.

  • Foreground Enlargement of Spherical Images Using a Spring Model

    An-shui YU  Kenji HARA  Kohei INOUE  Kiichi URAHAMA  

     
    LETTER-Image

      Vol:
    E102-A No:2
      Page(s):
    486-489

    In this paper, we propose a method for enhancing the visibility of omnidirectional spherical images by enlarging the foreground and compressing the background without provoking a sense of visual incompatibility by using a simplified spring model.

  • Design of Criterion for Adaptively Scaled Belief in Iterative Large MIMO Detection Open Access

    Takumi TAKAHASHI  Shinsuke IBI  Seiichi SAMPEI  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/07/30
      Vol:
    E102-B No:2
      Page(s):
    285-297

    This paper proposes a new design criterion of adaptively scaled belief (ASB) in Gaussian belief propagation (GaBP) for large multi-user multi-input multi-output (MU-MIMO) detection. In practical MU detection (MUD) scenarios, the most vital issue for improving the convergence property of GaBP iterative detection is how to deal with belief outliers in each iteration. Such outliers are caused by modeling errors due to the fact that the law of large number does not work well when it is difficult to satisfy the large system limit. One of the simplest ways to mitigate the harmful impact of outliers is belief scaling. A typical approach for determining the scaling parameter for the belief is to create a look-up table (LUT) based on the received signal-to-noise ratio (SNR) through computer simulations. However, the instantaneous SNR differs among beliefs because the MIMO channels in the MUD problem are random; hence, the creation of LUT is infeasible. To stabilize the dynamics of the random MIMO channels, we propose a new transmission block based criterion that adapts belief scaling to the instantaneous channel state. Finally, we verify the validity of ASB in terms of the suppression of the bit error rate (BER) floor.

  • Automated Detection of Children at Risk of Chinese Handwriting Difficulties Using Handwriting Process Information: An Exploratory Study

    Zhiming WU  Tao LIN  Ming LI  

     
    PAPER-Educational Technology

      Pubricized:
    2018/10/22
      Vol:
    E102-D No:1
      Page(s):
    147-155

    Handwriting difficulties (HWDs) in children have adverse effects on their confidence and academic progress. Detecting HWDs is the first crucial step toward clinical or teaching intervention for children with HWDs. To date, how to automatically detect HWDs is still a challenge, although digitizing tablets have provided an opportunity to automatically collect handwriting process information. Especially, to our best knowledge, there is no exploration into the potential of combining machine learning algorithms and the handwriting process information to automatically detect Chinese HWDs in children. To bridge the gap, we first conducted an experiment to collect sample data and then compared the performance of five commonly used classification algorithms (Decision tree, Support Vector Machine (SVM), Artificial Neural Network, Naïve Bayesian and k-Nearest Neighbor) in detecting HWDs. The results showed that: (1) only a small proportion (13%) of children had Chinese HWDs and each classification model on the imbalanced dataset (39 children at risk of HWDs versus 261 typical children) produced the results that were better than random guesses, indicating the possibility of using classification algorithms to detect Chinese HWDs; (2) the SVM model had the best performance in detecting Chinese HWDs among the five classification models; and (3) the performance of the SVM model, especially its sensitivity, could be significantly improved by employing the Synthetic Minority Oversampling Technique to handle the class-imbalanced data. This study gains new insights into which handwriting features are predictive of Chinese HWDs in children and proposes a method that can help the clinical and educational professionals to automatically detect children at risk of Chinese HWDs.

  • No-Dictionary Searchable Symmetric Encryption Open Access

    Wakaha OGATA  Kaoru KUROSAWA  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    114-124

    In the model of no-dictionary searchable symmetric encryption (SSE) schemes, the client does not need to keep the list of keywords W. In this paper, we first show a generic method to transform any passively secure SSE scheme to a no-dictionary SSE scheme such that the client can verify search results even if w ∉ W. In particular, it takes only O(1) time for the server to prove that w ∉ W. We next present a no-dictionary SSE scheme such that the client can hide even the search pattern from the server.

  • How to Watermark Cryptographic Functions by Bilinear Maps

    Ryo NISHIMAKI  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    99-113

    We introduce a notion of watermarking for cryptographic functions and propose a concrete scheme for watermarking cryptographic functions. Informally speaking, a digital watermarking scheme for cryptographic functions embeds information, called a mark, into functions such as one-way functions and decryption functions of public-key encryption. There are two basic requirements for watermarking schemes. A mark-embedded function must be functionally equivalent to the original function. It must be difficult for adversaries to remove the embedded mark without damaging the original functionality. In spite of its importance and usefulness, there have only been a few theoretical works on watermarking for functions (or programs). Furthermore, we do not have rigorous definitions of watermarking for cryptographic functions and concrete constructions. To solve the problem above, we introduce a notion of watermarking for cryptographic functions and define its security. Furthermore, we present a lossy trapdoor function (LTF) based on the decisional bilinear Diffie-Hellman problem problem and a watermarking scheme for the LTF. Our watermarking scheme is secure under the symmetric external Diffie-Hellman assumption in the standard model. We use techniques of dual system encryption and dual pairing vector spaces (DPVS) to construct our watermarking scheme. This is a new application of DPVS.

  • Accelerating Large-Scale Interconnection Network Simulation by Cellular Automata Concept

    Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  

     
    PAPER-Computer System

      Pubricized:
    2018/10/05
      Vol:
    E102-D No:1
      Page(s):
    52-74

    State-of-the-art parallel systems employ a huge number of computing nodes that are connected by an interconnection network. An interconnection network (ICN) plays an important role in a parallel system, since it is responsible to communication capability. In general, an ICN shows non-linear phenomena in its communication performance, most of them are caused by congestion. Thus, designing a large-scale parallel system requires sufficient discussions through repetitive simulation runs. This causes another problem in simulating large-scale systems within a reasonable cost. This paper shows a promising solution by introducing the cellular automata concept, which is originated in our prior work. Assuming 2D-torus topologies for simplification of discussion, this paper discusses fundamental design of router functions in terms of cellular automata, data structure of packets, alternative modeling of a router function, and miscellaneous optimization. The proposed models have a good affinity to GPGPU technology and, as representative speed-up results, the GPU-based simulator accelerates simulation upto about 1264 times from sequential execution on a single CPU. Furthermore, since the proposed models are applicable in the shared memory model, multithread implementation of the proposed methods achieve about 162 times speed-ups at the maximum.

  • A 65 nm 19.1-to-20.4 GHz Sigma-Delta Fractional-N Frequency Synthesizer with Two-Point Modulation for FMCW Radar Applications

    Yuanyuan XU  Wei LI  Wei WANG  Dan WU  Lai HE  Jintao HU  

     
    PAPER-Electronic Circuits

      Vol:
    E102-C No:1
      Page(s):
    64-76

    A 19.1-to-20.4 GHz sigma-delta fractional-N frequency synthesizer with two-point modulation (TPM) for frequency modulated continuous wave (FMCW) radar applications is presented. The FMCW synthesizer proposes a digital and voltage controlled oscillator (D/VCO) with large continuous frequency tuning range and small digital controlled oscillator (DCO) gain variation to support TPM. By using TPM technique, it avoids the correlation between loop bandwidth and chirp slope, which is beneficial to fast chirp, phase noise and linearity. The start frequency, bandwidth and slope of the FMCW signal are all reconfigurable independently. The FMCW synthesizer achieves a measured phase noise of -93.32 dBc/Hz at 1MHz offset from a 19.25 GHz carrier and less than 10 µs locking time. The root-mean-square (RMS) frequency error is only 112 kHz with 94 kHz/µs chirp slope, and 761 kHz with a fast slope of 9.725 MHz/µs respectively. Implemented in 65 nm CMOS process, the synthesizer consumes 74.3 mW with output buffer.

1021-1040hit(8214hit)