The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

1421-1440hit(8214hit)

  • Analysis of Timing and Frequency Offsets on OFDM Systems for Fractional Sampling Rate

    Byungju LIM  Young-Chai KO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/03/17
      Vol:
    E100-B No:10
      Page(s):
    1946-1951

    Timing and frequency offsets are caused by imperfect synchronization at the receiver. These errors degrade the performance of OFDM systems by introducing inter-carrier-interference (ICI) and inter-symbol-interference (ISI). In this paper, we derive signal-to-interference ratio (SIR) analytically with timing and frequency offsets for the case that the sampling rate of analog-to-digital converter (ADC) in OFDM receiver is an integer fraction of the signal bandwidth. We find the exact form of interference power as a function of the fractional sampling rate. Our derived analysis is confirmed by simulations and can be applied to see the exact performance of OFDM systems with fractional sampling rate.

  • Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features

    Toshihiro YAMAUCHI  Yohei AKAO  

     
    LETTER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2377-2381

    An operating system is an essential piece of software that manages hardware and software resources. Thus, attacks on an operating system kernel using kernel rootkits pose a particularly serious threat. Detecting an attack is difficult when the operating system kernel is infected with a kernel rootkit. For this reason, handling an attack will be delayed causing an increase in the amount of damage done to a computer system. In this paper, we propose Kernel Rootkits Guard (KRGuard), which is a new method to detect kernel rootkits that monitors branch records in the kernel space. Since many kernel rootkits make branches that differ from the usual branches in the kernel space, KRGuard can detect these differences by using the hardware features of commodity processors. Our evaluation shows that KRGuard can detect kernel rootkits that involve new branches in the system call handler processing with small overhead.

  • Efficient Soft-Output Lattice-Reduction-Aided MIMO Detector with Low Complexity

    Hyunsub KIM  Jaeseok KIM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/04/14
      Vol:
    E100-B No:10
      Page(s):
    1952-1958

    In this paper, an improved lattice reduction (LR)-aided soft-output multiple-input multiple-output (MIMO) detector is proposed. Conventional LR-aided soft-output MIMO detectors involve the empty set problem (ESP), in which an entry with a particular bit in the candidate list might not exist. To overcome the performance degradation resulting from this ESP, a post-processing algorithm that modifies the candidate list is proposed. The proposed algorithm efficiently resolves the ESP by utilizing the near-orthogonality of the lattice-reduced system model so that the bit error rate (BER) performance is enhanced. In addition, as the complexity of the candidate list generation is reduced with the aid of the post-processing algorithm, the overall complexity is also reduced. Simulation results and the complexity comparisons demonstrate that our proposed method lowers the required Eb/No by 4-5 dB at the BER of 10-5 and the complexity by 13%-55%, compared to the conventional method.

  • A Single-Dimensional Interface for Arranging Multiple Audio Sources in Three-Dimensional Space

    Kento OHTANI  Kenta NIWA  Kazuya TAKEDA  

     
    PAPER-Music Information Processing

      Pubricized:
    2017/06/26
      Vol:
    E100-D No:10
      Page(s):
    2635-2643

    A single-dimensional interface which enables users to obtain diverse localizations of audio sources is proposed. In many conventional interfaces for arranging audio sources, there are multiple arrangement parameters, some of which allow users to control positions of audio sources. However, it is difficult for users who are unfamiliar with these systems to optimize the arrangement parameters since the number of possible settings is huge. We propose a simple, single-dimensional interface for adjusting arrangement parameters, allowing users to sample several diverse audio source arrangements and easily find their preferred auditory localizations. To select subsets of arrangement parameters from all of the possible choices, auditory-localization space vectors (ASVs) are defined to represent the auditory localization of each arrangement parameter. By selecting subsets of ASVs which are approximately orthogonal, we can choose arrangement parameters which will produce diverse auditory localizations. Experimental evaluations were conducted using music composed of three audio sources. Subjective evaluations confirmed that novice users can obtain diverse localizations using the proposed interface.

  • Analysis and Design of a Full 360 degrees, Harmonic-Suppressed Hybrid Coupler Phase Shifter

    Chai Eu GUAN  Ahmed I.A. GALAL  Nagamitsu MIZOGUCHI  Akira ISHIKAWA  Shugo FUKAGAWA  Ryuji KITAYA  Haruichi KANAYA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    875-883

    The analysis and design of a full 360 degrees hybrid coupler phase shifter with integrated distributed elements low pass filters is presented. Pi-section filter is incorporated into hybrid coupler phase shifter for harmonic suppression. The physical size of the proposed structure is close to that of the conventional hybrid coupler phase shifter. The maximum phase shift range is bounded by the port impedance ratio of the hybrid coupler phase shifter. Furthermore, the phase shift range is reduced if series inductance in the reflective load deviates from the optimum value. Numerical and parametric analyses are used to find the equivalent circuit of the pi-section filter for consistent relative phase shift. To validate our analysis, the proposed phase shifter operates at 8.6GHz was fabricated and measured. Over the frequency range of interest, the fabricated phase shifter suppresses second harmonic and achieves analog phase shift of 0 to 360 degrees at the passband, agreeing with the theoretical and simulation results.

  • Sub-fF-Capacitance Photonic-Crystal Photodetector Towards fJ/bit On-Chip Receiver Open Access

    Kengo NOZAKI  Shinji MATSUO  Koji TAKEDA  Takuro FUJII  Masaaki ONO  Abdul SHAKOOR  Eiichi KURAMOCHI  Masaya NOTOMI  

     
    INVITED PAPER

      Vol:
    E100-C No:10
      Page(s):
    750-758

    An ultra-compact InGaAs photodetector (PD) is demonstrated based on a photonic crystal (PhC) waveguide to meet the demand for a photoreceiver for future dense photonic integration. Although the PhC-PD has a length of only 1.7µm and a capacitance of less than 1fF, a high responsivity of 1A/W was observed both theoretically and experimentally. This low capacitance PD allows us to expect a resistor-loaded receiver to be realized that requires no electrical amplifiers. We fabricated a resistor-loaded PhC-PD for light-to-voltage conversion, and demonstrated a kV/W efficiency with a GHz bandwidth without using amplifiers. This will lead to a photoreceiver with an ultralow energy consumption of less than 1fJ/bit, which is a step along the road to achieving a dense photonic network and processor on a chip.

  • A Compact RF Frontend Module of Active Phased Array Antenna for High SHF Wideband Massive MIMO in 5G Open Access

    Hideyuki NAKAMIZO  Shintaro SHINJO  Koji TSUTSUMI  Satoshi YAMAGUCHI  Hideharu YOSHIOKA  Akihiro OKAZAKI  Akinori TAIRA  Kenichi TAJIMA  

     
    INVITED PAPER

      Vol:
    E100-C No:10
      Page(s):
    818-824

    In order to meet various requirements for the 5th generation mobile communication, a high SHF wideband massive-MIMO system has been widely studied which offers wide system bandwidth and high spectral efficiency. A hybrid beamforming configuration which combines analog beamforming by APAA (Active Phased Array Antenna) and digital MIMO signal processing is one of the promising approaches for reducing the complexity and power consumption of the high SHF wideband massive-MIMO system. In order to realize the hybrid beamforming configuration in high SHF band, small size, low power consumption and precise beam forming over the wide-band frequency range are strongly required for RF frontend which constitutes analog beam former. In this paper, a compact RF frontend module for high SHF wideband 5G small cell base station is proposed. This RF frontend module is prototyped. Various key components of the RF frontend module are fabricated in 15GHz band, and measured results show that high RF performances are able to meet the requirements of RF frontend.

  • A 15GHz-Band 4-Channel Transmit/Receive RF Core-Chip for High SHF Wide-Band Massive MIMO in 5G

    Koji TSUTSUMI  Takaya MARUYAMA  Wataru YAMAMOTO  Takanobu FUJIWARA  Tatsuya HAGIWARA  Ichiro SOMADA  Eiji TANIGUCHI  Mitsuhiro SHIMOZAWA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    825-832

    A 15GHz-band 4-channel transmit/receive RF core-chip is presented for high SHF wide-band massive MIMO in 5G. In order to realize small RF frontend for 5G base stations, both 6bit phase shifters (PS) and 0.25 dB resolution variable gain amplifiers (VGA) are integrated in TX and RX paths of 4-channels on the chip. A PS calibration technique is applied to compensate the error of 6bit PS caused by process variations. A common gate current steering topology with tail current control is used for VGA to enhance the gain control accuracy. The 15GHz-band RF core-chip fabricated in 65 nm CMOS process achieved phase control error of 1.9deg. rms., and amplitude control error of 0.23 dB. rms.

  • A 100-MHz 51.2-Gb/s Packet Lookup Engine with Automatic Table Update Function

    Kousuke IMAMURA  Ryota HONDA  Yoshifumi KAWAMURA  Naoki MIURA  Masami URANO  Satoshi SHIGEMATSU  Tetsuya MATSUMURA  Yoshio MATSUDA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:10
      Page(s):
    2123-2134

    The development of an extremely efficient packet inspection algorithm for lookup engines is important in order to realize high throughput and to lower energy dissipation. In this paper, we propose a new lookup engine based on a combination of a mismatch detection circuit and a linked-list hash table. The engine has an automatic rule registration and deletion function; the results are that it is only necessary to input rules, and the various tables included in the circuits, such as the Mismatch Table, Index Table, and Rule Table, will be automatically configured using the embedded hardware. This function utilizes a match/mismatch assessment for normal packet inspection operations. An experimental chip was fabricated using 40-nm 8-metal CMOS process technology. The chip operates at a frequency of 100MHz under a power supply voltage of VDD =1.1V. A throughput of 100Mpacket/s (=51.2Gb/s) is obtained at an operating frequency of 100MHz, which is three times greater than the throughput of 33Mpacket/s obtained with a conventional lookup engine without a mismatch detection circuit. The measured energy dissipation was a 1.58pJ/b·Search.

  • Establishment of EMC Research in Japan and its Future Prospects Open Access

    Osamu FUJIWARA  

     
    INVITED SURVEY PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2017/03/27
      Vol:
    E100-B No:9
      Page(s):
    1623-1632

    Systematic research on electromagnetic compatibility (EMC) in Japan started in 1977 by the establishment of a technical committee on “environmental electromagnetic engineering” named EMCJ, which was founded both in the Institute of Electronics and Communication Engineers or the present IEICE (Institute of Electronics, Information and Communication Engineers) and in the Institute of Electrical Engineers of Japan or the IEEJ. The research activities have been continued as the basic field of interdisciplinary study to harmonize even in the electromagnetic (EM) environment where radio waves provide intolerable EM disturbances to electronic equipment and to that environment itself. The subjects and their outcomes which the EMCJ has dealt with during about 40 years from the EMCJ establishment include the evaluation of EM environment, EMC of electric and electronic equipment, and EMC of biological effects involving bioelectromagnetics and so on. In this paper, the establishment history and structure of the EMCJ are reviewed along with the change in activities, and topics of the technical reports presented at EMCJ meetings from 2006 to 2016 are surveyed. In addition, internationalization and its related campaign are presented in conjunction with the EMCJ research activities, and the status quo of the EMCJ under the IEICE is also discussed along with the prospects.

  • A Method for Evaluating Degradation Phenomenon of Electrical Contacts Using a Micro-Sliding Mechanism — Minimal Sliding Amplitudes against Input Waveforms (2) —

    Shin-ichi WADA  Koichiro SAWA  

     
    PAPER

      Vol:
    E100-C No:9
      Page(s):
    723-731

    Authors previously studied the degradation of electrical contacts under the condition of various external micro-oscillations. They also developed a micro-sliding mechanism (MSM2), which causes micro-sliding and is driven by a piezoelectric actuator and elastic hinges. Using the mechanism, experimental results were obtained on the minimal sliding amplitude (MSA) required to make the electrical resistance fluctuate under various conditions. In this paper, to develop a more realistic model of input waveform than the previous one, Ts/2 is set as the rising or falling time, Tc as the flat time, and τ/2 as the duration in a sliding period T (0.25 s) of the input waveform. Using the Duhamel's integral method and an optimization method, the physical parameters of natural angular frequency ω0 (12000 s-1), damping ratio ζ (0.05), and rising and falling time Ts (1.3 or 1.2 ms) are obtained. Using the parameters and the MSA, the total acceleration of the input TA (=f(t)) and the displacement of the output x(t) are also obtained using the Fourier series expansion method. The waveforms x(t) and the experimental results are similar to each other. If the effective mass m, which is defined as that of the movable parts in the MSM2, is 0.1 kg, each total force TF (=2mTA) is estimated from TA and m. By the TF, the cases for 0.3 N/pin as frictional force or in impulsive as input waveform are more serious than the others. It is essential for the safety and the confidence of electrical contacts to evaluate the input waveform and the frictional force. The ringing waveforms of the output displacements x(t) are calculated at smaller values of Ts (1.0, 0.5, and 0.0 ms) than the above values (1.3 or 1.2 ms). When Ts is slightly changed from 1.3 or 1.2 ms to 1.0 ms, the ringing amplitude is doubled. For the degradation of electrical contacts, it is essential that Ts is reduced in a rectangular and impulsive input. Finally, a very simple wear model comprising three stages (I, II, and III) is introduced in this paper. Because Ts is much shorter in a rectangular or impulsive input than in a sinusoidal input, it is considered that the former more easily causes wear than the latter owing to a larger frictional force. Taking the adhesive wear in Stages I and III into consideration, the wear is expected to be more severe in the case of small damped oscillations owing to the ringing phenomenon.

  • Hole-Filling Algorithm with Spatio-Temporal Background Information for View Synthesis

    Huu-Noi DOAN  Tien-Dat NGUYEN  Min-Cheol HONG  

     
    PAPER

      Pubricized:
    2017/06/14
      Vol:
    E100-D No:9
      Page(s):
    1994-2004

    This paper presents a new hole-filling method that uses extrapolated spatio-temporal background information to obtain a synthesized free-view. A new background codebook for extracting reliable temporal background information is introduced. In addition, the paper addresses estimating spatial local background to distinguish background and foreground regions so that spatial background information can be extrapolated. Background holes are filled by combining spatial and temporal background information. Finally, exemplar-based inpainting is applied to fill in the remaining holes using a new priority function. The experimental results demonstrated that satisfactory synthesized views can be obtained using the proposed algorithm.

  • A Survey on Modeling of Human States in Communication Behavior Open Access

    Sumaru NIIDA  Sho TSUGAWA  Mutsumi SUGANUMA  Naoki WAKAMIYA  

     
    INVITED SURVEY PAPER-Network

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1538-1546

    The Technical Committee on Communication Behavior Engineering addresses the research question “How do we construct a communication network system that includes users?”. The growth in highly functional networks and terminals has brought about greater diversity in users' lifestyles and freed people from the restrictions of time and place. Under this situation, the similarities of human behavior cause traffic aggregation and generate new problems in terms of the stabilization of network service quality. This paper summarizes previous studies relevant to communication behavior from a multidisciplinary perspective and discusses the research approach adopted by the Technical Committee on Communication Behavior Engineering.

  • Articulatory Modeling for Pronunciation Error Detection without Non-Native Training Data Based on DNN Transfer Learning

    Richeng DUAN  Tatsuya KAWAHARA  Masatake DANTSUJI  Jinsong ZHANG  

     
    PAPER-Speech and Hearing

      Pubricized:
    2017/05/26
      Vol:
    E100-D No:9
      Page(s):
    2174-2182

    Aiming at detecting pronunciation errors produced by second language learners and providing corrective feedbacks related with articulation, we address effective articulatory models based on deep neural network (DNN). Articulatory attributes are defined for manner and place of articulation. In order to efficiently train these models of non-native speech without such data, which is difficult to collect in a large scale, several transfer learning based modeling methods are explored. We first investigate three closely-related secondary tasks which aim at effective learning of DNN articulatory models. We also propose to exploit large speech corpora of native and target language to model inter-language phenomena. This kind of transfer learning can provide a better feature representation of non-native speech. Related task transfer and language transfer learning are further combined on the network level. Compared with the conventional DNN which is used as the baseline, all proposed methods improved the performance. In the native attribute recognition task, the network-level combination method reduced the recognition error rate by more than 10% relative for all articulatory attributes. The method was also applied to pronunciation error detection in Mandarin Chinese pronunciation learning by Japanese native speakers, and achieved the relative improvement up to 17.0% for detection accuracy and up to 19.9% for F-score, which is also better than the lattice-based combination.

  • Dynamic Power Allocation Based on Rain Attenuation Prediction for High Throughput Broadband Satellite Systems

    Shengchao SHI  Guangxia LI  Zhiqiang LI  Bin GAO  Zhangkai LUO  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E100-A No:9
      Page(s):
    2038-2043

    Broadband satellites, operating at Ka band and above, are playing more and more important roles in future satellite networks. Meanwhile, rain attenuation is the dominant impairment in these bands. In this context, a dynamic power allocation scheme based on rain attenuation prediction is proposed. By this scheme, the system can dynamically adjust the allocated power according to the time-varying predicted rain attenuation. Extensive simulation results demonstrate the improvement of the dynamic scheme over the static allocation. It can be concluded that the allocated capacities match the traffic demands better by introducing such dynamic power allocation scheme and the waste of power resources is also avoided.

  • Iteration-Free Bi-Dimensional Empirical Mode Decomposition and Its Application

    Taravichet TITIJAROONROJ  Kuntpong WORARATPANYA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2017/06/19
      Vol:
    E100-D No:9
      Page(s):
    2183-2196

    A bi-dimensional empirical mode decomposition (BEMD) is one of the powerful methods for decomposing non-linear and non-stationary signals without a prior function. It can be applied in many applications such as feature extraction, image compression, and image filtering. Although modified BEMDs are proposed in several approaches, computational cost and quality of their bi-dimensional intrinsic mode function (BIMF) still require an improvement. In this paper, an iteration-free computation method for bi-dimensional empirical mode decomposition, called iBEMD, is proposed. The locally partial correlation for principal component analysis (LPC-PCA) is a novel technique to extract BIMFs from an original signal without using extrema detection. This dramatically reduces the computation time. The LPC-PCA technique also enhances the quality of BIMFs by reducing artifacts. The experimental results, when compared with state-of-the-art methods, show that the proposed iBEMD method can achieve the faster computation of BIMF extraction and the higher quality of BIMF image. Furthermore, the iBEMD method can clearly remove an illumination component of nature scene images under illumination change, thereby improving the performance of text localization and recognition.

  • Generic Transformation for Signatures in the Continual Leakage Model

    Yuyu WANG  Keisuke TANAKA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1857-1869

    In ProvSec 2014, Wang and Tanaka proposed a transformation which converts weakly existentially unforgeable (wEUF) signature schemes into strongly existentially unforgeable (sEUF) ones in the bounded leakage model. To obtain the construction, they combined leakage resilient (LR) chameleon hash functions with the Generalised Boneh-Shen-Waters (GBSW) transformation proposed by Steinfeld, Pieprzyk, and Wang. However, their transformation cannot be used in a more realistic model called continual leakage model since secret keys of LR chameleon hash functions cannot be updated. In this paper, we propose a transformation which can convert wEUF signature schemes into sEUF ones in the continual leakage model. To achieve our goal, we give a new definition of continuous leakage resilient (CLR) chameleon hash function and construct it based on the CLR signature scheme proposed by Malkin, Teranishi, Vahlis, and Yung. Although our CLR chameleon hash functions satisfy the property of strong collision-resistance, due to the existence of the updating algorithm, an adversary may find the kind of collisions such that messages are the same but randomizers are different. Hence, we cannot combine our chameleon hash functions with the GBSW transformation directly, or the sEUF security of the transformed signature schemes cannot be achieved. To solve this problem, we improve the original GBSW transformation by making use of the Groth-Sahai proof system and then combine it with CLR chameleon hash functions.

  • On the Security of Non-Interactive Key Exchange against Related-Key Attacks

    Hiraku MORITA  Jacob C.N. SCHULDT  Takahiro MATSUDA  Goichiro HANAOKA  Tetsu IWATA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1910-1923

    Non-Interactive Key Exchange (NIKE) is a cryptographic primitive that allows two users to compute a shared key without any interaction. The Diffie-Hellman key exchange scheme is probably the most well-known example of a NIKE scheme. Freire et al. (PKC 2013) defined four security notions for NIKE schemes, and showed implications among them. In these notions, we consider an adversary that is challenged to distinguish a shared key of a new pair of users from a random value, using only its knowledge of keys shared between other pairs of users. To take into account side-channel attacks such as tampering and fault-injection attacks, Bellare and Kohno (Eurocrypt 2003) formalized related-key attacks (RKA), where stronger adversaries are considered. In this paper, we introduce four RKA security notions for NIKE schemes. In these notions, we consider an adversary that can also manipulate the secret keys of users and obtain shared keys computed under the modified secret keys. We also show implications and separations among the security notions, and prove that one of the NIKE schemes proposed by Freire et al. is secure in the strongest RKA sense in the random oracle model under the Double Strong Diffie-Hellman (DSDH) assumption over the group of signed quadratic residues, which is implied by the factoring assumption.

  • New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security

    Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Shota YAMADA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1882-1890

    Identity-based encryption (IBE) is an advanced form of public key encryption and one of the most important cryptographic primitives. Of the many constructions of IBE schemes, the one proposed by Boneh and Boyen (in Eurocrypt 2004) is quite important from both practical and theoretical points of view. The scheme was standardized as IEEE P1363.3 and is the basis for many subsequent constructions. In this paper, we investigate its multi-challenge security, which means that an adversary is allowed to query challenge ciphertexts multiple times rather than only once. Since single-challenge security implies multi-challenge security, and since Boneh and Boyen provided a security proof for the scheme in the single-challenge setting, the scheme is also secure in the multi-challenge setting. However, this reduction results in a large security loss. Instead, we give tight security reduction for the scheme in the multi-challenge setting. Our reduction is tight even if the number of challenge queries is not fixed in advance (that is, the queries are unbounded). Unfortunately, we are only able to prove the security in a selective setting and rely on a non-standard parameterized assumption. Nevertheless, we believe that our new security proof is of interest and provides new insight into the security of the Boneh-Boyen IBE scheme.

  • Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform

    Qinglan ZHAO  Dong ZHENG  Xiangxue LI  Yinghui ZHANG  Xiaoli DONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:9
      Page(s):
    1965-1972

    As a with-carry analog (based on modular arithmetic) of the usual Walsh-Hadamard transform (WHT), arithmetic Walsh transform (AWT) has been used to obtain analogs of some properties of Boolean functions which are important in the design and analysis of cryptosystems. The existence of nonzero linear structure of Boolean functions is an important criterion to measure the weakness of these functions in their cryptographic applications. In this paper, we find more analogs of linear structures of Boolean functions from AWT. For some classes of n-variable Boolean functions f, we find necessary and sufficient conditions for the existence of an invariant linear structure and a complementary linear structure 1n of f. We abstract out a sectionally linear relationship between AWT and WHT of n-variable balanced Boolean functions f with linear structure 1n. This result show that AWT can characterize cryptographic properties of these functions as long as WHT can. In addition, for a diagonal Boolean function f, a recent result by Carlet and Klapper says that the AWT of f can be expressed in terms of the AWT of a diagonal Boolean function of algebraic degree at most 3 in a larger number of variables. We provide for the result a complete and more modular proof which works for both even and odd weights (of the parameter c in the Corollary 19 by Carlet and Klapper (DCC 73(2): 299-318, 2014).

1421-1440hit(8214hit)