The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

621-640hit(5768hit)

  • Design of ELF/VLF Chirp-BOK Communication Based on Modulated Heating Low Ionosphere

    Kaijie ZHOU  Huali WANG  Peipei CAO  Zhangkai LUO  

     
    PAPER-Communication Theory and Signals

      Vol:
    E101-A No:12
      Page(s):
    2464-2471

    Excitation of Extremely Low Frequency (ELF)/Very Low Frequency (VLF) from ionosphere,which is artificial modulated by High Frequency (HF) waves can provide a way of antenna generation for deep submarine communication. In this paper, based on plasma energy conservation equation, the theoretical model of amplitude modulation HF pump heating low ionosphere for ELF/VLF generation is established. The linear frequency modulation technique of up-chirp and down-chirp have good self-correlation and cross-correlation, by which information can be transmitted by up-chirp and down-chirp. Thus, the linear frequency modulation technique can be applied to the ionosphere ELF/VLF communication. Based on this, a Chirp-BOK (Binary Orthogonal Keying) communication scheme is proposed. Indeed the Chirp-BOK amplitude and power modulation function are designed by combining the linear frequency modulation technique with the square wave amplitude modulation technique. The simulation results show in the condition that the ionosphere is heated by the Chirp-BOK power modulation HF waves, the temperature of ionospheric electronic and the variations of conductivity have obvious frequency modulation characteristics which are the same as that of power modulation, so does the variation of ionospheric current. Thus, when the ionosphere is heated by Chirp-BOK power modulation HF waves, the up-chirp (symbol ‘0’) and down-chirp (symbol ‘1’) ELF/VLF signals can be generated.

  • The Development of a High Accuracy Algorithm Based on Small Sample Size for Fingerprint Location in Indoor Parking Lot

    Weibo WANG  Jinghuan SUN  Ruiying DONG  Yongkang ZHENG  Qing HUA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/06/13
      Vol:
    E101-B No:12
      Page(s):
    2479-2486

    Indoor fingerprint location based on WiFi in large-scale indoor parking lots is more and more widely employed for vehicle lookup. However, the challenge is to ensure the location functionality because of the particularity and complexities of the indoor parking lot environment. To reduce the need to deploy of reference points (RPs) and the offline sampling workload, a partition-fitting fingerprint algorithm (P-FP) is proposed. To improve the location accuracy of the target, the PS-FP algorithm, a sampling importance resampling (SIR) particle filter with threshold based on P-FP, is further proposed. Firstly, the entire indoor parking lot is partitioned and the environmental coefficients of each partitioned section are gained by using the polynomial fitting model. To improve the quality of the offline fingerprint database, an error characteristic matrix is established using the difference between the fitting values and the actual measured values. Thus, the virtual RPs are deployed and C-means clustering is utilized to reduce the amount of online computation. To decrease the fluctuation of location coordinates, the SIR particle filter with a threshold setting is adopted to optimize the location coordinates. Finally, the optimal threshold value is obtained by comparing the mean location error. Test results demonstrated that PS-FP could achieve high location accuracy with few RPs and the mean location error is only about 0.7m. The cumulative distribution function (CDF) show that, using PS-FP, 98% of location errors are within 2m. Compared with the weighted K-nearest neighbors (WKNN) algorithm, the location accuracy by PS-FP exhibit an 84% improvement.

  • Equivalent-Circuit Model with Retarded Electromagnetic Coupling for Meta-Atoms of Wired Metallic Spheres

    Katsuya OHISHI  Takashi HISAKADO  Tohlu MATSUSHIMA  Osami WADA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E101-C No:12
      Page(s):
    923-930

    This paper describes the equivalent-circuit model of a metamaterial composed of conducting spheres and wires. This model involves electromagnetic coupling between the conductors, with retardation. The lumped-parameter equivalent circuit, which imports retardation to the electromagnetic coupling, is developed in this paper from Maxwell's equation. Using the equivalent-circuit model, we clarify the relationship between the retardation and radiation loss; we theoretically demonstrate that the electromagnetic retardation in the near-field represents the radiation loss of the meta-atom in the far-field. Furthermore, this paper focuses on the retarded electromagnetic coupling between two meta-atoms; we estimate the changes in the resonant frequencies and the losses due to the distance between the two coupled meta-atoms. It is established that the dependence characteristics are significantly affected by electromagnetic retardation.

  • Cycle Embedding in Generalized Recursive Circulant Graphs

    Shyue-Ming TANG  Yue-Li WANG  Chien-Yi LI  Jou-Ming CHANG  

     
    PAPER-Graph Algorithms

      Pubricized:
    2018/09/18
      Vol:
    E101-D No:12
      Page(s):
    2916-2921

    Generalized recursive circulant graphs (GRCGs for short) are a generalization of recursive circulant graphs and provide a new type of topology for interconnection networks. A graph of n vertices is said to be s-pancyclic for some $3leqslant sleqslant n$ if it contains cycles of every length t for $sleqslant tleqslant n$. The pancyclicity of recursive circulant graphs was investigated by Araki and Shibata (Inf. Process. Lett. vol.81, no.4, pp.187-190, 2002). In this paper, we are concerned with the s-pancyclicity of GRCGs.

  • Adjusting Holdoff Algorithm Dynamically According to Network Conditions for Improving Performance of Wireless Mesh Networks

    Santong LI  Xuejun TIAN  Takashi OKUDA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/05/11
      Vol:
    E101-B No:11
      Page(s):
    2250-2258

    Unlike Wi-Fi, Broadband Wireless Access (BWA) technology provides a high-speed communication in a wide area. The IEEE 802.16 (WiMAX) standard of wireless mesh networks is one of the widely used BWA standards. WiMAX mesh mode achieves data transmission in conflict-free manner in multihop networks by using the control messages (three way handshake messages or MSH-DSCH messages) to reserve channel for sending data. Concurrently, the coordination of three way handshake messages depends on the mechanism named Election based Transmission Timing (EBTT). However, IEEE 802.16 mesh mode uses a static holdoff algorithm, which leads to a low performance in the majority of cases. In this paper, after analyzing the IEEE 802.16 mesh mode with coordinated distributed scheduling, we propose a novel method to improve the throughput by a dynamic holdoff algorithm. The simulation results show that our proposal gets a better throughput performance.

  • Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET

    Yasutaka KAMEI  Takahiro MATSUMOTO  Kazuhiro YAMASHITA  Naoyasu UBAYASHI  Takashi IWASAKI  Shuichi TAKAYAMA  

     
    PAPER-Software Engineering

      Pubricized:
    2018/08/08
      Vol:
    E101-D No:11
      Page(s):
    2744-2753

    Nowadays, open source software (OSS) systems are adopted by proprietary software projects. To reduce the risk of using problematic OSS systems (e.g., causing system crashes), it is important for proprietary software projects to assess OSS systems in advance. Therefore, OSS quality assessment models are studied to obtain information regarding the quality of OSS systems. Although the OSS quality assessment models are partially validated using a small number of case studies, to the best of our knowledge, there are few studies that empirically report how industrial projects actually use OSS quality assessment models in their own development process. In this study, we empirically evaluate the cost and effectiveness of OSS quality assessment models at Fujitsu Kyushu Network Technologies Limited (Fujitsu QNET). To conduct the empirical study, we collect datasets from (a) 120 OSS projects that Fujitsu QNET's projects actually used and (b) 10 problematic OSS projects that caused major problems in the projects. We find that (1) it takes average and median times of 51 and 49 minutes, respectively, to gather all assessment metrics per OSS project and (2) there is a possibility that we can filter problematic OSS systems by using the threshold derived from a pool of assessment metrics. Fujitsu QNET's developers agree that our results lead to improvements in Fujitsu QNET's OSS assessment process. We believe that our work significantly contributes to the empirical knowledge about applying OSS assessment techniques to industrial projects.

  • Sphere Packing Bound and Gilbert-Varshamov Bound for b-Symbol Read Channels

    Seunghoan SONG  Toru FUJIWARA  

     
    PAPER-Coding Theory

      Vol:
    E101-A No:11
      Page(s):
    1915-1924

    A b-symbol read channel is a channel model in which b consecutive symbols are read at once. As special cases, it includes a symbol-pair read channel (b=2) and an ordinary channel (b=1). The sphere packing bound, the Gilbert-Varshamov (G-V) bound, and the asymptotic G-V bound for symbol-pair read channels are known for b=1 and 2. In this paper, we derive these three bounds for b-symbol read channels with b≥1. From analysis of the proposed G-V bound, it is confirmed that the achievable rate is higher for b-symbol read channels compared with those for ordinary channels based on the Hamming metric. Furthermore, it is shown that the optimal value of b that maximizes the asymptotic G-V bound is finitely determined depending on the fractional minimum distance.

  • Multiple Symbol Differential Detection Scheme for IEEE 802.15.4 BPSK Receivers

    Gaoyuan ZHANG  Hong WEN  Longye WANG  Xiaoli ZENG  Jie TANG  Runfa LIAO  Liang SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:11
      Page(s):
    1975-1979

    A simple and novel multiple-symbol differential detection (MSDD) scheme is proposed for IEEE 802.15.4 binary phase shift keying (BPSK) receivers. The detection is initiated by estimating and compensating the carrier frequency offset (CFO) effect in the chip sample of interest. With these new statistics, the decisions are jointly made by allowing the observation window length to be longer than two bit intervals. Simulation results demonstrate that detection reliability of the IEEE 802.15.4 BPSK receivers is significantly improved. Namely, at packet error rate (PER) of 1×10-3, the signal-to-noise ratio (SNR) gap between ideal coherent detection (perfect carrier reference phase and no CFO) with differential decoding and conventional optimal single differential coherent detection (SDCD) is filled by 2.1dB when the observation window length is set to 6bit intervals. Then, the benefit that less energy consumed by retransmissions is successfully achieved.

  • Air-Writing Recognition Based on Fusion Network for Learning Spatial and Temporal Features

    Buntueng YANA  Takao ONOYE  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E101-A No:11
      Page(s):
    1737-1744

    A fusion framework between CNN and RNN is proposed dedicatedly for air-writing recognition. By modeling the air-writing using both spatial and temporal features, the proposed network can learn more information than existing techniques. Performance of the proposed network is evaluated by using the alphabet and numeric datasets in the public database namely the 6DMG. Average accuracy of the proposed fusion network outperforms other techniques, i.e. 99.25% and 99.83% are observed in the alphabet gesture and the numeric gesture, respectively. Simplified structure of RNN is also proposed, which can attain about two folds speed-up of ordinary BLSTM network. It is also confirmed that only the distance between consecutive sampling points is enough to attain high recognition performance.

  • Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution

    Hiroya IKARASHI  Yong JIN  Nariyoshi YAMAI  Naoya KITAGAWA  Kiyohiko OKAYAMA  

     
    PAPER-Network Security

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2633-2643

    Security facilities such as firewall system and IDS/IPS (Intrusion Detection System/Intrusion Prevention System) have become fundamental solutions against cyber threats. With the rapid change of cyber attack tactics, detail investigations like DPI (Deep Packet Inspection) and SPI (Stateful Packet Inspection) for incoming traffic become necessary while they also cause the decrease of network throughput. In this paper, we propose an SDN (Software Defined Network) - based proactive firewall system in collaboration with domain name resolution to solve the problem. The system consists of two firewall units (lightweight and normal) and a proper one will be assigned for checking the client of incoming traffic by the collaboration of SDN controller and internal authoritative DNS server. The internal authoritative DNS server obtains the client IP address using EDNS (Extension Mechanisms for DNS) Client Subnet Option from the external DNS full resolver during the name resolution stage and notifies the client IP address to the SDN controller. By checking the client IP address on the whitelist and blacklist, the SDN controller assigns a proper firewall unit for investigating the incoming traffic from the client. Consequently, the incoming traffic from a trusted client will be directed to the lightweight firewall unit while from others to the normal firewall unit. As a result, the incoming traffic can be distributed properly to the firewall units and the congestion can be mitigated. We implemented a prototype system and evaluated its performance in a local experimental network. Based on the results, we confirmed that the prototype system presented expected features and acceptable performance when there was no flooding attack. We also confirmed that the prototype system showed better performance than conventional firewall system under ICMP flooding attack.

  • Simultaneous Wireless Information and Power Transfer Solutions for Energy-Harvesting Fairness in Cognitive Multicast Systems

    Pham-Viet TUAN  Insoo KOO  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:11
      Page(s):
    1988-1992

    In this letter, we consider the harvested-energy fairness problem in cognitive multicast systems with simultaneous wireless information and power transfer. In the cognitive multicast system, a cognitive transmitter with multi-antenna sends the same information to cognitive users in the presence of licensed users, and cognitive users can decode information and harvest energy with a power-splitting structure. The harvested-energy fairness problem is formulated and solved by using two proposed algorithms, which are based on semidefinite relaxation with majorization-minimization method, and sequential parametric convex approximation with feasible point pursuit technique, respectively. Finally, the performances of the proposed solutions and baseline schemes are verified by simulation results.

  • Dynamic Channel Assignment with Consideration of Interference and Fairness for Dense Small-Cell Networks

    Se-Jin KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:11
      Page(s):
    1984-1987

    This letter proposes a novel dynamic channel assignment (DCA) scheme with consideration of interference and fairness for the downlink of dense small-cell networks based on orthogonal frequency division multiple access-frequency division duplex. In the proposed scheme, a small-cell gateway fairly assigns subchannels to the small-cell user equipment (SUE) according to the co-tier interference from neighboring small-cell access points. From the simulation results, it is shown that the proposed DCA scheme outperforms other DCA schemes in terms of the fairness of each SUE capacity.

  • Resource Allocation in Multi-Cell Massive MIMO System with Time-Splitting Wireless Power Transfer

    Jia-Cheng ZHU  Dong-Hua CHEN  Yu-Cheng HE  Lin ZHOU  Jian-Jun MU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/05/16
      Vol:
    E101-B No:11
      Page(s):
    2331-2339

    Wireless information and power transfer technology is a promising means of supplying power for remote terminals in future communication systems. This paper investigates time-splitting (TS) recource allocation schemes for multi-cell massive MIMO systems with downlink (DL) wireless power transfer and uplink (UL) user information transmission under a harvest-then-transmit protocol. In order to jointly optimize the power and time allocation, two power minimization problems are formulated under different constraints on the minimal quality-of-service (QoS) requirement. Then, these original non-convex problems are transformed into their convex approximated ones which can be solved iteratively by successive convex approximation. Simulation results show that by exploiting the diversity effect of large-scale antenna arrays, the complexity-reduced asymptotic recourse allocation scheme almost match the power efficiency of the nonasymptotic scheme.

  • Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences

    Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Kazuhiko OHKUBO  Shigeki GOTO  

     
    PAPER-Mobile Application and Web Security

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2600-2611

    Security researchers/vendors detect malicious websites based on several website features extracted by honeyclient analysis. However, web-based attacks continue to be more sophisticated along with the development of countermeasure techniques. Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code. The evasive code indirectly identifies vulnerable clients by abusing the differences among JavaScript implementations. Attackers deliver malware only to targeted clients on the basis of the evasion results while avoiding honeyclient analysis. Therefore, we are faced with a problem in that honeyclients cannot analyze malicious websites. Nevertheless, we can observe the evasion nature, i.e., the results in accessing malicious websites by using targeted clients are different from those by using honeyclients. In this paper, we propose a method of extracting evasive code by leveraging the above differences to investigate current evasion techniques. Our method analyzes HTTP transactions of the same website obtained using two types of clients, a real browser as a targeted client and a browser emulator as a honeyclient. As a result of evaluating our method with 8,467 JavaScript samples executed in 20,272 malicious websites, we discovered previously unknown evasion techniques that abuse the differences among JavaScript implementations. These findings will contribute to improving the analysis capabilities of conventional honeyclients.

  • High-Speed Spelling in Virtual Reality with Sequential Hybrid BCIs

    Zhaolin YAO  Xinyao MA  Yijun WANG  Xu ZHANG  Ming LIU  Weihua PEI  Hongda CHEN  

     
    LETTER-Biological Engineering

      Pubricized:
    2018/07/25
      Vol:
    E101-D No:11
      Page(s):
    2859-2862

    A new hybrid brain-computer interface (BCI), which is based on sequential controls by eye tracking and steady-state visual evoked potentials (SSVEPs), has been proposed for high-speed spelling in virtual reality (VR) with a 40-target virtual keyboard. During target selection, gaze point was first detected by an eye-tracking accessory. A 4-target block was then selected for further target selection by a 4-class SSVEP BCI. The system can type at a speed of 1.25 character/sec in a cue-guided target selection task. Online experiments on three subjects achieved an averaged information transfer rate (ITR) of 360.7 bits/min.

  • Food Intake Detection and Classification Using a Necklace-Type Piezoelectric Wearable Sensor System

    Ghulam HUSSAIN  Kamran JAVED  Jundong CHO  Juneho YI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/08/09
      Vol:
    E101-D No:11
      Page(s):
    2795-2807

    Automatic monitoring of food intake in free living conditions is still an open problem to solve. This paper presents a novel necklace-type wearable system embedded with a piezoelectric sensor to monitor ingestive behavior by detecting skin motion from the lower trachea. Detected events are incorporated for food classification. Unlike the previous state-of-the-art piezoelectric sensor based system that employs spectrogram features, we have tried to fully exploit time-domain based signals for optimal features. Through numerous evaluations on the length of a frame, we have found the best performance with a frame length of 70 samples (3.5 seconds). This demonstrates that the chewing sequence carries important information for food classification. Experimental results show the validity of the proposed algorithm for food intake detection and food classification in real-life scenarios. Our system yields an accuracy of 89.2% for food intake detection and 80.3% for food classification over 17 food categories. Additionally, our system is based on a smartphone app, which helps users live healthy by providing them with real-time feedback about their ingested food episodes and types.

  • Incorporating Zero-Laxity Policy into Mixed-Criticality Multiprocessor Real-Time Systems

    Namyong JUNG  Hyeongboo BAEK  Donghyouk LIM  Jinkyu LEE  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:11
      Page(s):
    1888-1899

    As real-time embedded systems are required to accommodate various tasks with different levels of criticality, scheduling algorithms for MC (Mixed-Criticality) systems have been widely studied in the real-time systems community. Most studies have focused on MC uniprocessor systems whereas there have been only a few studies to support MC multiprocessor systems. In particular, although the ZL (Zero-Laxity) policy has been known to an effective technique in improving the schedulability performance of base scheduling algorithms on SC (Single-Criticality) multiprocessor systems, the effectiveness of the ZL policy on MC multiprocessor systems has not been revealed to date. In this paper, we focus on realizing the potential of the ZL policy for MC multiprocessor systems, which is the first attempt. To this end, we design the ZL policy for MC multiprocessor systems, and apply the policy to EDF (Earliest Deadline First), yielding EDZL (Earliest Deadline first until Zero-Laxity) tailored for MC multiprocessor systems. Then, we develop a schedulability analysis for EDZL (as well as its base algorithm EDF) to support its timing guarantee. Our simulation results show a significant schedulability improvement of EDZL over EDF, demonstrating the effectiveness of the ZL policy for MC multiprocessor systems.

  • A Directional Noise Suppressor with a Specified Constant Beamwidth

    Ryoji MIYAHARA  Akihiko SUGIYAMA  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1616-1624

    This paper proposes a directional noise suppressor with a specified constant beamwidth for directional interferences and diffuse noise. A directional gain is calculated based on interchannel phase difference and combined with a spectral gain commonly used in single-channel noise suppressors. The beamwidth can be specified as passband edges of the directional gain. In order to implement frequency-independent constant beamwidth, frequency-proportionate directional gains are defined for different frequencies as a constraint. Evaluation with signals recorded by a commercial PC demonstrates good agreement between the theoretical and the measured directivity. The signal-to-noise ratio improvement and the PESQ score for the enhanced signal are improved by 24.4dB and 0.3 over a conventional noise suppressor. In a speech recognition scenario, the proposed directional noise suppressor outperforms both the conventional nondirectional noise suppressor and the conventional directional noise suppressor based on phase based T/F filtering with a negligible degradation in the word error rate for clean speech.

  • Development of a Low Standby Power Six-Transistor CMOS SRAM Employing a Single Power Supply

    Nobuaki KOBAYASHI  Tadayoshi ENOMOTO  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:10
      Page(s):
    822-830

    We developed and applied a new circuit, called the “Self-controllable Voltage Level (SVL)” circuit, not only to expand both “write” and “read” stabilities, but also to achieve a low stand-by power and data holding capability in a single low power supply, 90-nm, 2-kbit, six-transistor CMOS SRAM. The SVL circuit can adaptively lower and higher the word-line voltages for a “read” and “write” operation, respectively. It can also adaptively lower and higher the memory cell supply voltages for the “write” and “hold” operations, and “read” operation, respectively. This paper focuses on the “hold” characteristics and the standby power dissipations (PST) of the developed SRAM. The average PST of the developed SRAM is only 0.984µW, namely, 9.57% of that (10.28µW) of the conventional SRAM at a supply voltage (VDD) of 1.0V. The data hold margin of the developed SRAM is 0.1839V and that of the conventional SRAM is 0.343V at the supply voltage of 1.0V. An area overhead of the SVL circuit is only 1.383% of the conventional SRAM.

  • Ka-Band Branch Line Coupler Applied Hexagonal Waveguide Suitable for Additive Manufacturing

    Motomi ABE  Hidenori YUKAWA  Yu USHIJIMA  Takuma NISHIMURA  Takeshi OSHIMA  Takeshi YUASA  Naofumi YONEDA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E101-C No:10
      Page(s):
    805-814

    A hexagonal waveguide branch line coupler suitable for additive manufacturing is proposed in this study, and its design method is elucidated. The additive manufactured Ka-band coupler exhibits characteristics similar to those of a machined coupler, but its weight and cost are reduced by 40% and 60%, respectively. Its effectiveness is also confirmed in this study.

621-640hit(5768hit)