The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ISM(359hit)

101-120hit(359hit)

  • An (N+N2)-Mixer Architecture for a High-Image-Rejection Wireless Receiver with an N-Phase Active Complex Filter

    Mamoru UGAJIN  Takuya SHINDO  Tsuneo TSUKAHARA  Takefumi HIRAGURI  

     
    PAPER-Circuit Theory

      Vol:
    E100-A No:4
      Page(s):
    1008-1014

    A high-image-rejection wireless receiver with an N-phase active RC complex filter is proposed and analyzed. Signal analysis shows that the double-conversion receiver with (N+N2) mixers corrects the gain and phase mismatches of the adjacent image. Monte Carlo simulations evaluate the relation between image-rejection performances and the dispersions of device parameters for the double-conversion wireless receiver. The Monte Carlo simulations show that the image rejection ratio of the adjacent image depends almost only on R and C mismatches in the complex filter.

  • A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms

    Masahiro ISHII  Atsuo INOMATA  Kazutoshi FUJIKAWA  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    62-72

    In this paper, we provided a new variant of Weil pairing on a family of genus 2 curves with the efficiently computable automorphism. Our pairing can be considered as a generalization of the omega pairing given by Zhao et al. We also report the algebraic cost estimation of our pairing. We then show that our pairing is more efficient than the variant of Tate pairing with the automorphism given by Fan et al. Furthermore, we show that our pairing is slightly better than the twisted Ate pairing on Kawazoe-Takahashi curve at the 192-bit security level.

  • Using a Single Dendritic Neuron to Forecast Tourist Arrivals to Japan

    Wei CHEN  Jian SUN  Shangce GAO  Jiu-Jun CHENG  Jiahai WANG  Yuki TODO  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2016/10/18
      Vol:
    E100-D No:1
      Page(s):
    190-202

    With the fast growth of the international tourism industry, it has been a challenge to forecast the tourism demand in the international tourism market. Traditional forecasting methods usually suffer from the prediction accuracy problem due to the high volatility, irregular movements and non-stationarity of the tourist time series. In this study, a novel single dendritic neuron model (SDNM) is proposed to perform the tourism demand forecasting. First, we use a phase space reconstruction to analyze the characteristics of the tourism and reconstruct the time series into proper phase space points. Then, the maximum Lyapunov exponent is employed to identify the chaotic properties of time series which is used to determine the limit of prediction. Finally, we use SDNM to make a short-term prediction. Experimental results of the forecasting of the monthly foreign tourist arrivals to Japan indicate that the proposed SDNM is more efficient and accurate than other neural networks including the multi-layered perceptron, the neuro-fuzzy inference system, the Elman network, and the single multiplicative neuron model.

  • A Ranking Approach to Source Retrieval of Plagiarism Detection

    Leilei KONG  Zhimao LU  Zhongyuan HAN  Haoliang QI  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2016/09/29
      Vol:
    E100-D No:1
      Page(s):
    203-205

    This paper addresses the issue of source retrieval in plagiarism detection. The task of source retrieval is retrieving all plagiarized sources of a suspicious document from a source document corpus whilst minimizing retrieval costs. The classification-based methods achieved the best performance in the current researches of source retrieval. This paper points out that it is more important to cast the problem as ranking and employ learning to rank methods to perform source retrieval. Specially, it employs RankBoost and Ranking SVM to obtain the candidate plagiarism source documents. Experimental results on the dataset of PAN@CLEF 2013 Source Retrieval show that the ranking based methods significantly outperforms the baseline methods based on classification. We argue that considering the source retrieval as a ranking problem is better than a classification problem.

  • Insufficient Vectorization: A New Method to Exploit Superword Level Parallelism

    Wei GAO  Lin HAN  Rongcai ZHAO  Yingying LI  Jian LIU  

     
    PAPER-Software System

      Pubricized:
    2016/09/29
      Vol:
    E100-D No:1
      Page(s):
    91-106

    Single-instruction multiple-data (SIMD) extension provides an energy-efficient platform to scale the performance of media and scientific applications while still retaining post-programmability. However, the major challenge is to translate the parallel resources of the SIMD hardware into real application performance. Currently, all the slots in the vector register are used when compilers exploit SIMD parallelism of programs, which can be called sufficient vectorization. Sufficient vectorization means all the data in the vector register is valid. Because all the slots which vector register provides must be used, the chances of vectorizing programs with low SIMD parallelism are abandoned by sufficient vectorization method. In addition, the speedup obtained by full use of vector register sometimes is not as great as that obtained by partial use. Specifically, the length of vector register provided by SIMD extension becomes longer, sufficient vectorization method cannot exploit the SIMD parallelism of programs completely. Therefore, insufficient vectorization method is proposed, which refer to partial use of vector register. First, the adaptation scene of insufficient vectorization is analyzed. Second, the methods of computing inter-iteration and intra-iteration SIMD parallelism for loops are put forward. Furthermore, according to the relationship between the parallelism and vector factor a method is established to make the choice of vectorization method, in order to vectorize programs as well as possible. Finally, code generation strategy for insufficient vectorization is presented. Benchmark test results show that insufficient vectorization method vectorized more programs than sufficient vectorization method by 107.5% and the performance achieved by insufficient vectorization method is 12.1% higher than that achieved by sufficient vectorization method.

  • Circular Bit-Vector-Mismatches: A New Approximate Circular String Matching with k-Mismatches

    ThienLuan HO  Seung-Rohk OH  HyunJin KIM  

     
    LETTER-Algorithms and Data Structures

      Vol:
    E99-A No:9
      Page(s):
    1726-1729

    This paper proposes a circular bit-vector-mismatches (CBVM) algorithm for approximate circular string matching with k-mismatches. We develop the proposed CBVM algorithm based on the rotation feature of the circular pattern. By reusing the matching information of the previous substring, the next substring of the input string can be processed in parallel.

  • The Constructions of Mismatched Filtering of Periodic Quadriphase Sequences with Even Length

    Xiuping PENG  Chengqian XU  Jiadong REN  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:9
      Page(s):
    1735-1739

    Quadriphase sequences with good correlation properties are required in higher order digital modulation schemes, e.g., for timing measurements, channel estimation or synchronization. In this letter, based on interleaving technique and pairs of mismatched binary sequences with perfect cross-correlation function (PCCF), two new methods for constructing quadriphase sequences with mismatched filtering which exist for even length N ≡ 2(mod4) are presented. The resultant perfect mismatched quadriphase sequences have high energy efficiencies. Compared with the existing methods, the new methods have flexible parameters and can give cyclically distinct perfect mismatched quadriphase sequences.

  • A Method for Evaluating Degradation Phenomenon of Electrical Contacts Using a Micro-Sliding Mechanism — Minimal Sliding Amplitudes against Input Waveforms —

    Shin-ichi WADA  Koichiro SAWA  

     
    PAPER

      Vol:
    E99-C No:9
      Page(s):
    999-1008

    Authors have studied degradation phenomenon on electrical contacts under the influences of an external micro-oscillation. A new micro-sliding mechanism 2 (MSM2) has developed, which provides micro-sliding driven by a piezo-electric actuator and elastic hinges. The experimental results are obtained on “minimal sliding amplitudes” to make resistances fluctuate on electrical contacts under some conditions which are three types of inputwaveform (sinusoidal, rectangular, and impulsive) and three levels of frictional force (1.6, 1.0, and 0.3 N/pin) by using the MSM2. The dynamical characteristics are discussed under the conditions. The simple theoretical model on the input signal and the output of the mechanism is built and the theoretical expressions from the model are obtained. A natural angular frequency (ω0=12600[s-1]) and a damping ratio (ζ=0.03[-]) are evaluated using experimental dynamical responses. The waveforms of inputs and outputs are obtained and the characteristics between inputs and outputs are also obtained on the theoretical model using the above. The maximal gain between the input and the output in rectangular or impulsive (24.4) is much larger than that (0.0) in sinusoidal. The difference on the output-accelerations between in sinusoidal and in rectangular (impulsive) is discussed. It is shown that it is possible to cause the degradation phenomenon in sinusoidal only when the output displacement are enlarged. It is also shown that it is possible to cause the phenomenon in rectangular or in impulsive, in addition to the above, when the external force has sharper rising and falling waveforms even if the displacement and the frequency of the force is small. The difference on the output-amplitudes between in rectangular and in impulsive is discussed. It is not clear that there is the difference between the effect in rectangular and that in impulsive. It is indicated that it is necessary to discuss the other causes, for instance, another dynamical, thermal, and chemical process.

  • Modelling Load Balancing Mechanisms in Self-Optimising 4G Mobile Networks with Elastic and Adaptive Traffic

    Mariusz GŁĄBOWSKI  Sławomir HANCZEWSKI  Maciej STASIAK  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:8
      Page(s):
    1718-1726

    This article describes an approximate model of a group of cells in the wireless 4G network with implemented load balancing mechanism. An appropriately modified model of Erlang's Ideal Grading is used to model this group of cells. The model makes it possible to take into account limited availability of resources of individual cells to multi-rate elastic and adaptive traffic streams generated by Erlang and Engset sources. The developed solution allows the basic traffic characteristics in the considered system to be determined, i.e. the occupancy distribution and the blocking probability. Because of the approximate nature of the proposed model, the results obtained based on the model were compared with the results of a digital simulation. The present study validates the adopted assumptions of the proposed model.

  • Energy Management Mechanism for Wi-Fi Tethering Mode on a Mobile Device

    Worapol TANGKOKIATTIKUL  Aphirak JANSANG  Anan PHONPHOEM  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:7
      Page(s):
    1619-1627

    Personal Wi-Fi Hotspot, the Wi-Fi tethering function, is widely deployed on mobile devices to allow other wireless clients to share Internet access via a broadband connection. Its advantages include no connection fee and support of non-3G/LTE devices. However, utilizing this function can rapidly deplete the battery power of the tethering device because both interface connections (3G/LTE and Wi-Fi) are always on. To address this problem, this paper proposes the Energy Management Mechanism for Wi-Fi Tethering Mode on Mobile Devices (EMWT). The mechanism is designed to effectively manage both interfaces by adjusting certain sleep durations according to the incoming traffic. Short, Long, and Deep sleep durations are introduced for saving energy. EMWT can also guarantee the packet delay bound by limiting the maximum sleep period. Five traffic rates, composed of very low, low, medium, high, and very high, are evaluated. NS-3 simulation results reveal that energy savings of up to 52.52% can be achieved with only a slight impact on system performance, in terms of end-to-end delay, throughput, and packet loss.

  • A Proof of Turyn's Conjecture: Nonexistence of Circulant Hadamard Matrices for Order Greater than Four

    Yoshimasa OH-HASHI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:7
      Page(s):
    1395-1407

    Biphase periodic sequences having elements +1 or -1 with the two-level autocorrelation function are desirable in communications and radars. However, in case of the biphase orthogonal periodic sequences, Turyn has conjectured that there exist only sequences with period 4, i.e., there exist the circulant Hadamard matrices for order 4 only. In this paper, it is described that the conjecture is proved to be true by means of the isomorphic mapping, the Chinese remainder theorem, the linear algebra, etc.

  • Power Consumption Signature: Characterizing an SSD

    Balgeun YOO  Seongjin LEE  Youjip WON  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/03/30
      Vol:
    E99-D No:7
      Page(s):
    1796-1809

    SSDs consist of non-mechanical components (host interface, control core, DRAM, flash memory, etc.) whose integrated behavior is not well-known. This makes an SSD seem like a black-box to users. We analyzed power consumption of four SSDs with standard I/O operations. We find the following: (a) the power consumption of SSDs is not significantly lower than that of HDDs, (b) all SSDs we tested had similar power consumption patterns which, we assume, is a result of their internal parallelism. SSDs have a parallel architecture that connects flash memories by channel or by way. This parallel architecture improves performance of SSDs if the information is known to the file system. This paper proposes three SSD characterization algorithms to infer the characteristics of SSD, such as internal parallelism, I/O unit, and page allocation scheme, by measuring its power consumption with various sized workloads. These algorithms are applied to four real SSDs to find: (i) the internal parallelism to decide whether to perform I/Os in a concurrent or an interleaved manner, (ii) the I/O unit size that determines the maximum size that can be assigned to a flash memory, and (iii) a page allocation method to map the logical address of write operations, which are requested from the host to the physical address of flash memory. We developed a data sampling method to provide consistency in collecting power consumption patterns of each SSD. When we applied three algorithms to four real SSDs, we found flash memory configurations, I/O unit sizes, and page allocation schemes. We show that the performance of SSD can be improved by aligning the record size of file system with I/O unit of SSD, which we found by using our algorithm. We found that Q Pro has I/O unit of 32 KB, and by aligning the file system record size to 32 KB, the performance increased by 201% and energy consumption decreased by 85%, which compared to the record size of 4 KB.

  • Characterizing Output Locations of GSP Mechanisms to Obnoxious Facility Game in Trees

    Morito OOMINE  Hiroshi NAGAMOCHI  

     
    PAPER

      Pubricized:
    2015/12/16
      Vol:
    E99-D No:3
      Page(s):
    615-623

    In the obnoxious facility game with a set of agents in a space, we wish to design a mechanism, a decision-making procedure that determines a location of an undesirable facility based on locations reported by the agents, where we do not know whether the location reported by an agent is where exactly the agent exists in the space. For a location of the facility, the benefit of each agent is defined to be the distance from the location of the facility to where the agent exists. Given a mechanism, all agents are informed of how the mechanism utilizes locations reported by the agents to determine a location of the facility before they report their locations. Some agent may try to manipulate the decision of the facility location by strategically misreporting her location. As a fair decision-making, mechanisms should be designed so that no particular group of agents can get a larger benefit by misreporting their locations. A mechanism is called group strategy-proof if no subset of agents can form a group such that every member of the group can increase her benefit by misreporting her location jointly with the rest of the group. For a given mechanism, a point in the space is called a candidate if it can be output as the location of the facility by the mechanism for some set of locations reported by agents. In this paper, we consider the case where a given space is a tree metric, and characterize the group strategy-proof mechanisms in terms of distribution of all candidates in the tree metric. We prove that there exists a group strategy-proof mechanism in the tree metric if and only if the tree has a point to which every candidate has the same distance.

  • Performance of Dynamic Instruction Window Resizing for a Given Power Budget under DVFS Control

    Hideki ANDO  Ryota SHIOYA  

     
    PAPER-Computer System

      Pubricized:
    2015/11/12
      Vol:
    E99-D No:2
      Page(s):
    341-350

    Dynamic instruction window resizing (DIWR) is a scheme that effectively exploits both memory-level parallelism and instruction-level parallelism by configuring the instruction window size appropriately for exploiting each parallelism. Although a previous study has shown that the DIWR processor achieves a significant speedup, power consumption has not been explored. The power consumption is increased in DIWR because the instruction window resources are enlarged in memory-intensive phases. If the power consumption exceeds the power budget determined by certain requirements, the DIWR processor must save power and thus, the performance previously presented cannot be achieved. In this paper, we explore to what extent the DIWR processor can achieve improved performance for a given power budget, assuming that dynamic voltage and frequency scaling (DVFS) is introduced as a power saving technique. Evaluation results using the SPEC2006 benchmark programs show that the DIWR processor, even with a constrained power budget, achieves a speedup over the conventional processor over a wide range of given power budgets. At the most important power budget point, i.e., when the power a conventional processor consumes without any power constraint is supplied, DIWR achieves a 16% speedup.

  • Analog and Digital Collaborative Design Techniques for Wireless SoCs

    Ryuichi FUJIMOTO  

     
    INVITED PAPER

      Vol:
    E99-A No:2
      Page(s):
    514-522

    Analog and digital collaborative design techniques for wireless SoCs are reviewed in this paper. In wireless SoCs, delicate analog performance such as sensitivity of the receiver is easily degraded due to interferences from digital circuit blocks. On the other hand, an analog performance such as distortion is strongly compensated by digital assist techniques with low power consumption. In this paper, a sensitivity recovery technique using the analog and digital collaborative design, and digital assist techniques to achieve low-power and high-performance analog circuits are presented. Such analog and digital collaborative design is indispensable for wireless SoCs.

  • Compact Dual-Band MIMO Antenna System for Mobile Handset Application

    Lingsheng YANG  Jianping FANG  Tao LI  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:12
      Page(s):
    2463-2469

    A compact dual-band MIMO (Multiple-Input-Multiple-Output) antenna system for LTE33 band, LTE 2300 and ISM 2.4GHz applications is presented. The whole system consists of four identical folded 3-D IFAs (inverted F antenna) mounted on nonmetallic cuboids. By using the radiation pattern diversity of the antenna elements, higher than 15dB isolation among the antenna elements and low correlation coefficient (CC<0.3) are achieved without any specially designed decoupling structures. Its gain and radiation pattern are elucidated.

  • Autonomous Decentralized Control for Indirectly Controlling System Performance Variable of Large-Scale and Wide-Area Networks

    Yusuke SAKUMOTO  Masaki AIDA  Hideyuki SHIMONISHI  

     
    PAPER-Network

      Vol:
    E98-B No:11
      Page(s):
    2248-2258

    In this paper, we propose a novel Autonomous Decentralized Control (ADC) scheme for indirectly controlling a system performance variable of large-scale and wide-area networks. In a large-scale and wide-area network, since it is impractical for any one node to gather full information of the entire network, network control must be realized by inter-node collaboration using information local to each node. Several critical network problems (e.g., resource allocation) are often formulated by a system performance variable that is an amount to quantify system state. We solve such problems by designing an autonomous node action that indirectly controls, via the Markov Chain Monte Carlo method, the probability distribution of a system performance variable by using only local information. Analyses based on statistical mechanics confirm the effectiveness of the proposed node action. Moreover, the proposal is used to implement traffic-aware virtual machine placement control with load balancing in a data center network. Simulations confirm that it can control the system performance variable and is robust against system fluctuations. A comparison against a centralized control scheme verifies the superiority of the proposal.

  • A Study on the Performance of Channel-Mismatched Equalizations in D-TR-STBC-SC Relaying Network

    Jeong-Min CHOI  Robin SHRESTHA  Sungho JEON  Jong-Soo SEO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:10
      Page(s):
    2079-2096

    In this paper, we study a distributed time-reversal space-time block coded single-carrier (D-TR-STBC-SC) system for amplify-and-forward (AF) half-duplex relaying in frequency-selective Rayleigh fading channels. Under the imperfect channel estimation condition, we analyze the mean-square-error (MSE) performance of the optimal and channel-mismatched frequency domain minimum MSE (FD-MMSE) and least square (LS) equalization. Our analysis results show that, unlike the point-to-point communications, the channel-mismatched FD-MMSE equalization of D-TR-STBC-SC relaying network leads to the ceiling effect that the MSE increases as the signal-to-noise ratio (SNR) of relay-to-destination link increases. Decomposing the MSE, it is found that the primary cause of the ceiling effect is the source-to-destination link in the first time-slot, which makes the covariance matrix of noise vector ill-conditioned. In order to resolve the channel-mismatching problems in the equalization process, we develop optimum relay power control strategies by considering practical channel estimations, i.e., training-based LS and linear minimum MSE (LMMSE) channel estimations. It is shown that the optimum power control resolves the trade-off between MSE performance and relay power consumption, and improves the robustness against the channel-mismatching. Finally, we introduce a performance evaluation to demonstrate the performance of channel equalization combined with the proposed power controls in D-TR-STBC-SC relaying network.

  • The Wear of Hot Switching Au/Cr-Au/MWCNT Contact Pairs for MEMS Contacts

    John W. McBRIDE  Hong LIU  Chamaporn CHIANRABUTRA  Adam P. LEWIS  

     
    PAPER

      Vol:
    E98-C No:9
      Page(s):
    912-918

    A gold coated carbon nanotubes composite was used as a contact material in Micro-Electrical-Mechanical-System (MEMS) switches. The switching contact was tested under typical conditions of MEMS relay applications: load voltage of 4 V, contact force of 1 mN, and load current varied between 20-200 mA. This paper focuses on the wear process over switching lifetime, and the dependence of the wear area on the current is discussed. It was shown that the contact was going to fail when the wear area approached the whole contact area, at which point the contact resistance increased sharply to three times the nominal resistance.

  • Graph Isomorphism Completeness for Trapezoid Graphs

    Asahi TAKAOKA  

     
    LETTER-Graphs and Networks

      Vol:
    E98-A No:8
      Page(s):
    1838-1840

    The complexity of the graph isomorphism problem for trapezoid graphs has been open over a decade. This paper shows that the problem is GI-complete. More precisely, we show that the graph isomorphism problem is GI-complete for comparability graphs of partially ordered sets with interval dimension 2 and height 3. In contrast, the problem is known to be solvable in polynomial time for comparability graphs of partially ordered sets with interval dimension at most 2 and height at most 2.

101-120hit(359hit)