The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ITO(570hit)

101-120hit(570hit)

  • Techniques for Measuring Business Process Based on Business Values

    Jihyun LEE  Sungwon KANG  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2014/12/26
      Vol:
    E98-D No:4
      Page(s):
    911-921

    The ultimate purpose of a business process is to promote business values. Thus, any process that fails to enhance or promote business values should be improved or adjusted so that business values can be achieved. Therefore an organization should have the capability of confirming whether a business value is achieved; furthermore, in order to cope with the changes of business environment, it should be able to define the necessary measures on the basis of business values. This paper proposes techniques for measuring a business process based on business values, which can be used to monitor and control business activities focusing on the attainment of business values. To show the feasibility of the techniques, we compare their monitoring and controlling capabilities with those of the current fulfillment process of a company. The results show that the proposed techniques are effective in linking business values to relevant processes and integrating each measurement result in accordance with the management level.

  • New Directions for a Japanese Academic Backbone Network Open Access

    Shigeo URUSHIDANI  Shunji ABE  Kenjiro YAMANAKA  Kento AIDA  Shigetoshi YOKOYAMA  Hiroshi YAMADA  Motonori NAKAMURA  Kensuke FUKUDA  Michihiro KOIBUCHI  Shigeki YAMADA  

     
    INVITED PAPER

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    546-556

    This paper describes an architectural design and related services of a new Japanese academic backbone network, called SINET5, which will be launched in April 2016. The network will cover all 47 prefectures with 100-Gigabit Ethernet technology and connect each pair of prefectures with a minimized latency. This will enable users to leverage evolving cloud-computing powers as well as draw on a high-performance platform for data-intensive applications. The transmission layer will form a fully meshed, SDN-friendly, and reliable network. The services will evolve to be more dynamic and cloud-oriented in response to user demands. Cyber-security measures for the backbone network and tools for performance acceleration and visualization are also discussed.

  • In situ Observation of Direct Electron Transfer Reaction of Cytochrome c Immobilized on ITO Electrode Modified with 10-carboxydecylphosphonic Acid by Slab Optical Waveguide Spectroscopy and Cyclic Voltammetry

    Naoki MATSUDA  Hirotaka OKABE  

     
    BRIEF PAPER

      Vol:
    E98-C No:2
      Page(s):
    152-155

    To immobilize cytochrome $c$ (cyt.,$c$) on ITO electrode with keeping its direct electron transfer (DET) activity, 10-carboxydecylphosphonic acid (10-CDPA) self-assembled monolayer (SAM) film was formed on ITO electrode. After 100 times washing process with exchanging phosphate buffer saline solution in the cell to fresh one, extit{in situ} slab optical waveguide (SOWG) absorption spectral measurement proved that about 80% of cyt.,$c$ immobilized on 10-CDPA modified ITO electrode was adsorbed on ITO electrode. Additionally SOWG spectral change of cyt.,$c$ between oxidized and reduced forms was observed with setting the ITO electrode potential at 0.3 and $-$0.3,V vs. Ag/AgCl, respectively showing DET reaction between cyt.,$c$ and ITO electrode occurred. About 30% of a monolayer coverage was estimated from the coulomb amount in the surface area of oxidation and reduction peaks on cyclic voltammetry (CV) data. CV peak current maintained 84% for ITO electrode modified with 10-CDPA SAM film after 60,min continuous scan with 0.1,V/sec from 0.3 and $-$0.3,V vs. Ag/AgCl.

  • Chemical Reaction in Microdroplets with Different Sizes Containing CdSe/ZnS Quantum Dot and Organic Dye

    Takeshi FUKUDA  Tomokazu KURABAYASHI  Hikari UDAKA  Nayuta FUNAKI  Miho SUZUKI  Donghyun YOON  Asahi NAKAHARA  Tetsushi SEKIGUCHI  Shuichi SHOJI  

     
    BRIEF PAPER

      Vol:
    E98-C No:2
      Page(s):
    123-126

    We report a real time method to monitor the chemical reaction in microdroplets, which contain an organic dye, 5(6)-carboxynaphthofluorescein and a CdSe/ZnS quantum dot using fluorescence spectra. Especially, the relationship between the droplet size and the reaction rate of the two reagents was investigated by changing an injection speed.

  • Ferroelectric-Based Pulse-Shaping Artificial Transmission Line

    Hsiao-Yun LI  Shiu-Cheng CHEN  Jia-Shiang FU  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E98-C No:1
      Page(s):
    28-34

    An artificial transmission line with variable capacitors as its shunt elements, also known as a nonlinear transmission line, can be used to generate pulsed waveforms with short durations. In this work, the variable capacitors are implemented using ferroelectric materials. Analysis and experimental results of such a ferroelectric-based artificial transmission line are presented. The differential equation that describes the nonlinear transmission line is derived and solved. The analytical expression for the solitary waves propagating along the line is found. An artificial transmission line is fabricated using thin-film barium--strontium--titanate capacitors and commercially available chip inductors. The fabrication process of the ferroelectric-based artificial transmission line is described. On-wafer characterization of the line is performed. Measurement results show that, with proper dc bias and substantial input power, a sinusoidal input waveform turns into a bell-shaped pulse train at the output, demonstrating the pulse-shaping capability of the ferroelectric-based artificial transmission line.

  • Muffled and Brisk Speech Evaluation with Criterion Based on Temporal Differentiation of Vocal Tract Area Function

    Masanori MORISE  Satoshi TSUZUKI  Hideki BANNO  Kenji OZAWA  

     
    LETTER-Speech and Hearing

      Pubricized:
    2014/09/17
      Vol:
    E97-D No:12
      Page(s):
    3230-3233

    This research deals with muffled speech as the evaluation target and introduces a criterion for evaluating the auditory impression in muffled speech. It focuses on the vocal tract area function (VTAF) to evaluate the auditory impression, and the criterion uses temporal differentiation of this function to track the temporal variation of the shape of the mouth. The experimental results indicate that the proposed criterion can be used to evaluate the auditory impression as well as the subjective impression.

  • In-line Process Monitoring for Amorphous Oxide Semiconductor TFT Fabrication using Microwave-detected Photoconductivity Decay Technique Open Access

    Hiroshi GOTO  Hiroaki TAO  Shinya MORITA  Yasuyuki TAKANASHI  Aya HINO  Tomoya KISHI  Mototaka OCHI  Kazushi HAYASHI  Toshihiro KUGIMIYA  

     
    INVITED PAPER

      Vol:
    E97-C No:11
      Page(s):
    1055-1062

    We have investigated the microwave-detected photoconductivity responses from the amorphous In--Ga--Zn--O (a-IGZO) thin films. The time constant extracted by the slope of the slow part of the reflectivity signals are correlated with TFT performances. We have evaluated the influences of the sputtering conditions on the quality of a-IGZO thin film, as well as the influences of gate insulation films and annealing conditions, by comparing the TFT characteristics with the microwave photoconductivity decay ($mu$-PCD). It is concluded that the $mu$-PCD is a promising method for in-line process monitoring for the IGZO-TFTs fabrication.

  • Sound Image Localization Using Dynamic Transaural Reproduction with Non-contact Head Tracking

    Hiroaki KURABAYASHI  Makoto OTANI  Kazunori ITOH  Masami HASHIMOTO  Mizue KAYAMA  

     
    PAPER

      Vol:
    E97-A No:9
      Page(s):
    1849-1858

    Binaural reproduction is one of the promising approaches to present a highly realistic virtual auditory space to a listener. Generally, binaural signals are reproduced using a set of headphones that leads to a simple implementation of such a system. In contrast, binaural signals can be presented to a listener using a technique called “transaural reproduction” which employs a few loudspeakers with crosstalk cancellation for compensating acoustic transmissions from the loudspeakers to both ears of the listener. The major advantage of transaural reproduction is that a listener is able to experience binaural reproduction without wearing any device. This leads to a more natural listening environment. However, in transaural reproduction, the listener is required to be still within a very narrow sweet spot because the crosstalk canceller is very sensitive to the listener's head position and orientation. To solve this problem, dynamic transaural systems have been developed by utilizing contact type head tracking. This paper introduces the development of a dynamic transaural system with non-contact head tracking which releases the listener from any attachment, thereby preserving the advantage of transaural reproduction. Experimental results revealed that sound images presented in the horizontal and median planes were localized more accurately when the system tracked the listener's head rotation than when the listeners did not rotate their heads or when the system did not track the listener's head rotation. These results demonstrate that the system works effectively and correctly with the listener's head rotation.

  • A Resource Analysis of Radio Space Distribution for the Wide-Area Virtualization of Wireless Transceivers

    Yuusuke KAWAKITA  Haruhisa ICHIKAWA  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1800-1807

    Wide area virtualization of wireless transceivers by centrally managed software radio systems is a way to efficiently share the resources for supporting a variety of wireless protocols. In order to enable wide-area virtualization of wireless transceivers, the authors have developed a mechanism to deliver the radio space information which is quantized broadband radio wave information including the radio signals to the transceivers. Delivery mechanism consists of a distribution server which distributes radio space corresponding to the request of the client such as the center frequency and the bandwidth and a client which uses the radio space information. Accumulation of the distribution servers which deliver radio space information simultaneously to a large number of clients will contribute to build an infrastructure for any clients ubiquitously distributed over the globe. In this paper, scale-out architecture of a distribution server is proposed to deliver unlimitedly broadband radio space information to unlimited number of clients. Experimental implementation indicates the architecture to be a scale-out solution, while the number of clients is restricted by the computer resources of the distribution server. The band pass filter processing for individual client in the distribution server consumes the dominant part of the processing power, and the number of CPU cores is the upper limit of clients supportable for the distribution server in the current operating system implementation. The logical increase of the number of CPU cores by hardware multithreading does not contribute to relax this limit. We also discuss the guidance architecture or building server derived from these conclusions.

  • Highly Reliable Non-volatile Logic Circuit Technology and Its Application Open Access

    Hiromitsu KIMURA  Zhiyong ZHONG  Yuta MIZUOCHI  Norihiro KINOUCHI  Yoshinobu ICHIDA  Yoshikazu FUJIMORI  

     
    INVITED PAPER

      Vol:
    E97-D No:9
      Page(s):
    2226-2233

    A ferroelectric-based (FE-based) non-volatile logic is proposed for low-power LSI. Standby currents in a logic circuit can be cut off by using FE-based non-volatile flip-flops (NVFFs), and the standby power can be reduced to zero. The FE capacitor is accessed only when the power turns on/off, performance of the NVFF is almost as same as that of the conventional flip-flop (FF) in a logic operation. The use of complementarily stored data in coupled FE capacitors makes it possible to realize wide read voltage margin, which guarantees 10 years retention at 85 degree Celsius under less than 1.5V operation. The low supply voltage and electro-static discharge (ESD) detection technique prevents data destruction caused by illegal access for the FE capacitor during standby state. Applying the proposed circuitry in CPU, the write and read operation for all FE capacitors in 1.6k-bit NVFFs are performed within 7µs and 3µs with access energy of 23.1nJ and 8.1nJ, respectively, using 130nm CMOS with Pb(Zr,Ti)O3(PZT) thin films.

  • Distributed Source Coding for Real-Time ECG Signal Monitoring

    Hung-Tsai WU  Wei-Ying TSAI  Wen-Whei CHANG  

     
    PAPER-Biological Engineering

      Vol:
    E97-D No:8
      Page(s):
    2157-2165

    Wireless patient monitoring is an active research area with the goal of ubiquitous health care services. This study presents a novel means of exploiting the distributed source coding (DSC) in low-complexity compression of ECG signals. We first convert the ECG data compression to an equivalent channel coding problem and exploit a linear channel code for the DSC construction. Performance is further enhanced by the use of a correlation channel that more precisely characterizes the statistical dependencies of ECG signals. Also proposed is a modified BCJR algorithm which performs symbol decoding of binary convolutional codes to better exploit the source's a priori information. Finally, a complete setup system for online ambulatory ECG monitoring via mobile cellular networks is presented. Experiments on the MIT-BIH arrhythmia database and real-time acquired ECG signals demonstrate that the proposed system outperforms other schemes in terms of encoder complexity and coding efficiency.

  • Parallel Use of Dispersion Devices for Resolution Improvement of Optical Quantization at High Sampling Rate

    Tomotaka NAGASHIMA  Takema SATOH  Petre CATALIN  Kazuyoshi ITOH  Tsuyoshi KONISHI  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    787-794

    We investigate resolution improvement in optical quantization with keeping high sampling rate performance in optical sampling. Since our optical quantization approach uses power-to-wavelength conversion based on soliton self-frequency shift, a spectral compression can improve resolution in exchange for sampling rate degradation. In this work, we propose a different approach for resolution improvement by parallel use of dispersion devices so as to avoid sampling rate degradation. Additional use of different dispersion devices can assist the wavelength separation ability of an original dispersion device. We demonstrate the principle of resolution improvement in 3 bit optical quantization. Simulation results based on experimental evaluation of 3 bit optical quantization system shows 4 bit optical quantization is achieved by parallel use of dispersion devices in 3 bit optical quantization system. The maximum differential non-linearity (DNL) and integral non-linearity (INL) are 0.49 least significant bit (LSB) and 0.50 LSB, respectively. The effective number of bits (ENOB) estimated to 3.62 bit.

  • Motion Pattern Study and Analysis from Video Monitoring Trajectory

    Kai KANG  Weibin LIU  Weiwei XING  

     
    PAPER-Pattern Recognition

      Vol:
    E97-D No:6
      Page(s):
    1574-1582

    This paper introduces an unsupervised method for motion pattern learning and abnormality detection from video surveillance. In the preprocessing steps, trajectories are segmented based on their locations, and the sub-trajectories are represented as codebooks. Under our framework, Hidden Markov Models (HMMs) are used to characterize the motion pattern feature of the trajectory groups. The state of trajectory is represented by a HMM and has a probability distribution over the possible output sub-trajectories. Bayesian Information Criterion (BIC) is introduced to measure the similarity between groups. Based on the pairwise similarity scores, an affinity matrix is constructed which indicates the distance between different trajectory groups. An Adaptable Dynamic Hierarchical Clustering (ADHC) tree is proposed to gradually merge the most similar groups and form the trajectory motion patterns, which implements a simpler and more tractable dynamical clustering procedure in updating the clustering results with lower time complexity and avoids the traditional overfitting problem. By using the HMM models generated for the obtained trajectory motion patterns, we may recognize motion patterns and detect anomalies by computing the likelihood of the given trajectory, where a maximum likelihood for HMM indicates a pattern, and a small one below a threshold suggests an anomaly. Experiments are performed on EIFPD trajectory datasets from a structureless scene, where pedestrians choose their walking paths randomly. The experimental results show that our method can accurately learn motion patterns and detect anomalies with better performance.

  • Mining API Usage Patterns by Applying Method Categorization to Improve Code Completion

    Rizky Januar AKBAR  Takayuki OMORI  Katsuhisa MARUYAMA  

     
    PAPER

      Vol:
    E97-D No:5
      Page(s):
    1069-1083

    Developers often face difficulties while using APIs. API usage patterns can aid them in using APIs efficiently, which are extracted from source code stored in software repositories. Previous approaches have mined repositories to extract API usage patterns by simply applying data mining techniques to the collection of method invocations of API objects. In these approaches, respective functional roles of invoked methods within API objects are ignored. The functional role represents what type of purpose each method actually achieves, and a method has a specific predefined order of invocation in accordance with its role. Therefore, the simple application of conventional mining techniques fails to produce API usage patterns that are helpful for code completion. This paper proposes an improved approach that extracts API usage patterns at a higher abstraction level rather than directly mining the actual method invocations. It embraces a multilevel sequential mining technique and uses categorization of method invocations based on their functional roles. We have implemented a mining tool and an extended Eclipse's code completion facility with extracted API usage patterns. Evaluation results of this tool show that our approach improves existing code completion.

  • Visualization System for Monitoring Bug Update Information Open Access

    Yasufumi TAKAMA  Takeshi KUROSAWA  

     
    PAPER

      Vol:
    E97-D No:4
      Page(s):
    654-662

    This paper proposes a visualization system for supporting the task of monitoring bug update information. Recent growth of the Web has brought us various kinds of text stream data, such as bulletin board systems (BBS), blogs, and social networking services (SNS). Bug update information managed by bug tracking systems (BTS) is also a kind of text stream data. As such text stream data continuously generates new data, it is difficult for users to watch it all the time. Therefore, the task of monitoring text stream data inevitably involves breaks of monitoring, which would cause users to lose the context of monitoring. In order to support such a monitoring task involving breaks, the proposed system employs several visualization techniques. The dynamic relationship between bugs is visualized with animation, and a function of highlighting updated bugs as well as that of replaying a part of the last monitoring time is also proposed in order to help a user grasping the context of monitoring. The result of experiment with test participants shows that highlighting and replay functions can reduce frequency of checking data and monitoring time.

  • A New Way for User's Web Communication Visualization and Measurement: Modeling, Experiment and Application

    Tao QIN  Wei LI  Chenxu WANG  Xingjun ZHANG  

     
    PAPER-Network

      Vol:
    E97-B No:4
      Page(s):
    730-737

    With the ever-growing prevalence of web 2.0, users can access information and resources easily and ubiquitously. It becomes increasingly important to understand the characteristics of user's complex behavior for efficient network management and security monitoring. In this paper, we develop a novel method to visualize and measure user's web-communication-behavior character in large-scale networks. First, we employ the active and passive monitoring methods to collect more than 20,000 IP addresses providing web services, which are divided into 12 types according to the content they provide, e.g. News, music, movie and etc, and then the IP address library is established with elements as (servicetype, IPaddress). User's behaviors are complex as they stay in multiple service types during any specific time period, we propose the behavior spectrum to model this kind of behavior characteristics in an easily understandable way. Secondly, two kinds of user's behavior characters are analyzed: the character at particular time instants and the dynamic changing characters among continuous time points. We then employ Renyi cross entropy to classify the users into different groups with the expectation that users in the same groups have similar behavior profiles. Finally, we demonstrated the application of behavior spectrum in profiling network traffic patterns and finding illegal users. The efficiency and correctness of the proposed methods are verified by the experimental results using the actual traffic traces collected from the Northwest Regional Center of China Education and Research Network (CERNET).

  • Ideas, Inspirations and Hints Those I Met in the Research of Electromagnetic Theory Open Access

    Kazuo TANAKA  

     
    INVITED PAPER

      Vol:
    E97-C No:1
      Page(s):
    3-10

    “How to get the original ideas” is the fundamental and critical issue for the researchers in science and technology. In this paper, the author writes his experiences concerning how he could encounter the interesting and original ideas of three research subjects, i.e., the accelerating medium effect, the guided-mode extracted integral equation and the surface plasmon gap waveguide.

  • Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites

    Takeshi YAGI  Junichi MURAYAMA  Takeo HARIU  Sho TSUGAWA  Hiroyuki OHSAKI  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E97-B No:1
      Page(s):
    76-86

    We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.

  • DC-DC Converter-Aware Task Scheduling and Dynamic Reconfiguration for Energy Harvesting Embedded Systems

    Kyungsoo LEE  Tohru ISHIHARA  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E96-A No:12
      Page(s):
    2660-2667

    Energy-harvesting devices are materials that allow ambient energy sources to be converters into usable electrical power. While a battery powers the modern embedded systems, these energy-harvesting devices power the energy-harvesting embedded systems. This claims a new energy efficient management techniques for the energy-harvesting systems dislike the previous management techniques. The higher entire system efficiency in an energy-harvesting system can be obtained by a higher generating efficiency, a higher consuming efficiency, or a higher transferring efficiency. This paper presents a generalized technique for a dynamic reconfiguration and a task scheduling considering the power loss in DC-DC converters in the system. The proposed technique minimizes the power loss in the DC-DC converter and charger of the system. The proposed technique minimizes the power loss in the DC-DC converters and charger of the system. Experiments with actual application demonstrate that our approach reduces the total energy consumption by 22% in average over the conventional approach.

  • A WAN-Optimized Live Storage Migration Mechanism toward Virtual Machine Evacuation upon Severe Disasters

    Takahiro HIROFUCHI  Mauricio TSUGAWA  Hidemoto NAKADA  Tomohiro KUDOH  Satoshi ITOH  

     
    PAPER

      Vol:
    E96-D No:12
      Page(s):
    2663-2674

    Wide-area VM migration is a technology with potential to aid IT services recovery since it can be used to evacuate virtualized servers to safe locations upon a critical disaster. However, the amount of data involved in a wide-area VM migration is substantially larger compared to VM migrations within LAN due to the need to transfer virtualized storage in addition to memory and CPU states. This increase of data makes it challenging to relocate VMs under a limited time window with electrical power. In this paper, we propose a mechanism to improve live storage migration across WAN. The key idea is to reduce the amount of data to be transferred by proactively caching virtual disk blocks to a backup site during regular VM operation. As a result of pre-cached disk blocks, the proposed mechanism can dramatically reduce the amount of data and consequently the time required to live migrate the entire VM state. The mechanism was evaluated using a prototype implementation under different workloads and network conditions, and we confirmed that it dramatically reduces the time to complete a VM live migration. By using the proposed mechanism, it is possible to relocate a VM from Japan to the United States in just under 40 seconds. This relocation would otherwise take over 1500 seconds, demonstrating that the proposed mechanism was able to reduce the migration time by 97.5%.

101-120hit(570hit)