The search functionality is under construction.

Keyword Search Result

[Keyword] MEC(222hit)

81-100hit(222hit)

  • Characterizing Output Locations of GSP Mechanisms to Obnoxious Facility Game in Trees

    Morito OOMINE  Hiroshi NAGAMOCHI  

     
    PAPER

      Pubricized:
    2015/12/16
      Vol:
    E99-D No:3
      Page(s):
    615-623

    In the obnoxious facility game with a set of agents in a space, we wish to design a mechanism, a decision-making procedure that determines a location of an undesirable facility based on locations reported by the agents, where we do not know whether the location reported by an agent is where exactly the agent exists in the space. For a location of the facility, the benefit of each agent is defined to be the distance from the location of the facility to where the agent exists. Given a mechanism, all agents are informed of how the mechanism utilizes locations reported by the agents to determine a location of the facility before they report their locations. Some agent may try to manipulate the decision of the facility location by strategically misreporting her location. As a fair decision-making, mechanisms should be designed so that no particular group of agents can get a larger benefit by misreporting their locations. A mechanism is called group strategy-proof if no subset of agents can form a group such that every member of the group can increase her benefit by misreporting her location jointly with the rest of the group. For a given mechanism, a point in the space is called a candidate if it can be output as the location of the facility by the mechanism for some set of locations reported by agents. In this paper, we consider the case where a given space is a tree metric, and characterize the group strategy-proof mechanisms in terms of distribution of all candidates in the tree metric. We prove that there exists a group strategy-proof mechanism in the tree metric if and only if the tree has a point to which every candidate has the same distance.

  • Autonomous Decentralized Control for Indirectly Controlling System Performance Variable of Large-Scale and Wide-Area Networks

    Yusuke SAKUMOTO  Masaki AIDA  Hideyuki SHIMONISHI  

     
    PAPER-Network

      Vol:
    E98-B No:11
      Page(s):
    2248-2258

    In this paper, we propose a novel Autonomous Decentralized Control (ADC) scheme for indirectly controlling a system performance variable of large-scale and wide-area networks. In a large-scale and wide-area network, since it is impractical for any one node to gather full information of the entire network, network control must be realized by inter-node collaboration using information local to each node. Several critical network problems (e.g., resource allocation) are often formulated by a system performance variable that is an amount to quantify system state. We solve such problems by designing an autonomous node action that indirectly controls, via the Markov Chain Monte Carlo method, the probability distribution of a system performance variable by using only local information. Analyses based on statistical mechanics confirm the effectiveness of the proposed node action. Moreover, the proposal is used to implement traffic-aware virtual machine placement control with load balancing in a data center network. Simulations confirm that it can control the system performance variable and is robust against system fluctuations. A comparison against a centralized control scheme verifies the superiority of the proposal.

  • The Wear of Hot Switching Au/Cr-Au/MWCNT Contact Pairs for MEMS Contacts

    John W. McBRIDE  Hong LIU  Chamaporn CHIANRABUTRA  Adam P. LEWIS  

     
    PAPER

      Vol:
    E98-C No:9
      Page(s):
    912-918

    A gold coated carbon nanotubes composite was used as a contact material in Micro-Electrical-Mechanical-System (MEMS) switches. The switching contact was tested under typical conditions of MEMS relay applications: load voltage of 4 V, contact force of 1 mN, and load current varied between 20-200 mA. This paper focuses on the wear process over switching lifetime, and the dependence of the wear area on the current is discussed. It was shown that the contact was going to fail when the wear area approached the whole contact area, at which point the contact resistance increased sharply to three times the nominal resistance.

  • A Breast Cancer Classifier Using a Neuron Model with Dendritic Nonlinearity

    Zijun SHA  Lin HU  Yuki TODO  Junkai JI  Shangce GAO  Zheng TANG  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2015/04/16
      Vol:
    E98-D No:7
      Page(s):
    1365-1376

    Breast cancer is a serious disease across the world, and it is one of the largest causes of cancer death for women. The traditional diagnosis is not only time consuming but also easily affected. Hence, artificial intelligence (AI), especially neural networks, has been widely used to assist to detect cancer. However, in recent years, the computational ability of a neuron has attracted more and more attention. The main computational capacity of a neuron is located in the dendrites. In this paper, a novel neuron model with dendritic nonlinearity (NMDN) is proposed to classify breast cancer in the Wisconsin Breast Cancer Database (WBCD). In NMDN, the dendrites possess nonlinearity when realizing the excitatory synapses, inhibitory synapses, constant-1 synapses and constant-0 synapses instead of being simply weighted. Furthermore, the nonlinear interaction among the synapses on a dendrite is defined as a product of the synaptic inputs. The soma adds all of the products of the branches to produce an output. A back-propagation-based learning algorithm is introduced to train the NMDN. The performance of the NMDN is compared with classic back propagation neural networks (BPNNs). Simulation results indicate that NMDN possesses superior capability in terms of the accuracy, convergence rate, stability and area under the ROC curve (AUC). Moreover, regarding ROC, for continuum values, the existing 0-connections branches after evolving can be eliminated from the dendrite morphology to release computational load, but with no influence on the performance of classification. The results disclose that the computational ability of the neuron has been undervalued, and the proposed NMDN can be an interesting choice for medical researchers in further research.

  • Performance Analysis of Demand Data Modification Mechanism for Power Balancing Control

    Yuki MINAMI  Shun-ichi AZUMA  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1562-1564

    For the electric demand prediction problem, a modification mechanism of predicted demand data has been proposed in the previous work. In this paper, we analyze the performance of the modification mechanism in power balancing control. Then, we analytically derive an upper bound of the performance, which is characterized by system parameters and prediction precision.

  • Resistive Switching Characteristics of Silicon Nitride-Based RRAM Depending on Top Electrode Metals

    Sungjun KIM  Sunghun JUNG  Min-Hwi KIM  Seongjae CHO  Byung-Gook PARK  

     
    PAPER

      Vol:
    E98-C No:5
      Page(s):
    429-433

    In this work, resistive switching random-access memory (RRAM) devices having a structure of metal/Si$_{3}$N$_{4}$/Si with different top electrode metals were fabricated to investigate the changes in switching and conduction mechanisms depending on electrode metals. It is shown that the metal workfunction is not strongly related with either high-resistance state (HRS) and forming voltage. Top electrodes (TEs) of Al, Cu, and Ni show both bipolar and unipolar switching characteristics. The changes of resistances in these devices can be explained by the different defect arrangements in the switching layer (SL). Among the devices with different TE metals, one with Ag electrode does not show unipolar switching unlike the others. The conducting filaments of Ag-electrode device in the low-resistance state (LRS) demonstrated metallic behaviors in the temperature-controlled experiments, which supports that Ag substantially participates in the conduction as a filament source. Moreover, the difference in switching speed is identified depending on TE metals.

  • Compact Authenticated Key Exchange from Bounded CCA-Secure KEM

    Kazuki YONEYAMA  

     
    PAPER-Public Key Based Cryptography

      Vol:
    E98-A No:1
      Page(s):
    132-143

    How to reduce communication complexity is a common important issue to design cryptographic protocols. This paper focuses on authenticated key exchange (AKE). Several AKE schemes have been studied, which satisfy strong security such as exposure-resilience in the standard model (StdM). However, there is a large gap on communication costs between schemes in the StdM and in the random oracle model. In this paper, we show a generic construction that is significantly compact (i.e., small communication cost) and secure in the StdM. We follow an existing generic construction from key encapsulated mechanism (KEM). Our main technique is to use a bounded chosen-ciphertext secure KEM instead of an ordinary chosen-ciphertext secure KEM. The communication cost can be reduced to half by this technique, and we achieve the most compact AKE scheme in the StdM. Moreover, our construction has instantiations under wider classes of hardness assumptions (e.g., subset-sum problems and multi-variate quadratic systems) than existing constructions. This work pioneers the first meaningful application of bounded chosen-ciphertext secure KEM.

  • Research on Distributed Parameter Model of Permanent Magnet in Robust Design of Electromagnetic Relay

    Huimin LIANG  Jiaxin YOU  Zhaowen CAI  Guofu ZHAI  

     
    PAPER-Electronic Components

      Vol:
    E97-C No:12
      Page(s):
    1142-1149

    The reliability of electromagnetic relay (EMR) which contains a permanent magnet (PM) can be improved by a robust design method. In this parameter design process, the calculation of electromagnetic system is very important. In analytical calculation, PM is often equivalent to a lumped parameter model of one magnetic resistance and one magnetic potential, but significant error is often caused; in order to increase the accuracy, a distributed parameter calculation model (DPM) of PM bar is established; solution procedure as well as verification condition of this model is given; by a case study of the single PM bar, magnetic field lines division method is adopted to build the DPM, the starting point and section magnetic flux of each segment are solved, a comparison is made with finite element method (FEM) and measured data; the accuracy of this magnetic field line based distributed parameter model (MFDPM) in PM bar is verified; this model is applied to the electromagnetic system of a certain type EMR, electromagnetic system calculation model is established based on MFDPM, and the static force is calculated under different rotation angles; compared with traditional lumped parameter model and FEM, it proves to be of acceptable calculation accuracy and high calculation speed which fit the requirement of robust design.

  • Preventing Participation of Insincere Workers in Crowdsourcing by Using Pay-for-Performance Payments

    Shigeo MATSUBARA  Meile WANG  

     
    PAPER-Information Network

      Vol:
    E97-D No:9
      Page(s):
    2415-2422

    We propose a method for finding an appropriate setting of a pay-per-performance payment system to prevent participation of insincere workers in crowdsourcing. Crowdsourcing enables fast and low-cost accomplishment of tasks; however, insincere workers prevent the task requester from obtaining high-quality results. Instead of a fixed payment system, the pay-per-performance payment system is promising for excluding insincere workers. However, it is difficult to learn what settings are better, and a naive payment setting may cause unsatisfactory outcomes. To overcome these drawbacks, we propose a method for calculating the expected payments for sincere and insincere workers, and then clarifying the conditions in the payment setting in which sincere workers are willing to choose a task, while insincere workers are not willing to choose the task. We evaluated the proposed method by conducting several experiments on tweet labeling tasks in Amazon Mechanical Turk. The results suggest that the pay-per-performance system is useful for preventing participation of insincere workers.

  • Cross-Layering Optimization for Low Energy Consumption in Wireless Body Area Networks

    Yali WANG  Lan CHEN  Chao LYV  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1808-1816

    Wireless body area networks (WBANs) have to work with low power and long lifetime to satisfy human biological safety requirements in e-health; therefore extremely low energy consumption is significant for WBANs. IEEE 802.15.6 standard has been published for wearable and implanted applications which provide communication technology requirements in WBANs. In this paper, the cross-layering optimization methodology is used to minimize the network energy consumption. Both the priority strategy and sleep mechanism in IEEE802.15.6 are considered. Macroscopic sleep model based on WBAN traffic priority and microscopic sleep model based on MAC structure are proposed. Then the network energy consumption optimization problem is solved by Lagrange dual method, the master problem are vertically decomposed into two sub problems in MAC and transport layers which are dealt with gradient method. Finally, a solution including self-adaption sleep mechanism and node rate controlling is proposed. The results of this paper indicate that the algorithm converges quickly and reduces the network energy consumption remarkably.

  • Practice and Evaluation of Pagelet-Based Client-Side Rendering Mechanism

    Hao HAN  Yinxing XUE  Keizo OYAMA  Yang LIU  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:8
      Page(s):
    2067-2083

    The rendering mechanism plays an indispensable role in browser-based Web application. It generates active webpages dynamically and provides human-readable layout through template engines, which are used as a standard programming model to separate the business logic and data computations from the webpage presentation. The client-side rendering mechanism, owing to the advances of rich application technologies, has been widely adopted. The adoption of client side rendering brings not only various merits but also new problems. In this paper, we propose and construct “pagelet”, a segment-based template engine for developing flexible and extensible Web applications. By presenting principles, practice and usage experience of pagelet, we conduct a comprehensive analysis of possible advantages and disadvantages brought by client-side rendering mechanism from the viewpoints of both developers and end-users.

  • Analysis of Energy-Delay Trade-Off for Power-Saving Mechanism Specific to Request-and-Response-Based Applications

    Hyun-Ho CHOI  Jung-Ryun LEE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1422-1428

    We propose a power-saving mechanism (PSM) specific to request-and-response-based applications, which simply changes the order of the operating procedure of the legacy PSM by considering the attributes of the request-and-response delay. We numerically analyze the PSM with respect to the energy consumption and buffering delay and characterize this performance by employing a simple energy-delay trade-off (EDT) curve that is determined by the operating parameters. The resulting EDT curve clearly shows that the proposed PSM outperforms the legacy PSM.

  • Culture Based Preference for the Information Feeding Mechanism in Online Social Networks Open Access

    Arunee RATIKAN  Mikifumi SHIKIDA  

     
    PAPER

      Vol:
    E97-D No:4
      Page(s):
    705-713

    Online Social Networks (OSNs) have recently been playing an important role in communication. From the audience aspect, they enable audiences to get unlimited information via the information feeding mechanism (IFM), which is an important part of the OSNs. The audience relies on the quantity and quality of the information served by it. We found that existing IFMs can result in two problems: information overload and cultural ignorance. In this paper, we propose a new type of IFM that solves these problems. The advantage of our proposed IFM is that it can filter irrelevant information with consideration of audiences' culture by using the Naïve Bayes (NB) algorithm together with features and factors. It then dynamically serves interesting and important information based on the current situation and preference of the audience. This mechanism helps the audience to reduce the time spent in finding interesting information. It can be applied to other cultures, societies and businesses. In the near future, the audience will be provided with excellent, and less annoying, communication. Through our studies, we have found that our proposed IFM is most appropriate for Thai and some groups of Japanese audiences under the consideration of audiences' culture.

  • Fixed-Rate Resource Exchange for Multi-Operator Pico eNodeB

    Tomohiko MIMURA  Koji YAMAMOTO  Masahiro MORIKURA  Ayako IWATA  Takashi TAMURA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:11
      Page(s):
    2913-2922

    In this paper, we introduce a new multi-operator pico eNodeB (eNB) concept for cellular networks. It is expected that mobile data offloading will be performed effectively after installing the pico eNBs in cellular networks, owing to the rapid increase in mobile traffic. However, when several different operators independently install the pico eNBs, high costs and large amounts of space will be required for the installation. In addition, when several different operators accommodate their own user equipments (UEs) in the pico eNBs, not enough UEs can be accommodated. This is because the UEs are not evenly distributed in the coverage area of the pico eNBs. In this paper, the accommodation of the UEs of different operators in co-sited pico eNB is discussed as one of the solutions to these problems. For the accommodation of the UEs of different operators, wireless resources should be allocated to them. However, when each operator independently controls his wireless resources, the operator is not provided with an incentive to accommodate the UEs of the other operators in his pico eNBs. For this reason, an appropriate rule for appropriate allocation of the wireless resources to the UEs of different operators should be established. In this paper, by using the concepts of game theory and mechanism design, a resource allocation rule where each operator is provided with an incentive to allocate the wireless resources to the UEs of different operators is proposed. With the proposed rule, each operator is not required to disclose the control information like link quality and the number of UEs to the other operators. Furthermore, the results of a throughput performance evaluation confirm that the proposed scheme improves the total throughput as compared with individual resource allocation.

  • The Contact Resistance Performance of Gold Coated Carbon-Nanotube Surfaces under Low Current Switching Open Access

    John W. McBRIDE  Chamaporn CHIANRABUTRA  Liudi JIANG  Suan Hui PU  

     
    INVITED PAPER

      Vol:
    E96-C No:9
      Page(s):
    1097-1103

    Multi-Walled CNT (MWCNT) are synthesized on a silicon wafer and sputter coated with a gold film. The planar surfaces are mounted on the tip of a piezo-electric actuator and mated with a gold coated hemispherical surface to form an electrical contact. These switching contacts are tested under conditions typical of MEMS relay applications; 4V, with a static contact force of 1mN, at a low current between 20-50mA. The failure of the switch is identified by the evolution of contact resistance which is monitored throughout the switching cycles. The results show that the contact resistance can be stable for up to 120 million switching cycles, which are 106 orders of higher than state-of-the-art pure gold contact. Bouncing behavior was also observed in each switching cycle. The failing mechanism was also studied in relation to the contact surface changes. It was observed that the contact surfaces undergo a transfer process over the switching life time, ultimately leading to switching failure the number of bounces is also related to the fine transfer failure mechanism.

  • Analyzing Deterioration in Optical Performance of Fiber Connections with Refractive Index Matching Material Using Incorrectly Cleaved Fiber Ends

    Mitsuru KIHARA  Yuichi YAJIMA  Hiroshi WATANABE  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E96-B No:9
      Page(s):
    2206-2212

    We experimentally investigate and analyze faults in optical fiber connections with refractive index matching material that have incorrectly cleaved fiber ends. We explain that incorrectly cleaved fiber ends, which are not ideal because they are uneven and not perpendicular to the fiber axis, are caused by defective optical fiber cleavers. We discover that the optical performance of field installable connections using incorrectly cleaved fiber ends might change greatly. We also infer that the significant change in insertion and return losses might be attributed to partially air-filled gaps by using scatter diagrams of measured insertion and return losses. Our experiment results reveal that the optical performance might deteriorate to more than 40dB in terms of insertion loss and less than 30dB in terms of return loss.

  • Modeling of Triangular Sacrificial Layer Residue Effect in Nano-Electro-Mechanical Nonvolatile Memory

    Woo Young CHOI  Min Su HAN  Boram HAN  Dongsun SEO  Il Hwan CHO  

     
    BRIEF PAPER

      Vol:
    E96-C No:5
      Page(s):
    714-717

    A modified modeling of residue effect on nano-electro-mechanical nonvolatile memory (NEMory) is presented for considering wet etching process. The effect of a residue under the cantilever is investigated for the optimization. The feasibility of the proposed model is investigated by finite element analysis simulations.

  • An Approach for Utilizing User Resources in Information-Centric Network

    HyunYong LEE  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    48-55

    As one innovative research that heavily depends on the network virtualization for its realization and deployment on an Internet-scale, we propose an approach to utilize user resources in information-centric network (ICN). We try to fully benefit from the in-network cache that is one attractive feature of ICN by expanding the in-network cache indirectly based on the user resources. To achieve this, in this paper, we focus on how to encourage users to contribute their resources in ICN. Through simulations, we examine a feasibility of our approach and an effect of user participation on the content distribution performance in ICN. We also briefly discuss how the network virtualization technique can be utilized for our research in terms of its evaluation and deployment.

  • An Online Bandwidth Allocation Scheme Based on Mechanism Design Model

    Sungwook KIM  

     
    LETTER-Network

      Vol:
    E96-B No:1
      Page(s):
    321-324

    In this paper, a new bandwidth allocation scheme is proposed based on the Mechanism Design (MD); MD is a branch of game theory that stimulates rational users to behave cooperatively for a global goal. The proposed scheme consists of bandwidth adaptation, call admission control and pricing computation algorithms to improve network performance. These algorithms are designed based on the adaptive online approach and work together to maximize bandwidth efficiency economically. A simulation shows that the proposed scheme can satisfy contradictory requirements and so provide well-balanced network performance.

  • User-Assisted Content Distribution in Information-Centric Network

    HyunYong LEE  Akihiro NAKAO  

     
    LETTER-Network

      Vol:
    E95-B No:12
      Page(s):
    3873-3874

    In this letter, we argue that user resources will be still useful in the information-centric network (ICN). From this point of view, we first examine how P2P utilizing user resources looks like in ICN. Then, we identify challenging research issues to utilize user resources in ICN.

81-100hit(222hit)