The search functionality is under construction.

Keyword Search Result

[Keyword] OMP(3924hit)

101-120hit(3924hit)

  • A Lightweight Automatic Modulation Recognition Algorithm Based on Deep Learning

    Dong YI  Di WU  Tao HU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/09/30
      Vol:
    E106-B No:4
      Page(s):
    367-373

    Automatic modulation recognition (AMR) plays a critical role in modern communication systems. Owing to the recent advancements of deep learning (DL) techniques, the application of DL has been widely studied in AMR, and a large number of DL-AMR algorithms with high recognition rates have been developed. Most DL-AMR algorithm models have high recognition accuracy but have numerous parameters and are huge, complex models, which make them hard to deploy on resource-constrained platforms, such as satellite platforms. Some lightweight and low-complexity DL-AMR algorithm models also struggle to meet the accuracy requirements. Based on this, this paper proposes a lightweight and high-recognition-rate DL-AMR algorithm model called Lightweight Densely Connected Convolutional Network (DenseNet) Long Short-Term Memory network (LDLSTM). The model cascade of DenseNet and LSTM can achieve the same recognition accuracy as other advanced DL-AMR algorithms, but the parameter volume is only 1/12 that of these algorithms. Thus, it is advantageous to deploy LDLSTM in resource-constrained systems.

  • An Interpretation Method on Amplitude Intensities for Response Waveforms of Backward Transient Scattered Field Components by a 2-D Coated Metal Cylinder

    Keiji GOTO  Toru KAWANO  

     
    PAPER

      Pubricized:
    2022/09/29
      Vol:
    E106-C No:4
      Page(s):
    118-126

    In this paper, we propose an interpretation method on amplitude intensities for response waveforms of backward transient scattered field components for both E- and H-polarizations by a 2-D coated metal cylinder. A time-domain (TD) asymptotic solution, which is referred to as a TD Fourier transform method (TD-FTM), is derived by applying the FTM to a backward transient scattered field expressed by an integral form. The TD-FTM is represented by a combination of a direct geometric optical ray (DGO) and a reflected GO (RGO) series. We use the TD-FTM to derive amplitude intensity ratios (AIRs) between adjacent backward transient scattered field components. By comparing the numerical values of the AIRs with those of the influence factors that compose the AIRs, major factor(s) can be identified, thereby allowing detailed interpretation method on the amplitude intensities for the response waveforms of backward transient scattered field components. The accuracy and practicality of the TD-FTM are evaluated by comparing it with three reference solutions. The effectiveness of an interpretation method on the amplitude intensities for response waveforms of backward transient scattered field components is revealed by identifying major factor(s) affecting the amplitude intensities.

  • Study of FIT Dedicated Computer with Dataflow Architecture for High Performance 2-D Magneto-Static Field Simulation

    Chenxu WANG  Hideki KAWAGUCHI  Kota WATANABE  

     
    PAPER

      Pubricized:
    2022/08/23
      Vol:
    E106-C No:4
      Page(s):
    136-143

    An approach to dedicated computers is discussed in this study as a possibility for portable, low-cost, and low-power consumption high-performance computing technologies. Particularly, dataflow architecture dedicated computer of the finite integration technique (FIT) for 2D magnetostatic field simulation is considered for use in industrial applications. The dataflow architecture circuit of the BiCG-Stab matrix solver of the FIT matrix calculation is designed by the very high-speed integrated circuit hardware description language (VHDL). The operation of the dedicated computer's designed circuit is considered by VHDL logic circuit simulation.

  • TEBAS: A Time-Efficient Balance-Aware Scheduling Strategy for Batch Processing Jobs

    Zijie LIU  Can CHEN  Yi CHENG  Maomao JI  Jinrong ZOU  Dengyin ZHANG  

     
    LETTER-Software Engineering

      Pubricized:
    2022/12/28
      Vol:
    E106-D No:4
      Page(s):
    565-569

    Common schedulers for long-term running services that perform task-level optimization fail to accommodate short-living batch processing (BP) jobs. Thus, many efficient job-level scheduling strategies are proposed for BP jobs. However, the existing scheduling strategies perform time-consuming objective optimization which yields non-negligible scheduling delay. Moreover, they tend to assign BP jobs in a centralized manner to reduce monetary cost and synchronization overhead, which can easily cause resource contention due to the task co-location. To address these problems, this paper proposes TEBAS, a time-efficient balance-aware scheduling strategy, which spreads all tasks of a BP job into the cluster according to the resource specifications of a single task based on the observation that computing tasks of a BP job commonly possess similar features. The experimental results show the effectiveness of TEBAS in terms of scheduling efficiency and load balancing performance.

  • Group Sparse Reduced Rank Tensor Regression for Micro-Expression Recognition

    Sunan LI  Yuan ZONG  Cheng LU  Chuangan TANG  Yan ZHAO  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2023/01/05
      Vol:
    E106-D No:4
      Page(s):
    575-578

    To overcome the challenge in micro-expression recognition that it only emerge in several small facial regions with low intensity, some researchers proposed facial region partition mechanisms and introduced group sparse learning methods for feature selection. However, such methods have some shortcomings, including the complexity of region division and insufficient utilization of critical facial regions. To address these problems, we propose a novel Group Sparse Reduced Rank Tensor Regression (GSRRTR) to transform the fearure matrix into a tensor by laying blocks and features in different dimensions. So we can process grids and texture features separately and avoid interference between grids and features. Furthermore, with the use of Tucker decomposition, the feature tensor can be decomposed into a product of core tensor and a set of matrix so that the number of parameters and the computational complexity of the scheme will decreased. To evaluate the performance of the proposed micro-expression recognition method, extensive experiments are conducted on two micro expression databases: CASME2 and SMIC. The experimental results show that the proposed method achieves comparable recognition rate with less parameters than state-of-the-art methods.

  • A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model

    Yoshiki ABE  Takeshi NAKAI  Yohei WATANABE  Mitsugu IWAMOTO  Kazuo OHTA  

     
    PAPER

      Pubricized:
    2022/10/20
      Vol:
    E106-A No:3
      Page(s):
    315-324

    Card-based cryptography realizes secure multiparty computation using physical cards. In 2018, Watanabe et al. proposed a card-based three-input majority voting protocol using three cards. In a card-based cryptographic protocol with n-bit inputs, it is known that a protocol using shuffles requires at least 2n cards. In contrast, as Watanabe et al.'s protocol, a protocol using private permutations can be constructed with fewer cards than the lower bounds above. Moreover, an n-input protocol using private permutations would not even require n cards in principle since a private permutation depending on an input can represent the input without using additional cards. However, there are only a few protocols with fewer than n cards. Recently, Abe et al. extended Watanabe et al.'s protocol and proposed an n-input majority voting protocol with n cards and n + ⌊n/2⌋ + 1 private permutations. This paper proposes an n-input majority voting protocol with ⌈n/2⌉ + 1 cards and 2n-1 private permutations, which is also obtained by extending Watanabe et al.'s protocol. Compared with Abe et al.'s protocol, although the number of private permutations increases by about n/2, the number of cards is reduced by about n/2. In addition, unlike Abe et al.'s protocol, our protocol includes Watanabe et al.'s protocol as a special case where n=3.

  • On the Limitations of Computational Fuzzy Extractors

    Kenji YASUNAGA  Kosuke YUZAWA  

     
    LETTER

      Pubricized:
    2022/08/10
      Vol:
    E106-A No:3
      Page(s):
    350-354

    We present a negative result of fuzzy extractors with computational security. Specifically, we show that, under a computational condition, a computational fuzzy extractor implies the existence of an information-theoretic fuzzy extractor with slightly weaker parameters. Our result implies that to circumvent the limitations of information-theoretic fuzzy extractors, we need to employ computational fuzzy extractors that are not invertible by non-lossy functions.

  • Orthogonal Variable Spreading Factor Codes Suppressing Signal-Envelope Fluctuation

    Tomoko K. MATSUSHIMA  Shoichiro YAMASAKI  Hirokazu TANAKA  

     
    LETTER-Spread Spectrum Technologies and Applications

      Pubricized:
    2022/08/08
      Vol:
    E106-A No:3
      Page(s):
    445-449

    Recently, complex orthogonal variable spreading factor (OVSF) codes based on polyphase orthogonal codes have been proposed to support multi-user/multi-rate data transmission services in synchronous direct-sequence code-division multiple access (DS-CDMA) systems. This study investigates the low signal-envelope fluctuation property of the complex OVSF codes in terms of transmission signal trajectories. In addition, a new method is proposed to suppress the envelope fluctuation more strongly at the expense of reducing the number of spreading sequences of the codes.

  • New Construction of Z-Optimal Type-II Even-Length Quadriphase Z-Complementary Pairs

    Fanxin ZENG  Xiping HE  Zhenyu ZHANG  Li YAN  

     
    LETTER-Sequences

      Pubricized:
    2022/08/23
      Vol:
    E106-A No:3
      Page(s):
    450-453

    Type-II Z-complementary pairs (ZCPs) play an important role in suppressing asynchronous interference in a wideband wireless communication system where the minimum interfering-signal delay is large. Based on binary Golay complementary pairs (BGCPs) and interleaving technique, new construction for producing Z-optimal Type-II even-length quadriphase ZCPs (EL-QZCPs) is presented, and the resultant pairs have new lengths in the form of 2 × 2α10β26γ (α, β, γ non-negative integers), which are not included in existing known Type-II EL-QZCPs.

  • Accurate Phase Angle Measurement of Backscatter Signal under Noisy Environment

    Tomoya IWASAKI  Osamu TOKUMASU  Jin MITSUGI  

     
    PAPER

      Pubricized:
    2022/09/15
      Vol:
    E106-A No:3
      Page(s):
    464-470

    Backscatter communication is an emerging wireless access technology to realize ultra-low power terminals exploiting the modulated reflection of incident radio wave. This paper proposes a method to measure the phase angle of backscatter link using principal component analysis (PCA). The phase angle measurement of backscatter link at the receiver is essential to maximize the signal quality for subsequent demodulation and to measure the distance and the angle of arrival. The drawback of popular phase angle measurement with naive phase averaging and linear regression analysis is to produce erroneous phase angle, where the phase angle is close to $pm rac{pi}{2}$ radian and the signal quality is poor. The advantage of the proposal is quantified with a computer simulation, a conducted experiment and radio propagation experiments.

  • Dynamic Verification Framework of Approximate Computing Circuits using Quality-Aware Coverage-Based Grey-Box Fuzzing

    Yutaka MASUDA  Yusei HONDA  Tohru ISHIHARA  

     
    PAPER

      Pubricized:
    2022/09/02
      Vol:
    E106-A No:3
      Page(s):
    514-522

    Approximate computing (AC) has recently emerged as a promising approach to the energy-efficient design of digital systems. For realizing the practical AC design, we need to verify whether the designed circuit can operate correctly under various operating conditions. Namely, the verification needs to efficiently find fatal logic errors or timing errors that violate the constraint of computational quality. This work focuses on the verification where the computational results can be observed, the computational quality can be calculated from computational results, and the constraint of computational quality is given and defined as the constraint which is set to the computational quality of designed AC circuit with given workloads. Then, this paper proposes a novel dynamic verification framework of the AC circuit. The key idea of the proposed framework is to incorporate a quality assessment capability into the Coverage-based Grey-box Fuzzing (CGF). CGF is one of the most promising techniques in the research field of software security testing. By repeating (1) mutation of test patterns, (2) execution of the program under test (PUT), and (3) aggregation of coverage information and feedback to the next test pattern generation, CGF can explore the verification space quickly and automatically. On the other hand, CGF originally cannot consider the computational quality by itself. For overcoming this quality unawareness in CGF, the proposed framework additionally embeds the Design Under Verification (DUV) component into the calculation part of computational quality. Thanks to the DUV integration, the proposed framework realizes the quality-aware feedback loop in CGF and thus quickly enhances the verification coverage for test patterns that violate the quality constraint. In this work, we quantitatively compared the verification coverage of the approximate arithmetic circuits between the proposed framework and the random test. In a case study of an approximate multiply-accumulate (MAC) unit, we experimentally confirmed that the proposed framework achieved 3.85 to 10.36 times higher coverage than the random test.

  • An Accuracy Reconfigurable Vector Accelerator based on Approximate Logarithmic Multipliers for Energy-Efficient Computing

    Lingxiao HOU  Yutaka MASUDA  Tohru ISHIHARA  

     
    PAPER

      Pubricized:
    2022/09/02
      Vol:
    E106-A No:3
      Page(s):
    532-541

    The approximate logarithmic multiplier proposed by Mitchell provides an efficient alternative for processing dense multiplication or multiply-accumulate operations in applications such as image processing and real-time robotics. It offers the advantages of small area, high energy efficiency and is suitable for applications that do not necessarily achieve high accuracy. However, its maximum error of 11.1% makes it challenging to deploy in applications requiring relatively high accuracy. This paper proposes a novel operand decomposition method (OD) that decomposes one multiplication into the sum of multiple approximate logarithmic multiplications to widely reduce Mitchell multiplier errors while taking full advantage of its area savings. Based on the proposed OD method, this paper also proposes an accuracy reconfigurable multiply-accumulate (MAC) unit that provides multiple reconfigurable accuracies with high parallelism. Compared to a MAC unit consisting of accurate multipliers, the area is significantly reduced to less than half, improving the hardware parallelism while satisfying the required accuracy for various scenarios. The experimental results show the excellent applicability of our proposed MAC unit in image smoothing and robot localization and mapping application. We have also designed a prototype processor that integrates the minimum functionality of this MAC unit as a vector accelerator and have implemented a software-level accuracy reconfiguration in the form of an instruction set extension. We experimentally confirmed the correct operation of the proposed vector accelerator, which provides the different degrees of accuracy and parallelism at the software level.

  • DAG-Pathwidth: Graph Algorithmic Analyses of DAG-Type Blockchain Networks

    Shoji KASAHARA  Jun KAWAHARA  Shin-ichi MINATO  Jumpei MORI  

     
    PAPER

      Pubricized:
    2022/12/22
      Vol:
    E106-D No:3
      Page(s):
    272-283

    This paper analyzes a blockchain network forming a directed acyclic graph (DAG), called a DAG-type blockchain, from the viewpoint of graph algorithm theory. To use a DAG-type blockchain, NP-hard graph optimization problems on the DAG are required to be solved. Although various problems for undirected and directed graphs can be efficiently solved by using the notions of graph parameters, these currently known parameters are meaningless for DAGs, which implies that it is hopeless to design efficient algorithms based on the parameters for such problems. In this work, we propose a novel graph parameter for directed graphs called a DAG-pathwidth, which represents the closeness to a directed path. This is an extension of the pathwidth, a well-known graph parameter for undirected graphs. We analyze the features of the DAG-pathwidth and prove that computing the DAG-pathwidth of a DAG (directed graph in general) is NP-complete. Finally, we propose an efficient algorithm for a variant of the maximum k-independent set problem for the DAG-type blockchain when the DAG-pathwidth of the input graph is small.

  • Calculation Solitaire is NP-Complete

    Chuzo IWAMOTO  Tatsuya IDE  

     
    LETTER

      Pubricized:
    2022/10/31
      Vol:
    E106-D No:3
      Page(s):
    328-332

    Calculation is a solitaire card game with a standard 52-card deck. Initially, cards A, 2, 3, and 4 of any suit are laid out as four foundations. The remaining 48 cards are piled up as the stock, and there are four empty tableau piles. The purpose of the game is to move all cards of the stock to foundations. The foundation starting with A is to be built up in sequence from an ace to a king. The other foundations are similarly built up, but by twos, threes, and fours from 2, 3, and 4 until a king is reached. Here, a card of rank i may be used as a card of rank i + 13j for j ∈ {0, 1, 2, 3}. During the game, the player moves (i) the top card of the stock either onto a foundation or to the top of a tableau pile, or (ii) the top card of a tableau pile onto a foundation. We prove that the generalized version of Calculation Solitaire is NP-complete.

  • A Non-Revisiting Equilibrium Optimizer Algorithm

    Baohang ZHANG  Haichuan YANG  Tao ZHENG  Rong-Long WANG  Shangce GAO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/12/20
      Vol:
    E106-D No:3
      Page(s):
    365-373

    The equilibrium optimizer (EO) is a novel physics-based meta-heuristic optimization algorithm that is inspired by estimating dynamics and equilibrium states in controlled volume mass balance models. As a stochastic optimization algorithm, EO inevitably produces duplicated solutions, which is wasteful of valuable evaluation opportunities. In addition, an excessive number of duplicated solutions can increase the risk of the algorithm getting trapped in local optima. In this paper, an improved EO algorithm with a bis-population-based non-revisiting (BNR) mechanism is proposed, namely BEO. It aims to eliminate duplicate solutions generated by the population during iterations, thus avoiding wasted evaluation opportunities. Furthermore, when a revisited solution is detected, the BNR mechanism activates its unique archive population learning mechanism to assist the algorithm in generating a high-quality solution using the excellent genes in the historical information, which not only improves the algorithm's population diversity but also helps the algorithm get out of the local optimum dilemma. Experimental findings with the IEEE CEC2017 benchmark demonstrate that the proposed BEO algorithm outperforms other seven representative meta-heuristic optimization techniques, including the original EO algorithm.

  • Learning Multi-Level Features for Improved 3D Reconstruction

    Fairuz SAFWAN MAHAD  Masakazu IWAMURA  Koichi KISE  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/12/08
      Vol:
    E106-D No:3
      Page(s):
    381-390

    3D reconstruction methods using neural networks are popular and have been studied extensively. However, the resulting models typically lack detail, reducing the quality of the 3D reconstruction. This is because the network is not designed to capture the fine details of the object. Therefore, in this paper, we propose two networks designed to capture both the coarse and fine details of the object to improve the reconstruction of the detailed parts of the object. To accomplish this, we design two networks. The first network uses a multi-scale architecture with skip connections to associate and merge features from other levels. For the second network, we design a multi-branch deep generative network that separately learns the local features, generic features, and the intermediate features through three different tailored components. In both network architectures, the principle entails allowing the network to learn features at different levels that can reconstruct the fine parts and the overall shape of the reconstructed 3D model. We show that both of our methods outperformed state-of-the-art approaches.

  • Multi-Input Physical Layer Network Coding in Two-Dimensional Wireless Multihop Networks

    Hideaki TSUGITA  Satoshi DENNO  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/08/10
      Vol:
    E106-B No:2
      Page(s):
    193-202

    This paper proposes multi-input physical layer network coding (multi-input PLNC) for high speed wireless communication in two-dimensional wireless multihop networks. In the proposed PLNC, all the terminals send their packets simultaneously for the neighboring relays to maximize the network throughput in the first slot, and all the relays also do the same to the neighboring terminals in the second slot. Those simultaneous signal transmissions cause multiple signals to be received at the relays and the terminals. Signal reception in the multi-input PLNC uses multichannel filtering to mitigate the difficulties caused by the multiple signal reception, which enables the two-input PLNC to be applied. In addition, a non-linear precoding is proposed to reduce the computational complexity of the signal detection at the relays and the terminals. The proposed multi-input PLNC makes all the terminals exchange their packets with the neighboring terminals in only two time slots. The performance of the proposed multi-input PLNC is confirmed by computer simulation. The proposed multi-input physical layer network coding achieves much higher network throughput than conventional techniques in a two-dimensional multihop wireless network with 7 terminals. The proposed multi-input physical layer network coding attains superior transmission performance in wireless hexagonal multihop networks, as long as more than 6 antennas are placed on the terminals and the relays.

  • Millimeter-Wave Single-Pixel Imaging Using Electrically-Switchable Liquid-Crystal Mask Open Access

    Michinori HONMA  Takashi SASE  Ryota ITO  Toshiaki NOSE  

     
    INVITED PAPER

      Pubricized:
    2022/08/23
      Vol:
    E106-C No:2
      Page(s):
    34-40

    In this study, we have proposed a millimeter-wave (MMW) single-pixel imaging (SPI) system with a liquid-crystal (LC) mask cell. The LC cell functions as an electrically switchable mask based on the change in absorption properties, which depend on the orientation of the LC. We investigated the influence of noise on the measured and estimated data (reconstructed image). The proposed system exhibited moderate robustness against random noise (that were added) compared to raster scan-based and Hadamard matrix-based SPI systems. Finally, the results of some demonstrative experiments were introduced to ensure the applicability of the constructed MMW-SPI system, and steps for improving the reconstructed image quality were discussed.

  • Superposition Signal Input Decoding for Lattice Reduction-Aided MIMO Receivers Open Access

    Satoshi DENNO  Koki KASHIHARA  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/08/01
      Vol:
    E106-B No:2
      Page(s):
    184-192

    This paper proposes a novel approach to low complexity soft input decoding for lattice reduction-aided MIMO receivers. The proposed approach feeds a soft input decoder with soft signals made from hard decision signals generated by using a lattice reduction-aided linear detector. The soft signal is a weighted-sum of some candidate vectors that are near by the hard decision signal coming out from the lattice reduction-aided linear detector. This paper proposes a technique to adjust the weight adapt to the channel for the higher transmission performance. Furthermore, we propose to introduce a coefficient that is used for the weights in order to enhance the transmission performance. The transmission performance is evaluated in a 4×4 MIMO channel. When a linear MMSE filter or a serial interference canceller is used as the linear detector, the proposed technique achieves about 1.0dB better transmission performance at the BER of 10-5 than the decoder fed with the hard decision signals. In addition, the low computational complexity of the proposed technique is quantitatively evaluated.

  • A Compression Router for Low-Latency Network-on-Chip

    Naoya NIWA  Yoshiya SHIKAMA  Hideharu AMANO  Michihiro KOIBUCHI  

     
    PAPER-Computer System

      Pubricized:
    2022/11/08
      Vol:
    E106-D No:2
      Page(s):
    170-180

    Network-on-Chips (NoCs) are important components for scalable many-core processors. Because the performance of parallel applications is usually sensitive to the latency of NoCs, reducing it is a primary requirement. In this study, a compression router that hides the (de)compression-operation delay is proposed. The compression router (de)compresses the contents of the incoming packet before the switch arbitration is completed, thus shortening the packet length without latency penalty and reducing the network injection-and-ejection latency. Evaluation results show that the compression router improves up to 33% of the parallel application performance (conjugate gradients (CG), fast Fourier transform (FT), integer sort (IS), and traveling salesman problem (TSP)) and 63% of the effective network throughput by 1.8 compression ratio on NoC. The cost is an increase in router area and its energy consumption by 0.22mm2 and 1.6 times compared to the conventional virtual-channel router. Another finding is that off-loading the decompressor onto a network interface decreases the compression-router area by 57% at the expense of the moderate increase in communication latency.

101-120hit(3924hit)