The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PA(8249hit)

541-560hit(8249hit)

  • Using the Rotation Matrix to Eliminate the Unitary Ambiguity in the Blind Estimation of Short-Code DSSS Signal Pseudo-Code

    Kejun LI  Yong GAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/03
      Vol:
    E103-B No:9
      Page(s):
    979-988

    For the blind estimation of short-code direct sequence spread spectrum (DSSS) signal pseudo-noise (PN) sequences, the eigenvalue decomposition (EVD) algorithm, the singular value decomposition (SVD) algorithm and the double-periodic projection approximation subspace tracking with deflation (DPASTd) algorithm are often used to estimate the PN sequence. However, when the asynchronous time delay is unknown, the largest eigenvalue and the second largest eigenvalue may be very close, resulting in the estimated largest eigenvector being any non-zero linear combination of the really required largest eigenvector and the really required second largest eigenvector. In other words, the estimated largest eigenvector exhibits unitary ambiguity. This degrades the performance of any algorithm estimating the PN sequence from the estimated largest eigenvector. To tackle this problem, this paper proposes a spreading sequence blind estimation algorithm based on the rotation matrix. First of all, the received signal is divided into two-information-period-length temporal vectors overlapped by one-information-period. The SVD or DPASTd algorithm can then be applied to obtain the largest eigenvector and the second largest eigenvector. The matrix composed of the largest eigenvector and the second largest eigenvector can be rotated by the rotation matrix to eliminate any unitary ambiguity. In this way, the best estimation of the PN sequence can be obtained. Simulation results show that the proposed algorithm not only solves the problem of estimating the PN sequence when the largest eigenvalue and the second largest eigenvalue are close, but also performs well at low signal-to-noise ratio (SNR) values.

  • Selective Pseudo-Labeling Based Subspace Learning for Cross-Project Defect Prediction

    Ying SUN  Xiao-Yuan JING  Fei WU  Yanfei SUN  

     
    LETTER-Software Engineering

      Pubricized:
    2020/06/10
      Vol:
    E103-D No:9
      Page(s):
    2003-2006

    Cross-project defect prediction (CPDP) is a research hot recently, which utilizes the data form existing source project to construct prediction model and predicts the defect-prone of software instances from target project. However, it is challenging in bridging the distribution difference between different projects. To minimize the data distribution differences between different projects and predict unlabeled target instances, we present a novel approach called selective pseudo-labeling based subspace learning (SPSL). SPSL learns a common subspace by using both labeled source instances and pseudo-labeled target instances. The accuracy of pseudo-labeling is promoted by iterative selective pseudo-labeling strategy. The pseudo-labeled instances from target project are iteratively updated by selecting the instances with high confidence from two pseudo-labeling technologies. Experiments are conducted on AEEEM dataset and the results show that SPSL is effective for CPDP.

  • Method of Measuring Conducted Noise Voltage with a Floating Measurement System to Ground Open Access

    Naruto ARAI  Ken OKAMOTO  Jun KATO  Yoshiharu AKIYAMA  

     
    PAPER

      Pubricized:
    2020/04/08
      Vol:
    E103-B No:9
      Page(s):
    903-910

    This paper describes a method of measuring the unsymmetric voltage of conducted noise using a floating measurement system. Here, floating means that there is no physical connection to the reference ground. The method works by correcting the measured voltage to the desired unsymmetric voltage using the capacitance between the measurement instrument and the reference ground plane acting as the return path of the conducted electromagnetic noise. The existing capacitance measurement instrument needs a probe in contact with the ground, so it is difficult to use for on-site measurement of stray capacitance to ground at troubleshooting sites where the ground plane is not exposed or no ground connection point is available. The authors have developed a method of measuring stray capacitance to ground that does not require physical connection of the probe to the ground plane. The developed method can be used to estimate the capacitance between the measurement instrument and ground plane even if the distance and relative permittivity of the space are unknown. And a method is proposed for correcting the voltage measured with the floating measurement system to obtain the unsymmetric voltage of the noise by using the measured capacitance to ground. In the experiment, the unsymmetric voltage of a sinusoidal wave transmitting on a co-axial cable was measured with a floating oscilloscope in a shield room and the measured voltage was corrected to within 2dB of expected voltage by using the capacitance measured with the developed method. In addition, the voltage of a rectangular wave measured with the floating oscilloscope, which displays sag caused by the stray capacitance to ground, was corrected to a rectangular wave without sag. This means that the phase of the unsymmetric voltage can also be corrected by the measured stray capacitance. From these results, the effectiveness of the proposed methods is shown.

  • Effect of Complex Permeability on Circuit Parameters of CPW with Magnetic Noise Suppression Sheet

    Sho MUROGA  Motoshi TANAKA  Takefumi YOSHIKAWA  Yasushi ENDO  

     
    PAPER

      Pubricized:
    2020/04/08
      Vol:
    E103-B No:9
      Page(s):
    899-902

    An effect of complex permeability of noise suppression sheets (NSS) on circuit parameters was investigated by a magnetic circuit analysis using cross-sectional size and material parameters. The series resistance and inductance of the coplanar waveguide (CPW) with a NSS considering the effect of the complex permeability of the NSS were quantitatively estimated. The result indicated that the imaginary and real part of the effective permeability affected the resistance and inductance, respectively. Furthermore, this analysis was applied to an 8-µm-wide CPW with a 0.5-µm-thick Co85Zr3Nb12 film for quantitative estimation of the resistance, the inductance and the characteristic impedance. The estimated parameters were almost similar to the measured values. These results showed that the frequency characteristics of the circuit parameters could be controlled by changing size and material parameters.

  • A Fast Length Matching Routing Pattern Generation Method for Set-Pair Routing Problem Using Selective Pin-Pair Connections Open Access

    Shimpei SATO  Kano AKAGI  Atsushi TAKAHASHI  

     
    PAPER

      Vol:
    E103-A No:9
      Page(s):
    1037-1044

    Routing problems derived from silicon-interposer and etc. are often formulated as a set-pair routing problem where the combination of pin-pairs to be connected is flexible. In this routing problem, a length matching routing pattern is often required due to the requirement of the signal propagation delays be the same. We propose a fast length matching routing method for the set-pair routing problem. The existing algorithm generates a good length matching routing pattern in practical time. However, due to the limited searching range, there are length matching routing patterns that cannot find due to the limited searching range of the algorithm. Also, it needs heavy iterative steps to improve a solution, and the computation time is practical but not fast. In the set-pair routing, although pin-pairs to be connected is flexible, it is expected that combinations of pin-pairs which realize length matching are restricted. In our method, such a combination of pin-pairs is selected in advance, then routing is performed to realize the connection of the selected pin-pairs. Heavy iterative steps are not used for both the selection and the routing, then a routing pattern is generated in a short time. In the experiments, we confirm that the quality of routing patterns generated by our method is almost equivalent to the existing algorithm. Furthermore, our method finds length matching routing patterns that the existing algorithm cannot find. The computation time is about 360 times faster than the existing algorithm.

  • A Capacitance Measurement Device for Running Hardware Devices and Its Evaluations

    Makoto NISHIZAWA  Kento HASEGAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E103-A No:9
      Page(s):
    1018-1027

    In IoT (Internet-of-Things) era, the number and variety of hardware devices becomes continuously increasing. Several IoT devices are utilized at infrastructure equipments. How to maintain such IoT devices is a serious concern. Capacitance measurement is one of the powerful ways to detect anomalous states in the structure of the hardware devices. Particularly, measuring capacitance while the hardware device is running is a major challenge but no such researches proposed so far. This paper proposes a capacitance measuring device which measures device capacitance in operation. We firstly combine the AC (alternating current) voltage signal with the DC (direct current) supply voltage signal and generates the fluctuating signal. We supply the fluctuating signal to the target device instead of supplying the DC supply voltage. By effectively filtering the observed current in the target device, the filtered current can be proportional to the capacitance value and thus we can measure the target device capacitance even when it is running. We have implemented the proposed capacitance measuring device on the printed wiring board with the size of 95mm × 70mm and evaluated power consumption and accuracy of the capacitance measurement. The experimental results demonstrate that power consumption of the proposed capacitance measuring device is reduced by 65% in low-power mode from measuring mode and proposed device successfully measured capacitance in 0.002μF resolution.

  • The Expected Distance of Shortest Path-Based In-Trees along Spanning Root Mobility on Grid Graph

    Yoshihiro KANEKO  

     
    PAPER

      Vol:
    E103-A No:9
      Page(s):
    1071-1077

    The paper deals with the shortest path-based in-trees on a grid graph. There a root is supposed to move among all vertices. As such a spanning mobility pattern, root trajectories based on a Hamilton path or cycle are discussed. Along such a trajectory, each vertex randomly selects the next hop on the shortest path to the root. Under those assumptions, this paper shows that a root trajectory termed an S-path provides the minimum expected symmetric difference. Numerical experiments show that another trajectory termed a Right-cycle also provides the minimum result.

  • Complexity-Reduced Adaptive PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Signals Open Access

    Taku SUZUKI  Mikihito SUZUKI  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/23
      Vol:
    E103-B No:9
      Page(s):
    1019-1029

    This paper proposes a computational complexity-reduced algorithm for an adaptive peak-to-average power ratio (PAPR) reduction method previously developed by members of our research group that uses the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. The proposed algorithm is an extension of the peak cancellation (PC) signal-based method that has been mainly investigated for per-antenna PAPR reduction. This method adds the PC signal, which is designed so that the out-of-band radiation is removed/reduced, directly to the time-domain transmission signal at each antenna. The proposed method, referred to as PCCNC (PC with channel-null constraint), performs vector-level signal processing in the PC signal generation so that the PC signal is transmitted only to the null space in the MIMO channel. We investigate three methods to control the beamforming (BF) vector in the PC signal, which is a key factor in determining the achievable PAPR performance of the algorithm. Computer simulation results show that the proposed PCCNC achieves approximately the same throughput-vs.-PAPR performance as the previous method while dramatically reducing the required computational cost.

  • Deep Learning Approaches for Pathological Voice Detection Using Heterogeneous Parameters

    JiYeoun LEE  Hee-Jin CHOI  

     
    LETTER-Speech and Hearing

      Pubricized:
    2020/05/14
      Vol:
    E103-D No:8
      Page(s):
    1920-1923

    We propose a deep learning-based model for classifying pathological voices using a convolutional neural network and a feedforward neural network. The model uses combinations of heterogeneous parameters, including mel-frequency cepstral coefficients, linear predictive cepstral coefficients and higher-order statistics. We validate the accuracy of this model using the Massachusetts Eye and Ear Infirmary (MEEI) voice disorder database and the Saarbruecken Voice Database (SVD). Our model achieved an accuracy of 99.3% for MEEI and 75.18% for SVD. This model achieved an accuracy that is 7.18% higher than that of competitive models in previous studies.

  • Dual-Polarized Metasurface Using Multi-Layer Ceramic Capacitors for Radar Cross Section Reduction

    Thanh-Binh NGUYEN  Naoyuki KINAI  Naobumi MICHISHITA  Hisashi MORISHITA  Teruki MIYAZAKI  Masato TADOKORO  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2020/02/18
      Vol:
    E103-B No:8
      Page(s):
    852-859

    This paper proposes a dual-polarized metasurface that utilizes multi-layer ceramic capacitors (MLCCs) for radar cross-section (RCS) reduction in the 28GHz band of the quasi-millimeter band. MLCCs are very small in size; therefore, miniaturization of the unit cell structure of the metamaterial can be expected, and the MLCCs can be periodically loaded onto a narrow object. First, the MLCC structure was modeled as a basic structure, and the effective permeability of the MLCC was determined to investigate the influence of the arrangement direction on MLCC interaction. Next, the unit cell structure of the dual-polarized metasurface was designed for an MLCC set on a dielectric substrate. By analyzing the infinite periodic structure and finite structure, the monostatic reduction characteristics, oblique incidence characteristics, and dual-polarization characteristics of the proposed metasurface were evaluated. In the case of the MLCCs arranged in the same direction, the monostatic RCS reduction was approximately 30dB at 29.8GHz, and decreased when the MLCCs were arranged in a checkerboard pattern. The monostatic RCS reductions for the 5 × 5, 10 × 10, and 20 × 20 divisions were roughly the same, i.e., 10.8, 9.9, and 10.3dB, respectively. Additionally, to validate the simulated results, the proposed dual-polarized metasurface was fabricated and measured. The measured results were found to approximately agree with the simulated results, confirming that the RCS can be reduced for dual-polarization operation.

  • A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements

    Kokoro KOBAYASHI  Tsuyoshi OGUNI  Masaki NAKAGAWA  

     
    PAPER-Computer System

      Pubricized:
    2020/04/06
      Vol:
    E103-D No:7
      Page(s):
    1623-1632

    This paper presents a series of secure PIN/password input methods resilient to shoulder hacking. When a person inputs a PIN or password to a smartphone, tablet, banking terminal, etc., there is a risk of shoulder hacking of the PIN or the password being stolen. To decrease the risk, we propose a method that erases key-top labels, moves them smoothly and simultaneously, and lets the user touch the target key after they stopped. The user only needs to trace a single key, but peepers have to trace the movements of all the keys at the same time. We extend the method by assigning different colors, shapes, and/or sizes to keys for enhancing distinguishability, which allows all the keys to be moved instantaneously after key-top labels are erased and the user to touch the target key. We also introduce a “move backward/forward” function that allows the user to play back the movements. This series of methods does not have the highest security, but it is easy to use and does not require any changes to the server side. Results of a performance evaluation demonstrate that this method has high resistance to shoulder hacking while providing satisfactory usability without large input errors.

  • S-Parameter Analysis for Balanced and Unbalanced Modes Corresponding Dissipated Power of a Small Antenna

    Takashi YANAGI  Yasuhiro NISHIOKA  Toru FUKASAWA  Naofumi YONEDA  Hiroaki MIYASHITA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/01/15
      Vol:
    E103-B No:7
      Page(s):
    780-786

    In this paper, an analysis method for calculating balanced and unbalanced modes of a small antenna is summarized. Modal condactances which relate dissipated power of the antenna are directly obtained from standard S-parameters that we can measure by a 2-port network analyzer. We demonstrate the validity and effectiveness of the proposed method by simulation and measurement for a dipole antenna with unbalaned feed. The ratio of unbalanced-mode power to the total power (unbalanced-mode power ratio) calculated by the proposed method agrees precisely with that yielded by the conventional method using measured radiation patterns. Furthermore, we analyze a small loop antenna with unbalanced feed by the proposed method and show that the self-balancing characteristic appears when the loop is set in resonant state by loading capacitances or the whole length of the loop is less than 1/20th the wavelength.

  • Optimization Approach to Minimize Backup Capacity Considering Routing in Primary and Backup Networks for Random Multiple Link Failures

    Soudalin KHOUANGVICHIT  Nattapong KITSUWAN  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2020/01/17
      Vol:
    E103-B No:7
      Page(s):
    726-735

    This paper proposes an optimization approach that designs the backup network with the minimum total capacity to protect the primary network from random multiple link failures with link failure probability. In the conventional approach, the routing in the primary network is not considered as a factor in minimizing the total capacity of the backup network. Considering primary routing as a variable when deciding the backup network can reduce the total capacity in the backup network compared to the conventional approach. The optimization problem examined here employs robust optimization to provide probabilistic survivability guarantees for different link capacities in the primary network. The proposed approach formulates the optimization problem as a mixed integer linear programming (MILP) problem with robust optimization. A heuristic implementation is introduced for the proposed approach as the MILP problem cannot be solved in practical time when the network size increases. Numerical results show that the proposed approach can achieve lower total capacity in the backup network than the conventional approach.

  • Magic Line: An Integrated Method for Fast Parts Counting and Orientation Recognition Using Industrial Vision Systems

    Qiaochu ZHAO  Ittetsu TANIGUCHI  Makoto NAKAMURA  Takao ONOYE  

     
    PAPER-Vision

      Vol:
    E103-A No:7
      Page(s):
    928-936

    Vision systems are widely adopted in industrial fields for monitoring and automation. As a typical example, industrial vision systems are extensively implemented in vibrator parts feeder to ensure orientations of parts for assembling are aligned and disqualified parts are eliminated. An efficient parts orientation recognition and counting method is thus critical to adopt. In this paper, an integrated method for fast parts counting and orientation recognition using industrial vision systems is proposed. Original 2D spatial image signal of parts is decomposed to 1D signal with its temporal variance, thus efficient recognition and counting is achievable, feeding speed of each parts is further leveraged to elaborate counting in an adaptive way. Experiments on parts of different types are conducted, the experimental results revealed that our proposed method is both more efficient and accurate compared to other relevant methods.

  • Participating-Domain Segmentation Based Server Selection Scheme for Real-Time Interactive Communication Open Access

    Akio KAWABATA  Bijoy CHAND CHATTERJEE  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2020/01/17
      Vol:
    E103-B No:7
      Page(s):
    736-747

    This paper proposes an efficient server selection scheme in successive participation scenario with participating-domain segmentation. The scheme is utilized by distributed processing systems for real-time interactive communication to suppress the communication latency of a wide-area network. In the proposed scheme, users participate for server selection one after another. The proposed scheme determines a recommended server, and a new user selects the recommended server first. Before each user participates, the recommended servers are determined assuming that users exist in the considered regions. A recommended server is determined for each divided region to minimize the latency. The new user selects the recommended available server, where the user is located. We formulate an integer linear programming problem to determine the recommended servers. Numerical results indicate that, at the cost additional computation, the proposed scheme offers smaller latency than the conventional scheme. We investigate different policies to divide the users' participation for the recommended server finding process in the proposed scheme.

  • Control Vector Selection for Extended Packetized Predictive Control in Wireless Networked Control Systems

    Keisuke NAKASHIMA  Takahiro MATSUDA  Masaaki NAGAHARA  Tetsuya TAKINE  

     
    PAPER-Network

      Pubricized:
    2020/01/15
      Vol:
    E103-B No:7
      Page(s):
    748-758

    We study wireless networked control systems (WNCSs), where controllers (CLs), controlled objects (COs), and other devices are connected through wireless networks. In WNCSs, COs can become unstable due to bursty packet losses and random delays on wireless networks. To reduce these network-induced effects, we utilize the packetized predictive control (PPC) method, where future control vectors to compensate bursty packet losses are generated in the receiving horizon manner, and they are packed into packets and transferred to a CO unit. In this paper, we extend the PPC method so as to compensate random delays as well as bursty packet losses. In the extended PPC method, generating many control vectors improves the robustness against both problems while it increases traffic on wireless networks. Therefore, we consider control vector selection to improve the robustness effectively under the constraint of single packet transmission. We first reconsider the input strategy of control vectors received by COs and propose a control vector selection scheme suitable for the strategy. In our selection scheme, control vectors are selected based on the estimated average and variance of round-trip delays. Moreover, we solve the problem that the CL may misconceive the CO's state due to insufficient information for state estimation. Simulation results show that our selection scheme achieves the higher robustness against both bursty packet losses and delays in terms of the 2-norm of the CO's state.

  • A Multilayer Steganography Method with High Embedding Efficiency for Palette Images

    Han-Yan WU  Ling-Hwei CHEN  Yu-Tai CHING  

     
    PAPER-Cryptographic Techniques

      Pubricized:
    2020/04/07
      Vol:
    E103-D No:7
      Page(s):
    1608-1617

    Embedding efficiency is an important issue in steganography methods. Matrix embedding (1, n, h) steganography was proposed by Crandall to achieve high embedding efficiency for palette images. This paper proposes a steganography method based on multilayer matrix embedding for palette images. First, a parity assignment is provided to increase the image quality. Then, a multilayer matrix embedding (k, 1, n, h) is presented to achieve high embedding efficiency and capacity. Without modifying the color palette, hk secret bits can be embedded into n pixels by changing at most k pixels. Under the same capacity, the embedding efficiency of the proposed method is compared with that of pixel-based steganography methods. The comparison indicates that the proposed method has higher embedding efficiency than pixel-based steganography methods. The experimental results also suggest that the proposed method provides higher image quality than some existing methods under the same embedding efficiency and capacity.

  • A Two-Stage Phase-Aware Approach for Monaural Multi-Talker Speech Separation

    Lu YIN  Junfeng LI  Yonghong YAN  Masato AKAGI  

     
    PAPER-Speech and Hearing

      Pubricized:
    2020/04/20
      Vol:
    E103-D No:7
      Page(s):
    1732-1743

    The simultaneous utterances impact the ability of both the hearing-impaired persons and automatic speech recognition systems. Recently, deep neural networks have dramatically improved the speech separation performance. However, most previous works only estimate the speech magnitude and use the mixture phase for speech reconstruction. The use of the mixture phase has become a critical limitation for separation performance. This study proposes a two-stage phase-aware approach for multi-talker speech separation, which integrally recovers the magnitude as well as the phase. For the phase recovery, Multiple Input Spectrogram Inversion (MISI) algorithm is utilized due to its effectiveness and simplicity. The study implements the MISI algorithm based on the mask and gives that the ideal amplitude mask (IAM) is the optimal mask for the mask-based MISI phase recovery, which brings less phase distortion. To compensate for the error of phase recovery and minimize the signal distortion, an advanced mask is proposed for the magnitude estimation. The IAM and the proposed mask are estimated at different stages to recover the phase and the magnitude, respectively. Two frameworks of neural network are evaluated for the magnitude estimation on the second stage, demonstrating the effectiveness and flexibility of the proposed approach. The experimental results demonstrate that the proposed approach significantly minimizes the distortions of the separated speech.

  • Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems

    Taewhan KIM  Kangsoo JUNG  Seog PARK  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2020/04/01
      Vol:
    E103-D No:7
      Page(s):
    1683-1692

    Web service users are overwhelmed by the amount of information presented to them and have difficulties in finding the information that they need. Therefore, a recommendation system that predicts users' taste is an essential factor for the success of businesses. However, recommendation systems require users' personal information and can thus lead to serious privacy violations. To solve this problem, many research has been conducted about protecting personal information in recommendation systems and implementing differential privacy, a privacy protection technique that inserts noise into the original data. However, previous studies did not examine the following factors in applying differential privacy to recommendation systems. First, they did not consider the sparsity of user rating information. The total number of items is much more than the number of user-rated items. Therefore, a rating matrix created for users and items will be very sparse. This characteristic renders the identification of user patterns in rating matrixes difficult. Therefore, the sparsity issue should be considered in the application of differential privacy to recommendation systems. Second, previous studies focused on protecting user rating information but did not aim to protect the lists of user-rated items. Recommendation systems should protect these item lists because they also disclose user preferences. In this study, we propose a differentially private recommendation scheme that bases on a grouping method to solve the sparsity issue and to protect user-rated item lists and user rating information. The proposed technique shows better performance and privacy protection on actual movie rating data in comparison with an existing technique.

  • Analysis and Minimization of Roundoff Noise for Generalized Direct-Form II Realization of 2-D Separable-Denominator Filters

    Takao HINAMOTO  Akimitsu DOI  Wu-Sheng LU  

     
    PAPER-Digital Signal Processing

      Vol:
    E103-A No:7
      Page(s):
    873-884

    Based on the concept of polynomial operators, this paper explores generalized direct-form II structure and its state-space realization for two-dimensional separable-denominator digital filters of order (m, n) where a structure with 3(m+n)+mn+1 fixed parameters plus m+n free parameters is introduced and analyzed. An l2-scaling method utilizing different coupling coefficients at different branch nodes to avoid overflow is presented. Expressions of evaluating the roundoff noise for the filter structure as well as its state-space realization are derived and investigated. The availability of the m+n free parameters is shown to be beneficial as the roundoff noise measures can be minimized with respect to these free parameters by means of an exhaustive search over a set with finite number of candidate elements. The important role these parameters can play in the endeavors of roundoff noise reduction is demonstrated by numerical experiments.

541-560hit(8249hit)