The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PA(8249hit)

1281-1300hit(8249hit)

  • Automatically Extracting Parallel Sentences from Wikipedia Using Sequential Matching of Language Resources

    Juryong CHEON  Youngjoong KO  

     
    LETTER-Natural Language Processing

      Pubricized:
    2016/11/11
      Vol:
    E100-D No:2
      Page(s):
    405-408

    In this paper, we propose a method to find similar sentences based on language resources for building a parallel corpus between English and Korean from Wikipedia. We use a Wiki-dictionary consisted of document titles from the Wikipedia and bilingual example sentence pairs from Web dictionary instead of traditional machine readable dictionary. In this way, we perform similarity calculation between sentences using sequential matching of the language resources, and evaluate the extracted parallel sentences. In the experiments, the proposed parallel sentences extraction method finally shows 65.4% of F1-score.

  • FPGA Hardware Acceleration of a Phylogenetic Tree Reconstruction with Maximum Parsimony Algorithm

    Henry BLOCK  Tsutomu MARUYAMA  

     
    PAPER-Computer System

      Pubricized:
    2016/11/14
      Vol:
    E100-D No:2
      Page(s):
    256-264

    In this paper, we present an FPGA hardware implementation for a phylogenetic tree reconstruction with a maximum parsimony algorithm. We base our approach on a particular stochastic local search algorithm that uses the Progressive Neighborhood and the Indirect Calculation of Tree Lengths method. This method is widely used for the acceleration of the phylogenetic tree reconstruction algorithm in software. In our implementation, we define a tree structure and accelerate the search by parallel and pipeline processing. We show results for eight real-world biological datasets. We compare execution times against our previous hardware approach, and TNT, the fastest available parsimony program, which is also accelerated by the Indirect Calculation of Tree Lengths method. Acceleration rates between 34 to 45 per rearrangement, and 2 to 6 for the whole search, are obtained against our previous hardware approach. Acceleration rates between 2 to 36 per rearrangement, and 18 to 112 for the whole search, are obtained against TNT.

  • Structural and Behavioral Properties of Well-Structured Workflow Nets

    Zhaolong GOU  Shingo YAMAGUCHI  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    421-426

    Workflow nets (WF-nets for short) are a standard way to automate business processes. Well-Structured WF-nets (WS WF-nets for short) are an important subclass of WF-nets because they have a well-balanced capability to expression power and analysis power. In this paper, we revealed structural and behavioral properties of WS WF-nets. Our results on structural properties are: (i) There is no EFC but non-FC WF-net in WS WF-nets; (ii) A WS WF-net is sound iff it is a van Hee et al.'s ST-net. Our results on behavioral properties are: (i) Any WS WF-net is safe; (ii) Any WS WF-net is separable; (iii) A necessary and sufficient condition on reachability of sound WS WF-net (N,[pIk]). Finally we illustrated the usefulness of the proposed properties with an application example of analyzing workflow evolution.

  • Further Results on the Minimum and Stopping Distances of Full-Length RS-LDPC Codes

    Haiyang LIU  Hao ZHANG  Lianrong MA  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:2
      Page(s):
    738-742

    Based on the codewords of the [q,2,q-1] extended Reed-Solomon (RS) code over the finite field Fq, we can construct a regular binary γq×q2 matrix H(γ,q), where q is a power of 2 and γ≤q. The matrix H(γ,q) defines a regular low-density parity-check (LDPC) code C(γ,q), called a full-length RS-LDPC code. Using some analytical methods, we completely determine the values of s(H(4,q)), s(H(5,q)), and d(C(5,q)) in this letter, where s(H(γ,q)) and d(C(γ,q)) are the stopping distance of H(γ,q) and the minimum distance of C(γ,q), respectively.

  • An Error Correction Method for Neighborhood-Level Errors in NAND Flash Memories

    Shohei KOTAKI  Masato KITAKAMI  

     
    PAPER-Coding Theory

      Vol:
    E100-A No:2
      Page(s):
    653-662

    Rapid process scaling and the introduction of the multilevel cell (MLC) concept have lowered costs of NAND Flash memories, but also degraded reliability. For this reason, the memories are depending on strong error correcting codes (ECCs), and this has enabled the memories to be used in wide range of storage applications, including solid-state drives (SSDs). Meanwhile, too strong error correcting capability requires excessive decoding complexity and check bits. In NAND Flash memories, cell errors to neighborhood voltage levels are more probable than those to distant levels. Several ECCs reflecting this characteristics, including limited-magnitude ECCs which correct only errors with a certain limited magnitude and low-density parity check (LDPC) codes, have been proposed. However, as most of these ECCs need the multiple bits in a cell for encoding, they cannot be used with multipage programing, a high speed programming method currently employed in the memories. Also, binary ECCs with Gray codes are no longer optimal when multilevel voltage shifts (MVSs) occur. In this paper, an error correction method reflecting the error characteristic is presented. This method detects errors by a binary ECC as a conventional manner, but a nonbinary value or whole the bits in a cell, are subjected to error correction, so as to be corrected into the most probable neighborhood value. The amount of bit error rate (BER) improvement is depending on the probability of the each error magnitude. In case of 2bit/cell, if only errors of magnitude 1 and 2 can occur and the latter occupies 5% of cell errors, acceptable BER is improved by 4%. This is corresponding to extending 2.4% of endurance. This method needs about 15% longer average latency, 19% longer maximum latency, and 15% lower throughput. However, with using the conventional method until the memories' lifetime number of program/erase cycling, and the proposed method after that, BER improvement can be utilized for extending endurance without latency and throughput degradation until the switch of the methods.

  • A 12-bit 1.25MS/s Area-Efficient Radix-Value Self-Estimated Non-Binary Cyclic ADC with Relaxed Requirements on Analog Components

    Hao SAN  Rompei SUGAWARA  Masao HOTTA  Tatsuji MATSUURA  Kazuyuki AIHARA  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    534-540

    A 12-bit 1.25MS/s cyclic analog-to-digital converter (ADC) is designed and fabricated in 90nm CMOS technology, and only occupies an active area as small as 0.037mm2. The proposed ADC is composed of a non-binary AD convertion stage, and a on-chip non-binary-to-binary digital block includes a built-in radix-value self-estimation scheme. Therefore, althouh a non-binary convertion architechture is adopted, the proposed ADC is the same as other stand-alone binary ADCs. The redundancy of non-binary 1-bit/step architecture relaxes the accuracy requirement on analog components of ADC. As a result, the implementation of analog circuits such as amplifier and comparator becomes simple, and high-density Metal-Oxide-Metal (MOM) capacitors can be used to achieve a small chip area. Furthermore, the novel radix-value self-estimation technique can be realized by only simple logic circuits without any extra analog input, so that the total active area of ADC is dramatically reduced. The prototype ADC achieves a measured peak signal-to-noise-and-distortion-ratio (SNDR) of 62.3dB using a poor DC gain amplifier as low as 45dB and MOM capacitors without any careful layout techniques to improve the capacitor matching. The proposed ADC dissipated 490µW in analog circuits at 1.4V power supply and 1.25Msps (20MHz clocking). The measured DNL is +0.94/-0.71LSB and INL is +1.9/-1.2LSB at 30kHz sinusoidal input.

  • A Study on Adaptive Scheduling Priority Control for Layered Cell Configuration

    Atsushi NAGATE  Teruya FUJII  Masayuki MURATA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/09/15
      Vol:
    E100-B No:2
      Page(s):
    372-379

    The layered cell configuration, in which a large number of small cells are set in a macro-cell coverage area, is attracting much attention recently as a promising approach to handle the rapidly increasing mobile data traffic. In this configuration, cells of various sizes, from macro to small, are placed in various locations, so that the variation in the number and the distribution of the users among cells becomes much wider than in conventional macro-cell homogeneous networks. Therefore, even in the layered cell configuration, the users in the cell with many users and low received signal quality may experience low throughput especially at cell edge. This is because such users experience both low spectral efficiency and few radio resources. In order to resolve this issue, a lot of techniques have been proposed such as load balancing and cooperative multi-point transmission. In this paper, we focus on scheduling priority control as a simple solution that can also be used in combination with load balancing and coordinated multi-point transmission. We propose an adaptive scheduling priority control scheme based on the congestion and user distribution of each cell and clarify the effect of the proposed method by computer simulations.

  • An Improved Supervised Speech Separation Method Based on Perceptual Weighted Deep Recurrent Neural Networks

    Wei HAN  Xiongwei ZHANG  Meng SUN  Li LI  Wenhua SHI  

     
    LETTER-Speech and Hearing

      Vol:
    E100-A No:2
      Page(s):
    718-721

    In this letter, we propose a novel speech separation method based on perceptual weighted deep recurrent neural network (DRNN) which incorporate the masking properties of the human auditory system. In supervised training stage, we firstly utilize the clean label speech of two different speakers to calculate two perceptual weighting matrices. Then, the obtained different perceptual weighting matrices are utilized to adjust the mean squared error between the network outputs and the reference features of both the two clean speech so that the two different speech can mask each other. Experimental results on TSP speech corpus demonstrate that the proposed speech separation approach can achieve significant improvements over the state-of-the-art methods when tested with different mixing cases.

  • Maintenance Modeling for a System Equipped on Ship

    Tomohiro KITAGAWA  Tetsushi YUGE  Shigeru YANAGI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E100-A No:2
      Page(s):
    629-638

    The maintenance of a system on a ship has limitations when the ship is engaged in a voyage because of limited maintenance resources. When a system fails, it is either repaired instantly on ship with probability p or remains unrepaired during the voyage with probability 1-p owing to the lack of maintenance resources. In the latter case, the system is repaired after the voyage. We propose two management policies for the overhaul interval of an IFR system: one manages the overhaul interval by number of voyages and the other manages it by the total voyage time. Our goal is to determine the optimal policy that ensures the required availability of the system and minimizes the expected cost rate.

  • Personalized Movie Recommendation System Based on Support Vector Machine and Improved Particle Swarm Optimization

    Xibin WANG  Fengji LUO  Chunyan SANG  Jun ZENG  Sachio HIROKAWA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/11/21
      Vol:
    E100-D No:2
      Page(s):
    285-293

    With the rapid development of information and Web technologies, people are facing ‘information overload’ in their daily lives. The personalized recommendation system (PRS) is an effective tool to assist users extract meaningful information from the big data. Collaborative filtering (CF) is one of the most widely used personalized recommendation techniques to recommend the personalized products for users. However, the conventional CF technique has some limitations, such as the low accuracy of of similarity calculation, cold start problem, etc. In this paper, a PRS model based on the Support Vector Machine (SVM) is proposed. The proposed model not only considers the items' content information, but also the users' demographic and behavior information to fully capture the users' interests and preferences. An improved Particle Swarm Optimization (PSO) algorithm is also proposed to improve the performance of the model. The efficiency of the proposed method is verified by multiple benchmark datasets.

  • Hierarchical Sparse Bayesian Learning with Beta Process Priors for Hyperspectral Imagery Restoration

    Shuai LIU  Licheng JIAO  Shuyuan YANG  Hongying LIU  

     
    PAPER-Pattern Recognition

      Pubricized:
    2016/11/04
      Vol:
    E100-D No:2
      Page(s):
    350-358

    Restoration is an important area in improving the visual quality, and lays the foundation for accurate object detection or terrain classification in image analysis. In this paper, we introduce Beta process priors into hierarchical sparse Bayesian learning for recovering underlying degraded hyperspectral images (HSI), including suppressing the various noises and inferring the missing data. The proposed method decomposes the HSI into the weighted summation of the dictionary elements, Gaussian noise term and sparse noise term. With these, the latent information and the noise characteristics of HSI can be well learned and represented. Solved by Gibbs sampler, the underlying dictionary and the noise can be efficiently predicted with no tuning of any parameters. The performance of the proposed method is compared with state-of-the-art ones and validated on two hyperspectral datasets, which are contaminated with the Gaussian noises, impulse noises, stripes and dead pixel lines, or with a large number of data missing uniformly at random. The visual and quantitative results demonstrate the superiority of the proposed method.

  • A Compact MIMO Antenna System Using Split-Ring Resonator Antennas

    Keishi KOSAKA  Hiroshi TOYAO  Eiji HANKUI  

     
    PAPER

      Vol:
    E100-B No:2
      Page(s):
    234-241

    A novel compact multi-input multi-output (MIMO) antenna system with split-ring resonator (SRR), a popular metamaterial structure, is presented. The MIMO antenna system consists of SRRs as radiator elements arranged close to each other on a printed circuit board. We evaluate the antenna characteristics with a single and two SRR elements arranged within various sizes of area. We also analyze MIMO channel capacities of SRR elements by using radiation patterns. The obtained results confirm that the proposed MIMO antenna system can achieve the same channel capacity as a conventional MIMO antenna system but with a 30% smaller footprint area and is very suitable for compact wireless equipment in next-generation wireless systems.

  • Regression-Based Channel Capacity for the Evaluation of 2×2 MIMO Antennas

    Kazuhiro HONDA  Takeshi KITAMURA  Kun LI  Koichi OGAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/08/31
      Vol:
    E100-B No:2
      Page(s):
    323-335

    A simple but efficient method for evaluating the channel capacity of 2×2 multiple-input multiple-output (MIMO) antenna systems is proposed. First, the channel capacity of a half-wavelength dipole array antenna is calculated using the Monte Carlo method by changing the incident-wave signal-to-noise power ratio, the power difference between two elements, and the correlation coefficient. Using the calculated results, a polynomial function is derived by multivariate regression analysis to estimate the channel capacity. The validity of the developed function is confirmed by comparing the channel capacity estimated by the developed function with that calculated by the Monte Carlo method using a MIMO array antenna operated under various scenarios, including antenna-human body electromagnetic interactions and radio-wave propagation environments, for future MIMO systems. The function is also validated by means of two experimental approaches: the use of radiation patterns measured in an anechoic chamber and the use of a spatial fading emulator that can create a two-dimensional fading environment.

  • Dynamic Heterogeneous Particle Swarm Optimization

    Shiqin YANG  Yuji SATO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/11/02
      Vol:
    E100-D No:2
      Page(s):
    247-255

    Recently, the Static Heterogeneous Particle Swarm Optimization (SHPSO) has been studied by more and more researchers. In SHPSO, the different search behaviours assigned to particles during initialization do not change during the search process. As a consequence of this, the inappropriate population size of exploratory particles could leave the SHPSO with great difficulties of escaping local optima. This motivated our attempt to improve the performance of SHPSO by introducing the dynamic heterogeneity. The self-adaptive heterogeneity is able to alter its heterogeneous structure according to some events caused by the behaviour of the swarm. The proposed triggering events are confirmed by keeping track of the frequency of the unchanged global best position (pg) for a number of iterations. This information is then used to select a new heterogeneous structure when pg is considered stagnant. According to the different types of heterogeneity, DHPSO-d and DHPSO-p are proposed in this paper. In, particles dynamically use different rules for updating their position when the triggering events are confirmed. In DHPSO-p, a global gbest model and a pairwise connection model are automatically selected by the triggering configuration. In order to investigate the scalability of and DHPSO-p, a series of experiments with four state-of-the-art algorithms are performed on ten well-known optimization problems. The scalability analysis of and DHPSO-p reveals that the dynamic self-adaptive heterogeneous structure is able to address the exploration-exploitation trade-off problem in PSO, and provide the excellent optimal solution of a problem simultaneously.

  • A Hardware Efficient Multiple-Stream Pipeline FFT Processor for MIMO-OFDM Systems

    Kai-Feng XIA  Bin WU  Tao XIONG  Tian-Chun YE  Cheng-Ying CHEN  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:2
      Page(s):
    592-601

    In this paper, a hardware efficient design methodology for a configurable-point multiple-stream pipeline FFT processor is presented. We first compared the memory and arithmetic components of different pipeline FFT architectures, and obtained the conclusion that MDF architecture is more hardware efficient than MDC for the overall processor. Then, in order to reduce the computational complexity, a binary-tree representation was adopted to analyze the decomposition algorithm. Consequently, the coefficient multiplications are minimized among all the decomposition probabilities. In addition, an efficient output reorder circuit was designed for the multiple-stream architecture. An 128∼2048 point 4-stream FFT processor in LTE system was designed in SMIC 55nm technology for evaluation. It owns 1.09mm2 core area with 82.6mW power consumption at 122.88MHz clock frequency.

  • Novel Anti-Jamming Algorithm for GNSS Receivers Using Wavelet-Packet-Transform-Based Adaptive Predictors

    Ying-Ren CHIEN  Po-Yu CHEN  Shih-Hau FANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:2
      Page(s):
    602-610

    Powerful jammers are able to disable consumer-grade global navigation satellite system (GNSS) receivers under normal operating conditions. Conventional anti-jamming techniques based on the time-domain are unable to effectively suppress wide-band interference, such as chirp-like jammer. This paper proposes a novel anti-jamming architecture, combining wavelet packet signal analysis with adaptive filtering theory to mitigate chirp interference. Exploiting the excellent time-frequency resolution of wavelet technologies makes it possible to generate a reference chirp signal, which is basically a “de-noised” jamming signal. The reference jamming signal then is fed into an adaptive predictor to function as a refined jamming signal such that it predicts a replica of the jammer from the received signal. The refined chirp signal is then subtracted from the received signal to realize the aim of anti-jamming. Simulation results demonstrate the effectiveness of the proposed method in combating chirp interference in Galileo receivers. We achieved jamming-to-signal power ratio (JSR) of 50dB with an acquisition probability exceeding 90%, which is superior to many anti-jamming techniques based on the time-domain, such as conventional adaptive notch filters. The proposed method was also implemented in an software-defined GPS receiver for further validation.

  • Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered

    SeongHan SHIN  Kazukuni KOBARA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:2
      Page(s):
    639-652

    Anonymous password-based authentication protocols are designed to provide not only password-based authentication but also client anonymity. In [22], Qian et al. proposed a simple anonymous password-based authentication protocol (SAPAKE). In this paper, we reconsider the SAPAKE protocol [22] by first showing that an (third party) active attacker can impersonate the server and compute a session key with probability 1. After giving a formal model that captures such attacks, we propose a simple and secure anonymous password-based authentication (for short, S2APA) protocol that provides security against modification attacks on protocol-specific values and is more efficient than YZWB09/10 [32], [33] and SAPAKE [22]. Also, we prove that the S2APA protocol is AKE-secure against active attacks as well as modification attacks under the computational Diffie-Hellman problem in the random oracle model, and provides unconditional client anonymity against a semi-honest server, who honestly follows the protocol.

  • A Video Salient Region Detection Framework Using Spatiotemporal Consistency Optimization

    Yunfei ZHENG  Xiongwei ZHANG  Lei BAO  Tieyong CAO  Yonggang HU  Meng SUN  

     
    PAPER-Image

      Vol:
    E100-A No:2
      Page(s):
    688-701

    Labeling a salient region accurately in video with cluttered background and complex motion condition is still a challenging work. Most existing video salient region detection models mainly extract the stimulus-driven saliency features to detect the salient region in video. They are easily influenced by the cluttered background and complex motion conditions. It may lead to incomplete or wrong detection results. In this paper, we propose a video salient region detection framework by fusing the stimulus-driven saliency features and spatiotemporal consistency cue to improve the performance of detection under these complex conditions. On one hand, stimulus-driven spatial saliency features and temporal saliency features are extracted effectively to derive the initial spatial and temporal salient region map. On the other hand, in order to make use of the spatiotemporal consistency cue, an effective spatiotemporal consistency optimization model is presented. We use this model optimize the initial spatial and temporal salient region map. Then the superpixel-level spatiotemporal salient region map is derived by optimizing the initial spatiotemporal salient region map. Finally, the pixel-level spatiotemporal salient region map is derived by solving a self-defined energy model. Experimental results on the challenging video datasets demonstrate that the proposed video salient region detection framework outperforms state-of-the-art methods.

  • Degrees of Freedom of MIMO Multiway Relay Channels Using Distributed Interference Neutralization and Retransmission

    Bowei ZHANG  Wenjiang FENG  Qian XIAO  Luran LV  Zhiming WANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/08/09
      Vol:
    E100-B No:2
      Page(s):
    269-279

    In this paper, we study the degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) multiway relay channel (mRC) with two relays, two clusters and K (K≥3) users per cluster. We consider a clustered full data exchange model, i.e., each user in a cluster sends a multicast (common) message to all other users in the same cluster and desires to acquire all messages from them. The DoF results of the mRC with the single relay have been reported. However, the DoF achievability of the mRC with multiple relays is still an open problem. Furthermore, we consider a more practical scenario where no channel state information at the transmitter (CSIT) is available to each user. We first give a DoF cut-set upper bound of the considered mRC. Then, we propose a distributed interference neutralization and retransmission scheme (DINR) to approach the DoF cut-set upper bound. In the absence of user cooperation, this method focuses on the beamforming matrix design at each relay. By investigating channel state information (CSI) acquisition, we show that the DINR scheme can be performed by distributed processing. Theoretical analyses and numerical simulations show that the DoF cut-set upper bound can be attained by the DINR scheme. It is shown that the DINR scheme can provide significant DoF gain over the conventional time division multiple access (TDMA) scheme. In addition, we show that the DINR scheme is superior to the existing single relay schemes for the considered mRC.

  • Efficient Selection of Users' Pair in Cognitive Radio Network to Maximize Throughput Using Simultaneous Transmit-Sense Approach

    Muhammad Sajjad KHAN  Muhammad USMAN  Vu-Van HIEP  Insoo KOO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/09/01
      Vol:
    E100-B No:2
      Page(s):
    380-389

    Protection of the licensed user (LU) and utilization of the spectrum are the most important goals in cognitive radio networks. To achieve the first goal, a cognitive user (CU) is required to sense for a longer time period, but this adversely affects the second goal, i.e., throughput or utilization of the network, because of the reduced time left for transmission in a time slot. This tradeoff can be controlled by simultaneous sensing and data transmission for the whole frame duration. However, increasing the sensing time to the frame duration consumes more energy. We propose a new frame structure in this paper, in which transmission is done for the whole frame duration whereas sensing is performed only until the required detection probability is satisfied. This means the CU is not required to perform sensing for the whole frame duration, and thus, conserves some energy by sensing for a smaller duration. With the proposed frame structure, throughput of all the CUs is estimated for the frame and, based on the estimated throughput and consumed energy in sensing and transmission, the energy efficient pair of CUs (transmitter and receiver) that maximizes system throughput by consuming less energy, is selected for a time slot. The selected CUs transmits data for the whole time slot, whereas sensing is performed only for certain duration. The performance improvement of the proposed scheme is demonstrated through simulations by comparing it with existing schemes.

1281-1300hit(8249hit)