The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

2541-2560hit(6809hit)

  • Query Processing in a Traceable P2P Record Exchange Framework

    Fengrong LI  Yoshiharu ISHIKAWA  

     
    PAPER-Parallel and Distributed Databases

      Vol:
    E93-D No:6
      Page(s):
    1433-1446

    As the spread of high-speed networks and the development of network technologies, P2P technologies are actively used today for information exchange in the network. While information exchange in a P2P network is quite flexible, there is an important problem--lack of reliability. Since we cannot know the details of how the data was obtained, it is hard to fully rely on it. To ensure the reliability of exchanged data, we have proposed the framework of a traceable P2P record exchange based on database technologies. In this framework, records are exchanged among autonomous peers, and each peer stores its exchange and modification histories in it. The framework supports the function of tracing queries to query the details of the obtained data. A tracing query is described in datalog and executed as a recursive query in the P2P network. In this paper, we focus on the query processing strategies for the framework. We consider two types of queries, ad hoc queries and continual queries, and present the query processing strategies for their executions.

  • A Two-Stage Composition Method for Danger-Aware Services Based on Context Similarity

    Junbo WANG  Zixue CHENG  Lei JING  Kaoru OTA  Mizuo KANSEN  

     
    PAPER-Information Network

      Vol:
    E93-D No:6
      Page(s):
    1521-1539

    Context-aware systems detect user's physical and social contexts based on sensor networks, and provide services that adapt to the user accordingly. Representing, detecting, and managing the contexts are important issues in context-aware systems. Composition of contexts is a useful method for these works, since it can detect a context by automatically composing small pieces of information to discover service. Danger-aware services are a kind of context-aware services which need description of relations between a user and his/her surrounding objects and between users. However when applying the existing composition methods to danger-aware services, they show the following shortcomings that (1) they have not provided an explicit method for representing composition of multi-user' contexts, (2) there is no flexible reasoning mechanism based on similarity of contexts, so that they can just provide services exactly following the predefined context reasoning rules. Therefore, in this paper, we propose a two-stage composition method based on context similarity to solve the above problems. The first stage is composition of the useful information to represent the context for a single user. The second stage is composition of multi-users' contexts to provide services by considering the relation of users. Finally the danger degree of the detected context is computed by using context similarity between the detected context and the predefined context. Context is dynamically represented based on two-stage composition rules and a Situation theory based Ontology, which combines the advantages of Ontology and Situation theory. We implement the system in an indoor ubiquitous environment, and evaluate the system through two experiments with the support of subjects. The experiment results show the method is effective, and the accuracy of danger detection is acceptable to a danger-aware system.

  • Analysis and Modeling of a Priority Inversion Scheme for Starvation Free Controller Area Networks

    Cheng-Min LIN  

     
    PAPER-Software System

      Vol:
    E93-D No:6
      Page(s):
    1504-1511

    Control Area Network (CAN) development began in 1983 and continues today. The forecast for annual world production in 2008 is approximately 65-67 million vehicles with 10-15 CAN nodes per vehicle on average . Although the CAN network is successful in automobile and industry control because the network provides low cost, high reliability, and priority messages, a starvation problem exists in the network because the network is designed to use a fixed priority mechanism. This paper presents a priority inversion scheme, belonging to a dynamic priority mechanism to prevent the starvation problem. The proposed scheme uses one bit to separate all messages into two categories with/without inverted priority. An analysis model is also constructed in this paper. From the model, a message with inverted priority has a higher priority to be processed than messages without inverted priority so its mean waiting time is shorter than the others. Two cases with and without inversion are implemented in our experiments using a probabilistic model checking tool based on an automatic formal verification technique. Numerical results demonstrate that low-priority messages with priority inversion have better expression in the probability in a full queue state than others without inversion. However, our scheme is very simple and efficient and can be easily implemented at the chip level.

  • Fixed-Width Group CSD Multiplier Design

    Yong-Eun KIM  Kyung-Ju CHO  Jin-Gyun CHUNG  Xinming HUANG  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:6
      Page(s):
    1497-1503

    This paper presents an error compensation method for fixed-width group canonic signed digit (GCSD) multipliers that receive a W-bit input and generate a W-bit product. To efficiently compensate for the truncation error, the encoded signals from the GCSD multiplier are used for the generation of the error compensation bias. By Synopsys simulations, it is shown that the proposed method leads to up to 84% reduction in power consumption and up to 78% reduction in area compared with the fixed-width modified Booth multipliers.

  • Efficient Power Network Analysis with Modeling of Inductive Effects

    Shan ZENG  Wenjian YU  Xianlong HONG  Chung-Kuan CHENG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E93-A No:6
      Page(s):
    1196-1203

    In this paper, an efficient method is proposed to accurately analyze large-scale power/ground (P/G) networks, where inductive parasitics are modeled with the partial reluctance. The method is based on frequency-domain circuit analysis and the technique of vector fitting, and obtains the time-domain voltage response at given P/G nodes. The frequency-domain circuit equation including partial reluctances is derived, and then solved with the GMRES algorithm with rescaling, preconditioning and recycling techniques. With the merit of sparsified reluctance matrix and iterative solving techniques for the frequency-domain circuit equations, the proposed method is able to handle large-scale P/G networks with complete inductive modeling. Numerical results show that the proposed method is orders of magnitude faster than HSPICE, several times faster than INDUCTWISE, and capable of handling the inductive P/G structures with more than 100,000 wire segments.

  • End User Perceptual Distorted Scenes Enhancement Algorithm Using Partition-Based Local Color Values for QoE-Guaranteed IPTV

    Jinsul KIM  

     
    LETTER

      Vol:
    E93-B No:6
      Page(s):
    1422-1425

    In this letter, we propose distorted scenes enhancement algorithm in order to provide end user perceptual QoE-guaranteed IPTV service. The block edge detection with weight factor and partition-based local color values method can be applied for the degraded video frames which are affected by network transmission errors such as out of order, jitter, and packet loss to improve QoE efficiently. Based on the result of quality metric after using the distorted scenes enhancement algorithm, the distorted scenes have been restored better than others.

  • An Integrated CMOS Front-End Receiver with a Frequency Tripler for V-Band Applications

    Po-Hung CHEN  Min-Chiao CHEN  Chun-Lin KO  Chung-Yu WU  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E93-C No:6
      Page(s):
    877-883

    A direct-conversion receiver integrated with the CMOS subharmonic frequency tripler (SFT) for V-band applications is designed, fabricated and measured using 0.13-µm CMOS technology. The receiver consists of a low-noise amplifier, a down-conversion mixer, an output buffer, and an SFT. A fully differential SFT is introduced to relax the requirements on the design of the frequency synthesizer. Thus, the operational frequency of the frequency synthesizer in the proposed receiver is only 20 GHz. The fabricated receiver has a maximum conversion gain of 19.4 dB, a minimum single-side band noise figure of 10.2 dB, the input-referred 1-dB compression point of -20 dBm and the input third order inter-modulation intercept point of -8.3 dB. It draws only 15.8 mA from a 1.2-V power supply with a total chip area of 0.794 mm0.794 mm. As a result, it is feasible to apply the proposed receiver in low-power wireless transceiver in the V-band applications.

  • Measurement and Evaluation of the Bioelectrical Impedance of the Human Body by Deconvolution of a Square Wave

    Yuhwai TSENG  Chauchin SU  Chien-Nan Jimmy LIU  

     
    LETTER-Biological Engineering

      Vol:
    E93-D No:6
      Page(s):
    1656-1660

    In this study, we use the deconvolution of a square test stimulus to replace a series of sinusoidal test waveforms with different frequencies to simplify the measurement of human body impedance. The average biological impedance of body parts is evaluated by constructing a frequency response of the equivalent human body system. Only two stainless-steel electrodes are employed in the measurement and evaluation.

  • Efficient Analyzing General Dominant Relationship Based on Partial Order Models

    Zhenglu YANG  Lin LI  Masaru KITSUREGAWA  

     
    PAPER-Information Retrieval

      Vol:
    E93-D No:6
      Page(s):
    1394-1402

    Skyline query is very important because it is the basis of many applications, e.g., decision making, user-preference queries. Given an N-dimensional dataset D, a point p is said to dominate another point q if p is better than q in at least one dimension and equal to or better than q in the remaining dimensions. In this paper, we study a generalized problem of skyline query that, users are more interested in the details of the dominant relationship in a dataset, i.e., a point p dominates how many other points and whom they are. We show that the existing framework proposed in can not efficiently solve this problem. We find the interrelated connection between the partial order and the dominant relationship. Based on this discovery, we propose a new data structure, ParCube, which concisely represents the dominant relationship. We propose some effective strategies to construct ParCube. Extensive experiments illustrate the efficiency of our methods.

  • Question Answering for the Operation of Software Applications: A Document Retrieval Approach

    Atsushi FUJII  Seiji TAKEGATA  

     
    PAPER-Natural Language Processing

      Vol:
    E93-D No:6
      Page(s):
    1369-1377

    Reflecting the rapid growth of information technology, the configuration of software applications such as word processors and spreadsheets is both sophisticated and complicated. It is often difficult for users to identify relevant functions in the online manual for a target application. In this paper, we propose a method for question answering that finds functions related to the user's request. To enhance our method, we addressed two "mismatch" problems. The first problem is associated with a mismatch in vocabulary, where the same concept is represented by different words in the manual and in the user's question. The second problem is associated with a mismatch in function. Although the user may have a hypothetical function for a purpose in mind, this purpose can sometimes be accomplished by other functions. To resolve these mismatch problems, we extract terms related to software functions from the Web, so that the user's question can be matched to the relevant function with high accuracy. We demonstrate the effectiveness of our method experimentally.

  • Spectral Methods for Thesaurus Construction

    Nobuyuki SHIMIZU  Masashi SUGIYAMA  Hiroshi NAKAGAWA  

     
    PAPER-Natural Language Processing

      Vol:
    E93-D No:6
      Page(s):
    1378-1385

    Traditionally, popular synonym acquisition methods are based on the distributional hypothesis, and a metric such as Jaccard coefficients is used to evaluate the similarity between the contexts of words to obtain synonyms for a query. On the other hand, when one tries to compile and clean a thesaurus, one often already has a modest number of synonym relations at hand. Could something be done with a half-built thesaurus alone? We propose the use of spectral methods and discuss their relation to other network-based algorithms in natural language processing (NLP), such as PageRank and Bootstrapping. Since compiling a thesaurus is very laborious, we believe that adding the proposed method to the toolkit of thesaurus constructors would significantly ease the pain in accomplishing this task.

  • 3-Hop Cooperative Diversity Using Quasi-Orthogonal Space-Time Block Code

    Tomoya YAMAOKA  Yoshitaka HARA  Noriyuki FUKUI  Hiroshi KUBO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1636-1640

    We propose 3-hop cooperative diversity using QOSTBC (Quasi-Orthogonal Space-Time Block Code), which offers 3-hop cooperative diversity without signal separation in relay nodes. The key of our proposed scheme is encoding signal sequence in different signal unit according to relay stage. This letter explains details of the proposed scheme and shows that it offers interference reduction among streams and space diversity gain by result of simulations.

  • A Signal Detection Circuit for 8b/10b 2.5 Gb/s Serial Data Communication System in 90 nm CMOS

    Kozue SASAKI  Hiroki SATO  Akira HYOGO  Keitaro SEKINE  

     
    BRIEF PAPER

      Vol:
    E93-C No:6
      Page(s):
    864-866

    This paper presents a CMOS signal detection circuit for 2.5 Gb/s serial data communication system over FR-4 backplane. This overcomes characteristics deviation of full-wave rectifier-based simple power detection circuits due to data pattern and temperature by using an edge detector and a sample-hold circuit.

  • Time Delay Estimator Based on Frequency Estimation Approach

    Kenneth Wing Kin LUI  Hing Cheung SO  

     
    LETTER-Digital Signal Processing

      Vol:
    E93-A No:6
      Page(s):
    1248-1250

    In this Letter, the problem of estimating the time-difference-of-arrival between signals received at two spatially separated sensors is addressed. By taking discrete Fourier transform of the sensor outputs, time delay estimation corresponds to finding the frequency of a noisy sinusoid with time-varying amplitude. The generalized weighted linear predictor is utilized to estimate the time delay and it is shown that its estimation accuracy attains Cramér-Rao lower bound.

  • Low-Cost Implementation of Single Frequency Estimation Scheme Using Auto-Correlation Function

    Hyun YANG  Young-Hwan YOU  

     
    LETTER-Digital Signal Processing

      Vol:
    E93-A No:6
      Page(s):
    1251-1253

    This letter proposes a low-complexity scheme for estimating the frequency of a complex sinusoid in flat fading channels. The proposed estimator yields an estimation performance that is comparable to the existing autocorrelation-based frequency estimator, while retaining the same frequency range. Its implementation complexity is much lower than the conventional scheme, thus this allows for fast estimation in real time.

  • A Throughput-Aimed MAC Protocol with QoS Provision for Cognitive Ad Hoc Networks Open Access

    Yichen WANG  Pinyi REN  Guangen WU  

     
    LETTER

      Vol:
    E93-B No:6
      Page(s):
    1426-1429

    In this letter, we propose a Throughput-aimed MAC Protocol with Quality of Service (QoS) provision (T-MAC) for cognitive Ad Hoc networks. This protocol operates based on the Time Division Multiple Access (TDMA) slot assignments and the power control mechanism, which can improve the QoS provision and network throughput. Our simulation results show that the T-MAC protocol can efficiently increase the network throughput and reduce the access delay.

  • Non-reference Objective Quality Evaluation for Noise-Reduced Speech Using Overall Quality Estimation Model

    Takeshi YAMADA  Yuki KASUYA  Yuki SHINOHARA  Nobuhiko KITAWAKI  

     
    PAPER

      Vol:
    E93-B No:6
      Page(s):
    1367-1372

    This paper describes non-reference objective quality evaluation for noise-reduced speech. First, a subjective test is conducted in accordance with ITU-T Rec. P.835 to obtain the speech quality, the noise quality, and the overall quality of noise-reduced speech. Based on the results, we then propose an overall quality estimation model. The unique point of the proposed model is that the estimation of the overall quality is done only using the previously estimated speech quality and noise quality, in contrast to conventional models, which utilize the acoustical features extracted. Finally, we propose a non-reference objective quality evaluation method using the proposed model. The results of an experiment with different noise reduction algorithms and noise types confirmed that the proposed method gives more accurate estimates of the overall quality compared with the method described in ITU-T Rec. P.563.

  • Distributed Reinforcement Learning Approach for Vehicular Ad Hoc Networks

    Celimuge WU  Kazuya KUMEKAWA  Toshihiko KATO  

     
    PAPER-Network

      Vol:
    E93-B No:6
      Page(s):
    1431-1442

    In Vehicular Ad hoc Networks (VANETs), general purpose ad hoc routing protocols such as AODV cannot work efficiently due to the frequent changes in network topology caused by vehicle movement. This paper proposes a VANET routing protocol QLAODV (Q-Learning AODV) which suits unicast applications in high mobility scenarios. QLAODV is a distributed reinforcement learning routing protocol, which uses a Q-Learning algorithm to infer network state information and uses unicast control packets to check the path availability in a real time manner in order to allow Q-Learning to work efficiently in a highly dynamic network environment. QLAODV is favored by its dynamic route change mechanism, which makes it capable of reacting quickly to network topology changes. We present an analysis of the performance of QLAODV by simulation using different mobility models. The simulation results show that QLAODV can efficiently handle unicast applications in VANETs.

  • Parametric Packet-Layer Model for Evaluation Audio Quality in Multimedia Streaming Services

    Noritsugu EGI  Takanori HAYASHI  Akira TAKAHASHI  

     
    PAPER

      Vol:
    E93-B No:6
      Page(s):
    1359-1366

    We propose a parametric packet-layer model for monitoring audio quality in multimedia streaming services such as Internet protocol television (IPTV). This model estimates audio quality of experience (QoE) on the basis of quality degradation due to coding and packet loss of an audio sequence. The input parameters of this model are audio bit rate, sampling rate, frame length, packet-loss frequency, and average burst length. Audio bit rate, packet-loss frequency, and average burst length are calculated from header information in received IP packets. For sampling rate, frame length, and audio codec type, the values or the names used in monitored services are input into this model directly. We performed a subjective listening test to examine the relationships between these input parameters and perceived audio quality. The codec used in this test was the Advanced Audio Codec-Low Complexity (AAC-LC), which is one of the international standards for audio coding. On the basis of the test results, we developed an audio quality evaluation model. The verification results indicate that audio quality estimated by the proposed model has a high correlation with perceived audio quality.

  • Sensor Localization Based on AOA-Assisted NLOS Identification

    Takahiro ASO  Teruyuki MIYAJIMA  

     
    LETTER-Communication Theory and Signals

      Vol:
    E93-A No:6
      Page(s):
    1274-1276

    In ubiquitous sensor networks, the estimation accuracy of a node location is limited due to the presence of non-line-of-sight (NLOS) paths. To mitigate the NLOS effects, this letter proposes a simple algorithm where NLOS identification is carried out using angle-of-arrival (AOA). Simulation results show that the use of AOA improves NLOS identification rates and location estimation accuracy.

2541-2560hit(6809hit)