The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

561-580hit(2923hit)

  • Low Cost, High Performance of Coplanar Waveguide Fabricated by Screen Printing Technology Open Access

    Masahiro HORIBE  

     
    INVITED PAPER

      Vol:
    E99-C No:10
      Page(s):
    1094-1099

    This paper presents an innovative fabrication process for a planar circuits at millimeter-wave frequency. Screen printing technology provides low cost and high performance coplanar waveguides (CPW) lines in planar devices operated at millimeter-wave frequency up to 110GHz. Printed transmission lines provide low insertion losses of 0.30dB/mm at 110GHz and small return loss like as impedance standard lines. In the paper, Multiline Thru-Reflect-Line (TRL) calibration was also demonstrated by using the impedance standard substrates (ISS) fabricated by screen printing. Regarding calibration capability validation, verification devices were measured and compare the results to the result obtained by the TRL calibration using commercial ISS. The comparison results obtained by calibration of screen printing ISS are almost the same as results measured based on conventional ISS technology.

  • Topics Arising from the WRC-15 with Respect to Satellite-Related Agenda Items Open Access

    Nobuyuki KAWAI  Satoshi IMATA  

     
    INVITED PAPER

      Vol:
    E99-B No:10
      Page(s):
    2113-2120

    Along with remarkable advancement of radiocommunication services including satellite services, the radio-frequency spectrum and geostationary-satellite orbit are getting congested. WRC-15 was held in November 2015 to study and implement efficient use of those natural resources. There were a number of satellite-related agenda items associated with frequency allocation, new usages of satellite communications and satellite regulatory issues. This paper overviews the outcome from these agenda items of WRC-15 as well as the agenda items for the next WRC (i.e. the WRC-19).

  • Cooperative Path Selection Framework for Effective Data Gathering in UAV-Aided Wireless Sensor Networks

    Sotheara SAY  Mohamad Erick ERNAWAN  Shigeru SHIMAMOTO  

     
    PAPER

      Vol:
    E99-B No:10
      Page(s):
    2156-2167

    Sensor networks are often used to understand underlying phenomena that are reflected through sensing data. In real world applications, this understanding supports decision makers attempting to access a disaster area or monitor a certain event regularly and thus necessary actions can be triggered in response to the problems. Practitioners designing such systems must overcome difficulties due to the practical limitations of the data and the fidelity of a network condition. This paper explores the design of a network solution for the data acquisition domain with the goal of increasing the efficiency of data gathering efforts. An unmanned aerial vehicle (UAV) is introduced to address various real-world sensor network challenges such as limited resources, lack of real-time representative data, and mobility of a relay station. Towards this goal, we introduce a novel cooperative path selection framework to effectively collect data from multiple sensor sources. The framework consists of six main parts ranging from the system initialization to the UAV data acquisition. The UAV data acquisition is useful to increase situational awareness or used as inputs for data manipulation that support response efforts. We develop a system-based simulation that creates the representative sensor networks and uses the UAV for collecting data packets. Results using our proposed framework are analyzed and compared to existing approaches to show the efficiency of the scheme.

  • Deforming Pyramid: Multiscale Image Representation Using Pixel Deformation and Filters for Non-Equispaced Signals

    Saho YAGYU  Akie SAKIYAMA  Yuichi TANAKA  

     
    PAPER

      Vol:
    E99-A No:9
      Page(s):
    1646-1654

    We propose an edge-preserving multiscale image decomposition method using filters for non-equispaced signals. It is inspired by the domain transform, which is a high-speed edge-preserving smoothing method, and it can be used in many image processing applications. One of the disadvantages of the domain transform is sensitivity to noise. Even though the proposed method is based on non-equispaced filters similar to the domain transform, it is robust to noise since it employs a multiscale decomposition. It uses the Laplacian pyramid scheme to decompose an input signal into the piecewise-smooth components and detail components. We design the filters by using an optimization based on edge-preserving smoothing with a conversion of signal distances and filters taking into account the distances between signal intervals. In addition, we also propose construction methods of filters for non-equispaced signals by using arbitrary continuous filters or graph spectral filters in order that various filters can be accommodated by the proposed method. As expected, we find that, similar to state-of-the-art edge-preserving smoothing techniques, including the domain transform, our approach can be used in many applications. We evaluated its effectiveness in edge-preserving smoothing of noise-free and noisy images, detail enhancement, pencil drawing, and stylization.

  • Circular Bit-Vector-Mismatches: A New Approximate Circular String Matching with k-Mismatches

    ThienLuan HO  Seung-Rohk OH  HyunJin KIM  

     
    LETTER-Algorithms and Data Structures

      Vol:
    E99-A No:9
      Page(s):
    1726-1729

    This paper proposes a circular bit-vector-mismatches (CBVM) algorithm for approximate circular string matching with k-mismatches. We develop the proposed CBVM algorithm based on the rotation feature of the circular pattern. By reusing the matching information of the previous substring, the next substring of the input string can be processed in parallel.

  • Detecting Logical Inconsistencies by Clustering Technique in Natural Language Requirements

    Satoshi MASUDA  Tohru MATSUODANI  Kazuhiko TSUDA  

     
    PAPER

      Pubricized:
    2016/07/06
      Vol:
    E99-D No:9
      Page(s):
    2210-2218

    In the early phases of the system development process, stakeholders exchange ideas and describe requirements in natural language. Requirements described in natural language tend to be vague and include logical inconsistencies, whereas logical consistency is the key to raising the quality and lowering the cost of system development. Hence, it is important to find logical inconsistencies in the whole requirements at this early stage. In verification and validation of the requirements, there are techniques to derive logical formulas from natural language requirements and evaluate their inconsistencies automatically. Users manually chunk the requirements by paragraphs. However, paragraphs do not always represent logical chunks. There can be only one logical chunk over some paragraphs on the other hand some logical chunks in one paragraph. In this paper, we present a practical approach to detecting logical inconsistencies by clustering technique in natural language requirements. Software requirements specifications (SRSs) are the target document type. We use k-means clustering to cluster chunks of requirements and develop semantic role labeling rules to derive “conditions” and “actions” as semantic roles from the requirements by using natural language processing. We also construct an abstraction grammar to transform the conditions and actions into logical formulas. By evaluating the logical formulas with input data patterns, we can find logical inconsistencies. We implemented our approach and conducted experiments on three case studies of requirements written in natural English. The results indicate that our approach can find logical inconsistencies.

  • Knowledge-Based Reestablishment of Primary Exclusive Region in Database-Driven Spectrum Sharing

    Shota YAMASHITA  Koji YAMAMOTO  Takayuki NISHIO  Masahiro MORIKURA  

     
    PAPER

      Vol:
    E99-B No:9
      Page(s):
    2019-2027

    Technological developments in wireless communication have led to an increasing demand for radio frequencies. This has necessitated the practice of spectrum sharing to ensure optimal usage of the limited frequencies, provided this does not cause interference. This paper presents a framework for managing an unexpected situation in which a primary user experiences harmful interference with regard to database-driven secondary use of spectrum allocated to the primary user towards 5G mobile networks, where the primary user is assumed to be a radar system. In our proposed framework, the primary user informs a database that they are experiencing harmful interference. Receiving the information, the database updates a primary exclusive region in which secondary users are unable to operate in the licensed spectrum. Subsequent to the update, this primary exclusive region depends on the knowledge about the secondary users when the primary user experiences harmful interference, knowledge of which is stored in the database. We assume a circular primary exclusive region centered at a primary receiver and derive an optimal radius of the primary exclusive region by applying stochastic geometry. Then, for each type of knowledge stored in the database for the secondary user, we evaluate the optimal radius for a target probability that the primary user experiences harmful interference. The results show that the more detailed the knowledge of the secondary user's density and transmission power stored in the database, the smaller the radius that has to be determined for the primary exclusive region after the update and the more efficient the spatial reuse of the licensed spectrum that can be achieved.

  • Database Calibration for Outdoor Wi-Fi Positioning System

    Yuyang HUANG  Li-Ta HSU  Yanlei GU  Haitao WANG  Shunsuke KAMIJO  

     
    PAPER-Intelligent Transport System

      Vol:
    E99-A No:9
      Page(s):
    1683-1690

    The limitation of the GPS in urban canyon has led to the rapid development of Wi-Fi positioning system (WPS). The fingerprint-based WPS could be divided into calibration and positioning stages. In calibration stage, several grid points (GPs) are selected, and their position tags and featured access points (APs) are collected to build fingerprint database. In positioning stage, real time measurement of APs are compared with the feature of each GP in the database. The k weighted nearest neighbors (KWNN) algorithm is used as pattern matching algorithm to estimate the final positioning result. However, the performance of outdoor fingerprint-based WPS is not good enough for pedestrian navigation. The main challenge is to build a robust fingerprint database. The received number of APs in outdoor environments has large variation. In addition, positioning result estimated by GPS receiver is used as position tag of each GP to automatically build the fingerprint database. This paper studies the lifecycle of fingerprint database in outdoor environment. We also shows that using long time collected data to build database could improve the positioning accuracy. Moreover, a new 3D-GNSS (3D building models aided GNSS) positioning method is used to provide accurate position tags. In this paper, the fingerprint-based WPS has been developed in an outdoor environment near the center of Tokyo city. The proposed WPS can achieve around 17 meters positioning accuracy in urban canyon.

  • Complex Networks Clustering for Lower Power Scan Segmentation in At-Speed Testing

    Zhou JIANG  Guiming LUO  Kele SHEN  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:9
      Page(s):
    1071-1079

    The scan segmentation method is an efficient solution to deal with the test power problem; However, the use of multiple capture cycles may cause capture violations, thereby leading to fault coverage loss. This issue is much more severe in at-speed testing. In this paper, two scan partition schemes based on complex networks clustering ara proposed to minimize the capture violations without increasing test-data volume and extra area overhead. In the partition process, we use a more accurate notion, spoiled nodes, instead of violation edges to analyse the dependency of flip-flops (ffs), and we use the shortest-path betweenness (SPB) method and the Laplacian-based graph partition method to find the best combination of these flip-flops. Beyond that, the proposed methods can use any given power-unaware set of patterns to test circuits, reducing both shift and capture power in at-speed testing. Extensive experiments have been performed on reference circuit ISCAS89 and IWLS2005 to verify the effectiveness of the proposed methods.

  • A Survey of Geographic Routing Protocols for Vehicular Ad Hoc Networks as a Sensing Platform

    Kenichi MASE  

     
    SURVEY PAPER

      Vol:
    E99-B No:9
      Page(s):
    1938-1948

    An overview of the evolution of intelligent transport systems (ITS) supported by advances in information and communication technologies is presented. Focusing on a sensing platform as one of the ITS applications, this paper presents a survey on vehicular ad hoc network-based geographic routing. In addition to the minimum requirement of street-awareness based on street maps, traffic and packet-awareness are considered essential to achieve acceptable packet delivery performance. In particular, in addition to statistical information, real-time traffic and packet level information are indispensable for making routing protocols feasible and effective. Considering traffic conditions that are highly space- and time-dependent, static nodes can be used to assist with geographic routing, and a protocol workable under a partial deployment of static nodes is considered.

  • The Constructions of Mismatched Filtering of Periodic Quadriphase Sequences with Even Length

    Xiuping PENG  Chengqian XU  Jiadong REN  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:9
      Page(s):
    1735-1739

    Quadriphase sequences with good correlation properties are required in higher order digital modulation schemes, e.g., for timing measurements, channel estimation or synchronization. In this letter, based on interleaving technique and pairs of mismatched binary sequences with perfect cross-correlation function (PCCF), two new methods for constructing quadriphase sequences with mismatched filtering which exist for even length N ≡ 2(mod4) are presented. The resultant perfect mismatched quadriphase sequences have high energy efficiencies. Compared with the existing methods, the new methods have flexible parameters and can give cyclically distinct perfect mismatched quadriphase sequences.

  • Energy-Based Tree Illustration System: ETIS

    Katsuto NAKAJIMA  Azusa MAMA  Yuki MORIMOTO  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/05/25
      Vol:
    E99-D No:9
      Page(s):
    2417-2421

    We propose a system named ETIS (Energy-based Tree Illustration System) for automatically generating tree illustrations characteristic of two-dimensional ones with features such as exaggerated branch curves, leaves, and flowers. The growth behavior of the trees can be controlled by adjusting the energy. The canopy shape and the region to fill with leaves and flowers are also controlled by hand-drawn guide lines.

  • Modelling Load Balancing Mechanisms in Self-Optimising 4G Mobile Networks with Elastic and Adaptive Traffic

    Mariusz GŁĄBOWSKI  Sławomir HANCZEWSKI  Maciej STASIAK  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:8
      Page(s):
    1718-1726

    This article describes an approximate model of a group of cells in the wireless 4G network with implemented load balancing mechanism. An appropriately modified model of Erlang's Ideal Grading is used to model this group of cells. The model makes it possible to take into account limited availability of resources of individual cells to multi-rate elastic and adaptive traffic streams generated by Erlang and Engset sources. The developed solution allows the basic traffic characteristics in the considered system to be determined, i.e. the occupancy distribution and the blocking probability. Because of the approximate nature of the proposed model, the results obtained based on the model were compared with the results of a digital simulation. The present study validates the adopted assumptions of the proposed model.

  • Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption

    Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2079-2089

    Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive or private data, cares are necessary. In this paper, we propose a secure system for privacy-protecting both the training and predicting data in logistic regression via homomorphic encryption. Perhaps surprisingly, despite the non-polynomial tasks of training and predicting in logistic regression, we show that only additively homomorphic encryption is needed to build our system. Indeed, we instantiate our system with Paillier, LWE-based, and ring-LWE-based encryption schemes, highlighting the merits and demerits of each instantiation. Besides examining the costs of computation and communication, we carefully test our system over real datasets to demonstrate its utility.

  • Energy-Efficient Resource Allocation in Sensing-Based Spectrum Sharing for Cooperative Cognitive Radio Networks

    Wanming HAO  Shouyi YANG  Osamu MUTA  Haris GACANIN  Hiroshi FURUKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1763-1771

    Energy-efficient resource allocation is considered in sensing-based spectrum sharing for cooperative cognitive radio networks (CCRNs). The secondary user first listens to the spectrum allocated to the primary user (PU) to detect the PU state and then initiates data transmission with two power levels based on the sensing decision (e.g., idle or busy). Under this model, the optimization problem of maximizing energy efficiency (EE) is formulated over the transmission power and sensing time subject to some practical limitations, such as the individual power constraint for secondary source and relay, the quality of service (QoS) for the secondary system, and effective protection for the PU. Given the complexity of this problem, two simplified versions (i.e., perfect and imperfect sensing cases) are studied in this paper. We transform the considered problem in fractional form into an equivalent optimization problem in subtractive form. Then, for perfect sensing, the Lagrange dual decomposition and iterative algorithm are applied to acquire the optimal power allocation policy; for imperfect sensing, an exhaustive search and iterative algorithm are proposed to obtain the optimal sensing time and corresponding power allocation strategy. Finally, numerical results show that the energy-efficient design greatly improves EE compared with the conventional spectrum-efficient design.

  • Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things Open Access

    Huaqun WANG  Keqiu LI  Kaoru OTA  Jian SHEN  

     
    INVITED PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    1966-1973

    In the health IoT (Internet of Things), the specialized sensor devices can be used to monitor remote health and notify the emergency information, e.g., blood pressure, heart rate, etc. These data can help the doctors to rescue the patients. In cloud-based health IoT, patients' medical/health data is managed by the cloud service providers. Secure storage and privacy preservation are indispensable for the outsourced medical/health data in cloud computing. In this paper, we study the integrity checking and sharing of outsourced private medical/health records for critical patients in public clouds (ICS). The patient can check his own medical/health data integrity and retrieve them. When a patient is in coma, some authorized entities and hospital can cooperate to share the patient's necessary medical/health data in order to rescue the patient. The paper studies the system model, security model and concrete scheme for ICS in public clouds. Based on the bilinear pairing technique, we design an efficient ICS protocol. Through security analysis and performance analysis, the proposed protocol is provably secure and efficient.

  • An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform

    Sila CHUNWIJITRA  Chanchai JUNLOUCHAI  Sitdhibong LAOKOK  Pornchai TUMMARATTANANONT  Kamthorn KRAIRAKSA  Chai WUTIWIWATCHAI  

     
    PAPER-Educational Technology

      Pubricized:
    2016/05/19
      Vol:
    E99-D No:8
      Page(s):
    2140-2150

    Massive Open Online Courses (MOOC) have been invented to support Virtual Learning Environment (VLE) for higher education. While numerous learning courses and contents were authored, most of the existing resources are now hard to reuse/redistribute among instructors due to the privacy of the contents. Therefore, Open Educational Resources (OER) and the Creative Commons license (CC) are interesting solutions available to alleviate such problems of MOOC. This research presents a new framework that effectively connects OER and MOOC for a life-long e-Learning platform for Thai people. We utilize the Fedora Commons repository for an OER back-end, and develop a new front-end to manage OER resources. In addition, we introduce a “FedX API” - including a packet encapsulation and a data transmission module - that organizes educational resources between both systems. We also proposed the CC declaring function to help participants on-the-fly declare their content license; therefore, any resources must be granted as an open licensing. Another important function is a Central Authorized System (CAS) which is applied to develop single signing-on to facilitate the OER-MOOC connection. Since the framework is designed to support the massive demand, the concurrent access capability is also evaluated to measure the performance of the proposed framework. The results show that the proposed framework can provide up to 750 concurrencies without any defects. The FedX API does not produce bottleneck trouble on the interoperability framework in any cases. In addition, resources can be exchanged among the third-party OER repositories by an OAI-PMH harvesting tool.

  • Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network

    Duc Tiep VU  Kyungbaek KIM  

     
    LETTER-Information Network

      Pubricized:
    2016/05/19
      Vol:
    E99-D No:8
      Page(s):
    2177-2181

    Recently in an SDN/NFV-enabled network, a consolidated middlebox is proposed in which middlebox functions required by a network flow are provided at a single machine in a virtualized manner. With the promising advantages such as simplifying network traffic routing and saving resources of switches and machines, consolidated middleboxes are going to replace traditional middleboxes in the near future. However, the location of consolidated middleboxes may affect the performance of an SDN/NFV network significantly. Accordingly, the consolidated middlebox positioning problem in an SDN/NFV-enabled network must be addressed adequately with service chain constraints (a flow must visit a specific type of consolidated middlebox), resource constraints (switch memory and processing power of the machine), and performance requirements (end-to-end delay and bandwidth consumption). In this paper, we propose a novel solution of the consolidated middlebox positioning problem in an SDN/NFV-enabled network based on flow clustering to improve the performance of service chain flows and utilization of a consolidated middlebox. Via extensive simulations, we show that our solution significantly reduces the number of routing rules per switch, the end-to-end delay and bandwidth consumption of service flows while meeting service chain and resource constraints.

  • BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

    Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2002-2009

    Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.

  • The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning

    Shutchon PREMCHAISAWATT  Nararat RUANGCHAIJATUPON  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/05/17
      Vol:
    E99-D No:8
      Page(s):
    2131-2139

    In this work, the novel fingerprinting evaluation parameter, which is called the punishment cost, is proposed. This parameter can be calculated from the designed matrix, the punishment matrix, and the confusion matrix. The punishment cost can describe how well the result of positioning is in the designated grid or not, by which the conventional parameter, the accuracy, cannot describe. The experiment is done with real measured data on weekdays and weekends. The results are considered in terms of accuracy and the punishment cost. Three well-known machine learning algorithms, i.e. Decision Tree, k-Nearest Neighbors, and Artificial Neural Network, are verified in fingerprinting positioning. In experimental environment, Decision Tree can perform well on the data from weekends whereas the performance is underrated on the data from weekdays. The k-Nearest Neighbors has proper punishment costs, even though it has lower accuracy than that of Artificial Neural Network, which has moderate accuracies but lower punishment costs. Therefore, other criteria should be considered in order to select the algorithm for indoor positioning. In addition, punishment cost can facilitate the conversion spot positioning to floor positioning without data modification.

561-580hit(2923hit)