The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

3941-3960hit(16314hit)

  • Experimental Study on Arc Motion and Voltage Fluctuation at Slowly Separating Contact with External DC Magnetic Field

    Yoshiki KAYANO  Kazuaki MIYANAGA  Hiroshi INOUE  

     
    BRIEF PAPER

      Vol:
    E97-C No:9
      Page(s):
    858-862

    Since electromagnetic (EM) noise resulting from an arc discharge disturbs other electric devices, parameters on electromagnetic compatibility, as well as lifetime and reliability, are important properties for electrical contacts. To clarify the characteristics and the mechanism of the generation of the EM noise, the arc column and voltage fluctuations generated by slowly breaking contacts with external direct current (DC) magnetic field, up to 20,mT, was investigated experimentally using Ag$_{90.7{ m wt%}}$SnO$_{2,9.3{ m wt}%}$ material. Firstly the motion of the arc column is measured by high-speed camera. Secondary, the distribution of the motion of the arc and contact voltage are discussed. It was revealed that the contact voltage fluctuation in the arc duration is related to the arc column motion.

  • Experimental Investigation and Numerical Simulation on the Role of Sphere Indenter in Measuring Contact Resistance of Flat Rivets

    Wanbin REN  Yu CHEN  Shengjun XUE  Guenther HORN  Guofu ZHAI  

     
    PAPER

      Vol:
    E97-C No:9
      Page(s):
    873-879

    There has been increasing demand to research the measuring method to characterize the batch consistency of contact rivets. An automated test equipment has been described that makes it possible to measure the electrical contact resistance with high efficiency. The relationship between contact force and contact resistance during the loading and unloading process was measured explicitly using AgPd alloy, stainless steel and sapphire substrate material with Au coatings as sphere indenters separately. To explain the phenomena of contact resistance decreasing more slowly than the traditional theoretical results during loading, the indenter with coating and rivet are modeled by using the commercial FEM software COMSOL Multiphysics. Besides the constriction resistance, the transition region Au coating resistance and the bulk resistance of the substrate are deduced from the simulated current lines profiles and iso-potentials. The difference of electrical conductivity between indenter material and gold coating is the reason for the occurrence of the transition region.

  • A Packet Classifier Based on Prefetching EVMDD (k) Machines

    Hiroki NAKAHARA  Tsutomu SASAO  Munehiro MATSUURA  

     
    PAPER-Logic Design

      Vol:
    E97-D No:9
      Page(s):
    2243-2252

    A Decision Diagram Machine (DDM) is a special-purpose processor that has special instructions to evaluate a decision diagram. Since the DDM uses only a limited number of instructions, it is faster than the general-purpose Micro Processor Unit (MPU). Also, the architecture for the DDM is much simpler than that for an MPU. This paper presents a packet classifier using a parallel EVMDD (k) machine. To reduce computation time and code size, first, a set of rules for a packet classifier is partitioned into groups. Then, the parallel EVMDD (k) machine evaluates them. To further speed-up for the standard EVMDD (k) machine, we propose the prefetching EVMDD (k) machine which reads both the index and the jump address at the same time. The prefetching EVMDD (k) machine is 2.4 times faster than the standard one using the same memory size. We implemented a parallel prefetching EVMDD (k) machine consisting of 30 machines on an FPGA, and compared it with the Intel's Core i5 microprocessor running at 1.7GHz. Our parallel machine is 15.1-77.5 times faster than the Core i5, and it requires only 8.1-58.5 percents of the memory for the Core i5.

  • A Lower Bound on the Gate Count of Toffoli-Based Reversible Logic Circuits

    Takashi HIRAYAMA  Hayato SUGAWARA  Katsuhisa YAMANAKA  Yasuaki NISHITANI  

     
    PAPER-Reversible/Quantum Computing

      Vol:
    E97-D No:9
      Page(s):
    2253-2261

    We present a new lower bound on the number of gates in reversible logic circuits that represent a given reversible logic function, in which the circuits are assumed to consist of general Toffoli gates and have no redundant input/output lines. We make a theoretical comparison of lower bounds, and prove that the proposed bound is better than the previous one. Moreover, experimental results for lower bounds on randomly-generated reversible logic functions and reversible benchmarks are given. The results also demonstrate that the proposed lower bound is better than the former one.

  • An Oscillation-Based On-Chip Temperature-Aware Dynamic Voltage and Frequency Scaling Scheme in System-on-a-Chip

    Katherine Shu-Min LI  Yingchieh HO  Yu-Wei YANG  Liang-Bi CHEN  

     
    PAPER-Circuit Implementations

      Vol:
    E97-D No:9
      Page(s):
    2320-2329

    The excessively high temperature in a chip may cause circuit malfunction and performance degradation, and thus should be avoided to improve system reliability. In this paper, a novel oscillation-based on-chip thermal sensing architecture for dynamically adjusting supply voltage and clock frequency in System-on-a-Chip (SoC) is proposed. It is shown that the oscillation frequency of a ring oscillator reduces linearly as the temperature rises, and thus provides a good on-chip temperature sensing mechanism. An efficient Dynamic Voltage-to-Frequency Scaling (DF2VS) algorithm is proposed to dynamically adjust supply voltage according to the oscillation frequencies of the ring oscillators distributed in SoC so that thermal sensing can be carried at all potential hot spots. An on-chip Dynamic Voltage Scaling or Dynamic Voltage and Frequency Scaling (DVS or DVFS) monitor selects the supply voltage level and clock frequency according to the outputs of all thermal sensors. Experimental results on SoC benchmark circuits show the effectiveness of the algorithm that a 10% reduction in supply voltage alone can achieve about 20% power reduction (DVS scheme), and nearly 50% reduction in power is achievable if the clock frequency is also scaled down (DVFS scheme). The chip temperature will be significant lower due to the reduced power consumption.

  • Learning a Two-Dimensional Fuzzy Discriminant Locality Preserving Subspace for Visual Recognition

    Ruicong ZHI  Lei ZHAO  Bolin SHI  Yi JIN  

     
    PAPER-Pattern Recognition

      Vol:
    E97-D No:9
      Page(s):
    2434-2442

    A novel Two-dimensional Fuzzy Discriminant Locality Preserving Projections (2D-FDLPP) algorithm is proposed for learning effective subspace of two-dimensional images. The 2D-FDLPP algorithm is derived from the Two-dimensional Locality Preserving Projections (2D-LPP) by exploiting both fuzzy and discriminant properties. 2D-FDLPP algorithm preserves the relationship degree of each sample belonging to given classes with fuzzy k-nearest neighbor classifier. Also, it introduces between-class scatter constrain and label information into 2D-LPP algorithm. 2D-FDLPP algorithm finds the subspace which can best discriminate different pattern classes and weakens the environment factors according to soft assignment method. Therefore, 2D-FDLPP algorithm has more discriminant power than 2D-LPP, and is more suitable for recognition tasks. Experiments are conducted on the MNIST database for handwritten image classification, the JAFFE database and Cohn-Kanade database for facial expression recognition and the ORL database for face recognition. Experimental results reported the effectiveness of our proposed algorithm.

  • Speech Emotion Recognition Using Transfer Learning

    Peng SONG  Yun JIN  Li ZHAO  Minghai XIN  

     
    LETTER-Speech and Hearing

      Vol:
    E97-D No:9
      Page(s):
    2530-2532

    A major challenge for speech emotion recognition is that when the training and deployment conditions do not use the same speech corpus, the recognition rates will obviously drop. Transfer learning, which has successfully addressed the cross-domain classification or recognition problem, is presented for cross-corpus speech emotion recognition. First, by using the maximum mean discrepancy embedding (MMDE) optimization and dimension reduction algorithms, two close low-dimensional feature spaces are obtained for source and target speech corpora, respectively. Then, a classifier function is trained using the learned low-dimensional features in the labeled source corpus, and directly applied to the unlabeled target corpus for emotion label recognition. Experimental results demonstrate that the transfer learning method can significantly outperform the traditional automatic recognition technique for cross-corpus speech emotion recognition.

  • Scalable Connection-Based Time Division Multiple Access Architecture for Wireless Network-on-Chip

    Shijun LIN  Zhaoshan LIU  Jianghong SHI  Xiaofang WU  

     
    BRIEF PAPER-Integrated Electronics

      Vol:
    E97-C No:9
      Page(s):
    918-921

    In this paper, we propose a scalable connection-based time division multiple access architecture for wireless NoC. In this architecture, only one-hop transmission is needed when a packet is transmitted from one wired subnet to another wired subnet, which improves the communication performance and cuts down the energy consumption. Furthermore, by carefully designing the central arbiter, the bandwidth of the wireless channel can be fully used. Simulation results show that compared with the traditional WCube wireless NoC architecture, the proposed architecture can greatly improve the network throughput, and cut down the transmission latency and energy consumption with a reasonable area overhead.

  • Experiments Validating the Effectiveness of Multi-Point Wireless Energy Transmission with Carrier Shift Diversity Open Access

    Daiki MAEHARA  Gia Khanh TRAN  Kei SAKAGUCHI  Kiyomichi ARAKI  Minoru FURUKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:9
      Page(s):
    1928-1937

    This paper presents a method to seamlessly extend the coverage of energy supply field for wireless sensor networks in order to free sensors from wires and batteries, where the multi-point scheme is employed to overcome path-loss attenuation, while the carrier shift diversity is introduced to mitigate the effect of interference between multiple wave sources. As we focus on the energy transmission part, sensor or communication schemes are out of scope of this paper. To verify the effectiveness of the proposed wireless energy transmission, this paper conducts indoor experiments in which we compare the power distribution and the coverage performance of different energy transmission schemes including conventional single-point, simple multi-point and our proposed multi-point scheme. To easily observe the effect of the standing-wave caused by multipath and interference between multiple wave sources, 3D measurements are performed in an empty room. The results of our experiments together with those of a simulation that assumes a similar antenna setting in free space environment show that the coverage of single-point and multi-point wireless energy transmission without carrier shift diversity are limited by path-loss, standing-wave created by multipath and interference between multiple wave sources. On the other hand, the proposed scheme can overcome power attenuation due to the path-loss as well as the effect of standing-wave created by multipath and interference between multiple wave sources.

  • Robust and Fast Phonetic String Matching Method for Lyric Searching Based on Acoustic Distance

    Xin XU  Tsuneo KATO  

     
    PAPER-Music Information Processing

      Vol:
    E97-D No:9
      Page(s):
    2501-2509

    This paper proposes a robust and fast lyric search method for music information retrieval (MIR). The effectiveness of lyric search systems based on full-text retrieval engines or web search engines is highly compromised when the queries of lyric phrases contain incorrect parts due to mishearing. To improve the robustness of the system, the authors introduce acoustic distance, which is computed based on a confusion matrix of an automatic speech recognition experiment, into Dynamic-Programming (DP)-based phonetic string matching to identify the songs that the misheard lyric phrases refer to. An evaluation experiment verified that the search accuracy is increased by 4.4% compared with the conventional method. Furthermore, in this paper a two-pass search algorithm is proposed to realize real-time execution. The algorithm pre-selects the probable candidates using a rapid index-based search in the first pass and executes a DP-based search process with an adaptive termination strategy in the second pass. Experimental results show that the proposed search method reduced processing time by more than 86.2% compared with the conventional methods for the same search accuracy.

  • Traffic Pattern Based Data Recovery Scheme for Cyber-Physical Systems

    Naushin NOWER  Yasuo TAN  Azman Osman LIM  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:9
      Page(s):
    1926-1936

    Feedback data loss can severely degrade overall system performance. In addition, it can affect the control and computation of the Cyber-physical Systems (CPS). CPS hold enormous potential for a wide range of emerging applications that include different data traffic patterns. These data traffic patterns have wide varieties of diversities. To recover various traffic patterns we need to know the nature of their underlying property. In this paper, we propose a data recovery framework for different traffic patterns of CPS, which comprises data pre-processing step. In the proposed framework, we designed a Data Pattern Analyzer to classify the different patterns and built a model based on the pattern as a data pre-processing step. Inside the framework, we propose a data recovery scheme, called Efficient Temporal and Spatial Data Recovery (ETSDR) algorithm to recover the incomplete feedback for CPS to maintain real time control. In this algorithm, we utilize the temporal model based on the traffic pattern and consider the spatial correlation of the nearest neighbor sensors. Numerical results reveal that the proposed ETSDR outperforms both the weighted prediction (WP) and the exponentially weighted moving average (EWMA) algorithms regardless of the increment percentage of missing data in terms of the root mean square error, the mean absolute error, and the integral of absolute error.

  • Multi-Service MIMO Broadcasting with Different Receive Antennas

    Ruifeng MA  Zhaocheng WANG  Zhixing YANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:9
      Page(s):
    1994-1997

    The next generation wireless broadcasting systems combining with MIMO technology has drawn much attention recently. Considering the coexistence of receivers equipped with different numbers of antennas in these systems, there exists the special requirement to maximize the transmission rate for receivers having more antennas, while guaranteeing the normal rate for receivers having less antennas. In this letter, superposition coding is proposed to fulfill this requirement and the concept of broadcast cluster is introduced, wherein the optimized power allocation parameters are derived. The BER simulations for multiple services are provided to verify the significant SNR performance gap between receivers with various numbers of receive antennas.

  • Spatial Aliasing Effects in a Steerable Parametric Loudspeaker for Stereophonic Sound Reproduction

    Chuang SHI  Hideyuki NOMURA  Tomoo KAMAKURA  Woon-Seng GAN  

     
    PAPER

      Vol:
    E97-A No:9
      Page(s):
    1859-1866

    Earlier attempts to deploy two units of parametric loudspeakers have shown encouraging results in improving the accuracy of spatial audio reproductions. As compared to a pair of conventional loudspeakers, this improvement is mainly a result of being free of crosstalk due to the sharp directivity of the parametric loudspeaker. By replacing the normal parametric loudspeaker with the steerable parametric loudspeaker, a flexible sweet spot can be created that tolerates head movements of the listener. However, spatial aliasing effects of the primary frequency waves are always observed in the steerable parametric loudspeaker. We are motivated to make use of the spatial aliasing effects to create two sound beams from one unit of the steerable parametric loudspeaker. Hence, a reduction of power consumption and physical size can be achieved by cutting down the number of loudspeakers used in an audio system. By introducing a new parameter, namely the relative steering angle, we propose a stereophonic beamsteering method that can control the amplitude difference corresponding to the interaural level difference (ILD) between two sound beams. Currently, this proposed method does not support the reproduction of interaural time differences (ITD).

  • Performance Analysis and Optimization of the Relay Multicast System with Space-Time Coding

    Nan WANG  Ming CHEN  Jianxin DAI  Xia WU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E97-A No:9
      Page(s):
    2005-2010

    In a sector of a single cell, due to the fading characteristic of wireless channels, several decode-and-forward relay stations are deployed to form a two-hop relay-assisted multicast system. We propose two schemes for the system, the first scheme combines the use of space-time code and distributed space-time code (DSTC), and the second one combines the use of DSTC and maximum ratio combining. We give an outage probability analysis for both of them. Based on this analysis, we manage to maximize the spectral efficiency under a preset outage probability confinement by finding out the optimal power allocation and relay location strategies. We use genetic algorithms to verify our analysis and numerical results show that the schemes proposed by us significantly outperform the scheme in previous work. We also show the effect of path loss exponent on the optimal strategy.

  • Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method

    Xuyun NIE  Albrecht PETZOLDT  Johannes BUCHMANN  Fagen LI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:9
      Page(s):
    1952-1961

    The Piece in Hand method is a security enhancement technique for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece in Hand method as proposed by Tsuji et al. in 2009. The key point of this method is to introduce an invertible quadratic polynomial map on the plaintext variables to add perturbation to the original MPKC. An additional quadratic map allows the owner of the secret key to remove this perturbation from the system. By our analysis, we find that the security of the enhanced scheme depends mainly on the structure of the quadratic polynomials of this auxiliary map. The two examples proposed by Tsuji et al. for this map can not resist the Linearization Equations attack. Given a valid ciphertext, we can easily get a public key which is equivalent to that of the underlying MPKC. If there exists an algorithm that can recover the plaintext corresponding to a valid ciphertext of the underlying MPKC, we can construct an algorithm that can recover the plaintext corresponding to a valid ciphertext of the enhanced MPKC.

  • A Resource Analysis of Radio Space Distribution for the Wide-Area Virtualization of Wireless Transceivers

    Yuusuke KAWAKITA  Haruhisa ICHIKAWA  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1800-1807

    Wide area virtualization of wireless transceivers by centrally managed software radio systems is a way to efficiently share the resources for supporting a variety of wireless protocols. In order to enable wide-area virtualization of wireless transceivers, the authors have developed a mechanism to deliver the radio space information which is quantized broadband radio wave information including the radio signals to the transceivers. Delivery mechanism consists of a distribution server which distributes radio space corresponding to the request of the client such as the center frequency and the bandwidth and a client which uses the radio space information. Accumulation of the distribution servers which deliver radio space information simultaneously to a large number of clients will contribute to build an infrastructure for any clients ubiquitously distributed over the globe. In this paper, scale-out architecture of a distribution server is proposed to deliver unlimitedly broadband radio space information to unlimited number of clients. Experimental implementation indicates the architecture to be a scale-out solution, while the number of clients is restricted by the computer resources of the distribution server. The band pass filter processing for individual client in the distribution server consumes the dominant part of the processing power, and the number of CPU cores is the upper limit of clients supportable for the distribution server in the current operating system implementation. The logical increase of the number of CPU cores by hardware multithreading does not contribute to relax this limit. We also discuss the guidance architecture or building server derived from these conclusions.

  • Activity Recognition Based on an Accelerometer in a Smartphone Using an FFT-Based New Feature and Fusion Methods

    Yang XUE  Yaoquan HU  Lianwen JIN  

     
    LETTER-Human-computer Interaction

      Vol:
    E97-D No:8
      Page(s):
    2182-2186

    With the development of personal electronic equipment, the use of a smartphone with a tri-axial accelerometer to detect human physical activity is becoming popular. In this paper, we propose a new feature based on FFT for activity recognition from tri-axial acceleration signals. To improve the classification performance, two fusion methods, minimal distance optimization (MDO) and variance contribution ranking (VCR), are proposed. The new proposed feature achieves a recognition rate of 92.41%, which outperforms six traditional time- or frequency-domain features. Furthermore, the proposed fusion methods effectively improve the recognition rates. In particular, the average accuracy based on class fusion VCR (CFVCR) is 97.01%, which results in an improvement in accuracy of 4.14% compared with the results without any fusion. Experiments confirm the effectiveness of the new proposed feature and fusion methods.

  • Constructing Social Networks from Literary Fiction

    Jong-kyu SEO  Sung-hwan KIM  Hwan-gue CHO  

     
    LETTER-Social Networks

      Vol:
    E97-D No:8
      Page(s):
    2046-2047

    A social network is a useful model for identifying hidden structures and meaningful knowledge among social atoms, which have complicated interactions. In recent years, most studies have focused on the real data of the social space such as emails, tweets, and human communities. In this paper, we construct a social network from literary fiction by mapping characters to vertices and their relationship strengths to edges. The main contribution of this paper is that our model can be exploited to reveal the deep structures of fiction novels by using graph theoretic concepts, without the involvement of any manual work. Experimental evaluation showed that our model successfully classified fictional characters in terms of their importance to the plot of a novel.

  • Joint Lifetime-Utility Cross-Layer Optimization for Network Coding-Based Wireless Multi-Hop Networks with Matrix Game and Multiple Payoffs

    Jain-Shing LIU  

     
    PAPER-Network

      Vol:
    E97-B No:8
      Page(s):
    1638-1646

    Maximizing network lifetime and optimizing aggregate system utility are important but usually conflict goals in wireless multi-hop networks. For the trade-off, we present a matrix game-theoretic cross-layer optimization formulation to jointly maximize the diverse objectives in such networks with network coding. To this end, we introduce a cross-layer formulation of general network utility maximization (NUM) that accommodates routing, scheduling, and stream control from different layers in the coded networks. Specifically, for the scheduling problem and then the objective function involved, we develop a matrix game with the strategy sets of the players corresponding to hyperlink and transmission mode, and design multiple payoffs specific to lifetime and system utility, respectively. In particular, with the inherit merit that matrix game can be solved with mathematical programming, our cross-layer programming formulation actually benefits from both game-based and NUM-based approaches at the same time by cooperating the programming model for the matrix game with that for the other layers in a consistent framework. Finally, our numerical experiments quantitatively exemplify the possible performance trad-offs with respect to the two variants developed on the multiple objectives in question while qualitatively exhibiting the differences between the framework and the other related works.

  • Mobility Overlap-Removal-Based Leakage Power and Register-Aware Scheduling in High-Level Synthesis

    Nan WANG  Song CHEN  Wei ZHONG  Nan LIU  Takeshi YOSHIMURA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E97-A No:8
      Page(s):
    1709-1719

    Scheduling is a key problem in high level synthesis, as the scheduling results affect most of the important design metrics. In this paper, we propose a novel scheduling method to simultaneously optimize the leakage power of functional units with dual-Vth techniques and the number of registers under given timing and resource constraints. The mobility overlaps between operations are removed to eliminate data dependencies, and a simulated-annealing-based method is introduced to explore the mobility overlap removal solution space. Given the overlap-free mobilities, the resource usage and register usage in each control step can be accurately estimated. Meanwhile, operations are scheduled so as to optimize the leakage power of functional units with minimal number of registers. Then, a set of operations is iteratively selected, reassigned as low-Vth, and rescheduled until the resource constraints are all satisfied. Experimental results show the efficiency of the proposed algorithm.

3941-3960hit(16314hit)