The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

821-840hit(4624hit)

  • A Heuristic Expansion Framework for Mapping Instances to Linked Open Data

    Natthawut KERTKEIDKACHORN  Ryutaro ICHISE  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/04/05
      Vol:
    E99-D No:7
      Page(s):
    1786-1795

    Mapping instances to the Linked Open Data (LOD) cloud plays an important role for enriching information of instances, since the LOD cloud contains abundant amounts of interlinked instances describing the instances. Consequently, many techniques have been introduced for mapping instances to a LOD data set; however, most of them merely focus on tackling with the problem of heterogeneity. Unfortunately, the problem of the large number of LOD data sets has yet to be addressed. Owing to the number of LOD data sets, mapping an instance to a LOD data set is not sufficient because an identical instance might not exist in that data set. In this article, we therefore introduce a heuristic expansion based framework for mapping instances to LOD data sets. The key idea of the framework is to gradually expand the search space from one data set to another data set in order to discover identical instances. In experiments, the framework could successfully map instances to the LOD data sets by increasing the coverage to 90.36%. Experimental results also indicate that the heuristic function in the framework could efficiently limit the expansion space to a reasonable space. Based upon the limited expansion space, the framework could effectively reduce the number of candidate pairs to 9.73% of the baseline without affecting any performances.

  • A 60 GHz Hybrid Analog/Digital Beamforming Receiver with Interference Suppression for Multiuser Gigabit/s Radio Access

    Koji TAKINAMI  Hiroyuki MOTOZUKA  Tomoya URUSHIHARA  Masashi KOBAYASHI  Hiroshi TAKAHASHI  Masataka IRIE  Takenori SAKAMOTO  Yohei MORISHITA  Kenji MIYANAGA  Takayuki TSUKIZAWA  Noriaki SAITO  Naganori SHIRAKATA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E99-C No:7
      Page(s):
    856-865

    This paper presents a 60 GHz analog/digital beamforming receiver that effectively suppresses interference signals, targeting the IEEE 802.11ad/WiGig standard. Combining two-stream analog frontends with interference rejection digital signal processing, the analog beamforming steers the antenna beam to the desired direction while the digital beamforming provides gain suppression in the interference direction. A prototype has been built with 40 nm CMOS analog frontends as well as offline baseband digital signal processing. Measurements show a 3.1 dB EVM advantage over conventional two-stream diversity during a packet collision situation.

  • Novel Design of Dual-Band Reconfigurable Dipole Antenna Using Lumped and Distributed Elements

    Shoichi ONODERA  Ryo ISHIKAWA  Akira SAITOU  Kazuhiko HONJO  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:7
      Page(s):
    1550-1557

    A frequency-reconfigurable dipole antenna, whose dual resonant frequencies are independently controlled, is introduced. The antenna's conductor consists of radiating conductors, lumped and distributed elements, and varactors. To design the antenna, current distribution, input impedance, and radiation power including higher-order modes, are analyzed for a narrow-angle sectorial antenna embedded with passive elements. To derive the formulae used, radiation power is analyzed in two ways: using Chu's equivalent circuit and the multipole expansion method. Numerical estimations of electrically small antennas show that dual-band antennas are feasible. The dual resonant frequencies are controlled with the embedded series and shunt inductors. A dual-band antenna is fabricated, and measured input impedances agree well with the calculated data. With the configuration, an electrically small 2.5-/5-GHz dual-band reconfig-urable antenna is designed and fabricated, where the reactance values for the series and shunt inductors are controlled with varactors, each connected in series to the inductors. Varying the voltages applied to the varactors varies the measured upper and lower resonant frequencies between 2.6 and 2.9GHz and between 5.1 and 5.3GHz, where the other resonant frequency is kept almost identical. Measured radiation patterns on the H-plane are almost omni-directional for both bands.

  • Optimized Binary Search with Multiple Collision Bits Resolution Anti-Collision Algorithm for Efficient RFID Tag Identification

    Younghwan JUNG  Daehee KIM  Sunshin AN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E99-A No:7
      Page(s):
    1494-1498

    In this paper, we analyze two representative tree-based RFID anti-collision algorithms: the Query Tree protocol and the Binary Search algorithm. Based on the advantages and disadvantages of the two algorithms, we propose and evaluate two optimized anti-collision algorithms: the Optimized Binary Search, which performs better than the Query Tree Protocol with the same tag-side overhead, and the Optimized Binary Search with Multiple Collision Bits Resolution algorithm, which performs the best with an acceptable increase in tag-side processing overhead.

  • Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System

    Aslhan AKYOL  Mehmet HACIBEYOĞLU  Bekir KARLIK  

     
    PAPER-Information Network

      Pubricized:
    2016/04/05
      Vol:
    E99-D No:7
      Page(s):
    1810-1821

    With the increase of network components connected to the Internet, the need to ensure secure connectivity is becoming increasingly vital. Intrusion Detection Systems (IDSs) are one of the common security components that identify security violations. This paper proposes a novel multilevel hybrid classifier that uses different feature sets on each classifier. It presents the Discernibility Function based Feature Selection method and two classifiers involving multilayer perceptron (MLP) and decision tree (C4.5). Experiments are conducted on the KDD'99 Cup and ISCX datasets, and the proposal demonstrates better performance than individual classifiers and other proposed hybrid classifiers. The proposed method provides significant improvement in the detection rates of attack classes and Cost Per Example (CPE) which was the primary evaluation method in the KDD'99 Cup competition.

  • Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack

    Takeshi SUGAWARA  Daisuke SUZUKI  Minoru SAEKI  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1323-1333

    The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric between two operands. The asymmetric leakage is verified with experiments on FPGA and micro-controller platforms. Moreover, we show an experimental result in which success and failure of the attack is determined by the order of operands. Therefore, designing operand order can be a cost-effective countermeasure. Meanwhile we also show a case in which a particular countermeasure becomes ineffective when the asymmetric leakage is considered. In addition to the above main contribution, an extension of the attack by Hanley et al. using the signal-processing technique of Big Mac Attack is presented.

  • Study on RCS Reduction of Patch Array Using Switchable Absorption/Transmission Surface

    Shinya KITAGAWA  Ryosuke SUGA  Osamu HASHIMOTO  Kiyomichi ARAKI  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    805-808

    Radar cross section (RCS) of a patch array antenna is reduced using a switchable absorption/transmission surface. The switchable surface performs as between a radar absorber and transmission surface using diodes at 9GHz. The switchable surface was applied to the radome of a patch array and its radiation pattern and RCS reduction were evaluated. The gain and the radiation pattern with the radome was equivalent to that without the radome. The RCS reduction with the radome was 25dB compared to that without the radome.

  • Fast Coding Unit Size Decision in HEVC Intra Coding

    Tao FAN  Guozhong WANG  Xiwu SHANG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/04/15
      Vol:
    E99-D No:7
      Page(s):
    1953-1956

    The current high efficiency video coding (HEVC) standard is developed to achieve greatly improved compression performance compared with the previous coding standard H.264/AVC. It adopts a quadtree based picture partition structure to flexibility signal various texture characteristics of images. However, this results in a dramatic increase in computational complexity, which obstructs HEVC in real-time application. To alleviate this problem, we propose a fast coding unit (CU) size decision algorithm in HEVC intra coding based on consideration of the depth level of neighboring CUs, distribution of rate distortion (RD) value and distribution of residual data. Experimental results demonstrate that the proposed algorithm can achieve up to 60% time reduction with negligible RD performance loss.

  • A Simple Approximation Formula for Numerical Dispersion Error in 2-D and 3-D FDTD Method

    Jun SONODA  Keimei KAINO  Motoyuki SATO  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    793-796

    The finite-difference time-domain (FDTD) method has been widely used in recent years to analyze the propagation and scattering of electromagnetic waves. Because the FDTD method has second-order accuracy in space, its numerical dispersion error arises from truncated higher-order terms of the Taylor expansion. This error increases with the propagation distance in cases of large-scale analysis. The numerical dispersion error is expressed by a dispersion relation equation. It is difficult to solve this nonlinear equation which have many parameters. Consequently, a simple formula is necessary to substitute for the dispersion relation error. In this study, we have obtained a simple formula for the numerical dispersion error of 2-D and 3-D FDTD method in free space propagation.

  • Transmission Properties of Electromagnetic Wave in Pre-Cantor Bar: Scaling and Double-Exponetiality

    Ryota SATO  Keimei KAINO  Jun SONODA  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    801-804

    Pre-Cantor bar, the one-dimensional fractal media, consists of two kinds of materials. Using the transmission-line theory we will explain the double-exponential behavior of the minimum of the transmittance as a function of the stage number n, and obtain formulae of two kinds of scaling behaviors of the transmittance. From numerical calculations for n=1 to 5 we will find that the maximum of field amplitudes of resonance which increases double-exponentially with n is well estimated by the theoretical upper bound. We will show that after sorting field amplitudes for resonance frequencies of the 5th stage their distribution is a staircase function of the index.

  • Reputation-Based Collusion Detection with Majority of Colluders

    Junbeom HUR  Mengxue GUO  Younsoo PARK  Chan-Gun LEE  Ho-Hyun PARK  

     
    PAPER-Information Network

      Pubricized:
    2016/04/07
      Vol:
    E99-D No:7
      Page(s):
    1822-1835

    The reputation-based majority-voting approach is a promising solution for detecting malicious workers in a cloud system. However, this approach has a drawback in that it can detect malicious workers only when the number of colluders make up no more than half of all workers. In this paper, we simulate the behavior of a reputation-based method and mathematically analyze its accuracy. Through the analysis, we observe that, regardless of the number of colluders and their collusion probability, if the reputation value of a group is significantly different from those of other groups, it is a completely honest group. Based on the analysis result, we propose a new method for distinguishing honest workers from colluders even when the colluders make up the majority group. The proposed method constructs groups based on their reputations. A group with the significantly highest or lowest reputation value is considered a completely honest group. Otherwise, honest workers are mixed together with colluders in a group. The proposed method accurately identifies honest workers even in a mixed group by comparing each voting result one by one. The results of a security analysis and an experiment show that our method can identify honest workers much more accurately than a traditional reputation-based approach with little additional computational overhead.

  • High-Efficient Frame Aggregation with Frame Size Adaptation for Downlink MU-MIMO Wireless LANs

    Yoshihide NOMURA  Kazuo MORI  Hideo KOBAYASHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:7
      Page(s):
    1584-1592

    This paper investigates a frame aggregation (FA) technique in the medium access control (MAC) layer for downlink multi-user multiple input multiple output (MU-MIMO) channels in wireless local area networks (WLANs), and proposes a high-efficient FA scheme that ehances system performance: transmission performance and fairness in communication between mobile terminals (MTs). The proposed FA scheme employs novel criteria for selecting receiving MTs and wireless frame setting with a frame size adaptation mechanism for MU-MIMO transmissions. The proposed receiving MT selection gives higher priority to the MTs expecting higher throughput in the next MU-MIMO transmission and having large amount transmission data while reducing signaling overhead, leading to improvements in system throughput and fairness in communication. The proposed wireless frame setting, which employs hybrid A-MSDU/A-MPDU FA, achieves frame error rate (FER) better than the requirement from communication services by using A-MSDU frame size adaptation. Through system-level simulation, the effectiveness of the proposed scheme is validated for downlink MU-MIMO channels in WLANs.

  • Known-Key Attacks on Type-2 GFN with SPS Round Function

    Le DONG  Tianli WANG  Jiao DU  Shanqi PANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:7
      Page(s):
    1488-1493

    We present a rebound attack on the 4-branch type-2 generalized Feistel structure with an SPS round function, which is called the type-2 GFN-SPS in this paper. Applying a non-full-active-match technique, we construct a 6-round known-key truncated differential distinguisher, and it can deduce a near-collision attack on compression functions of this structure embedding the MMO or MP modes. Extending the 6-round attack, we build a 7-round truncated differential path to get a known-key differential distinguisher with seven rounds. The results give some evidences that this structure is not stronger than the type-2 GFN with an SP round function and not weaker than that with an SPSP round function against the rebound attack.

  • Adaptive Perceptual Block Compressive Sensing for Image Compression

    Jin XU  Yuansong QIAO  Zhizhong FU  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/03/09
      Vol:
    E99-D No:6
      Page(s):
    1702-1706

    Because the perceptual compressive sensing framework can achieve a much better performance than the legacy compressive sensing framework, it is very promising for the compressive sensing based image compression system. In this paper, we propose an innovative adaptive perceptual block compressive sensing scheme. Firstly, a new block-based statistical metric which can more appropriately measure each block's sparsity and perceptual sensibility is devised. Then, the approximated theoretical minimum measurement number for each block is derived from the new block-based metric and used as weight for adaptive measurements allocation. The obtained experimental results show that our scheme can significantly enhance both objective and subjective performance of a perceptual compressive sensing framework.

  • Alignment Tolerance in Multiple-Stream Transmission Using Orthogonal Directivities under Line-of-Sight Environments

    Maki ARAI  Tomohiro SEKI  Ken HIRAGA  Kazumitsu SAKAMOTO  Tadao NAKAGAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:6
      Page(s):
    1362-1370

    A method for increasing alignment tolerance in simple multiple-stream transmission is described. Its use of π-shifted antenna directivity phase enables it to cancel interference even when antenna placement deviations occur. The interference cancellation by using π-shifted directivities provides higher alignment tolerance than that with conventional fixed weight methods. It also provides smaller channel gain variation than can be obtained using fixed weights even when antenna displacement occurs. An objective function is described that is determined by the alignment tolerance. The function is defined to maximize the alignment tolerance. The method's validity is confirmed by an experimental analysis of two-stream transmission in which the alignment tolerance of the proposed method is compared to that of conventional fixed weight methods.

  • Steady State Analysis of the TCP Network with RED Algorithm

    Daisuke ITO  Tetsushi UETA  

     
    LETTER-Nonlinear Problems

      Vol:
    E99-A No:6
      Page(s):
    1247-1250

    The transmission control protocol with a random early detection (TCP/RED) is an important algorithm for a TCP congestion control [1]. It has been expressed as a simple second-order discrete-time hybrid dynamical model, and shows unique and typical nonlinear phenomena, e.g., bifurcation phenomena or chaotic attractors [2], [3]. However, detailed behavior is unclear due to discontinuity that describes the switching of transmission phases in TCP/RED, but we have proposed its analysis method in previous study. This letter clarifies bifurcation structures with it.

  • Score Level Fusion for Network Traffic Application Identification

    Masatsugu ICHINO  Hiroaki MAEDA  Hiroshi YOSHIURA  

     
    PAPER-Internet

      Vol:
    E99-B No:6
      Page(s):
    1341-1352

    A method based on score level fusion using logistic regression has been developed that uses packet header information to classify Internet applications. Applications are classified not on the basis of the individual flows for each type of application but on the basis of all the flows for each type of application, i.e., the “overall traffic flow.” The overall traffic flow is divided into equal time slots, and the applications are classified using statistical information obtained for each time slot. Evaluation using overall traffic flow generated by five types of applications showed that its true and false positive rates are better than those of methods using feature level fusion.

  • A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems

    Dongxu MA  Zilong WANG  Hui LI  

     
    PAPER-Information Theory

      Vol:
    E99-A No:6
      Page(s):
    1222-1227

    Controlling the peak-to-mean envelope power ratio (PMEPR) of orthogonal frequency-division multiplexed (OFDM) transmissions is a significant obstacle in many low-cost applications of OFDM. An coding approach proposed by H.R. Sadjadpour presents non-square M-QAM symbols as a combination of QPSK and BPSK signals when M=22n+1, and then uses QPSK and BPSK Golay (or Golay-like) sequences with a constant PMEPR to generate M-QAM sequences. This paper proposes a new scheme in which M-QAM sequences are generated by QPSK and BPSK sequences with variable PMEPRs. In other words, this new scheme is a general case of the existing approach. As a result, the code rate of the new sequence is significantly improved, while the upper bound of its PMEPR remains at a comparative level.

  • A Convolution Theorem for Multiple-Valued Logic Polynomials of a Semigroup Type and Their Fast Multiplication

    Hajime MATSUI  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1025-1033

    In this paper, a convolution theorem which is analogous to the theorem for Fourier transform is shown among a certain type of polynomials. We establish a fast method of the multiplication in a special class of quotient rings of multivariate polynomials over q-element finite field GF(q). The polynomial which we treat is one of expressing forms of the multiple-valued logic function from the product of the semigroups in GF(q) to GF(q). Our results can be applied to the speedup of both software and hardware concerning multiple-valued Boolean logic.

  • Constructions of Gaussian Integer Sequences with Zero Correlation Zone

    Xiaoyu CHEN  Deming KONG  Chengqian XU  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:6
      Page(s):
    1260-1263

    Based on a perfect Gaussian integer sequence, shift and combination operations are performed to construct Gaussian integer sequences with zero correlation zone (ZCZ). The resultant sequence sets are optimal or almost optimal with respect to the Tang-Fan-Matsufuji bound. Furthermore, the ZCZ Gaussian integer sequence sets can be provided for quasi-synchronous code-division multiple-access systems to increase transmission data rate and reduce interference.

821-840hit(4624hit)