The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

4761-4780hit(21534hit)

  • Perfect Arrays over the 8-QAM+ Constellation

    Fanxin ZENG  Linjie QIAN  Zhenyu ZHANG  

     
    LETTER-Information Theory

      Vol:
    E98-A No:4
      Page(s):
    1038-1043

    Perfect arrays are widely applied to high-dimensional communications, time-frequency-coding, spatial correlation or map matching, built-in tests of VLSI-circuits, radar, and so on. The letter investigates perfect arrays over the 8-QAM+ constellation, and two constructions for yielding such arrays are presented. Furthermore, the family size of the proposed arrays is determined as well.

  • Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks

    Hae Young LEE  

     
    LETTER-Information Network

      Vol:
    E98-D No:4
      Page(s):
    964-967

    This letter presents a method to adaptively counter false data injection attacks (FDIAs) in wireless sensor networks, in which a fuzzy rule-based system detects FDIAs and chooses the most appropriate countermeasures. The method does not require en-route verification processes and manual parameter settings. The effectiveness of the method is shown with simulation results.

  • Power-Efficient Instancy Aware DRAM Scheduling

    Gung-Yu PAN  Chih-Yen LAI  Jing-Yang JOU  Bo-Cheng Charles LAI  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:4
      Page(s):
    942-953

    Nowadays, computer systems are limited by the power and memory wall. As the Dynamic Random Access Memory (DRAM) has dominated the power consumption in modern devices, developing power-saving approaches on DRAM has become more and more important. Among several techniques on different abstract levels, scheduling-based power management policies can be applied to existing memory controllers to reduce power consumption without causing severe performance degradation. Existing power-aware schedulers cluster memory requests into sets, so that the large portion of the DRAM can be switched into the power saving mode; however, only the target addresses are taken into consideration when clustering, while we observe the types (read or write) of requests can play an important role. In this paper, we propose two scheduling-based power management techniques on the DRAM controller: the inter-rank read-write aware clustering approach greatly reduces the active standby power, and the intra-rank read-write aware reordering approach mitigates the performance degradation. The simulation results show that the proposed techniques effectively reduce 75% DRAM power on average. Compared with the existing policy, the power reduction is 10% more on average with comparable or less performance degradation for the proposed techniques.

  • Cell-Specific Association for Heterogeneous Networks with Interference Control

    Yinghong WEN  Yuan CAO  Wei XU  Hideo NAKAMURA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:4
      Page(s):
    653-660

    This paper focuses on system level simulation of heterogeneous networks (HetNet). Aiming at the imbalance offloading of macro cell and pico cell under the macro-pico coexistence case, we propose an adaptive cell-specific association strategy for HetNet to ensure that users can be served equitably by both macro cell and pico cell. The traditional cell range expansion (CRE) scheme with bias-based cell association has fixed bias values for all pico cells. Our proposal, on the other hand, sets different thresholds of attached users for all MeNB (macro enhanced node B) and PeNBs (pico enhanced node B), and all cell-specific biases are obtained by the proposed adaptive association strategy according to different cell-specific predefined thresholds. With this strategy, the load imbalance between MeNB and different PeNBs is well alleviated, and hence the entire network performance is elevated. Moreover, due to the newly deployed low-power nodes in HetNets, the achieved spectral efficiency of users, especially for cell edge users, is also affected by the downlink inter-cell interference. The idea we put forward is to combine the frequency and power coordination, and so suppress the inter-cell interference. Finally in this paper, we present some numerical results to verify the effectiveness of our proposed approach.

  • A Primary-side Regulation AC–DC Constant Voltage Control Chip with Cable Compensation

    Changyuan CHANG  Penglin YANG  Yang XU  Yao CHEN  Bin BIAN  

     
    PAPER-Electronic Circuits

      Vol:
    E98-C No:4
      Page(s):
    349-355

    A primary-side regulation AC--DC constant voltage control chip is designed, which employs a novel cable compensation technique to improve the precision of the output voltage and pursue a wider load range for regulation. In the proposed controller, constant voltage (CV) is achieved by OSC charging current and current-limiting point adjustment. Meantime, according to different cable lengths, the sampled voltage is regulated by injecting current to pull-down resistance of the system to obtain an accurate output voltage. The proposed chip is implemented in TSMC 0.35,$mu $m 5,V/40,V BCD process, and a 12,V/1,A circuit prototype has been built to verify the proposed control method. Experimental results show that the maximum cable compensation current reaches 43,$mu $A, and the precision of the output voltage is within $pm$ 3% in a wide range of output current from 0 to 1,A.

  • A New Content-Oriented Traffic Engineering for Content Distribution: CAR (Content Aware Routing)

    Shigeyuki YAMASHITA  Daiki IMACHI  Miki YAMAMOTO  Takashi MIYAMURA  Shohei KAMAMURA  Koji SASAYAMA  

     
    PAPER-Network System

      Vol:
    E98-B No:4
      Page(s):
    575-584

    Large-scale content transfer, especially video transfer, is now a dominant traffic component in the Internet. Originally, content transfer had a content-oriented feature, i.e., “Users do not care where content is retrieved. Users only take care of what content they obtain.” Conventional traffic engineering (TE) aims to obtain optimal routes for traffic between ingress and egress router pairs, i.e., TE has focused on a location-oriented approach that takes care of where to connect. With increased demand for content-oriented features for content traffic, TE needs to focus on content-oriented routing design. In this study, we therefore propose a novel approach to content-oriented TE, called content aware routing (CAR). In CAR, routes are designed for content and egress router pairs, i.e., content traffic toward a receiver-side router. Content demand can be flexibly distributed to multiple servers (i.e., repositories) providing the same content, meaning that content can be obtained from anywhere. CAR solves the optimization problem of minimizing maximum link utilization. If there are multiple optimal solutions, CAR selects a solution in which resource usage is minimized. Using numerical examples formulated by the linear programming problem, we evaluated CAR by comparing it with combinations of conventional content delivery networks and TE, i.e., location-oriented designs. Our numerical results showed that CAR improved maximum link utilization by up to 15%, with only a 5% increase of network resource usage.

  • Preliminary Study of Electrical Contact Behaviors of Au-plated Material at Super Low Making/Breaking Velocity

    Wanbin REN  Shengjun XUE  Hongxu ZHI  Guofu ZHAI  

     
    PAPER-Electromechanical Devices and Components

      Vol:
    E98-C No:4
      Page(s):
    364-370

    This paper presents the electrical contact behaviors of Au-plated material at super low making and breaking velocity conditions by introducing our new designed test rig. The fundamental phenomena in the contact voltage and contact force versus piezoactuator displacement curves were investigated under the load current of 1A and velocity of 50,nm/s. From the repetitive experimental results, we found that the adhesion phenomena during the unloading process are closely correlative with the initial contact stage in the loading process. Furthermore, a mathematical model which is relative to the variation of contact force in loading is built, thus the physical mechanism of adhesion and principal factors of gold-plated materials are discussed. Finally, the physical process of molten bridge under the no mechanical contact situation is also analyzed in detail.

  • Social Network and Tag Sources Based Augmenting Collaborative Recommender System

    Tinghuai MA  Jinjuan ZHOU  Meili TANG  Yuan TIAN  Abdullah AL-DHELAAN  Mznah AL-RODHAAN  Sungyoung LEE  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2014/12/26
      Vol:
    E98-D No:4
      Page(s):
    902-910

    Recommender systems, which provide users with recommendations of content suited to their needs, have received great attention in today's online business world. However, most recommendation approaches exploit only a single source of input data and suffer from the data sparsity problem and the cold start problem. To improve recommendation accuracy in this situation, additional sources of information, such as friend relationship and user-generated tags, should be incorporated in recommendation systems. In this paper, we revise the user-based collaborative filtering (CF) technique, and propose two recommendation approaches fusing user-generated tags and social relations in a novel way. In order to evaluate the performance of our approaches, we compare experimental results with two baseline methods: user-based CF and user-based CF with weighted friendship similarity using the real datasets (Last.fm and Movielens). Our experimental results show that our methods get higher accuracy. We also verify our methods in cold-start settings, and our methods achieve more precise recommendations than the compared approaches.

  • Client Honeypot Multiplication with High Performance and Precise Detection

    Mitsuaki AKIYAMA  Takeshi YAGI  Youki KADOBAYASHI  Takeo HARIU  Suguru YAMAGUCHI  

     
    PAPER-Attack Monitoring & Detection

      Vol:
    E98-D No:4
      Page(s):
    775-787

    We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot requires both improved inspection performance and in-depth analysis for inspecting and discovering malicious websites. However, OS overhead in recent client honeypot operation cannot be ignored when improving honeypot multiplication performance. We propose a client honeypot system that is a combination of multi-OS and multi-process honeypot approaches, and we implemented this system to evaluate its performance. The process sandbox mechanism, a security measure for our multi-process approach, provides a virtually isolated environment for each web browser. It prevents system alteration from a compromised browser process by I/O redirection of file/registry access. To solve the inconsistency problem of file/registry view by I/O redirection, our process sandbox mechanism enables the web browser and corresponding plug-ins to share a virtual system view. Therefore, it enables multiple processes to be run simultaneously without interference behavior of processes on a single OS. In a field trial, we confirmed that the use of our multi-process approach was three or more times faster than that of a single process, and our multi-OS approach linearly improved system performance according to the number of honeypot instances. In addition, our long-term investigation indicated that 72.3% of exploitations target browser-helper processes. If a honeypot restricts all process creation events, it cannot identify an exploitation targeting a browser-helper process. In contrast, our process sandbox mechanism permits the creation of browser-helper processes, so it can identify these types of exploitations without resulting in false negatives. Thus, our proposed system with these multiplication approaches improves performance efficiency and enables in-depth analysis on high interaction systems.

  • Rice Channel Realization for BAN Over-The-Air Testing Using a Fading Emulator with an Arm-Swinging Dynamic Phantom

    Kun LI  Kazuhiro HONDA  Koichi OGAWA  

     
    PAPER

      Vol:
    E98-B No:4
      Page(s):
    543-553

    This paper presents a new methodology for realizing a Rice channel in BAN Over-The-Air (OTA) testing using a fading emulator with a dynamic phantom. For the proposed apparatus to be effective, the fading emulator must be provided with an appropriate K-factor that represents the actual propagation environment indoors. Further, an implementation of the Rice channel to the proposed fading emulator in a BAN situation is presented. Thereafter, a calibration method for the fading emulator to adjust the actual K-factor of the on-body Rice channel is advanced. This calibration method is validated by analyzing the variations in the instantaneous K-factor attributed to the arm-swinging motion. Finally, an experiment is conducted for a continuous human walking motion with the fading emulator using an arm-swinging dynamic phantom. The results show that the developed fading emulator allows BAN-OTA testing to replicate the actual Rice channel propagation environment with the consideration of the dynamic characteristics of human walking motion.

  • Field-emission Characteristics of a Focused-Ion-Beam-Sharpened P-Type Silicon Single Emitter

    Tomomi YOSHIMOTO  Tatsuo IWATA  

     
    PAPER-Electron Tubes, Vacuum and Beam Technology

      Vol:
    E98-C No:4
      Page(s):
    371-376

    The field electron emission characteristics of a p-type Si emitter sharpened by a spirally scanned Ga focused-ion-beam milling process were investigated. Saturated Fowler--Nordheim (F--N) plots, which are unique phenomena of p-type semiconductor emitters, were observed. The slight increase of the emission current in the saturated F--N plots region was discussed in terms of the depletion layer width in which electron generation occurs. The temperature dependence of the field electron emission current was also discussed. The activation energy of carrier generation was determined to be 0.26,eV, ascribable to the surface states that accompany the defects introduced by the Ga ion beam. When the emitter was irradiated by a 650-nm-wavelength laser, the increase in the emission current, i.e., the photoexcited emission current, was observed in the saturated region of the F--N plots. The photoexcited emission current was proportional to the laser intensity.

  • Error Performance Analysis of Asymmetric Slepian-Wolf Coding for Ordered Random Variables

    Kana DEGUCHI  Motohiko ISAKA  

     
    PAPER-Coding Theory

      Vol:
    E98-A No:4
      Page(s):
    992-999

    We analyze the error performance of coding for ordered random variables with side information at the decoder, where encoder input as well as side information are deliberately extracted from the output of correlated sources. A tight upper bound on error probability is derived for linear encoding, and minimum distance decoding for a binary source and Gaussian distributed side information. Some features caused by the signal extraction are discussed.

  • Multi-ISP Cooperative Cache Sharing for Saving Inter-ISP Transit Cost in Content Centric Networking

    Kazuhito MATSUDA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E98-B No:4
      Page(s):
    621-629

    Content-Centric Networking (CCN) has an in-network caching mechanism, which can reduce the traffic volume along the route to the destination host. This traffic volume reduction on the transit link can decrease inter-ISP transit cost. However, the memory space for caching in CCN routers is small relative to content volume. In addition, any initial access to the content requested by a user must use the transit link, even when a nearby CCN router outside the route has the cached content. In this paper, we propose a method of cooperative cache sharing among CCN routers in multiple ISPs. It aims to attain a further reduction in the inter-ISP transit cost by improving the cache hit ratio. In the proposed method, the CCN routers share the memory space for caching of non-overlapping cache content. We evaluate the proposed method by simulation experiments using the IP-level network topology of actual ISP, and show that the inter-ISP transit traffic can be reduced by up to 28% compared with normal caching behavior of CCN.

  • Contextual Max Pooling for Human Action Recognition

    Zhong ZHANG  Shuang LIU  Xing MEI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/01/19
      Vol:
    E98-D No:4
      Page(s):
    989-993

    The bag-of-words model (BOW) has been extensively adopted by recent human action recognition methods. The pooling operation, which aggregates local descriptor encodings into a single representation, is a key determiner of the performance of the BOW-based methods. However, the spatio-temporal relationship among interest points has rarely been considered in the pooling step, which results in the imprecise representation of human actions. In this paper, we propose a novel pooling strategy named contextual max pooling (CMP) to overcome this limitation. We add a constraint term into the objective function under the framework of max pooling, which forces the weights of interest points to be consistent with their probabilities. In this way, CMP explicitly considers the spatio-temporal contextual relationships among interest points and inherits the positive properties of max pooling. Our method is verified on three challenging datasets (KTH, UCF Sports and UCF Films datasets), and the results demonstrate that our method achieves better results than the state-of-the-art methods in human action recognition.

  • A High Efficiency Class-E Power Amplifier Over a Wide Power Range Using a Look-Up Table Based Dynamic Biasing Scheme

    Jonggyun LIM  Wonshil KANG  Kang-Yoon LEE  Hyunchul KU  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E98-C No:4
      Page(s):
    377-379

    A class-E power amplifier (PA) with novel dynamic biasing scheme is proposed to enhance power added efficiency (PAE) over a wide power range. A look-up table (LUT) adjusts input power and drain supply voltage simultaneously to keep switch mode condition of a power transistor and to optimize the PAE. Experimental results show that the class-E PA using the proposed scheme with harmonic suppression filter gives the PAE higher than 80% over 8.5,dB range with less than 40,dBc harmonic suppression.

  • A Study of Effective Replica Reconstruction Schemes for the Hadoop Distributed File System

    Asami HIGAI  Atsuko TAKEFUSA  Hidemoto NAKADA  Masato OGUCHI  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/01/13
      Vol:
    E98-D No:4
      Page(s):
    872-882

    Distributed file systems, which manage large amounts of data over multiple commercially available machines, have attracted attention as management and processing systems for Big Data applications. A distributed file system consists of multiple data nodes and provides reliability and availability by holding multiple replicas of data. Due to system failure or maintenance, a data node may be removed from the system, and the data blocks held by the removed data node are lost. If data blocks are missing, the access load of the other data nodes that hold the lost data blocks increases, and as a result, the performance of data processing over the distributed file system decreases. Therefore, replica reconstruction is an important issue to reallocate the missing data blocks to prevent such performance degradation. The Hadoop Distributed File System (HDFS) is a widely used distributed file system. In the HDFS replica reconstruction process, source and destination data nodes for replication are selected randomly. We find that this replica reconstruction scheme is inefficient because data transfer is biased. Therefore, we propose two more effective replica reconstruction schemes that aim to balance the workloads of replication processes. Our proposed replication scheduling strategy assumes that nodes are arranged in a ring, and data blocks are transferred based on this one-directional ring structure to minimize the difference in the amount of transfer data for each node. Based on this strategy, we propose two replica reconstruction schemes: an optimization scheme and a heuristic scheme. We have implemented the proposed schemes in HDFS and evaluate them on an actual HDFS cluster. We also conduct experiments on a large-scale environment by simulation. From the experiments in the actual environment, we confirm that the replica reconstruction throughputs of the proposed schemes show a 45% improvement compared to the HDFS default scheme. We also verify that the heuristic scheme is effective because it shows performance comparable to the optimization scheme. Furthermore, the experimental results on the large-scale simulation environment show that while the optimization scheme is unrealistic because a long time is required to find the optimal solution, the heuristic scheme is very efficient because it can be scalable, and that scheme improved replica reconstruction throughput by up to 25% compared to the default scheme.

  • Analog Cancellation for Full-Duplex Wireless in Multipath Self-Interference Channels

    Jong-Ho LEE  Ji-won CHOI  Jae-Hoon JUNG  Seong-Cheol KIM  Yong-Hwa KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:4
      Page(s):
    646-652

    In this paper, we propose an analog cancellation scheme for multipath self-interference channels in full-duplex wireless orthogonal frequency-division multiplexing (OFDM) systems. The conventional approaches emulate the radio-frequency (RF) self-interference signals by passing the RF transmit signals through delay lines and programmable attenuators. By contrast, our proposed scheme computes the phase-rotated and weighted versions of the baseband transmit signals in the baseband domain, which are simply upconverted to obtain the emulated RF self-interference signals. Numerical results are presented to verify the suppression performance of the proposed scheme.

  • Relay Transmission Thruchip Interface with Low-Skew 3D Clock Distribution Network

    Yasuhiro TAKE  Tadahiro KURODA  

     
    PAPER

      Vol:
    E98-C No:4
      Page(s):
    322-332

    This paper presents an inductive coupling interface using a relay transmission scheme and a low-skew 3D clock distribution network synchronized with an external reference clock source for 3D chip stacking. A relayed transmission scheme using one coil is proposed to reduce the number of coils in a data link. Coupled resonation is utilized for clock and data recovery (CDR) for the first time in the world, resulting in the elimination of a source-synchronous clock link. As a result, the total number of coils required is reduced to one-fifth of the conventional number required, yielding a significant improvement in data rate, layout area, and energy consumption. A low-skew 3D clock distribution network utilizes vertically coupled LC oscillators and horizontally coupled ring oscillators. The proposed frequency-locking and phase-pulling scheme widens the lock range to $pm$ 10%. Two test chips were designed and fabricated in 0.18 $mu$m CMOS. The bandwidth of the proposed interface using relay transmission ThruChip Interface (TCI) is 2.7 Gb/s/mm$^2$; energy consumption per chip is 0.9 pJ/b/chip. Clock skew is less than 18- and 25- ps under a 1.8- and 0.9- V supply. The distributed RMS jitter is smaller than 1.72 ps.

  • Response of a Superconducting Transition-Edge Sensor Microcalorimeter with a Mushroom-shaped Absorber to L X-rays Emitted by Transuranium Elements Open Access

    Keisuke MAEHATA  Makoto MAEDA  Naoko IYOMOTO  Kenji ISHIBASHI  Keisuke NAKAMURA  Katsunori AOKI  Koji TAKASAKI  Kazuhisa MITSUDA  Keiichi TANAKA  

     
    INVITED PAPER

      Vol:
    E98-C No:3
      Page(s):
    178-185

    A four-pixel-array superconducting transition-edge sensor (TES) microcalorimeter with a mushroom-shaped absorber was fabricated for the energy dispersive spectroscopy performed on a transmission electron microscope. The TES consists of a bilayer of Au/Ti with either a 50-nm or 120-nm thickness. The absorber of 5.0,$mu$m thick is made from a Au layer and its stem is deposited in the center of the TES surface. A Ta$_{2}$O$_{5}$ insulating layer of 100-nm thickness is inserted between the overhang region of the absorber and the TES surface. A selected pixel of the TES microcalorimeter was operated for the detection of Np L X-rays emitted from an $^{241}$Am source. A response of the TES microcalorimeter to L X-rays was obtained by analyzing detection signal pulses with using the optimal filter method. An energy resolution was obtained to be 33,eV of the full width at half maximum value at 17.751,keV of Np L$_{eta 1}$ considering its natural width of 13.4,eV. Response to L X-rays emitted from a mixture source of $^{238}$Pu, $^{239}$Pu and $^{241}$Am was obtained by operating the selected pixel of the TES microcalorimeter. Major L X-ray peaks of progeny elements of $alpha$ decay of Pu and Am isotopes were clearly identified in the obtained energy spectrum. The experimental results demonstrated the separation of $^{241}$Am and plutonium isotopes by L X-ray spectroscopy.

  • Trigger Circuit of Hardware Trojan Based on Up/Down Counter

    Zhe HUANG  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E98-C No:3
      Page(s):
    279-282

    A new trigger circuit based on up/down counter is proposed. This trigger circuit consists of a up/down counter and a pulse conversion circuit. Compared with a trigger circuit based on 32-bit counter, the proposed trigger circuit occupies less circuit area and consumes less power consumption, while the trigger process can be inversed, increasing the controllability of the Trojan.

4761-4780hit(21534hit)