The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

5221-5240hit(21534hit)

  • Analysis of Fuzzy Cluster for Mental Health

    Chieko KATO  Kensei TSUCHIDA  Futoshi SUGIMOTO  Yasunori SHIONO  Takehide GOTO  

     
    LETTER-Rehabilitation Engineering and Assistive Technology

      Vol:
    E97-D No:7
      Page(s):
    1923-1926

    Recently, there are many Japanese citizens living abroad in Asia, including developing countries. However, not many studies have been conducted regarding their mental health. The purpose of this study was to see what kinds of stress people experience when living abroad. Japanese workers living abroad, including some who are married to foreign nationals, and their families were asked seven questions in a survey, and they provided answers to questions in agreement with the intent and purpose of this study. Morphological analysis of the results and category classification by word class was carried out. This category was arranged by word classes. Additionally, the tendencies of responses were categorized according to the KJ method. In response to the question, “Do you have any trouble because of cultural differences?” these responses were classified according to common features. A fuzzy cluster analysis was carried out based on this information. Meaningful clusters were obtained by fuzzy cluster analysis. Differences in the values of stress and family culture can best be described by fuzzy cluster analysis.

  • Wavelength-Routed Switching for 25-Gbit/s Optical Packets Using a Compact Transmitter Integrating a Parallel-Ring-Resonator Tunable Laser and an InGaAlAs EAM Open Access

    Toru SEGAWA  Wataru KOBAYASHI  Tatsushi NAKAHARA  Ryo TAKAHASHI  

     
    INVITED PAPER

      Vol:
    E97-C No:7
      Page(s):
    719-724

    We describe wavelength-routed switching technology for 25-Gbit/s optical packets using a tunable transmitter that monolithically integrates a parallel-ring-resonator tunable laser and an InGaAlAs electro-absorption modulator (EAM). The transmitter provided accurate wavelength tunability with 100-GHz spacing and small output power variation. A 25-Gbit/s burst-mode optical-packet data was encoded onto the laser output by modulating the integrated EAM with a constant voltage swing of 2 V at 45$^{circ}$C. Clear eye openings were observed at the output of the 100 GHz-spaced arrayed-waveguide grating with error-free operation being achieved for all packets. The tunable transmitter is very promising for realizing a high-speed, large-port-count and energy-efficient wavelength-routing switch that enables the forwarding of 100-Gbit/s optical packets.

  • Bounded Strong Satisfiability Checking of Reactive System Specifications

    Masaya SHIMAKAWA  Shigeki HAGIHARA  Naoki YONEZAKI  

     
    PAPER-Software System

      Vol:
    E97-D No:7
      Page(s):
    1746-1755

    Many fatal accidents involving safety-critical reactive systems have occurred in unexpected situations that were not considered during the design and test phases of development. To prevent such accidents, reactive systems should be designed to respond appropriately to any request from an environment at any time. Verifying this property during the specification phase reduces development reworking. This property of a specification is commonly known as realizability. Realizability checking for reactive system specifications involves complex and intricate analysis. The complexity of realizability problems is 2EXPTIME-complete. To detect typical simple deficiencies in specifications efficiently, we introduce the notion of bounded strong satisfiability (a necessary condition for realizability), and present a method for checking this property. Bounded strong satisfiability is the property that, for all input patterns represented by loop structures of a given size k, there is a response that satisfies a given specification. We report a checking method based on a satisfiability solver, and show that the complexity of the bounded strong satisfiability problem is co-NEXPTIME-complete. Moreover, we report experimental results showing that our method is more efficient than existing approaches.

  • Phased Array Antenna Beam Steering Scheme for Future Wireless Access Systems Using Radio-over-Fiber Technique

    Masayuki OISHI  Yoshihiro NISHIKAWA  Kosuke NISHIMURA  Keiji TANAKA  Shigeyuki AKIBA  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1281-1289

    This paper proposes a simple and practical scheme to decide the direction of a phased array antenna beam in wireless access systems using Radio-over-Fiber (RoF) technique. The feasibility of the proposed scheme is confirmed by the optical and wireless transmission experiments using 2GHz RoF signals. In addition, two-dimensional steering operation in the millimeter-wave band is demonstrated for targeting future high-speed wireless communication systems. The required system parameters for practical use are also provided by investigating the induced transmission penalties. The proposed detection scheme is applicable to two-dimensional antenna beam steering in the millimeter-wave band by properly designing the fiber length and wavelength variable range.

  • BICM-ID-Based IDMA: Convergence and Rate Region Analyses

    Kun WU  Khoirul ANWAR  Tad MATSUMOTO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1483-1492

    This paper considers uplink interleave division multiple access (IDMA), of which crucial requirement is the proper operability at a very low signal-to-interference-plus-noise power ratio (SINR) range. The primary objectives of this paper are threefold: (1) to demonstrate the achievability of near-capacity performance of bit interleaved coded modulation with iterative detection (BICM-ID) using very low rate single parity check and irregular repetition (SPC-IrR) codes at a very low SINR range, and hence the technique is effective in achieving excellent performance when it is applied for IDMA, (2) to propose a very simple multiuser detection (MUD) technique for the SPC-IrR BICM-ID IDMA which does not incur heavy per-iteration computational burden, and (3) to analyze the impacts of power allocation on the convergence property of MUD as well as on the rate region, by using the extrinsic information transfer (EXIT) chart. The SPC-IrR code parameters are optimized by using the EXIT-constrained binary switching algorithm (EBSA) at a very low SINR range. Simulation results show that the proposed technique can achieve excellent near-capacity performance with the bit error rate (BER) curves exhibiting very sharp threshold, which significantly influences the convergence property of MUD. Furthermore, this paper presents results of the rate region analysis of multiple access channel (MAC) in the cases of equal and unequal power allocation, as well as of a counterpart technique. The results of the MAC rate region analysis show that our proposed technique outperforms the counterpart technique.

  • Plug-and-Play Optical Interconnection Using Digital Coherent Technology for Resilient Network Based on Movable and Deployable ICT Resource Unit

    Tetsuro KOMUKAI  Hirokazu KUBOTA  Toshikazu SAKANO  Toshihiko HIROOKA  Masataka NAKAZAWA  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1334-1341

    Triggered by the Great East Japan Earthquake in March 2011, the authors have been studying a resilient network whose key element is a movable and deployable ICT resource unit. The resilient network needs a function of robust and immediate connection to a wide area network active outside the damaged area. This paper proposes an application of digital coherent technology for establishing optical interconnection between the movable ICT resource unit and existing network nodes through a photonic network, rapidly, easily and with the minimum in manual work. We develop a prototype of a 100Gbit/s digital coherent transponder which is installable to our movable and deployable ICT resource unit and experimentally confirm the robust and immediate connection by virtue of the plug and play function.

  • Decoupling Network Comprising Transmission Lines and Bridge Resistance for Two-Element Array Antenna

    Shumo LI  Naoki HONMA  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:7
      Page(s):
    1395-1402

    This paper presents a novel decoupling network consisting of transmission lines and a bridge resistance for a two-element array antenna and evaluates its performance through simulations and measurements. To decouple the antennas, the phase of the mutual admittance between the antenna ports is rotated by using the transmission lines, and a pure resistance working as a bridge resistance is inserted between the two antenna ports to cancel the mutual coupling. The simulation results indicate that the proposed decoupling network can provide a wider bandwidth than the conventional approach. The proposed decoupling network is implemented and tested as a demonstration to confirm its performance. The measurement results indicate that the mutual coupling between the two antenna ports is lowered by about 47dB at the resonant frequency.

  • An Empirical Study of Bugs in Software Build System

    Xin XIA  Xiaozhen ZHOU  David LO  Xiaoqiong ZHAO  Ye WANG  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:7
      Page(s):
    1769-1780

    A build system converts source code, libraries and other data into executable programs by orchestrating the execution of compilers and other tools. The whole building process is managed by a software build system, such as Make, Ant, CMake, Maven, Scons, and QMake. Many studies have investigated bugs and fixes in several systems, but to our best knowledge, none focused on bugs in build systems. One significant feature of software build systems is that they should work on various platforms, i.e., various operating systems (e.g., Windows, Linux), various development environments (e.g., Eclipse, Visual Studio), and various programming languages (e.g., C, C++, Java, C#), so the study of software build systems deserves special consideration. In this paper, we perform an empirical study on bugs in software build systems. We analyze four software build systems, Ant, Maven, CMake and QMake, which are four typical and widely-used software build systems, and can be used to build Java, C, C++ systems. We investigate their bug database and code repositories, randomly sample a set of bug reports and their fixes (800 bugs reports totally, and 199, 250, 200, and 151 bug reports for Ant, Maven, CMake and QMake, respectively), and manually assign them into various categories. We find that 21.35% of the bugs belong to the external interface category, 18.23% of the bugs belong to the logic category, and 12.86% of the bugs belong to the configuration category. We also investigate the relationship between bug categories and bug severities, bug fixing time, and number of bug comments.

  • Analysis on Effectiveness of Fractional Frequency Reuse for Uplink Using SC-FDMA in Cellular Systems

    Masashi FUSHIKI  Takeo OHSEKI  Satoshi KONISHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1457-1466

    Single Carrier — Frequency Domain Multiple Access (SC-FDMA) is a multiple access technique employed in LTE uplink transmission. SC-FDMA can improve system throughput by frequency selective scheduling (FSS). In cellular systems using SC-FDMA in the uplink, interference arising from user equipments (UEs) in neighboring cells degrades the system throughput, especially the throughput of cell-edge UEs. In order to overcome this drawback, many papers have considered fractional frequency reuse (FFR) techniques and analyzed their effectiveness. However, these studies have come to different conclusions regarding the effectiveness of FFR because the throughput gain of FFR depends on the frequency reuse design and evaluation conditions. Previous papers have focused on the frequency reuse design. Few papers have examined the conditions where FFR is effective, and only the UE traffic conditions have been evaluated. This paper reveals other conditions where FFR is effective by demonstrating the throughput gain of FFR. In order to analyze the throughput gain of FFR, we focus on the throughput relationship between FFR and FSS. System level simulation results demonstrate that FFR is effective when the following conditions are met: (i) the number of UEs is small and (ii) the multipath delay spread is large or close to 0.

  • Analysis of Electromagnetic Scattering from a Conducting Spherical Shell by the 3D Point Matching Method with Mode Expansion

    Shinichiro OHNUKI  Kenichiro KOBAYASHI  Seiya KISHIMOTO  Tsuneki YAMASAKI  

     
    BRIEF PAPER

      Vol:
    E97-C No:7
      Page(s):
    714-717

    Electromagnetic scattering problems of canonical 2D structures can be analyzed with a high degree of accuracy by using the point matching method with mode expansion. In this paper, we will extend our previous method to 3D electromagnetic scattering problems and investigate the radar cross section of spherical shells and the computational accuracy.

  • Unified Analysis of ICI-Cancelled OFDM Systems in Doubly-Selective Channels

    Chi KUO  Jin-Fu CHANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1435-1448

    The effect of transceiver impairments (consisting of frequency offset, phase noise and doubly-selective channel) is a key factor for determining performance of an orthogonal frequency-division multiplexing (OFDM) system since the transceiver impairments trigger intercarrier interference (ICI). These impairments are well known and have been investigated separately in the past. However, these impairments usually arise concurrently and should be jointly considered from the perspectives of both receiver design and system evaluation. In this research, impact of these impairments on an OFDM system is jointly analyzed and the result degenerates to the special case where only a specific impairment is present. A mitigation method aided by segment-by-segment time-domain interpolation (STI) is then proposed following the analysis. STI is general, and its weights can be specified according to the interpolation method and system requirements. Computer simulation is used to validate the analysis and to compare the performance of the proposed method with those of other proposals.

  • Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search

    Fangming ZHAO  Takashi NISHIDE  Kouichi SAKURAI  

     
    PAPER-Information Network

      Vol:
    E97-D No:7
      Page(s):
    1790-1803

    We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting. Our fine-grained access control aware multi-user secure keyword search approach interdependently harmonizes these two security notions, access control and encrypted keyword search. Owing to the shrinkage of the cloud server's search space to the user's decryptable subset, the proposed scheme both decreases information leakage and is shown to be efficient by the results of our contrastive performance simulation.

  • Fundamental LOD-BOR-FDTD Method for the Analysis of Plasmonic Devices

    Jun SHIBAYAMA  Takuto OIKAWA  Tomoyuki HIRANO  Junji YAMAUCHI  Hisamatsu NAKANO  

     
    BRIEF PAPER

      Vol:
    E97-C No:7
      Page(s):
    707-709

    The body-of-revolution finite-difference time-domain method (BOR-FDTD) based on the locally one-dimensional (LOD) scheme is extended to a frequency-dependent version for the analysis of the Drude and Drude-Lorentz models. The formulation is simplified with a fundamental scheme, in which the number of arithmetic operations is reduced by 40% in the right-hand sides of the resultant equations. Efficiency improvement of the LOD-BOR-FDTD is discussed through the analysis of a plasmonic rod waveguide and a plasmonic grating.

  • Salient Region Detection Based on Color Uniqueness and Color Spatial Distribution

    Xing ZHANG  Keli HU  Lei WANG  Xiaolin ZHANG  Yingguan WANG  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E97-D No:7
      Page(s):
    1933-1936

    In this study, we address the problem of salient region detection. Recently, saliency detection with contrast based approaches has shown to give promising results. However, different individual features exhibit different performance. In this paper, we show that the combination of color uniqueness and color spatial distribution is an effective way to detect saliency. A Color Adaptive Thresholding Watershed Fusion Segmentation (CAT-WFS) method is first given to retain boundary information and delete unnecessary details. Based on the segmentation, color uniqueness and color spatial distribution are defined separately. The color uniqueness denotes the color rareness of salient object, while the color spatial distribution represents the color attribute of the background. Aiming at highlighting the salient object and downplaying the background, we combine the two characters to generate the final saliency map. Experimental results demonstrate that the proposed algorithm outperforms existing salient object detection methods.

  • Data Mining Intrusion Detection in Vehicular Ad Hoc Network

    Xiaoyun LIU  Gongjun YAN  Danda B. RAWAT  Shugang DENG  

     
    PAPER

      Vol:
    E97-D No:7
      Page(s):
    1719-1726

    The past decade has witnessed a growing interest in vehicular networking. Initially motivated by traffic safety, vehicles equipped with computing, communication and sensing capabilities will be organized into ubiquitous and pervasive networks with a significant Internet presence while on the move. Large amount of data can be generated, collected, and processed on the vehicular networks. Big data on vehicular networks include useful and sensitive information which could be exploited by malicious intruders. But intrusion detection in vehicular networks is challenging because of its unique features of vehicular networks: short range wireless communication, large amount of nodes, and high mobility of nodes. Traditional methods are hard to detect intrusion in such sophisticated environment, especially when the attack pattern is unknown, therefore, it can result unacceptable false negative error rates. As a novel attempt, the main goal of this research is to apply data mining methodology to recognize known attacks and uncover unknown attacks in vehicular networks. We are the first to attempt to adapt data mining method for intrusion detection in vehicular networks. The main contributions include: 1) specially design a decentralized vehicle networks that provide scalable communication and data availability about network status; 2) applying two data mining models to show feasibility of automated intrusion detection system in vehicular networks; 3) find the detection patterns of unknown intrusions.

  • Efficient Linear Time Encoding for LDPC Codes

    Tomoharu SHIBUYA  Kazuki KOBAYASHI  

     
    PAPER-Coding Theory

      Vol:
    E97-A No:7
      Page(s):
    1556-1567

    In this paper, we propose a new encoding method applicable to any linear codes over arbitrary finite field whose computational complexity is O(δ*n) where δ* and n denote the maximum column weight of a parity check matrix of a code and the code length, respectively. This means that if a code has a parity check matrix with the constant maximum column weight, such as LDPC codes, it can be encoded with O(n) computation. We also clarify the relation between the proposed method and conventional methods, and compare the computational complexity of those methods. Then we show that the proposed encoding method is much more efficient than the conventional ones.

  • Proposal of in-line wavelength-selective modulator based on waveguide interferometer

    Kenji KINTAKA  Ryotaro MORI  Tetsunosuke MIURA  Shogo URA  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    749-754

    A new wavelength-selective optical modulator was proposed and discussed. The modulator consists of three kinds of distributed Bragg reflectors (DBRs) integrated in a single straight waveguide. The waveguide can guide TE$_0$ and TE$_1$ modes, and an in-line Michelson interferometer is constructed by the three DBRs. An operation-wavelength wave among incident wavelength-division-multiplexed TE$_1$ guided waves is split into TE$_0$ and TE$_1$ guided waves by one of DBRs, and combined by the same DBR to be TE$_0$ output wave with interference after one of waves is phase-modulated. A modulator using an electro-optic (EO) polymer is designed, and the static performance was predicted theoretically. An operation principle was confirmed experimentally by a prototype device utilizing a thermo-optic effect instead of the EO effect.

  • Comparative Study of Network Cost and Power Consumption between a 100-Gb/s-Based Single-Line-Rate Network and a 100-G&400-Gb/s-Based Flexible-Bitrate Network in Three Different Network Topologies

    Noboru YOSHIKANE  Takehiro TSURITANI  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1295-1302

    This paper presents a comparative study of the number of pieces of optical transport equipment, network cost and power consumption depending on the transmission reach of the 400-Gb/s-based signal between flexible-bitrate networks using 100-Gb/s and 400-Gb/s signals and 100-Gb/s-based single-line-rate networks. In this study, we use three types of network topologies: a North American network topology, a European network topology and a Japan photonic network topology. As for the transmission reach of the 400-Gb/s-based signal, considering performance margins, different transmission reaches of the 400-Gb/s signal are assumed varying from 300km to 600km with 100-km increments. We show that the 100-Gb/s and 400-Gb/s-based flexible-bitrate networks are effective for cutting the total number of pieces of equipment and could be effective for reducing network cost and power consumption depending on the transmission reach of the 400-Gb/s signal in the case of a relatively small-scale network.

  • Split pump region in 1.55 μm InGaAsP/InGaAsP asymmetric active multi-mode interferometer laser diode for improved modulation bandwidth

    Mohammad NASIR UDDIN  Takaaki KIZU  Yasuhiro HINOKUMA  Kazuhiro TANABE  Akio TAJIMA  Kazutoshi KATO  Kiichi HAMAMOTO  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    781-786

    Laser diode capable of high speed direct modulation is one of the key solution for short distance applications due to their low power consumption, low cost and small size features. Realization of high modulation bandwidth for direct modulated laser maintaining the above mentioned feature is needed to enhance the short distance, low cost data transmission. One promising approach to enhance the modulation speed is to increase the photon density to achieve high modulation bandwidth. So to achieve this target, 1.55 $mu$m InGaAsP/InGaAsP multiple quantum well (MQW) asymmetric active multimode interferometer laser diode (active MMI-LD) has been demonstrated [1]. The split pumping concept has been applied for the active MMI-LD and significant enhancement of electrical to optical 3 dB down frequency bandwidth (f$_{mathrm{3dB}})$ up to 8 GHz has been successfully confirmed. The reported high bandwidth for split pump active MMI-LD is around 3.5 times higher than the previously reported maximum 3 dB bandwidth (2.3 GHz) of active MMI-LD without split pumping section. That shows, the splitted multimode pumping section behind the electrically isolated modulation section can potentially improve the modulation bandwidth of active MMI-LD. Clear and open eye diagram had also been confirmed for 2.5 Gbps, (2$^{mathrm{7}}$-1) pseudo random bit sequence (PRBS) modulation.

  • The Use of Highpass Filtered Time-Spread Echo for Pitch Scaling Detection

    Hwai-Tsu HU  Hsien-Hsin CHOU  Ling-Yuan HSU  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:7
      Page(s):
    1623-1626

    An echo-hiding scheme is presented to detect the pitch variation due to playback speed modification. The inserted time-spread echo is obtained by convolving the highpass filtered audio with a gain-controlled pseudo noise sequence. The perceptual evaluation confirms that the embedded echo is virtually imperceptible. Compared with the Fourier magnitude modulation, the proposed scheme attains better detection rates.

5221-5240hit(21534hit)