The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

6621-6640hit(21534hit)

  • Inclined Slot Array Antennas on a Hollow Rectangular Coaxial Line

    Satoshi YAMAGUCHI  Yukihiro TAHARA  Toru TAKAHASHI  Kazushi NISHIZAWA  Hiroaki MIYASHITA  Yoshihiko KONISHI  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:9
      Page(s):
    2870-2877

    Slotted-waveguide array antennas are attractive because of their low-loss characteristics at high frequencies. Several types of slotted arrays whose polarization angles are inclined to the waveguide axis have been reported. In this paper, we propose a new type of slot array antenna on a rectangular coaxial line for minimizing the waveguide width. As opposed to a conventional waveguide, there is no “cut-off” concept in our proposal because the coaxial line is a transverse electromagnetic (TEM) line. Therefore it is possible to guide the wave even if the diameter of the line is much smaller than that of the waveguide. Moreover, the proposed antenna is a resonant slot array antenna that is based on standing-wave excitation and is thus different from traveling-wave antennas (such as a leaky coaxial cable (LCX)).

  • Class-Based N-Gram Language Model for New Words Using Out-of-Vocabulary to In-Vocabulary Similarity

    Welly NAPTALI  Masatoshi TSUCHIYA  Seiichi NAKAGAWA  

     
    PAPER-Speech and Hearing

      Vol:
    E95-D No:9
      Page(s):
    2308-2317

    Out-of-vocabulary (OOV) words create serious problems for automatic speech recognition (ASR) systems. Not only are they miss-recognized as in-vocabulary (IV) words with similar phonetics, but the error also causes further errors in nearby words. Language models (LMs) for most open vocabulary ASR systems treat OOV words as a single entity, ignoring the linguistic information. In this paper we present a class-based n-gram LM that is able to deal with OOV words by treating each of them individually without retraining all the LM parameters. OOV words are assigned to IV classes consisting of similar semantic meanings for IV words. The World Wide Web is used to acquire additional data for finding the relation between the OOV and IV words. An evaluation based on adjusted perplexity and word-error-rate was carried out on the Wall Street Journal corpus. The result suggests the preference of the use of multiple classes for OOV words, instead of one unknown class.

  • Known-Key Attacks on Generalized Feistel Schemes with SP Round Function

    HyungChul KANG  Deukjo HONG  Dukjae MOON  Daesung KWON  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:9
      Page(s):
    1550-1560

    We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21, 13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgård domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme.

  • On the Convolutionally Encoded OFDM System with Symbol Time Offset

    Yung-Yi WANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E95-B No:9
      Page(s):
    2931-2935

    This study proposes an improved per-survivor-processing (PSP) scheme to tackle the phase error issue in the convolutionally coded OFDM systems. The proposed approach takes advantage of the trellis structure of the convolutional codes to compensate the symbol-time-offset (STO) caused phase error in frequency domain. Unlike the traditional PSP scheme which simply estimates the phase error by using a state-based horizontal process, the proposed approach develops an extra state-wise vertical process which selects the most likely phase estimate as the survival phase in each trellis stage and then accordingly align the phase of all states to this survival phase before moving to next trellis stage of the PSP scheme. With the vertical process, the resultant phase estimate is more reliable than that of the conventional PSP scheme and hence improve the accuracy in data decoding. Computer simulations confirm the validity of the proposed approach.

  • Position and Shape of Break Arcs Driven by Transverse Magnetic Field

    Tomoaki SASAKI  Junya SEKIKAWA  Takayoshi KUBONO  

     
    BRIEF PAPER

      Vol:
    E95-C No:9
      Page(s):
    1527-1530

    Break arcs are generated in a DC48 V and 10 A resistive circuit. The external transverse magnetic field of a permanent magnet is applied to the break arcs. The position and shape of the break arc are investigated. As a result, it is confirmed that the cathode spot region was shifted upward earlier than the anode spot region. This result shows that the cathode spot region is easily driven by the transverse magnetic field than the anode spot region.

  • Crosstalk Analysis and Measurement Technique for High Frequency Signal Transfer in MEMs Probe Pins

    Duc Long LUONG  Hyeonju BAE  Wansoo NAH  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1459-1464

    This paper develops a methodology of crosstalk analysis/measurement techniques for the design and fabrication of the MEMs (Micro-ElectroMichanical system) probe card. By introducing more ground pins into the connector pins, the crosstalk characteristics can be enhanced and a design guide for the parameters, such as pin's size and pitch is proposed to satisfy the given crosstalk limitation of -30 dB for reliable high speed signal transfer. The paper also presents a novel method to characterize scattering parameters of multiport interconnect circuits with a 4-port VNA (Vector Network Analyzer). By employing the re-normalization of scattering matrices with different reference impedances at other ports, data obtained from 4-port configuration measurements can be synthesized to build a full scattering matrix of the DUT (Device-Under-Test, MEMs probe connector pins). In comparison to the conventional 2-port VNA re-normalization method, proposed technique has two advantages: saving of measuring time, and enhanced accuracy even with open-ended unmeasured ports. A good agreement of the estimated and correct S parameters verifies the validness of the proposed algorithm.

  • Environmentally-Friendly Switches: Arcing Phenomena in Vacuum and SF6 Substitutes

    Shenli JIA  Xingwen LI  Zongqian SHI  Lijun WANG  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1452-1458

    This paper focuses on the latest research of switching arc both in vacuum and SF6 substitutes in our group. The crucial characteristics of vacuum arc are illustrated, including the motion and distribution of single cathode spot and multiple cathode spots, the influence of axial magnetic field on arc plasma characteristics, the influence of composite magnetic field on cathode jets, and the study of anode activities. Meanwhile, the arc characteristics in SF6 and its substitutes (Ar, CO2 and N2) at different pressures and gap distances are investigated by experiments and simulation.

  • Novel Watermarked MDC System Based on SFQ Algorithm

    Lin-Lin TANG  Jeng-Shyang PAN  Hao LUO  Junbao LI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2922-2925

    A novel watermarked MDC system based on the SFQ algorithm and the sub-sampling method is proposed in this paper. Sub-sampling algorithm is applied onto the transformed image to introduce some redundancy between different channels. Secret information is embedded into the preprocessed sub-images. Good performance of the new system to defense the noise and the compression attacks is shown in the experimental results.

  • CSMA/CA Unicast Communication Performance under Fading Environment with Two-Dimensional Distribution of Hidden Terminal

    Jingze DAI  Yasushi YAMAO  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2708-2717

    Performance of CSMA/CA wireless communication is severely affected by hidden terminal (HT) problem that results in failure of carrier sense and causes packet error due to collision. However, no mathematical analysis method for the HT problem has been available that takes into account actual radio environments including both fading and capture effect. This paper presents an analysis method that enables to well predict the probability of successful communication (PSC) and communication efficiency for CSMA/CA unicast communication including the interaction of data and ACK packets. Analysis of the PSC with two-dimensional HT distribution makes it easy to understand the influence of HT location and carrier sense level. Also it is shown that there is considerable difference on the PSC between fading and fading-free environments. The obtained results as well as the proposed analysis method are quite useful in CSMA/CA network design for WLAN and sensor network applications.

  • Good or Bad Committers? –– A Case Study of Committer's Activities on the Eclipse's Bug Fixing Process

    Anakorn JONGYINDEE  Masao OHIRA  Akinori IHARA  Ken-ichi MATSUMOTO  

     
    PAPER

      Vol:
    E95-D No:9
      Page(s):
    2202-2210

    There are many roles to play in the bug fixing process in open source software development. A developer called “Committer”, who has a permission to submit a patch into a software repository, plays a major role in this process and holds a key to the successfulness of the project. Despite the importance of committer's activities, we suspect that sometimes committers can make mistakes which have some consequences to the bug fixing process (e.g., reopened bugs after bug fixing). Our research focuses on studying the consequences of each committer's activities to this process. We collected each committer's historical data from the Eclipse-Platform's bug tracking system and version control system and evaluated their activities using bug status in the bug tracking system and commit log in the version control system. Then we looked deeper into each committer's characteristics to see the reasons why some committers tend to make mistakes more than the others.

  • MMSE-Based Precoders for Cooperative MIMO Systems with Direct Link

    Byungwook YOO  Chungyong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    2999-3002

    We propose linear precoders which jointly minimize the mean-squared error of estimated symbol at the destination node for cooperative multiple-input multiple-output communication systems. Unlike the existing precoders which require high computational complexity to solve the optimization problem on the direct link, the proposed precoder is expressed in a closed-form. Simulation results show that the proposed precoder outperforms the existing precoders in the low SNR region. Moreover, we observe that the proposed iterative algorithm is not sensitive to the initial matrices.

  • A Fuzzy Routing Method in UAV Delay Tolerant Networks

    Xuanya LI  Linlin CI  Wenbing JIN  

     
    LETTER

      Vol:
    E95-B No:9
      Page(s):
    2769-2773

    Hovering unmanned aerial vehicles (UAVs) with mutual sense and communication capability form a new-fashioned airborne ad hoc network. Traditional routing protocols assume that there has already existed an end-to-end path before the message forwarding starts which, however, is not always available in the airborne network featuring randomly violent topological changes. Local heuristic information without complex computational cost should be considered to help route in this specific delay tolerant network (DTN). In this letter, we take Crowd Density (CD) and Relative Velocity Direction (RVD) as the fuzzy inputs, and use approximate reasoning to calculate priority of alternative candidates. Finally, the proposed mechanism is compared with some existing protocols.

  • Non-contact PIM Evaluation Method Using a Standing Wave Coaxial Tube

    Daijiro ISHIBASHI  Nobuhiro KUGA  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1508-1514

    In this paper, a contactless measurement technique of passive intermodulation (PIM) using a coaxial tube excited with standing waves is proposed. The principle of the proposed method is described using a two-port network model with the lumped resistances representing the losses of a specimen and test equipment. To show its validity, a test using nickel wires producing high PIM is carried out, and its PIM-dependency on DUT-position in the coaxial tube is simulated using the FDTD method. The simulated result shows a good agreement to the experiment. Through the examination, it is found that the power consumption by the PIM source in a specimen is essential in PIM production, and sensitive PIM detection does not require good matching condition. Finally, the relation between PIM-source size and generated PIM level is also examined. The result shows that at least 18 dB-PIM reduction is obtained by PIM source size in a half-wavelength conductive wire.

  • Quantization Error-Aware Tomlinson-Harashima Precoding in Multiuser MISO Systems with Limited Feedback

    Yanzhi SUN  Muqing WU  Jianming LIU  Chaoyi ZHANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3015-3018

    In this letter, a quantization error-aware Tomlinson-Harashinma Precoding (THP) is proposed based on the equivalent zero-forcing (ZF) criterion in Multiuser Multiple-Input Single-Output (MU-MISO) systems with limited feedback, where the transmitter has only quantized channel direction information (CDI). This precoding scheme is robust to the channel uncertainties arising from the quantization error and the lack of channel magnitude information (CMI). Our simulation results show that the new THP scheme outperforms the conventional precoding scheme in limited feedback systems with respect to Bit Error Ratio (BER).

  • An Improved Large Frequency Offset Estimator Using Interpolation of Expanded Periodogram

    Seunghyun NAM  Jong-Min PARK  Heewook KIM  Tae Chul HONG  Kunseok KANG  Bon Jun KU  Do Seob AHN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3007-3010

    The periodogram scheme is a versatile method for large frequency offset estimation which requires preambles, in general, and only a few reference signals. However, the drawback of the conventional scheme is its inaccuracy in detecting the integer part of frequency offset which dominates the accuracy of frequency offset estimation. In order to increase the accuracy of the estimation, we directly interpolate a coefficient of the periodogram. The conventional periodogram and proposed schemes are compared in terms of the mean square error performance in the long term evolution system. The performance of the proposed method is compared with the conventional one and the simulation results indicate the better performance of the proposed one.

  • Numerical Analysis of Monopole Multi-Sector Antenna with Dielectric Cylinder

    Yuto SUZUKI  Naoki HONMA  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:9
      Page(s):
    2991-2994

    This letter proposes a monopole multi-sector antenna with dielectric cylinder, and shows some results of simulations that examined the antenna characteristics. The dependency of radiation characteristics on relative permittivity εr shows the lens effect with increase of εr. Furthermore, the characteristics of the proposed antenna are improved by optimizing the termination conditions at the quiescent antennas. The backlobe level is lower than -10 dB. Also, the vertical HPBW and the conical HPBW are around 70.5° and 63.4°, respectively. The optimization improved the actual gain by 2 dB. It is found that the diameter of the proposed antenna is 1/3rd that of the conventional one.

  • Attacker Detection Based on Dissimilarity of Local Reports in Collaborative Spectrum Sensing

    Junnan YAO  Qihui WU  Jinlong WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3024-3027

    In this letter, we propose a dissimilarity metric (DM) to measure the deviation of a cognitive radio from the network in terms of local sensing reports. Utilizing the probability mass function of the DM, we present a dissimilarity-based attacker detection algorithm to distinguish Byzantine attackers from honest users. The proposed algorithm is able to identify the attackers without a priori information of the attacking styles and is robust against both independent and dependent attacks.

  • Effects of Optical Layer Protection Granularity in Survivable Hierarchical Optical Path Network

    Yoshiyuki YAMADA  Hiroshi HASEGAWA  Ken-ichi SATO  

     
    LETTER-Network

      Vol:
    E95-B No:9
      Page(s):
    2959-2963

    This study compares the performances of waveband protection and wavelength path protection in survivable hierarchical optical path networks. Network costs and the number of switching operations necessary are evaluated for different ratios of protected demand. Numerical results demonstrate that waveband protection can drastically decrease the number of switching operations in the case of failure, while both waveband and wavelength path protection effectively reduce the network resources needed compared to single layer optical path networks.

  • An Adaptive Method to Acquire QoS Class Allocation Policy Based on Reinforcement Learning

    Nagao OGINO  Hajime NAKAMURA  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2828-2837

    For real-time services, such as VoIP and videoconferencing supplied through a multi-domain MPLS network, it is vital to guarantee end-to-end QoS of the inter-domain paths. Thus, it is important to allocate an appropriate QoS class to the inter-domain paths in each transit domain. Because each domain has its own policy for QoS class allocation, each domain must then allocate an appropriate QoS class adaptively based on the estimation of the QoS class allocation policies adopted in other domains. This paper proposes an adaptive method for acquiring a QoS class allocation policy through the use of reinforcement learning. This method learns the appropriate policy through experience in the actual QoS class allocation process. Thus, the method can adapt to a complex environment where the arrival of inter-domain path requests does not follow a simple Poisson process and where the various QoS class allocation policies are adopted in other domains. The proposed method updates the allocation policy whenever a QoS class is actually allocated to an inter-domain path. Moreover, some of the allocation policies often utilized in the real operational environment can be updated and refined more frequently. For these reasons, the proposed method is designed to adapt rapidly to variances in the surrounding environment. Simulation results verify that the proposed method can quickly adapt to variations in the arrival process of inter-domain path requests and the QoS class allocation policies in other domains.

  • Low-Complexity Sign Detection Algorithm for RNS {2n-1, 2n, 2n+1}

    Minghe XU  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E95-C No:9
      Page(s):
    1552-1556

    Based on a reverse converter algorithm derived from the New Chinese Remainder Theorem I, an algorithm for sign detection of RNS {2n-1, 2n, 2n+1} is presented in this paper. The hardware of proposed algorithm can be implemented using two n-bit additions and one (n+1)-bit comparator. Comparing with the previous paper, the proposed algorithm has reduced the number of additions used in the circuit. The experimental results show that the proposed circuit achieves 17.3% savings in area for small moduli and 10.5% savings in area for large moduli on an average, with almost the same speed. The power dissipations obtain 12.6% savings in average.

6621-6640hit(21534hit)