The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

1721-1740hit(21534hit)

  • Stronger Hardness Results on the Computational Complexity of Picross 3D

    Kei KIMURA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E103-A No:4
      Page(s):
    668-676

    Picross 3D is a popular single-player puzzle video game for the Nintendo DS. It presents a rectangular parallelepiped (i.e., rectangular box) made of unit cubes, some of which must be removed to construct an object in three dimensions. Each row or column has at most one integer on it, and the integer indicates how many cubes in the corresponding 1D slice remain when the object is complete. Kusano et al. showed that Picross 3D is NP-complete and Kimura et al. showed that the counting version, the another solution problem, and the fewest clues problem of Picross 3D are #P-complete, NP-complete, and Σ2P-complete, respectively, where those results are shown for the restricted input that the rectangular parallelepiped is of height four. On the other hand, Igarashi showed that Picross 3D is NP-complete even if the height of the input rectangular parallelepiped is one. Extending the result by Igarashi, we in this paper show that the counting version, the another solution problem, and the fewest clues problem of Picross 3D are #P-complete, NP-complete, and Σ2P-complete, respectively, even if the height of the input rectangular parallelepiped is one. Since the height of the rectangular parallelepiped of any instance of Picross 3D is at least one, our hardness results are best in terms of height.

  • System Performance Comparison of 3D Charge-Trap TLC NAND Flash and 2D Floating-Gate MLC NAND Flash Based SSDs

    Mamoru FUKUCHI  Chihiro MATSUI  Ken TAKEUCHI  

     
    PAPER-Integrated Electronics

      Vol:
    E103-C No:4
      Page(s):
    161-170

    This paper analyzes the system-level performance of Storage Class Memory (SCM)/NAND flash hybrid solid-state drives (SSDs) and SCM/NAND flash/NAND flash tri-hybrid SSDs in difference types of NAND flash memory. There are several types of NAND flash memory, i.e. 2-dimensional (2D) or 3-dimensional (3D), charge-trap type (CT) and floating-gate type (FG) and multi-level cell (MLC) or triple-level cell (TLC). In this paper, the following four types of NAND flash memory are analyzed: 1) 3D CT TLC, 2) 3D FG TLC, 3) 2D FG TLC, and 4) 2D FG MLC NAND flash. Regardless of read- and write-intensive workloads, SCM/NAND flash hybrid SSD with low cost 3D CT TLC NAND flash achieves the best performance that is 20% higher than that with higher cost 2D FG MLC NAND flash. The performance improvement of 3D CT TLC NAND flash can be obtained by the short write latency. On the other hand, in case of tri-hybrid SSD, SCM/3D CT TLC/3D CT TLC NAND flash tri-hybrid SSD improves the performance 102% compared to SCM/2D FG MLC/3D CT TLC NAND flash tri-hybrid SSD. In addition, SCM/2D FG MLC/2D FG MLC NAND flash tri-hybrid SSD shows 49% lower performance than SCM/2D FG MLC/3D CT TLC NAND flash tri-hybrid SSD. Tri-hybrid SSD flash with 3D CT TLC NAND flash is the best performance in tri-hybrid SSD thanks to larger block size and word-line (WL) write. Therefore, in 3D CT TLC NAND flash based SSDs, higher cost MLC NAND flash is not necessary for hybrid SSD and tri-hybrid SSD for data center applications.

  • Predicting Uninterruptible Durations of Office Workers by Using Probabilistic Work Continuance Model

    Shota SHIRATORI  Yuichiro FUJIMOTO  Kinya FUJITA  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2020/01/10
      Vol:
    E103-D No:4
      Page(s):
    838-849

    In order not to disrupt a team member concentrating on his/her own task, the interrupter needs to wait for a proper time. In this research, we examined the feasibility of predicting prospective interruptible times of office workers who use PCs. An analysis of actual working data collected from 13 participants revealed the relationship between uninterruptible durations and four features, i.e. type of application software, rate of PC operation activity, activity ratio between keystrokes and mouse clicks, and switching frequency of application software. On the basis of these results, we developed a probabilistic work continuance model whose probability changes according to the four features. The leave-one-out cross-validation indicated positive correlations between the actual and the predicted durations. The medians of the actual and the predicted durations were 539 s and 519 s. The main contribution of this study is the demonstration of the feasibility to predict uninterruptible durations in an actual working scenario.

  • Angular Momentum Spectrum of Electromagnetic Wave

    Chao ZHANG  Jin JIANG  

     
    LETTER-Analog Signal Processing

      Vol:
    E103-A No:4
      Page(s):
    715-717

    Angular Momentum (AM) has been considered as a new dimension of wireless transmissions as well as the intrinsic property of Electro-Magnetic (EM) waves. So far, AM is utilized as a discrete mode not only in the quantum states, but also in the statistical beam forming. Traditionally, the continuous value of AM is ignored and only the quantized mode number is identified. However, the recent discovery on electrons in spiral motion producing twisted radiation with AM, including Spin Angular Momentum (SAM) and Orbital Angular Momentum (OAM), proves that the continuous value of AM is available in the statistical EM wave beam. This is also revealed by the so-called fractional OAM, which is reported in optical OAM beams. Then, as the new dimension with continuous real number field, AM should turn out to be a certain spectrum, similar to the frequency spectrum usually in the wireless signal processing. In this letter, we mathematically define the AM spectrum and show the applications in the information theory analysis, which is expected to be an efficient tool for the future wireless communications with AM.

  • A True Random Number Generator Method Embedded in Wireless Communication Systems

    Toshinori SUZUKI  Masahiro KAMINAGA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E103-A No:4
      Page(s):
    686-694

    To increase the number of wireless devices such as mobile or IoT terminals, cryptosystems are essential for secure communications. In this regard, random number generation is crucial because the appropriate function of cryptosystems relies on it to work properly. This paper proposes a true random number generator (TRNG) method capable of working in wireless communication systems. By embedding a TRNG in such systems, no additional analog circuits are required and working conditions can be limited as long as wireless communication systems are functioning properly, making TRNG method cost-effective. We also present some theoretical background and considerations. We next conduct experimental verification, which strongly supports the viability of the proposed method.

  • Efficient Reliability Evaluation of Multi-Domain Networks with Secure Intra-Domain Privacy Open Access

    Atsushi TANIGUCHI  Takeru INOUE  Kohei MIZUNO  Takashi KURIMOTO  Atsuko TAKEFUSA  Shigeo URUSHIDANI  

     
    PAPER-Network Management/Operation

      Pubricized:
    2019/09/27
      Vol:
    E103-B No:4
      Page(s):
    440-451

    Communication networks are now an essential infrastructure of society. Many services are constructed across multiple network domains. Therefore, the reliability of multi-domain networks should be evaluated to assess the sustainability of our society, but there is no known method for evaluating it. One reason is the high computation complexity; i.e., network reliability evaluation is known to be #P-complete, which has prevented the reliability evaluation of multi-domain networks. The other reason is intra-domain privacy; i.e., network providers never disclose the internal data required for reliability evaluation. This paper proposes a novel method that computes the lower and upper bounds of reliability in a distributed manner without requiring privacy disclosure. Our method is solidly based on graph theory, and is supported by a simple protocol that secures intra-domain privacy. Experiments on real datasets show that our method can successfully compute the reliability for 14-domain networks in one second. The reliability is bounded with reasonable errors; e.g., bound gaps are less than 0.1% for reliable networks.

  • Ergodic Capacity of Composite Fading Channels in Cognitive Radios with Series Formula for Product of κ-µ and α-µ Fading Distributions

    He HUANG  Chaowei YUAN  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/10/08
      Vol:
    E103-B No:4
      Page(s):
    458-466

    In this study, product of two independent and non-identically distributed (i.n.i.d.) random variables (RVs) for κ-µ fading distribution and α-µ fading distribution is considered. The statistics of the product of RVs has been broadly applied in a large number of communications fields, such as cascaded fading channels, multiple input multiple output (MIMO) systems, radar communications and cognitive radios (CR). Exact close-form expressions of probability density function (PDF) and cumulative distribution function (CDF) with exact series formulas for the product of two i.n.i.d. fading distributions κ-µ and α-µ are deduced more accurately to represent the provided product expressions and generalized composite multipath shadowing models. Furthermore, ergodic channel capacity (ECC) is obtained to measure maximum fading channel capacity. At last, interestingly unlike κ-µ, η-µ, α-µ in [9], [17], [18], these analytical results are validated with Monte Carlo simulations and it shows that for provided κ-µ/α-µ model, non-linear parameter has more important influence than multipath component in PDF and CDF, and when the ratio between the total power of the dominant components and the total power of the scattered waves is same, higher α can significantly improve channel capacity over composite fading channels.

  • A Long Delay Multipath Equalization Using High Frequency Resolution Spatial Filters for SDM MIMO-OFDM Systems

    Tomoaki TAKEUCHI  Masahiro OKANO  Kenichi TSUCHIDA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/10/08
      Vol:
    E103-B No:4
      Page(s):
    476-484

    Long delay multipath is a major cause of the poor reception of digital terrestrial broadcasting signals. The direct solution to this problem in orthogonal frequency division multiplexing (OFDM) system is to make the guard interval (GI) longer than the maximum channel delay. However, given the wide variety in broadcasting channel characteristics, the worst case GI may be twice the value needed which decreases the spectral efficiency and service quality. Therefore, the solution must be implemented on the receiver side. For the next generation broadcasting system, this paper proposes a space division multiplexing (SDM) multiple-input multiple-output (MIMO)-OFDM receiver for a multipath environment whose maximum delay time exceeds the GI length. The proposed system employs the high frequency resolution spatial filters that have the same configuration as the conventional one but operate at four times higher frequency resolution. Computer simulation and laboratory test results are presented to show the effectiveness of the proposed system.

  • Adaptive Transmission Mode Switching in Interference Alignment Based Clustered Wireless Network

    Sungyoon CHO  Jeongwook SEO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2019/10/08
      Vol:
    E103-B No:4
      Page(s):
    485-494

    In this paper, hierarchical interference coordination is proposed that suppresses both intra- and inter-cluster interference (ICI) in clustered wireless networks. Assuming transmitters and receivers are equipped with multiple antennas and complete channel state information is shared among all transmitters within the same cluster, interference alignment (IA) is performed that uses nulls to suppress intra-cluster interference. For ICI mitigation, we propose a null-steering precoder designed on the nullspace of a principal eigenvector of the correlated ICI channels, which eliminates a significant amount of ICI power given the exchange of cluster geometry between neighboring clusters. However, as ICI is negligible for the system in which the distance between clusters are large enough, the proposed scheme may not improve the system performance compared with the pure IA scheme that exploits all spatial degrees of freedom (DoF) to increase multiplexing gain without ICI mitigation. For the efficient interference management between intra- and inter-cluster, we analyze the decision criterion that provides an adaptive transmission mode selection between pure IA and proposed ICI reduction in given network environments. Moreover, a low computational complexity based transmission mode switching algorithm is proposed for irregularly distributed networks.

  • Essential Roles, Challenges and Development of Embedded MCU Micro-Systems to Innovate Edge Computing for the IoT/AI Age Open Access

    Takashi KONO  Yasuhiko TAITO  Hideto HIDAKA  

     
    INVITED PAPER-Integrated Electronics

      Vol:
    E103-C No:4
      Page(s):
    132-143

    Embedded system approaches to edge computing in IoT implementations are proposed and discussed. Rationales of edge computing and essential core capabilities for IoT data supply innovation are identified. Then, innovative roles and development of MCU and embedded flash memory are illustrated by technology and applications, expanding from CPS to big-data and nomadic/autonomous elements of IoT requirements. Conclusively, a technology roadmap construction specific to IoT is proposed.

  • Silicon Controlled Rectifier Based Partially Depleted SOI ESD Protection Device for High Voltage Application

    Yibo JIANG  Hui BI  Hui LI  Zhihao XU  Cheng SHI  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Pubricized:
    2019/10/09
      Vol:
    E103-C No:4
      Page(s):
    191-193

    In partially depleted SOI (PD-SOI) technology, the SCR-based protection device is desired due to its relatively high robustness, but be restricted to use because of its inherent low holding voltage (Vh) and high triggering voltage (Vt1). In this paper, the body-tie side triggering diode inserting silicon controlled rectifier (BSTDISCR) is proposed and verified in 180 nm PD-SOI technology. Compared to the other devices in the same process and other related works, the BSTDISCR presents as a robust and latchup-immune PD-SOI ESD protection device, with appropriate Vt1 of 6.3 V, high Vh of 4.2 V, high normalized second breakdown current (It2), which indicates the ESD protection robustness, of 13.3 mA/µm, low normalized parasitic capacitance of 0.74 fF/µm.

  • Latch-Up Immune Bi-Direction ESD Protection Clamp for Push-Pull RF Power Amplifier

    Yibo JIANG  Hui BI  Wei ZHAO  Chen SHI  Xiaolei WANG  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Pubricized:
    2019/10/09
      Vol:
    E103-C No:4
      Page(s):
    194-196

    For the RF power amplifier, its exposed input and output are susceptible to damage from Electrostatic (ESD) damage. The bi-direction protection is required at the input in push-pull operating mode. In this paper, considering the process compatibility to the power amplifier, cascaded Grounded-gate NMOS (ggNMOS) and Polysilicon diodes (PDIO) are stacked together to form an ESD clamp with forward and reverse protection. Through Transmission line pulse (TLP) and CV measurements, the clamp is demonstrated as latch-up immune and low parasitic capacitance bi-direction ESD protection, with 18.67/17.34V holding voltage (Vhold), 4.6/3.2kV ESD protection voltage (VESD), 0.401/0.415pF parasitic capacitance (CESD) on forward and reverse direction, respectively.

  • Software Development Effort Estimation from Unstructured Software Project Description by Sequence Models

    Tachanun KANGWANTRAKOOL  Kobkrit VIRIYAYUDHAKORN  Thanaruk THEERAMUNKONG  

     
    PAPER

      Pubricized:
    2020/01/14
      Vol:
    E103-D No:4
      Page(s):
    739-747

    Most existing methods of effort estimations in software development are manual, labor-intensive and subjective, resulting in overestimation with bidding fail, and underestimation with money loss. This paper investigates effectiveness of sequence models on estimating development effort, in the form of man-months, from software project data. Four architectures; (1) Average word-vector with Multi-layer Perceptron (MLP), (2) Average word-vector with Support Vector Regression (SVR), (3) Gated Recurrent Unit (GRU) sequence model, and (4) Long short-term memory (LSTM) sequence model are compared in terms of man-months difference. The approach is evaluated using two datasets; ISEM (1,573 English software project descriptions) and ISBSG (9,100 software projects data), where the former is a raw text and the latter is a structured data table explained the characteristic of a software project. The LSTM sequence model achieves the lowest and the second lowest mean absolute errors, which are 0.705 and 14.077 man-months for ISEM and ISBSG datasets respectively. The MLP model achieves the lowest mean absolute errors which is 14.069 for ISBSG datasets.

  • Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings

    Uraiwan BUATOOM  Waree KONGPRAWECHNON  Thanaruk THEERAMUNKONG  

     
    PAPER

      Pubricized:
    2020/01/08
      Vol:
    E103-D No:4
      Page(s):
    748-758

    The outcome of document clustering depends on the scheme used to assign a weight to each term in a document. While recent works have tried to use distributions related to class to enhance the discrimination ability. It is worth exploring whether a deviation approach or an entropy approach is more effective. This paper presents a comparison between deviation-based distribution and entropy-based distribution as constraints in term weighting. In addition, their potential combinations are investigated to find optimal solutions in guiding the clustering process. In the experiments, the seeded k-means method is used for clustering, and the performances of deviation-based, entropy-based, and hybrid approaches, are analyzed using two English and one Thai text datasets. The result showed that the deviation-based distribution outperformed the entropy-based distribution, and a suitable combination of these distributions increases the clustering accuracy by 10%.

  • Compromising Strategies for Agents in Multiple Interdependent Issues Negotiation

    Shun OKUHARA  Takayuki ITO  

     
    PAPER

      Pubricized:
    2020/01/21
      Vol:
    E103-D No:4
      Page(s):
    759-770

    This paper presents a compromising strategy based on constraint relaxation for automated negotiating agents in the nonlinear utility domain. Automated negotiating agents have been studied widely and are one of the key technologies for a future society in which multiple heterogeneous agents act collaboratively and competitively in order to help humans perform daily activities. A pressing issue is that most of the proposed negotiating agents utilize an ad-hoc compromising process, in which they basically just adjust/reduce a threshold to forcibly accept their opponents' offers. Because the threshold is just reduced and the agent just accepts the offer since the value is more than the threshold, it is very difficult to show how and what the agent conceded even after an agreement has been reached. To address this issue, we describe an explainable concession process using a constraint relaxation process. In this process, an agent changes its belief by relaxing constraints, i.e., removing constraints, so that it can accept it is the opponent's offer. We also propose three types of compromising strategies. Experimental results demonstrate that these strategies are efficient.

  • Characterization of Interestingness Measures Using Correlation Analysis and Association Rule Mining

    Rachasak SOMYANONTHANAKUL  Thanaruk THEERAMUNKONG  

     
    PAPER

      Pubricized:
    2020/01/09
      Vol:
    E103-D No:4
      Page(s):
    779-788

    Objective interestingness measures play a vital role in association rule mining of a large-scaled database because they are used for extracting, filtering, and ranking the patterns. In the past, several measures have been proposed but their similarities or relations are not sufficiently explored. This work investigates sixty-one objective interestingness measures on the pattern of A → B, to analyze their similarity and dissimilarity as well as their relationship. Three-probability patterns, P(A), P(B), and P(AB), are enumerated in both linear and exponential scales and each measure's values of those conditions are calculated, forming synthesis data for investigation. The behavior of each measure is explored by pairwise comparison based on these three-probability patterns. The relationship among the sixty-one interestingness measures has been characterized with correlation analysis and association rule mining. In the experiment, relationships are summarized using heat-map and association rule mined. As the result, selection of an appropriate interestingness measure can be realized using the generated heat-map and association rules.

  • The Effect of Axis-Wise Triaxial Acceleration Data Fusion in CNN-Based Human Activity Recognition

    Xinxin HAN  Jian YE  Jia LUO  Haiying ZHOU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2020/01/14
      Vol:
    E103-D No:4
      Page(s):
    813-824

    The triaxial accelerometer is one of the most important sensors for human activity recognition (HAR). It has been observed that the relations between the axes of a triaxial accelerometer plays a significant role in improving the accuracy of activity recognition. However, the existing research rarely focuses on these relations, but rather on the fusion of multiple sensors. In this paper, we propose a data fusion-based convolutional neural network (CNN) approach to effectively use the relations between the axes. We design a single-channel data fusion method and multichannel data fusion method in consideration of the diversified formats of sensor data. After obtaining the fused data, a CNN is used to extract the features and perform classification. The experiments show that the proposed approach has an advantage over the CNN in accuracy. Moreover, the single-channel model achieves an accuracy of 98.83% with the WISDM dataset, which is higher than that of state-of-the-art methods.

  • Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image

    Minkyoung CHO  Jik-Soo KIM  Jongho SHIN  Incheol SHIN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/12/25
      Vol:
    E103-D No:4
      Page(s):
    896-900

    We propose an effective 2d image based end-to-end deep learning model for malware detection by introducing a black & white embedding to reserve bit information and adapting the convolution architecture. Experimental results show that our proposed scheme can achieve superior performance in both of training and testing data sets compared to well-known image recognition deep learning models (VGG and ResNet).

  • Investigation on e-Learning Status Estimation for New Learners — Classifier Selection on Representative Sample Selection

    Siyang YU  Kazuaki KONDO  Yuichi NAKAMURA  Takayuki NAKAJIMA  Masatake DANTSUJI  

     
    LETTER-Educational Technology

      Pubricized:
    2020/01/20
      Vol:
    E103-D No:4
      Page(s):
    905-909

    This article introduces our investigation on learning state estimation in e-learning on the condition that visual observation and recording of a learner's behaviors is possible. In this research, we examined methods of adaptation for a new learner for whom a small number of ground truth data can be obtained.

  • Sequential Authentication Using Handwriting Biometrics for Free Response e-Testing

    Taisuke KAWAMATA  Takako AKAKURA  

     
    LETTER-Educational Technology

      Pubricized:
    2020/01/20
      Vol:
    E103-D No:4
      Page(s):
    901-904

    To prevent proxy-test taking among examinees in unsynchronized e-Testing, a previous work proposed an online handwriting authentication. That method was limited to applied for end of each answer. For free response tests that needed to authenticate throughout the answer, we used the Bayesian prior information to examine a sequential handwriting authentication procedure. The evaluation results indicate that the accuracy of this procedure is higher than the previous method in examinees authentication during mathematics exam with referring the Chinese character.

1721-1740hit(21534hit)