The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ti(30728hit)

1461-1480hit(30728hit)

  • A Construction of Inter-Group Complementary Sequence Set Based on Interleaving Technique

    Xiaoyu CHEN  Huanchang LI  Yihan ZHANG  Yubo LI  

     
    LETTER-Coding Theory

      Pubricized:
    2021/07/12
      Vol:
    E105-A No:1
      Page(s):
    68-71

    A new construction of shift sequences is proposed under the condition of P|L, and then the inter-group complementary (IGC) sequence sets are constructed based on the shift sequence. By adjusting the parameter q, two or three IGC sequence sets can be obtained. Compared with previous methods, the proposed construction can provide more sequence sets for both synchronous and asynchronous code-division multiple access communication systems.

  • Generation of Surface Wave in C-Band Automotive On-Glass Antenna and an Easily Realizable Suppression Method for Improving Antenna Characteristics

    Osamu KAGAYA  Keisuke ARAI  Takato WATANABE  Takuji ARIMA  Toru UNO  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2021/08/02
      Vol:
    E105-B No:1
      Page(s):
    51-57

    In this paper, the influence of surface waves on the characteristics of on-glass antennas is clarified to enable appropriates design of C-band automotive on-glass antennas. Composite glasses are used in automotive windshields. These automotive composite glasses are composed of three layers. First, the surface wave properties of composite glass are investigated. Next, the effects of surface waves on the reflection coefficient characteristics of on-glass antennas are investigated. Finally, the antenna placement to reduce surface wave effect will be presented. Electromagnetic field analysis of a dipole antenna placed at the center of a 300mm × 300mm square flat composite glass showed that the electric field strength in the glass had ripples with the half wavelength period of the surface waves. Therefore, it was confirmed that standing waves are generated because of these surface waves. In addition, it is confirmed that ripples occur in the reflection coefficient at frequencies. Glass size is divisible by each of those guide wavelengths. Furthermore, it was clarified that the reflection coefficient fluctuates with respect to the distance between the antenna and a metal frame, which is attached to the end face in the direction perpendicular to the thickness of the glass because of the influence of standing waves caused by the surface waves; additionally, the reflection coefficient gets worse when the distance between the antenna and the metal frame is an integral multiple of one half wavelength. A similar tendency was observed in an electric field analysis using a model that was shaped like the actual windshield shape. Because radiation patterns also change as a result of the influence of surface waves and metal frames, the results imply that it is necessary to consider the actual device size and the metal frames when designing automotive on-glass antennas.

  • A New Method Based on Copula Theory for Evaluating Detection Performance of Distributed-Processing Multistatic Radar System

    Van Hung PHAM  Tuan Hung NGUYEN  Duc Minh NGUYEN  Hisashi MORISHITA  

     
    PAPER-Sensing

      Pubricized:
    2021/07/13
      Vol:
    E105-B No:1
      Page(s):
    67-75

    In this paper, we propose a new method based on copula theory to evaluate the detection performance of a distributed-processing multistatic radar system (DPMRS). By applying the Gaussian copula to model the dependence of local decisions in a DPMRS as well as data fusion rules of AND, OR, and K/N, the performance of a DPMRS for detecting Swerling fluctuating targets can be easily evaluated even under non-Gaussian clutter with a nonuniform dependence matrix. The reliability and flexibility of this method are validated by applying the proposed method to a previous problem by other authors, and our other investigation results indicate its high potential for evaluating DPMRS performance in various cases involving different models of target and clutter.

  • Study in CSI Correction Localization Algorithm with DenseNet Open Access

    Junna SHANG  Ziyang YAO  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2021/06/23
      Vol:
    E105-B No:1
      Page(s):
    76-84

    With the arrival of 5G and the popularity of smart devices, indoor localization technical feasibility has been verified, and its market demands is huge. The channel state information (CSI) extracted from Wi-Fi is physical layer information which is more fine-grained than the received signal strength indication (RSSI). This paper proposes a CSI correction localization algorithm using DenseNet, which is termed CorFi. This method first uses isolation forest to eliminate abnormal CSI, and then constructs a CSI amplitude fingerprint containing time, frequency and antenna pair information. In an offline stage, the densely connected convolutional networks (DenseNet) are trained to establish correspondence between CSI and spatial position, and generalized extended interpolation is applied to construct the interpolated fingerprint database. In an online stage, DenseNet is used for position estimation, and the interpolated fingerprint database and K-nearest neighbor (KNN) are combined to correct the position of the prediction results with low maximum probability. In an indoor corridor environment, the average localization error is 0.536m.

  • A Novel Low Complexity Scheme for Multiuser Massive MIMO Systems

    Aye Mon HTUN  Maung SANN MAW  Iwao SASASE  P. Takis MATHIOPOULOS  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/07/01
      Vol:
    E105-B No:1
      Page(s):
    85-96

    In this paper, we propose a novel user selection scheme based on jointly combining channel gain (CG) and signal to interference plus noise ratio (SINR) to improve the sum-rate as well as to reduce the computation complexity of multi-user massive multi-input multi-output (MU-massive MIMO) downlink transmission through a block diagonalization (BD) precoding technique. By jointly considering CG and SINR based user sets, sum-rate performance improvement can be achieved by selecting higher gain users with better SINR conditions as well as by eliminating the users who cause low sum-rate in the system. Through this approach, the number of possible outcomes for the user selection scheme can be reduced by counting the common users for every pair of user combinations in the selection process since the common users of CG-based and SINR-based sets possess both higher channel gains and better SINR conditions. The common users set offers not only sum-rate performance improvements but also computation complexity reduction in the proposed scheme. It is shown by means of computer simulation experiments that the proposed scheme can increase the sum-rate with lower computation complexity for various numbers of users as compared to conventional schemes requiring the same or less computational complexity.

  • 200W Four-Way Combined Pulsed Amplifier with 40% Power-Added Efficiency in X-Band

    Shubo DUN  Tiedi ZHANG  

     
    PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2021/08/17
      Vol:
    E105-C No:1
      Page(s):
    18-23

    This paper presents an X-band power-combined pulsed high power amplifier (HPA) based on the low insertion loss waveguide combiner. Relationships between the return loss and isolation of the magic Tee (MT) have been analyzed and the accurate design technique is given. The combination network is validated by the measurement of a single MT and a four-way passive network, and the characterization of the combined HPA module is designed, fabricated and discussed. The HPA delivers 200W output power with an associated power-added efficiency close to 40% within the frequency range of 7.8 GHz to 12.3 GHz. The combination efficiency is higher than 93%.

  • A Self-Powered Flyback Pulse Resonant Circuit for Combined Piezoelectric and Thermoelectric Energy Harvesting

    Huakang XIA  Yidie YE  Xiudeng WANG  Ge SHI  Zhidong CHEN  Libo QIAN  Yinshui XIA  

     
    PAPER-Electronic Circuits

      Pubricized:
    2021/06/23
      Vol:
    E105-C No:1
      Page(s):
    24-34

    A self-powered flyback pulse resonant circuit (FPRC) is proposed to extract energy from piezoelectric (PEG) and thermoelectric generators (TEG) simultaneously. The FPRC is able to cold start with the PEG voltage regardless of the TEG voltage, which means the TEG energy is extracted without additional cost. The measurements show that the FPRC can output 102 µW power under the input PEG and TEG voltages of 2.5 V and 0.5 V, respectively. The extracted power is increased by 57.6% compared to the case without TEGs. Additionally, the power improvement with respect to an ideal full-wave bridge rectifier is 2.71× with an efficiency of 53.9%.

  • Stochastic Modeling and Local CD Uniformity Comparison between Negative Metal-Based, Negative- and Positive-Tone Development EUV Resists

    Itaru KAMOHARA  Ulrich WELLING  Ulrich KLOSTERMANN  Wolfgang DEMMERLE  

     
    PAPER-Semiconductor Materials and Devices

      Pubricized:
    2021/08/06
      Vol:
    E105-C No:1
      Page(s):
    35-46

    This paper presents a simulation study on the printing behavior of three different EUV resist systems. Stochastic models for negative metal-based resist and conventional chemically amplified resist (CAR) were calibrated and then validated. As for negative-tone development (NTD) CAR, we commenced from a positive-tone development (PTD) CAR calibrated (material) and NTD development models, since state-of-the-art measurements are not available. A conceptual study between PTD CAR and NTD CAR shows that the stochastic inhibitor fluctuation differs for PTD CAR: the inhibitor level exhibits small fluctuation (Mack development). For NTD CAR, the inhibitor fluctuation depends on the NTD type, which is defined by categorizing the difference between the NTD and PTD development thresholds. Respective NTD types have different inhibitor concentration level. Moreover, contact hole printing between negative metal-based and NTD CAR was compared to clarify the stochastic process window (PW) for tone reversed mask. For latter comparison, the aerial image (AI) and secondary electron effect are comparable. Finally, the local CD uniformity (LCDU) for the same 20 nm size, 40 nm pitch contact hole was compared among the three different resists. Dose-dependent behavior of LCDU and stochastic PW for NTD were different for the PTD CAR and metal-based resist. For NTD CAR, small inhibitor level and large inhibitor fluctuation around the development threshold were observed, causing LCDU increase, which is specific to the inverse Mack development resist.

  • Replicated Study of Effectiveness Evaluation of Cutting-Edge Software Engineering

    Yukasa MURAKAMI  Masateru TSUNODA  

     
    LETTER

      Pubricized:
    2021/12/02
      Vol:
    E105-D No:1
      Page(s):
    21-25

    Although many software engineering studies have been conducted, it is not clear whether they meet the needs of software development practitioners. Some studies evaluated the effectiveness of software engineering research by practitioners, to clarify the research satisfies the needs of the practitioners. We performed replicated study of them, recruiting practitioners who mainly belong to SMEs (small and medium-sized enterprises) to the survey. We asked 16 practitioners to evaluate cutting-edge software engineering studies presented in ICSE 2016. In the survey, we set the viewpoint of the evaluation as the effectiveness for the respondent's own work. As a result, the ratio of positive answers (i.e., the answers were greater than 2 on a 5-point scale) was 33.3%, and the ratio was lower than past studies. The result was not affected by the number of employees in the respondent's company, but would be affected by the viewpoint of the evaluation.

  • What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer

    Jie TAN  Jianmin PANG  Cong LIU  

     
    LETTER

      Pubricized:
    2021/10/21
      Vol:
    E105-D No:1
      Page(s):
    26-30

    Due to the rapid development of different processors, e.g., x86 and Sunway, software porting between different platforms is becoming more frequent. However, the migrated software's execution efficiency on the target platform is different from that of the source platform, and most of the previous studies have investigated the improvement of the efficiency from the hardware perspective. To the best of our knowledge, this is the first paper to exclusively focus on studying what software factors can result in performance change after software migration. To perform our study, we used SonarQube to detect and measure five software factors, namely Duplicated Lines (DL), Code Smells Density (CSD), Big Functions (BF), Cyclomatic Complexity (CC), and Complex Functions (CF), from 13 selected projects of SPEC CPU2006 benchmark suite. Then, we measured the change of software performance by calculating the acceleration ratio of execution time before (x86) and after (Sunway) software migration. Finally, we performed a multiple linear regression model to analyze the relationship between the software performance change and the software factors. The results indicate that the performance change of software migration from the x86 platform to the Sunway platform is mainly affected by three software factors, i.e., Code Smell Density (CSD), Cyclomatic Complexity (CC), and Complex Functions (CF). The findings can benefit both researchers and practitioners.

  • Leveraging Scale-Up Machines for Swift DBMS Replication on IaaS Platforms Using BalenaDB

    Kaiho FUKUCHI  Hiroshi YAMADA  

     
    PAPER-Software System

      Pubricized:
    2021/10/01
      Vol:
    E105-D No:1
      Page(s):
    92-104

    In infrastructure-as-a-service platforms, cloud users can adjust their database (DB) service scale to dynamic workloads by changing the number of virtual machines running a DB management system (DBMS), called DBMS instances. Replicating a DBMS instance is a non-trivial task since DBMS replication is time-consuming due to the trend that cloud vendors offer high-spec DBMS instances. This paper presents BalenaDB, which performs urgent DBMS replication for handling sudden workload increases. Unlike convectional replication schemes that implicitly assume DBMS replicas are generated on remote machines, BalenaDB generates a warmed-up DBMS replica on an instance running on the local machine where the master DBMS instance runs, by leveraging the master DBMS resources. We prototyped BalenaDB on MySQL 5.6.21, Linux 3.17.2, and Xen 4.4.1. The experimental results show that the time for generating the warmed-up DBMS replica instance on BalenaDB is up to 30× shorter than an existing DBMS instance replication scheme, achieving significantly efficient memory utilization.

  • Firewall Traversal Method by Pseudo-TCP Encapsulation

    Keigo TAGA  Junjun ZHENG  Koichi MOURI  Shoichi SAITO  Eiji TAKIMOTO  

     
    PAPER-Information Network

      Pubricized:
    2021/09/29
      Vol:
    E105-D No:1
      Page(s):
    105-115

    A wide range of communication protocols has recently been developed to address service diversification. At the same time, firewalls (FWs) are installed at the boundaries between internal networks, such as those owned by companies and homes, and the Internet. In general, FWs are configured as whitelists and release only the port corresponding to the service to be used and block communication from other ports. In a previous study, we proposed a method for traversing a FW and enabling communication by inserting a pseudo-transmission control protocol (TCP) header imitating HTTPS into a packet, which normally would be blocked by the FW. In that study, we confirmed the efficiency of the proposed method via its implementation and experiments. Even though common encapsulating techniques work on end-nodes, the previous implementation worked on the relay node assuming a router. Further, middleboxes, which overwrite L3 and L4 headers on the Internet, need to be taken into consideration. Accordingly, we re-implemented the proposed method into an end-node and added a feature countering a typical middlebox, i.e., NAPT, into our implementation. In this paper, we describe the functional confirmation and performance evaluations of both versions of the proposed method.

  • Kernel-Based Regressors Equivalent to Stochastic Affine Estimators

    Akira TANAKA  Masanari NAKAMURA  Hideyuki IMAI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/10/05
      Vol:
    E105-D No:1
      Page(s):
    116-122

    The solution of the ordinary kernel ridge regression, based on the squared loss function and the squared norm-based regularizer, can be easily interpreted as a stochastic linear estimator by considering the autocorrelation prior for an unknown true function. As is well known, a stochastic affine estimator is one of the simplest extensions of the stochastic linear estimator. However, its corresponding kernel regression problem is not revealed so far. In this paper, we give a formulation of the kernel regression problem, whose solution is reduced to a stochastic affine estimator, and also give interpretations of the formulation.

  • Feature Description with Feature Point Registration Error Using Local and Global Point Cloud Encoders

    Kenshiro TAMATA  Tomohiro MASHITA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2021/10/11
      Vol:
    E105-D No:1
      Page(s):
    134-140

    A typical approach to reconstructing a 3D environment model is scanning the environment with a depth sensor and fitting the accumulated point cloud to 3D models. In this kind of scenario, a general 3D environment reconstruction application assumes temporally continuous scanning. However in some practical uses, this assumption is unacceptable. Thus, a point cloud matching method for stitching several non-continuous 3D scans is required. Point cloud matching often includes errors in the feature point detection because a point cloud is basically a sparse sampling of the real environment, and it may include quantization errors that cannot be ignored. Moreover, depth sensors tend to have errors due to the reflective properties of the observed surface. We therefore make the assumption that feature point pairs between two point clouds will include errors. In this work, we propose a feature description method robust to the feature point registration error described above. To achieve this goal, we designed a deep learning based feature description model that consists of a local feature description around the feature points and a global feature description of the entire point cloud. To obtain a feature description robust to feature point registration error, we input feature point pairs with errors and train the models with metric learning. Experimental results show that our feature description model can correctly estimate whether the feature point pair is close enough to be considered a match or not even when the feature point registration errors are large, and our model can estimate with higher accuracy in comparison to methods such as FPFH or 3DMatch. In addition, we conducted experiments for combinations of input point clouds, including local or global point clouds, both types of point cloud, and encoders.

  • Searching and Learning Discriminative Regions for Fine-Grained Image Retrieval and Classification

    Kangbo SUN  Jie ZHU  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2021/10/18
      Vol:
    E105-D No:1
      Page(s):
    141-149

    Local discriminative regions play important roles in fine-grained image analysis tasks. How to locate local discriminative regions with only category label and learn discriminative representation from these regions have been hot spots. In our work, we propose Searching Discriminative Regions (SDR) and Learning Discriminative Regions (LDR) method to search and learn local discriminative regions in images. The SDR method adopts attention mechanism to iteratively search for high-response regions in images, and uses this as a clue to locate local discriminative regions. Moreover, the LDR method is proposed to learn compact within category and sparse between categories representation from the raw image and local images. Experimental results show that our proposed approach achieves excellent performance in both fine-grained image retrieval and classification tasks, which demonstrates its effectiveness.

  • Multi-Source Domain Generalization Using Domain Attributes for Recurrent Neural Network Language Models

    Naohiro TAWARA  Atsunori OGAWA  Tomoharu IWATA  Hiroto ASHIKAWA  Tetsunori KOBAYASHI  Tetsuji OGAWA  

     
    PAPER-Natural Language Processing

      Pubricized:
    2021/10/05
      Vol:
    E105-D No:1
      Page(s):
    150-160

    Most conventional multi-source domain adaptation techniques for recurrent neural network language models (RNNLMs) are domain-centric. In these approaches, each domain is considered independently and this makes it difficult to apply the models to completely unseen target domains that are unobservable during training. Instead, our study exploits domain attributes, which represent common knowledge among such different domains as dialects, types of wordings, styles, and topics, to achieve domain generalization that can robustly represent unseen target domains by combining the domain attributes. To achieve attribute-based domain generalization system in language modeling, we introduce domain attribute-based experts to a multi-stream RNNLM called recurrent adaptive mixture model (RADMM) instead of domain-based experts. In the proposed system, a long short-term memory is independently trained on each domain attribute as an expert model. Then by integrating the outputs from all the experts in response to the context-dependent weight of the domain attributes of the current input, we predict the subsequent words in the unseen target domain and exploit the specific knowledge of each domain attribute. To demonstrate the effectiveness of our proposed domain attributes-centric language model, we experimentally compared the proposed model with conventional domain-centric language model by using texts taken from multiple domains including different writing styles, topics, dialects, and types of wordings. The experimental results demonstrated that lower perplexity can be achieved using domain attributes.

  • A Novel Discriminative Virtual Label Regression Method for Unsupervised Feature Selection

    Zihao SONG  Peng SONG  Chao SHENG  Wenming ZHENG  Wenjing ZHANG  Shaokai LI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2021/10/19
      Vol:
    E105-D No:1
      Page(s):
    175-179

    Unsupervised Feature selection is an important dimensionality reduction technique to cope with high-dimensional data. It does not require prior label information, and has recently attracted much attention. However, it cannot fully utilize the discriminative information of samples, which may affect the feature selection performance. To tackle this problem, in this letter, we propose a novel discriminative virtual label regression method (DVLR) for unsupervised feature selection. In DVLR, we develop a virtual label regression function to guide the subspace learning based feature selection, which can select more discriminative features. Moreover, a linear discriminant analysis (LDA) term is used to make the model be more discriminative. To further make the model be more robust and select more representative features, we impose the ℓ2,1-norm on the regression and feature selection terms. Finally, extensive experiments are carried out on several public datasets, and the results demonstrate that our proposed DVLR achieves better performance than several state-of-the-art unsupervised feature selection methods.

  • SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages

    Bodin CHINTHANET  Raula GAIKOVINA KULA  Rodrigo ELIZA ZAPATA  Takashi ISHIO  Kenichi MATSUMOTO  Akinori IHARA  

     
    LETTER

      Pubricized:
    2021/09/27
      Vol:
    E105-D No:1
      Page(s):
    19-20

    It has become common practice for software projects to adopt third-party dependencies. Developers are encouraged to update any outdated dependency to remain safe from potential threats of vulnerabilities. In this study, we present an approach to aid developers show whether or not a vulnerable code is reachable for JavaScript projects. Our prototype, SōjiTantei, is evaluated in two ways (i) the accuracy when compared to a manual approach and (ii) a larger-scale analysis of 780 clients from 78 security vulnerability cases. The first evaluation shows that SōjiTantei has a high accuracy of 83.3%, with a speed of less than a second analysis per client. The second evaluation reveals that 68 out of the studied 78 vulnerabilities reported having at least one clean client. The study proves that automation is promising with the potential for further improvement.

  • Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images Open Access

    Huy H. NGUYEN  Minoru KURIBAYASHI  Junichi YAMAGISHI  Isao ECHIZEN  

     
    PAPER

      Pubricized:
    2021/10/05
      Vol:
    E105-D No:1
      Page(s):
    65-77

    Deep neural networks (DNNs) have achieved excellent performance on several tasks and have been widely applied in both academia and industry. However, DNNs are vulnerable to adversarial machine learning attacks in which noise is added to the input to change the networks' output. Consequently, DNN-based mission-critical applications such as those used in self-driving vehicles have reduced reliability and could cause severe accidents and damage. Moreover, adversarial examples could be used to poison DNN training data, resulting in corruptions of trained models. Besides the need for detecting adversarial examples, correcting them is important for restoring data and system functionality to normal. We have developed methods for detecting and correcting adversarial images that use multiple image processing operations with multiple parameter values. For detection, we devised a statistical-based method that outperforms the feature squeezing method. For correction, we devised a method that uses for the first time two levels of correction. The first level is label correction, with the focus on restoring the adversarial images' original predicted labels (for use in the current task). The second level is image correction, with the focus on both the correctness and quality of the corrected images (for use in the current and other tasks). Our experiments demonstrated that the correction method could correct nearly 90% of the adversarial images created by classical adversarial attacks and affected only about 2% of the normal images.

  • A Simple but Efficient Ranking-Based Differential Evolution

    Jiayi LI  Lin YANG  Junyan YI  Haichuan YANG  Yuki TODO  Shangce GAO  

     
    LETTER-Biocybernetics, Neurocomputing

      Pubricized:
    2021/10/05
      Vol:
    E105-D No:1
      Page(s):
    189-192

    Differential Evolution (DE) algorithm is simple and effective. Since DE has been proposed, it has been widely used to solve various complex optimization problems. To further exploit the advantages of DE, we propose a new variant of DE, termed as ranking-based differential evolution (RDE), by performing ranking on the population. Progressively better individuals in the population are used for mutation operation, thus improving the algorithm's exploitation and exploration capability. Experimental results on a number of benchmark optimization functions show that RDE significantly outperforms the original DE and performs competitively in comparison with other two state-of-the-art DE variants.

1461-1480hit(30728hit)