The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] VA(3422hit)

181-200hit(3422hit)

  • Diversity-Robust Acoustic Feature Signatures Based on Multiscale Fractal Dimension for Similarity Search of Environmental Sounds

    Motohiro SUNOUCHI  Masaharu YOSHIOKA  

     
    PAPER-Music Information Processing

      Pubricized:
    2021/07/02
      Vol:
    E104-D No:10
      Page(s):
    1734-1748

    This paper proposes new acoustic feature signatures based on the multiscale fractal dimension (MFD), which are robust against the diversity of environmental sounds, for the content-based similarity search. The diversity of sound sources and acoustic compositions is a typical feature of environmental sounds. Several acoustic features have been proposed for environmental sounds. Among them is the widely-used Mel-Frequency Cepstral Coefficients (MFCCs), which describes frequency-domain features. However, in addition to these features in the frequency domain, environmental sounds have other important features in the time domain with various time scales. In our previous paper, we proposed enhanced multiscale fractal dimension signature (EMFD) for environmental sounds. This paper extends EMFD by using the kernel density estimation method, which results in better performance of the similarity search tasks. Furthermore, it newly proposes another acoustic feature signature based on MFD, namely very-long-range multiscale fractal dimension signature (MFD-VL). The MFD-VL signature describes several features of the time-varying envelope for long periods of time. The MFD-VL signature has stability and robustness against background noise and small fluctuations in the parameters of sound sources, which are produced in field recordings. We discuss the effectiveness of these signatures in the similarity sound search by comparing with acoustic features proposed in the DCASE 2018 challenges. Due to the unique descriptiveness of our proposed signatures, we confirmed the signatures are effective when they are used with other acoustic features.

  • An Enhanced HDPC-EVA Decoder Based on ADMM

    Yujin ZHENG  Yan LIN  Zhuo ZHANG  Qinglin ZHANG  Qiaoqiao XIA  

     
    LETTER-Coding Theory

      Pubricized:
    2021/04/02
      Vol:
    E104-A No:10
      Page(s):
    1425-1429

    Linear programming (LP) decoding based on the alternating direction method of multipliers (ADMM) has proved to be effective for low-density parity-check (LDPC) codes. However, for high-density parity-check (HDPC) codes, the ADMM-LP decoder encounters two problems, namely a high-density check matrix in HDPC codes and a great number of pseudocodewords in HDPC codes' fundamental polytope. The former problem makes the check polytope projection extremely complex, and the latter one leads to poor frame error rates (FER) performance. To address these issues, we introduce the even vertex algorithm (EVA) into the ADMM-LP decoding algorithm for HDPC codes, named as HDPC-EVA. HDPC-EVA can reduce the complexity of the projection process and improve the FER performance. We further enhance the proposed decoder by the automorphism groups of codes, creating diversity in the parity-check matrix. The simulation results show that the proposed decoder is capable of cutting down the average decoding time for each iteration by 30%-60%, as well as achieving near maximum likelihood (ML) performance on some BCH codes.

  • High-Density Implementation Techniques for Long-Range Radar Using Horn and Lens Antennas Open Access

    Akira KITAYAMA  Akira KURIYAMA  Hideyuki NAGAISHI  Hiroshi KURODA  

     
    PAPER

      Pubricized:
    2021/03/12
      Vol:
    E104-C No:10
      Page(s):
    596-604

    Long-range radars (LRRs) for higher level autonomous driving (AD) will require more antennas than simple driving assistance. The point at issue here is 50-60% of the LRR module area is used for antennas. To miniaturize LRR modules, we use horn and lens antenna with highly efficient gain. In this paper, we propose two high-density implementation techniques for radio-frequency (RF) front-end using horn and lens antennas. In the first technique, the gap between antennas was eliminated by taking advantage of the high isolation performance of horn and lens antennas. In the second technique, the RF front-end including micro-strip-lines, monolithic microwave integrated circuits, and peripheral parts is placed in the valley area of each horn. We fabricated a prototype LRR operating at 77 GHz with only one printed circuit board (PCB). To detect vehicles horizontally and vertically, this LRR has a minimum antenna configuration of one Tx antenna and four Rx antennas placed in 2×2 array, and 30 mm thickness. Evaluation results revealed that vehicles could be detected up to 320 m away and that the horizontal and vertical angle error was less than +/- 0.2 degrees, which is equivalent to the vehicle width over 280 m. Thus, horn and lens antennas implemented using the proposed techniques are very suitable for higher level AD LRRs.

  • Eigenvalue Based Relay Selection for XOR-Physical Layer Network Coding in Bi-Directional Wireless Relaying Networks

    Satoshi DENNO  Kazuma YAMAMOTO  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/03/25
      Vol:
    E104-B No:10
      Page(s):
    1336-1344

    This paper proposes relay selection techniques for XOR physical layer network coding with MMSE based non-linear precoding in MIMO bi-directional wireless relaying networks. The proposed selection techniques are derived on the different assumption about characteristics of the MMSE based non-linear precoding in the wireless network. We show that the signal to noise power ratio (SNR) is dependent on the product of all the eigenvalues in the channels from the terminals to relays. This paper shows that the best selection techniques in all the proposed techniques is to select a group of the relays that maximizes the product. Therefore, the selection technique is called “product of all eigenvalues (PAE)” in this paper. The performance of the proposed relay selection techniques is evaluated in a MIMO bi-directional wireless relaying network where two terminals with 2 antennas exchange their information via relays. When the PAE is applied to select a group of the 2 relays out of the 10 relays where an antenna is placed, the PAE attains a gain of more than 13dB at the BER of 10-3.

  • Desirable ITS Communication for Safety: Evaluation by the TsRm Evaluation Method for Overengineering Prevention, and Discussion About Sensor and Communication Fusion

    Ikkei HASEBE  Takaaki HASEGAWA  

     
    PAPER-Intelligent Transport System

      Pubricized:
    2021/04/01
      Vol:
    E104-A No:10
      Page(s):
    1379-1388

    In this paper, for the purpose of clarifying the desired ITS information and communication systems considering both safety and social feasibility to prevention overengineering, using a microscopic traffic flow simulator, we discuss the required information acquisition rate of three types of safety driving support systems, that is, the sensor type and the communication type, the sensor and communication fusion type. Performances are evaluated from the viewpoint of preventing overengineering performance using the “TsRm evaluation method” that considers a vehicle approaching within the range of R meters within T seconds as the vehicle with a high possibility of collision, and that evaluates only those vehicles. The results show that regarding the communication radius and the sensing range, overengineering performance may be estimated when all vehicles in the evaluation area are used for evaluations without considering each vehicle's location, velocity and acceleration as in conventional evaluations. In addition, it is clarified that the sensor and communication fusion type system is advantageous by effectively complementing the defects of the sensor type systems and the communication type systems.

  • Analytical Model of Middlebox Unavailability under Shared Protection Allowing Multiple Backups

    Risa FUJITA  Fujun HE  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2021/03/22
      Vol:
    E104-B No:9
      Page(s):
    1147-1158

    This paper presents an analytical model that yields the unavailability of a network function when each backup server can protect two functions and can recover one of them. Previous work describes a model to deal with the case that each function can be protected only by one server. In our model, we allow each function to be protected by multiple servers to ensure function availability. This requires us to know the feasible states of a connected component and its state transitions. By adopting the divide-and-conquer method, we enumerate the feasible states of a connected component. We then classify its state transitions. Based on the obtained feasible states and the classification of the state transitions, we enumerate the feasible states incoming to and outgoing from a general state, the transfer rates, and the conditions. With those informations, we generate multiple equations about the state transitions. Finally, by solving them, we obtain the probabilities that a connected component is in each state and calculate the unavailability of a function. Numerical results show that the average unavailability of a function is reduced by 18% and 5.7% in our two examined cases by allowing each function to be protected by multiple servers.

  • A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/02/22
      Vol:
    E104-A No:9
      Page(s):
    1353-1356

    In this letter, we present a construction of bent functions which generalizes a work of Zhang et al. in 2016. Based on that, we obtain a cubic bent function in 10 variables and prove that, it has no affine derivative and does not belong to the completed Maiorana-McFarland class, which is opposite to all 6/8-variable cubic bent functions as they are inside the completed Maiorana-McFarland class. This is the first time a theoretical proof is given to show that the cubic bent functions in 10 variables can be outside the completed Maiorana-McFarland class. Before that, only a sporadic example with such properties was known by computer search. We also show that our function is EA-inequivalent to that sporadic one.

  • A Virtual Pre-Connection Scheme Enabling Fast Connection to Local Spot Cell in Private Cellular Network

    Kazuo IBUKA  Hikaru KAWASAKI  Takeshi MATSUMURA  Fumihide KOJIMA  

     
    PAPER

      Pubricized:
    2021/03/08
      Vol:
    E104-B No:9
      Page(s):
    1129-1137

    In the 5th generation mobile communication system (5G), super high frequency (SHF) bands such as 28GHz will be used in many scenarios. In Japan, a local 5G working group has been established to apply advanced 5G technologies to private networks and is working to encourage local companies and municipalities to introduce new services for local needs. Meanwhile, the smaller size of the 28GHz band cells creates the difficulties when establishing deployment areas for homogeneous networks. In general, heterogeneous network approach with the combination of macro-cell and micro-cell have been considered practical and applied by the giant telecommunication operators. However, private network operators have difficulty in deploying both micro- and macro-cells due to the cost issue. Without the assistance of macro-cells, local spot cells with a small service area may not be able to start services while high-speed mobile users are staying in the service area. In this paper, we propose a virtual pre-connection scheme allowing fast connection to local spot cells without the assistance of macro-cells. In addition, we confirm that the proposed scheme can reduce the cell search time required when entering a local spot cell from 100 seconds or more to less than 1 second, and can reduce the loss of connection opportunities to local spot cells for high-speed mobile users.

  • Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries Open Access

    Jun KURIHARA  Toru NAKAMURA  Ryu WATANABE  

     
    PAPER-Coding Theory

      Pubricized:
    2021/03/23
      Vol:
    E104-A No:9
      Page(s):
    1271-1283

    This paper investigates an adversarial model in the scenario of private information retrieval (PIR) from n coded storage servers, called Byzantine adversary. The Byzantine adversary is defined as the one altering b server responses and erasing u server responses to a user's query. In this paper, two types of Byzantine adversaries are considered; 1) the classic omniscient type that has the full knowledge on n servers as considered in existing literature, and 2) the reasonable limited-knowledge type that has information on only b+u servers, i.e., servers under the adversary's control. For these two types, this paper reveals that the resistance of a PIR scheme, i.e., the condition of b and u to correctly obtain the desired message, can be expressed in terms of a code parameter called the coset distance of linear codes employed in the scheme. For the omniscient type, the derived condition expressed by the coset distance is tighter and more precise than the estimation of the resistance by the minimum Hamming weight of the codes considered in existing researches. Furthermore, this paper also clarifies that if the adversary is limited-knowledge, the resistance of a PIR scheme could exceed that for the case of the omniscient type. Namely, PIR schemes can increase their resistance to Byzantine adversaries by allowing the limitation on adversary's knowledge.

  • Character Design Generation System Using Multiple Users' Gaze Information

    Hiroshi TAKENOUCHI  Masataka TOKUMARU  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2021/05/25
      Vol:
    E104-D No:9
      Page(s):
    1459-1466

    We investigate an interactive evolutionary computation (IEC) using multiple users' gaze information when users partially participate in each design evaluation. Many previous IEC systems have a problem that user evaluation loads are too large. Hence, we proposed to employ user gaze information for evaluating designs generated by IEC systems in order to solve this problem. In this proposed system, users just view the presented designs, not assess, then the system automatically creates users' favorite designs. With the user's gaze information, the proposed system generates coordination that can satisfy many users. In our previous study, we verified the effectiveness of the proposed system from a real system operation viewpoint. However, we did not consider the fluctuation of the users during a solution candidate evaluation. In the actual operation of the proposed system, users may change during the process due to the user interchange. Therefore, in this study, we verify the effectiveness of the proposed system when varying the users participating in each evaluation for each generation. In the experiment, we employ two types of situations as assumed in real environments. The first situation changes the number of users evaluating the designs for each generation. The second situation employs various users from the predefined population to evaluate the designs for each generation. From the experimental results in the first situation, we confirm that, despite the change in the number of users during the solution candidate evaluation, the proposed system can generate coordination to satisfy many users. Also, from the results in the second situation, we verify that the proposed system can also generate coordination which both users who participate in the coordination evaluation can more satisfy.

  • Indifferentiability of SKINNY-HASH Internal Functions

    Akinori HOSOYAMADA  Tetsu IWATA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/03/10
      Vol:
    E104-A No:9
      Page(s):
    1156-1162

    We provide a formal proof for the indifferentiability of SKINNY-HASH internal function from a random oracle. SKINNY-HASH is a family of sponge-based hash functions that use functions (instead of permutations) as primitives, and it was selected as one of the second round candidates of the NIST lightweight cryptography competition. Its internal function is constructed from the tweakable block cipher SKINNY. The construction of the internal function is very simple and the designers claim n-bit security, where n is the block length of SKINNY. However, a formal security proof of this claim is not given in the original specification of SKINNY-HASH. In this paper, we formally prove that the internal function of SKINNY-HASH has n-bit security, i.e., it is indifferentiable from a random oracle up to O(2n) queries, substantiating the security claim of the designers.

  • Explanatory Rule Generation for Advanced Driver Assistant Systems

    Juha HOVI  Ryutaro ICHISE  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/06/11
      Vol:
    E104-D No:9
      Page(s):
    1427-1439

    Autonomous vehicles and advanced driver assistant systems (ADAS) are receiving notable attention as research fields in both academia and private industry. Some decision-making systems use sets of logical rules to map knowledge of the ego-vehicle and its environment into actions the ego-vehicle should take. However, such rulesets can be difficult to create — for example by manually writing them — due to the complexity of traffic as an operating environment. Furthermore, the building blocks of the rules must be defined. One common solution to this is using an ontology specifically aimed at describing traffic concepts and their hierarchy. These ontologies must have a certain expressive power to enable construction of useful rules. We propose a process of generating sets of explanatory rules for ADAS applications from data using ontology as a base vocabulary and present a ruleset generated as a result of our experiments that is correct for the scope of the experiment.

  • An Efficient Aircraft Boarding Strategy Considering Implementation

    Kenji UEHARA  Kunihiko HIRAISHI  Kokolo IKEDA  

     
    PAPER-Mathematical Systems Science

      Pubricized:
    2021/01/22
      Vol:
    E104-A No:8
      Page(s):
    1051-1058

    Boarding is the last step of aircraft turnaround and its completion in the shortest possible time is desired. In this paper, we propose a new boarding strategy that outperforms conventional strategies such as the back-to-front strategy and the outside-in strategy. The Steffen method is known as one of the most efficient boarding strategies in literature, but it is hard to be realized in the real situation because the complete sorting of passengers in a prescribed order is required. The proposed strategy shows a performance close to that of the Steffen method and can be easily implemented by using a special gate system.

  • Optimization and Combination of Scientific and Technological Resource Services Based on Multi-Community Collaborative Search

    Yida HONG  Yanlei YIN  Cheng GUO  Xiaobao LIU  

     
    PAPER

      Pubricized:
    2021/05/06
      Vol:
    E104-D No:8
      Page(s):
    1313-1320

    Many scientific and technological resources (STR) cannot meet the needs of real demand-based industrial services. To address this issue, the characteristics of scientific and technological resource services (STRS) are analyzed, and a method of the optimal combination of demand-based STR based on multi-community collaborative search is then put forward. An optimal combined evaluative system that includes various indexes, namely response time, innovation, composability, and correlation, is developed for multi-services of STR, and a hybrid optimal combined model for STR is constructed. An evaluative algorithm of multi-community collaborative search is used to study the interactions between general communities and model communities, thereby improving the adaptive ability of the algorithm to random dynamic resource services. The average convergence value CMCCSA=0.00274 is obtained by the convergence measurement function, which exceeds other comparison algorithms. The findings of this study indicate that the proposed methods can preferably reach the maximum efficiency of demand-based STR, and new ideas and methods for implementing demand-based real industrial services for STR are provided.

  • Construction of Multiple-Valued Bent Functions Using Subsets of Coefficients in GF and RMF Domains

    Milo&scaron M. RADMANOVIĆ  Radomir S. STANKOVIĆ  

     
    PAPER-Logic Design

      Pubricized:
    2021/04/21
      Vol:
    E104-D No:8
      Page(s):
    1103-1110

    Multiple-valued bent functions are functions with highest nonlinearity which makes them interesting for multiple-valued cryptography. Since the general structure of bent functions is still unknown, methods for construction of bent functions are often based on some deterministic criteria. For practical applications, it is often necessary to be able to construct a bent function that does not belong to any specific class of functions. Thus, the criteria for constructions are combined with exhaustive search over all possible functions which can be very CPU time consuming. A solution is to restrict the search space by some conditions that should be satisfied by the produced bent functions. In this paper, we proposed the construction method based on spectral subsets of multiple-valued bent functions satisfying certain appropriately formulated restrictions in Galois field (GF) and Reed-Muller-Fourier (RMF) domains. Experimental results show that the proposed method efficiently constructs ternary and quaternary bent functions by using these restrictions.

  • A Business Service Model of Smart Home Appliances Participating in the Peak Shaving and Valley Filling Based on Cloud Platform

    Mingrui ZHU  Yangjian JI  Wenjun JU  Xinjian GU  Chao LIU  Zhifang XU  

     
    PAPER

      Pubricized:
    2021/04/22
      Vol:
    E104-D No:8
      Page(s):
    1185-1194

    With the development of power market demand response capability, load aggregators play a more important role in the coordination between power grid and users. They have a wealth of user side business data resources related to user demand, load management and equipment operation. By building a business model of business data resource utilization and innovating the content and mode of intelligent power service, it can guide the friendly interaction between power supply, power grid and load, effectively improve the flexibility of power grid regulation, speed up demand response and refine load management. In view of the current situation of insufficient utilization of business resources, low user participation and imperfect business model, this paper analyzes the process of home appliance enterprises participating in peak shaving and valley filling (PSVF) as load aggregators, and expounds the relationship between the participants in the power market; a business service model of smart home appliance participating in PSVF based on cloud platform is put forward; the market value created by home appliance business resources for each participant under the joint action of market-oriented means, information technology and power consumption technology is discussed, and typical business scenarios are listed; taking Haier business resource analysis as an example, the feasibility of the proposed business model in innovating the content and value realization of intelligent power consumption services is proved.

  • Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN

    Kiana DZIUBINSKI  Masaki BANDAI  

     
    PAPER-Internet

      Pubricized:
    2021/02/09
      Vol:
    E104-B No:8
      Page(s):
    961-973

    The automation of the home through Internet of Things (IoT) devices presents security challenges for protecting the safety and privacy of its inhabitants. In spite of standard wireless communication security protocols, an attacker inside the wireless communication range of the smart home can extract identifier and statistical information, such as the MAC address and packet lengths, from the encrypted wireless traffic of IoT devices to make inferences about the private activities of the user. In this paper, to prevent this breach on privacy in the wireless LAN, we accomplish the following three items. First, we demonstrate that performing traffic shaping simultaneously on the upload and download node is necessary; second, we demonstrate that traffic shaping by random packet generation is impracticable due to the excessive bandwidth requirement; third, we propose traffic shaping by variable padding durations to reduce the bandwidth requirement for injecting dummy traffic during periods of user activity and inactivity to decrease the confidence of the local attacker from identifying genuine user activity traffic. From our performance evaluation, we decreased the data generated on several WiFi and ZigBee-enabled IoT devices by over 15% by our proposal of variable padding durations compared to the conventional method of fixed padding durations at low attacker confidence.

  • PAM-4 Eye-Opening Monitor Technique Using Gaussian Mixture Model for Adaptive Equalization

    Yosuke IIJIMA  Keigo TAYA  Yasushi YUMINAKA  

     
    PAPER-Circuit Technologies

      Pubricized:
    2021/04/21
      Vol:
    E104-D No:8
      Page(s):
    1138-1145

    To meet the increasing demand for high-speed communication in VLSI (very large-scale integration) systems, next-generation high-speed data transmission standards (e.g., IEEE 802.3bs and PCIe 6.0) will adopt four-level pulse amplitude modulation (PAM-4) for data coding. Although PAM-4 is spectrally efficient to mitigate inter-symbol interference caused by bandwidth-limited wired channels, it is more sensitive than conventional non-return-to-zero line coding. To evaluate the received signal quality when using adaptive coefficient settings for a PAM-4 equalizer during data transmission, we propose an eye-opening monitor technique based on machine learning. The proposed technique uses a Gaussian mixture model to classify the received PAM-4 symbols. Simulation and experimental results demonstrate the feasibility of adaptive equalization for PAM-4 coding.

  • The Fractional-N All Digital Frequency Locked Loop with Robustness for PVT Variation and Its Application for the Microcontroller Unit

    Ryoichi MIYAUCHI  Akio YOSHIDA  Shuya NAKANO  Hiroki TAMURA  Koichi TANNO  Yutaka FUKUCHI  Yukio KAWAMURA  Yuki KODAMA  Yuichi SEKIYA  

     
    PAPER-Circuit Technologies

      Pubricized:
    2021/04/01
      Vol:
    E104-D No:8
      Page(s):
    1146-1153

    This paper describes the Fractional-N All Digital Frequency Locked Loop (ADFLL) with Robustness for PVT variation and its application for the microcontroller unit. The conventional FLL is difficult to achieve the required specification by using the fine CMOS process. Especially, the conventional FLL has some problems such as unexpected operation and long lock time that are caused by PVT variation. To overcome these problems, we propose a new ADFLL which uses dynamic selecting digital filter coefficients. The proposed ADFLL was evaluatied through the HSPICE simulation and fabricating chips using a 0.13 µm CMOS process. From these results, we observed the proposed ADFLL has robustness for PVT variation by using dynamic selecting digital filter coefficient, and the lock time is improved up to 57%, clock jitter is 0.85 nsec.

  • An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics

    Akira ITO  Rei UENO  Naofumi HOMMA  

     
    PAPER-Logic Design

      Pubricized:
    2021/04/28
      Vol:
    E104-D No:8
      Page(s):
    1083-1091

    This study presents a formal verification method for Galois-field (GF) arithmetic circuits with the characteristics of more than two values. The proposed method formally verifies the correctness of circuit functionality (i.e., the input-output relations given as GF-polynomials) by checking the equivalence between a specification and a gate-level netlist. We represent a netlist using simultaneous algebraic equations and solve them based on a novel polynomial reduction method that can be efficiently applied to arithmetic over extension fields $mathbb{F}_{p^m}$, where the characteristic p is larger than two. By using the reverse topological term order to derive the Gröbner basis, our method can complete the verification, even when a target circuit includes bugs. In addition, we introduce an extension of the Galois-Field binary moment diagrams to perform the polynomial reductions faster. Our experimental results show that the proposed method can efficiently verify practical $mathbb{F}_{p^m}$ arithmetic circuits, including those used in modern cryptography. Moreover, we demonstrate that the extended polynomial reduction technique can enable verification that is up to approximately five times faster than the original one.

181-200hit(3422hit)