The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2381-2400hit(22683hit)

  • Modification of Velvet Noise for Speech Waveform Generation by Using Vocoder-Based Speech Synthesizer Open Access

    Masanori MORISE  

     
    LETTER-Speech and Hearing

      Pubricized:
    2018/12/05
      Vol:
    E102-D No:3
      Page(s):
    663-665

    This paper introduces a new noise generation algorithm for vocoder-based speech waveform generation. White noise is generally used for generating an aperiodic component. Since short-term white noise includes a zero-frequency component (ZFC) and inaudible components below 20 Hz, they are reduced in advance when synthesizing. We propose a new noise generation algorithm based on that for velvet noise to overcome the problem. The objective evaluation demonstrated that the proposed algorithm can reduce the unwanted components.

  • Link Adaptation of Two-Way AF Relaying Network with Channel Estimation Error over Nakagami-m Fading Channel

    Kyu-Sung HWANG  Chang Kyung SUNG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    581-591

    In this paper, we analyze the impact of channel estimation errors in an amplify-and-forward (AF)-based two-way relaying network (TWRN) where adaptive modulation (AM) is employed in individual relaying path. In particular, the performance degradation caused by channel estimation error is investigated over Nakagami-m fading channels. We first derive an end-to-end signal-to-noise ratio (SNR), a cumulative distribution function, and a probability density function in the presence of channel estimation error for the AF-based TWRN with adaptive modulation (TWRN-AM). By utilizing the derived SNR statistics, we present accurate expressions of the average spectral efficiency and bit error rates with an outage-constraint in which transmission does not take place during outage events of bidirectional communications. Based on our derived analytical results, an optimal power allocation scheme for TWRN-AM is proposed to improve the average spectral efficiency by minimizing system outages.

  • Optimization of Power Allocation for Chase Combining Hybrid ARQ

    Chen JI  Juan CAO  Guo'an ZHANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    613-622

    This paper studies power allocation for Chase combining (CC) hybrid ARQ (HARQ) in block-fading channels, with causal channel state information (CSI) available both at the receiver and transmitter. A best-effort power allocation scheme is proposed to improve the average throughput of CC HARQ. The scheme is formulated as an optimization problem that, for each round, allocating the transmit power to maximize the average incremental information according to the HARQ retransmission status and CSI. By convex optimization, the solution is derived in simple analytical form. At the same time, the HARQ performance metrics including throughput and outage probability are computed by recursive numerical integral. With at most 4 transmission rounds, this best-effort method achieves about 75% of ergodic capacity in independent Rayleigh block fading channels.

  • Greedy-Based VNF Placement Algorithm for Dynamic Multipath Service Chaining

    Kohei TABOTA  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    429-438

    Softwarized networks are expected to be utilized as a core network for the 5th Generation (5G) mobile services. For the mobile core network architecture, service chaining is expected to be utilized for dynamically steering traffic across multiple network functions. In this paper, for dynamic multipath service chaining, we propose a greedy-based VNF placement algorithm. This method can provide multipath service chaining so as to utilize the node resources such as CPU effectively while decreasing the cost about bandwidth and transmission delay. The proposed algorithm consists of four difference algorithms, and VNFs are placed appropriately with those algorithm. Our proposed algorithm obtains near optimal solution for the formulated optimization problem with a greedy algorithm, and hence multipath service chains can be provided dynamically. We evaluate the performance of our proposed method with simulation and compare its performance with the performances of other methods. In numerical examples, it is shown that our proposed algorithm can provide multipath service chains appropriately so as to utilize the limited amount of node resources effectively. Moreover, it is shown that our proposed algorithm is effective for providing service chaining dynamically in large-scale network.

  • Low-Complexity Joint Antenna and User Selection Scheme for the Downlink Multiuser Massive MIMO System with Complexity Reduction Factors

    Aye Mon HTUN  Maung SANN MAW  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    592-602

    Multiuser massive multi-input multi-output (MU massive MIMO) is considered as a promising technology for the fifth generation (5G) of the wireless communication system. In this paper, we propose a low-complexity joint antenna and user selection scheme with block diagonalization (BD) precoding for MU massive MIMO downlink channel in the time division duplex (TDD) system. The base station (BS) is equipped with a large-scale transmit antenna array while each user is using the single receive antenna in the system. To reduce the hardware cost, BS will be implemented by limited number of radio frequency (RF) chains and BS must activate some selected transmit antennas in the BS side for data transmitting and some users' receive antennas in user side for data receiving. To achieve the reduction in the computation complexity in the antenna and user selection while maintaining the same or higher sum-rate in the system, the proposed scheme relies on three complexity reduction key factors. The first key factor is that finding the average channel gains for the transmit antenna in the BS side and the receive antenna in the user side to select the best channel gain antennas and users. The second key factor called the complexity control factor ξ(Xi) for the antenna set and the user set limitation is used to control the complexity of the brute force search. The third one is that using the assumption of the point-to-point deterministic MIMO channel model to avoid the singular value decomposition (SVD) computation in the brute force search. We show that the proposed scheme offers enormous reduction in the computation complexity while ensuring the acceptable performance in terms of total system sum-rate compared with optimal and other conventional schemes.

  • Simplified User Grouping Algorithm for Massive MIMO on Sparse Beam-Space Channels

    Maliheh SOLEIMANI  Mahmood MAZROUEI-SEBDANI  Robert C. ELLIOTT  Witold A. KRZYMIEŃ  Jordan MELZER  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/13
      Vol:
    E102-B No:3
      Page(s):
    623-631

    Massive multiple-input multiple-output (MIMO) systems are a key promising technology for future broadband cellular networks. The propagation paths within massive MIMO radio channels are often sparse, both in the sub-6GHz frequency band and at millimeter wave frequencies. Herein, we propose a two-layer beamforming scheme for downlink transmission over massive multiuser MIMO sparse beam-space channels. The first layer employs a bipartite graph to dynamically group users in the beam-space domain; the aim is to minimize inter-user interference while significantly reducing the effective channel dimensionality. The second layer performs baseband linear MIMO precoding to maximize spatial multiplexing gain and system throughput. Simulation results demonstrate the proposed two-layer beamforming scheme outperforms other, more conventional algorithms.

  • Bandwidth-Efficient Blind Nonlinear Compensation of RF Receiver Employing Folded-Spectrum Sub-Nyquist Sampling Technique Open Access

    Kan KIMURA  Yasushi YAMAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    632-640

    Blind nonlinear compensation for RF receivers is an important research topic in 5G mobile communication, in which higher level modulation schemes are employed more often to achieve high capacity and ultra-broadband services. Since nonlinear compensation circuits must handle intermodulation bandwidths that are more than three times the signal bandwidth, reducing the sampling frequency is essential for saving power consumption. This paper proposes a novel blind nonlinear compensation technique that employs sub-Nyquist sampling analog-to-digital conversion. Although outband distortion spectrum is folded in the proposed sub-Nyquist sampling technique, determination of compensator coefficients is still possible by using the distortion power. Proposed technique achieves almost same compensation performance in EVM as the conventional compensation scheme, while reducing sampling speed of analog to digital convertor (ADC) to less than half the normal sampling frequency. The proposed technique can be applied in concurrent dual-band communication systems and adapt to flat Rayleigh fading environments.

  • Designing and Implementing an Enhanced Bluetooth Low Energy Scanner with User-Level Channel Awareness and Simultaneous Channel Scanning

    Sangwook BAK  Young-Joo SUH  

     
    LETTER-Information Network

      Pubricized:
    2018/12/17
      Vol:
    E102-D No:3
      Page(s):
    640-644

    This paper proposes an enhanced BLE scanner with user-level channel awareness and simultaneous channel scanning to increase theoretical scanning capability by up to three times. With better scanning capability, channel analysis quality also has been improved by considering channel-specific signal characteristics, without the need of beacon-side changes.

  • Designing Distributed SDN C-Plane Considering Large-Scale Disruption and Restoration Open Access

    Takahiro HIRAYAMA  Masahiro JIBIKI  Hiroaki HARAI  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    452-463

    Software-defined networking (SDN) technology enables us to flexibly configure switches in a network. Previously, distributed SDN control methods have been discussed to improve their scalability and robustness. Distributed placement of controllers and backing up each other enhance robustness. However, these techniques do not include an emergency measure against large-scale failures such as network separation induced by disasters. In this study, we first propose a network partitioning method to create a robust control plane (C-Plane) against large-scale failures. In our approach, networks are partitioned into multiple sub-networks based on robust topology coefficient (RTC). RTC denotes the probability that nodes in a sub-network isolate from controllers when a large-scale failure occurs. By placing a local controller onto each sub-network, 6%-10% of larger controller-switch connections will be retained after failure as compared to other approaches. Furthermore, we discuss reactive emergency reconstruction of a distributed SDN C-plane. Each node detects a disconnection to its controller. Then, C-plane will be reconstructed by isolated switches and managed by the other substitute controller. Meanwhile, our approach reconstructs C-plane when network connectivity recovers. The main and substitute controllers detect network restoration and merge their C-planes without conflict. Simulation results reveal that our proposed method recovers C-plane logical connectivity with a probability of approximately 90% when failure occurs in 100 node networks. Furthermore, we demonstrate that the convergence time of our reconstruction mechanism is proportional to the network size.

  • Software Engineering Data Analytics: A Framework Based on a Multi-Layered Abstraction Mechanism

    Chaman WIJESIRIWARDANA  Prasad WIMALARATNE  

     
    LETTER-Software Engineering

      Pubricized:
    2018/12/04
      Vol:
    E102-D No:3
      Page(s):
    637-639

    This paper presents a concept of a domain-specific framework for software analytics by enabling querying, modeling, and integration of heterogeneous software repositories. The framework adheres to a multi-layered abstraction mechanism that consists of domain-specific operators. We showcased the potential of this approach by employing a case study.

  • Unsupervised Deep Domain Adaptation for Heterogeneous Defect Prediction

    Lina GONG  Shujuan JIANG  Qiao YU  Li JIANG  

     
    PAPER-Software Engineering

      Pubricized:
    2018/12/05
      Vol:
    E102-D No:3
      Page(s):
    537-549

    Heterogeneous defect prediction (HDP) is to detect the largest number of defective software modules in one project by using historical data collected from other projects with different metrics. However, these data can not be directly used because of different metrics set among projects. Meanwhile, software data have more non-defective instances than defective instances which may cause a significant bias towards defective instances. To completely solve these two restrictions, we propose unsupervised deep domain adaptation approach to build a HDP model. Specifically, we firstly map the data of source and target projects into a unified metric representation (UMR). Then, we design a simple neural network (SNN) model to deal with the heterogeneous and class-imbalanced problems in software defect prediction (SDP). In particular, our model introduces the Maximum Mean Discrepancy (MMD) as the distance between the source and target data to reduce the distribution mismatch, and use the cross-entropy loss function as the classification loss. Extensive experiments on 18 public projects from four datasets indicate that the proposed approach can build an effective prediction model for heterogeneous defect prediction (HDP) and outperforms the related competing approaches.

  • Quantum Query Complexity of Unitary Operator Discrimination Open Access

    Akinori KAWACHI  Kenichi KAWANO  Francois LE GALL  Suguru TAMAKI  

     
    PAPER

      Pubricized:
    2018/11/08
      Vol:
    E102-D No:3
      Page(s):
    483-491

    Unitary operator discrimination is a fundamental problem in quantum information theory. The basic version of this problem can be described as follows: Given a black box implementing a unitary operator U∈S:={U1, U2} under some probability distribution over S, the goal is to decide whether U=U1 or U=U2. In this paper, we consider the query complexity of this problem. We show that there exists a quantum algorithm that solves this problem with bounded error probability using $lceil{sqrt{6} heta_{ m cover}^{-1}} ceil$ queries to the black box in the worst case, i.e., under any probability distribution over S, where the parameter θcover, which is determined by the eigenvalues of $U_1^dagger {U_2}$, represents the “closeness” between U1 and U2. We also show that this upper bound is essentially tight: we prove that for every θcover > 0 there exist operators U1 and U2 such that any quantum algorithm solving this problem with bounded error probability requires at least $lceil{ rac{2}{3 heta_{ m cover}}} ceil$ queries under uniform distribution over S.

  • Accurate Library Recommendation Using Combining Collaborative Filtering and Topic Model for Mobile Development

    Xiaoqiong ZHAO  Shanping LI  Huan YU  Ye WANG  Weiwei QIU  

     
    PAPER-Software Engineering

      Pubricized:
    2018/12/18
      Vol:
    E102-D No:3
      Page(s):
    522-536

    Background: The applying of third-party libraries is an integral part of many applications. But the libraries choosing is time-consuming even for experienced developers. The automated recommendation system for libraries recommendation is widely researched to help developers to choose libraries. Aim: from software engineering aspect, our research aims to give developers a reliable recommended list of third-party libraries at the early phase of software development lifecycle to help them build their development environment faster; and from technical aspect, our research aims to build a generalizable recommendation system framework which combines collaborative filtering and topic modeling techniques, in order to improve the performance of libraries recommendation significantly. Our works on this research: 1) we design a hybrid methodology to combine collaborative filtering and LDA text mining technology; 2) we build a recommendation system framework successfully based on the above hybrid methodology; 3) we make a well-designed experiment to validate the methodology and framework which use the data of 1,013 mobile application projects; 4) we do the evaluation for the result of the experiment. Conclusions: 1) hybrid methodology with collaborative filtering and LDA can improve the performance of libraries recommendation significantly; 2) based on the hybrid methodology, the framework works very well on the libraries recommendation for helping developers' libraries choosing. Further research is necessary to improve the performance of the libraries recommendation including: 1) use more accurate NLP technologies improve the correlation analysis; 2) try other similarity calculation methodology for collaborative filtering to rise the accuracy; 3) on this research, we just bring the time-series approach to the framework and make an experiment as comparative trial, the result shows that the performance improves continuously, so in further research we plan to use time-series data-mining as the basic methodology to update the framework.

  • An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal Open Access

    Hisao OGATA  Tomoyoshi ISHIKAWA  Norichika MIYAMOTO  Tsutomu MATSUMOTO  

     
    PAPER-Dependable Computing

      Pubricized:
    2018/12/06
      Vol:
    E102-D No:3
      Page(s):
    559-567

    Recently, criminals frequently utilize logical attacks to install malware in the PC of Automated Teller Machines (ATMs) for the sake of unauthorized cash withdrawal from ATMs. Malware in the PC sends unauthorized cash dispensing commands to the dispenser to withdraw cash without generating a transaction. Existing security measures primarily try to protect information property in the PC so as not to be compromised by malware. Such security measures are not so effective or efficient because the PC contains too many protected items to tightly control them in present ATM operational environments. This paper proposes a new ATM security measure based on secure peripheral devices; the secure dispenser in an ATM verifies the authenticity of a received dispensing command with the withdrawal transaction evidence, which is securely transferred from the secure card reader of an ATM. The card reader can capture the transaction evidence since all transaction data flows through the card reader in a smart card transaction. Even though the PC is compromised, unauthorized dispensing commands are not accepted by the secure dispenser. As a result, the new security measure does not impose heavy burden of tighter security managements for the PCs on financial institutes while achieving stringent security for the logical attacks to ATMs.

  • Multi-View Synthesis and Analysis Dictionaries Learning for Classification

    Fei WU  Xiwei DONG  Lu HAN  Xiao-Yuan JING  Yi-mu JI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2018/11/27
      Vol:
    E102-D No:3
      Page(s):
    659-662

    Recently, multi-view dictionary learning technique has attracted lots of research interest. Although several multi-view dictionary learning methods have been addressed, they can be further improved. Most of existing multi-view dictionary learning methods adopt the l0 or l1-norm sparsity constraint on the representation coefficients, which makes the training and testing phases time-consuming. In this paper, we propose a novel multi-view dictionary learning approach named multi-view synthesis and analysis dictionaries learning (MSADL), which jointly learns multiple discriminant dictionary pairs with each corresponding to one view and containing a structured synthesis dictionary and a structured analysis dictionary. MSADL utilizes synthesis dictionaries to achieve class-specific reconstruction and uses analysis dictionaries to generate discriminative code coefficients by linear projection. Furthermore, we design an uncorrelation term for multi-view dictionary learning, such that the redundancy among synthesis dictionaries learned from different views can be reduced. Two widely used datasets are employed as test data. Experimental results demonstrate the efficiency and effectiveness of the proposed approach.

  • Automatic and Accurate 3D Measurement Based on RGBD Saliency Detection

    Yibo JIANG  Hui BI  Hui LI  Zhihao XU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/12/21
      Vol:
    E102-D No:3
      Page(s):
    688-689

    The 3D measurement is widely required in modern industries. In this letter, a method based on the RGBD saliency detection with depth range adjusting (RGBD-DRA) is proposed for 3D measurement. By using superpixels and prior maps, RGBD saliency detection is utilized to detect and measure the target object automatically Meanwhile, the proposed depth range adjusting is processing while measuring to prompt the measuring accuracy further. The experimental results demonstrate the proposed method automatic and accurate, with 3 mm and 3.77% maximum deviation value and rate, respectively.

  • BER Performance of Human Body Communications Using FSDT

    Kunho PARK  Min Joo JEONG  Jong Jin BAEK  Se Woong KIM  Youn Tae KIM  

     
    PAPER-Network

      Pubricized:
    2018/08/23
      Vol:
    E102-B No:3
      Page(s):
    522-527

    This paper presents the bit error rate (BER) performance of human body communication (HBC) receivers in interference-rich environments. The BER performance was measured while applying an interference signal to the HBC receiver to consider the effect of receiver performance on BER performance. During the measurement, a signal attenuator was used to mimic the signal loss of the human body channel, which improved the repeatability of the measurement results. The measurement results showed that HBC is robust against the interference when frequency selective digital transmission (FSDT) is used as a modulation scheme. The BER performance in this paper can be effectively used to evaluate a communication performance of HBC.

  • Eager Memory Management for In-Memory Data Analytics

    Hakbeom JANG  Jonghyun BAE  Tae Jun HAM  Jae W. LEE  

     
    LETTER-Computer System

      Pubricized:
    2018/12/11
      Vol:
    E102-D No:3
      Page(s):
    632-636

    This paper introduces e-spill, an eager spill mechanism, which dynamically finds the optimal spill-threshold by monitoring the GC time at runtime and thereby prevent expensive GC overhead. Our e-spill adopts a slow-start model to gradually increase the spill-threshold until it reaches the optimal point without substantial GCs. We prototype e-spill as an extension to Spark and evaluate it using six workloads on three different parallel platforms. Our evaluations show that e-spill improves performance by up to 3.80× and saves the cost of cluster operation on Amazon EC2 cloud by up to 51% over the baseline system following Spark Tuning Guidelines.

  • Generation of Efficient Obfuscated Code through Just-in-Time Compilation

    Muhammad HATABA  Ahmed EL-MAHDY  Kazunori UEDA  

     
    LETTER-Dependable Computing

      Pubricized:
    2018/11/22
      Vol:
    E102-D No:3
      Page(s):
    645-649

    Nowadays the computing technology is going through a major paradigm shift. Local processing platforms are being replaced by physically out of reach yet more powerful and scalable environments such as the cloud computing platforms. Previously, we introduced the OJIT system as a novel approach for obfuscating remotely executed programs, making them difficult for adversaries to reverse-engineer. The system exploited the JIT compilation technology to randomly and dynamically transform the code, making it constantly changing, thereby complicating the execution state. This work aims to propose the new design iOJIT, as an enhanced approach that patches the old systems shortcomings, and potentially provides more effective obfuscation. Here, we present an analytic study of the obfuscation techniques on the generated code and the cost of applying such transformations in terms of execution time and performance overhead. Based upon this profiling study, we implemented a new algorithm to choose which obfuscation techniques would be better chosen for “efficient” obfuscation according to our metrics, i.e., less prone to security attacks. Another goal was to study the system performance with different applications. Therefore, we applied our system on a cloud platform running different standard benchmarks from SPEC suite.

  • The Covering Radius of the Reed-Muller Code R(3, 7) in R(5, 7) Is 20

    Gui LI  Qichun WANG  Shi SHU  

     
    LETTER-Coding Theory

      Vol:
    E102-A No:3
      Page(s):
    594-597

    We propose a recursive algorithm to reduce the computational complexity of the r-order nonlinearity of n-variable Boolean functions. Applying the algorithm and using the sufficient and necessary condition put forward by [1] to cut the vast majority of useless search branches, we show that the covering radius of the Reed-Muller Code R(3, 7) in R(5, 7) is 20.

2381-2400hit(22683hit)