The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2661-2680hit(22683hit)

  • Electro-Optical Characteristics and Curvature Resistance of Dye-Doped Liquid Crystal Gel Films for Stretchable Displays

    Ryosuke SAITO  Yosei SHIBATA  Takahiro ISHINABE  Hideo FUJIKAKE  

     
    BRIEF PAPER

      Vol:
    E101-C No:11
      Page(s):
    901-905

    In this study, we evaluated the electro-optical characteristics and structural stability in curved state of dye-doped liquid crystal (LC) gel film for stretchable displays. As the results, maximum contrast ratio of 6.7:1 and suppression of LC flow were achieved by optimum of blend condition such as gelator and dye concentration.

  • Analysis of Super-Steep Subthreshold Slope Body-Tied SOI MOSFET and its Possibility for Ultralow Voltage Application

    Takayuki MORI  Jiro IDA  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E101-C No:11
      Page(s):
    916-922

    In this paper, we review a super-steep subthreshold slope (SS) (<1 mV/dec) body-tied (BT) silicon on insulator (SOI) metal oxide semiconductor field effect transistor (MOSFET) fabricated with 0.15 µm SOI technology and discuss the possibility of its use in ultralow voltage applications. The mechanism of the super-steep SS in the BT SOI MOSFET was investigated with technology computer-aided design simulation. The gate length/width and Si thickness optimizations promise further reductions in operation voltage, as well as improvement of the ION/IOFF ratio. In addition, we demonstrated control of the threshold voltage and hysteresis characteristics using the substrate and body bias in the BT SOI MOSFET.

  • Upper Bound for Coded MIMO Systems without Enumeration of Codewords

    Jin-Taek SEONG  Jin-Ho YOU  

     
    PAPER-Communication Theory and Signals

      Vol:
    E101-A No:11
      Page(s):
    1925-1933

    In this paper, we consider coded multi-input multi-output (MIMO) systems with low-density parity-check (LDPC) codes and space-time block code (STBC) in MIMO channels. The LDPC code takes the role of a channel code while the STBC provides spatial-temporal diversity. The performance of such coded MIMO system has been shown to be excellent in the past. In this paper, we present a performance analysis for an upper bound on probability of error for coded MIMO schemes. Compared to previous works, the proposed approach for the upper bound can avoid any explicit weight enumeration of codewords and provide a significant step for the upper bound by using a multinomial theorem. In addition, we propose a log domain convolution that enables us to handle huge numbers, e.g., 10500. Comparison of system simulations and numerical evaluations shows that the proposed upper bound is applicable for various coded MIMO systems.

  • Incorporating Zero-Laxity Policy into Mixed-Criticality Multiprocessor Real-Time Systems

    Namyong JUNG  Hyeongboo BAEK  Donghyouk LIM  Jinkyu LEE  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:11
      Page(s):
    1888-1899

    As real-time embedded systems are required to accommodate various tasks with different levels of criticality, scheduling algorithms for MC (Mixed-Criticality) systems have been widely studied in the real-time systems community. Most studies have focused on MC uniprocessor systems whereas there have been only a few studies to support MC multiprocessor systems. In particular, although the ZL (Zero-Laxity) policy has been known to an effective technique in improving the schedulability performance of base scheduling algorithms on SC (Single-Criticality) multiprocessor systems, the effectiveness of the ZL policy on MC multiprocessor systems has not been revealed to date. In this paper, we focus on realizing the potential of the ZL policy for MC multiprocessor systems, which is the first attempt. To this end, we design the ZL policy for MC multiprocessor systems, and apply the policy to EDF (Earliest Deadline First), yielding EDZL (Earliest Deadline first until Zero-Laxity) tailored for MC multiprocessor systems. Then, we develop a schedulability analysis for EDZL (as well as its base algorithm EDF) to support its timing guarantee. Our simulation results show a significant schedulability improvement of EDZL over EDF, demonstrating the effectiveness of the ZL policy for MC multiprocessor systems.

  • How are IF-Conditional Statements Fixed Through Peer CodeReview?

    Yuki UEDA  Akinori IHARA  Takashi ISHIO  Toshiki HIRAO  Kenichi MATSUMOTO  

     
    PAPER-Software Engineering

      Pubricized:
    2018/08/08
      Vol:
    E101-D No:11
      Page(s):
    2720-2729

    Peer code review is key to ensuring the absence of software defects. To reduce review costs, software developers adopt code convention checking tools that automatically identify maintainability issues in source code. However, these tools do not always address the maintainability issue for a particular project. The goal of this study is to understand how code review fixes conditional statement issues, which are the most frequent changes in software development. We conduct an empirical study to understand if-statement changes through code review. Using review requests in the Qt and OpenStack projects, we analyze changes of the if-conditional statements that are (1) requested to be reviewed, and are (2) revised through code review. We find the most frequently changed symbols are “( )”, “.”, and “!”. We also find project-specific fixing patterns for improving code readability by association rule mining. For example “!” operator is frequently replaced with a function call. These rules are useful for improving a coding convention checker tailored for the projects.

  • Color-to-Gray Conversion Method Considering Contrasts in Color Image

    Shi BAO  Zhiqiang LIU  Go TANAKA  

     
    LETTER-Image

      Vol:
    E101-A No:11
      Page(s):
    1849-1853

    A new projection-based color-to-gray conversion method is proposed in this letter. In the proposed method, an objective function which considers color contrasts in an input image is defined. Projection coefficients are determined by minimizing the objective function. Experimental results show the validity of the proposed method.

  • Binary Sparse Representation Based on Arbitrary Quality Metrics and Its Applications

    Takahiro OGAWA  Sho TAKAHASHI  Naofumi WADA  Akira TANAKA  Miki HASEYAMA  

     
    PAPER-Image, Vision

      Vol:
    E101-A No:11
      Page(s):
    1776-1785

    Binary sparse representation based on arbitrary quality metrics and its applications are presented in this paper. The novelties of the proposed method are twofold. First, the proposed method newly derives sparse representation for which representation coefficients are binary values, and this enables selection of arbitrary image quality metrics. This new sparse representation can generate quality metric-independent subspaces with simplification of the calculation procedures. Second, visual saliency is used in the proposed method for pooling the quality values obtained for all of the parts within target images. This approach enables visually pleasant approximation of the target images more successfully. By introducing the above two novel approaches, successful image approximation considering human perception becomes feasible. Since the proposed method can provide lower-dimensional subspaces that are obtained by better image quality metrics, realization of several image reconstruction tasks can be expected. Experimental results showed high performance of the proposed method in terms of two image reconstruction tasks, image inpainting and super-resolution.

  • A Quantitative Analysis on Relationship between an Early-Closed Bug and Its Amount of Clues: A Case Study of Apache Ant

    Akito SUNOUCHI  Hirohisa AMAN  Minoru KAWAHARA  

     
    LETTER-Software Engineering

      Pubricized:
    2018/06/22
      Vol:
    E101-D No:10
      Page(s):
    2523-2525

    Once a bug is reported, it is a major concern whether or not the bug is resolved (closed) soon. This paper examines seven metrics quantifying the amount of clues to the early close of reported bugs through a case study. The results show that one of the metrics, the similarity to already-closed bug reports, is strongly related to early-closed bugs.

  • Impact of Viewing Distance on Task Performance and Its Properties

    Makio ISHIHARA  Yukio ISHIHARA  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2018/07/02
      Vol:
    E101-D No:10
      Page(s):
    2530-2533

    This paper discusses VDT syndrome from the point of view of the viewing distance between a computer screen and user's eyes. This paper conducts a series of experiments to show an impact of the viewing distance on task performance. In the experiments, two different viewing distances of 50cm and 350cm with the same viewing angle of 30degrees are taken into consideration. The results show that the long viewing distance enables people to manipulate the mouse more slowly, more correctly and more precisely than the short.

  • Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames

    Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  

     
    PAPER-Information Network

      Pubricized:
    2018/07/02
      Vol:
    E101-D No:10
      Page(s):
    2465-2473

    With the development of wireless network technology and popularization of mobile devices, the Wireless Local Area Network (WLAN) has become an indispensable part of our daily life. Although the 802.11-based WLAN provides enormous convenience for users to access the Internet, it also gives rise to a number of security issues. One of the most severe threat encountered by Wi-Fi users is the evil twin attacks. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Due to the characteristics of strong concealment, high confusion, great harmfulness and easy implementation, the evil twin has led to significant loss of sensitive information and become one of the most prominent security threats in recent years. In this paper, we propose a passive client-based detection solution that enables users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.

  • Optimal Mutually Orthogonal ZCZ Polyphase Sequence Sets

    Fanxin ZENG  Xiping HE  Guixin XUAN  Wenchao ZHANG  Guojun LI  Zhenyu ZHANG  Yanni PENG  Sheng LU  Li YAN  

     
    LETTER-Information Theory

      Vol:
    E101-A No:10
      Page(s):
    1713-1718

    In an approximately synchronized (AS) code-division multiple-access (CDMA) communication system, zero correlation zone (ZCZ) sequences can be used as its spreading sequences so that the system suppresses multiple access interference (MAI) and multi-path interference (MPI) fully and synchronously. In this letter, the mutually orthogonal (MO) ZCZ polyphase sequence sets proposed by one of the authors are improved, and the resultant ZCZ sequences in each set arrive at the theoretical bound regarding ZCZ sequences under some conditions. Therefore, the improved MO ZCZ sequence sets are optimal.

  • Development of a Low Standby Power Six-Transistor CMOS SRAM Employing a Single Power Supply

    Nobuaki KOBAYASHI  Tadayoshi ENOMOTO  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:10
      Page(s):
    822-830

    We developed and applied a new circuit, called the “Self-controllable Voltage Level (SVL)” circuit, not only to expand both “write” and “read” stabilities, but also to achieve a low stand-by power and data holding capability in a single low power supply, 90-nm, 2-kbit, six-transistor CMOS SRAM. The SVL circuit can adaptively lower and higher the word-line voltages for a “read” and “write” operation, respectively. It can also adaptively lower and higher the memory cell supply voltages for the “write” and “hold” operations, and “read” operation, respectively. This paper focuses on the “hold” characteristics and the standby power dissipations (PST) of the developed SRAM. The average PST of the developed SRAM is only 0.984µW, namely, 9.57% of that (10.28µW) of the conventional SRAM at a supply voltage (VDD) of 1.0V. The data hold margin of the developed SRAM is 0.1839V and that of the conventional SRAM is 0.343V at the supply voltage of 1.0V. An area overhead of the SVL circuit is only 1.383% of the conventional SRAM.

  • Power Transfer Theory on Linear Passive Two-Port Systems Open Access

    Takashi OHIRA  

     
    INVITED PAPER

      Vol:
    E101-C No:10
      Page(s):
    719-726

    This paper theoretically revisits linear passive two-port systems from the viewpoint of power transfer. Instead of using the conventional S21 magnitude, we propose generalizing the kQ product as a figure of merit for two-port performance evaluation. We explore three examples of power transfer schemes, i.e. inductive, capacitive, and resistive channels. Starting from their voltage-current equations, the kQ formula is analytically derived for each scheme. The resultant formulas look different in appearance but are all physically consistent with ωM/R, which stems from the original definition of kQ product in a primitive transformer. After comprehensively learning from the three examples, we finally extend the theory to a black-box model that represents any kind of power transfer channel. In terms of general two-port Z-parameters, useful mathematical expressions are deduced for the optimum load, input impedance, and maximum power transfer efficiency. We also supplement the theory with helpful graphics that explain how the generalized kQ behaves as a function of the circuit parameters.

  • A Stereo Wind-Noise Suppressor with Null Beamforming and Frequency-Domain Noise Averaging

    Masanori KATO  Akihiko SUGIYAMA  Tatsuya KOMATSU  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1631-1637

    This paper proposes a stereo wind-noise suppressor with frequency-domain noise averaging. A directional gain for diffuse wind noise is estimated frame by frame using a null beamformer based on interchannel phase difference which blocks the target signal. The wind-noise gain estimate is commonly multiplied by the input noisy signal to generate channel dependent wind noise estimates in order to cope with interchannel wind-noise imbalance. Interchannel phase agreement by target signal dominance or incidentally equal wind-noise phase, which leads to underestimation, is offset by averaging channel dependent wind-noise estimates along frequency. Evaluation results show that the mean PESQ score by the proposed wind-noise suppressor reaches 2.1 which is 0.2 higher than that by the wind-noise suppressor without averaging and 0.3 higher than that by a conventional monaural-noise suppressor with a statistically significant difference.

  • A New Semi-Blind Method for Spatial Equalization in MIMO Systems

    Liu YANG  Hang ZHANG  Yang CAI  Qiao SU  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1693-1697

    In this letter, a new semi-blind approach incorporating the bounded nature of communication sources with the distance between the equalizer outputs and the training sequence is proposed. By utilizing the sparsity property of l1-norm cost function, the proposed algorithm can outperform the semi-blind method based on higher-order statistics (HOS) criterion especially for transmitting sources with non-constant modulus. Experimental results demonstrate that the proposed method shows superior performance over the HOS based semi-blind method and the classical training-based method for QPSK and 16QAM sources equalization. While for 64QAM signal inputs, the proposed algorithm exhibits its superiority in low signal-to-noise-ratio (SNR) conditions compared with the training-based method.

  • Design and Analysis of First-Order Steerable Nonorthogonal Differential Microphone Arrays

    Qiang YU  Xiaoguang WU  Yaping BAO  

     
    LETTER-Engineering Acoustics

      Vol:
    E101-A No:10
      Page(s):
    1687-1692

    Differential microphone arrays have been widely used in hands-free communication systems because of their frequency-invariant beampatterns, high directivity factors and small apertures. Considering the position of acoustic source always moving within a certain range in real application, this letter proposes an approach to construct the steerable first-order differential beampattern by using four omnidirectional microphones arranged in a non-orthogonal circular geometry. The theoretical analysis and simulation results show beampattern constructed via this method achieves the same direction factor (DF) as traditional DMAs and higher white noise gain (WNG) within a certain angular range. The simulation results also show the proposed method applies to processing speech signal. In experiments, we show the effectiveness and small computation amount of the proposed method.

  • Dynamic Ensemble Selection Based on Rough Set Reduction and Cluster Matching

    Ying-Chun CHEN  Ou LI  Yu SUN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/04/11
      Vol:
    E101-B No:10
      Page(s):
    2196-2202

    Ensemble learning is widely used in the field of sensor network monitoring and target identification. To improve the generalization ability and classification precision of ensemble learning, we first propose an approximate attribute reduction algorithm based on rough sets in this paper. The reduction algorithm uses mutual information to measure attribute importance and introduces a correction coefficient and an approximation parameter. Based on a random sampling strategy, we use the approximate attribute reduction algorithm to implement the multi-modal sample space perturbation. To further reduce the ensemble size and realize a dynamic subset of base classifiers that best matches the test sample, we define a similarity parameter between the test samples and training sample sets that takes the similarity and number of the training samples into consideration. We then propose a k-means clustering-based dynamic ensemble selection algorithm. Simulations show that the multi-modal perturbation method effectively selects important attributes and reduces the influence of noise on the classification results. The classification precision and runtime of experiments demonstrate the effectiveness of the proposed dynamic ensemble selection algorithm.

  • 4.5-/4.9-GHz-Band Selective High-Efficiency GaN HEMT Power Amplifier by Characteristic Impedance Switching

    Kazuki MASHIMO  Ryo ISHIKAWA  Kazuhiko HONJO  

     
    PAPER

      Vol:
    E101-C No:10
      Page(s):
    751-758

    A 4.5-/4.9-GHz band-selective GaN HEMT high-efficiency power amplifier has been designed and evaluated for next-generation wireless communication systems. An optimum termination impedance for each high-efficiency operation band was changed by using PIN diodes inserted into a harmonic treatment circuit at the output side. In order to minimize the influence of the insertion loss of the PIN diodes, an additional line is arranged in parallel with the open-ended stub used for second harmonic treatment, and the line and stub are connected with the PIN diodes to change the effective characteristic impedance. The fabricated GaN HEMT amplifier achieved a maximum power-added efficiency of 57% and 66% and a maximum drain efficiency of 62% and 70% at 4.6 and 5.0GHz, respectively, with a saturated output power of 38dBm, for each switched condition.

  • Effective Capacity Analysis for Wireless Relay Network with Different Relay Selection Protocols

    Hui ZHI  Feiyue WANG  Ziju HUANG   

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/04/09
      Vol:
    E101-B No:10
      Page(s):
    2203-2212

    Effective capacity (EC) is an important performance metric for a time-varying wireless channel in order to evaluate the communication rate in the physical layer (PHL) while satisfying the statistical delay quality of service (QoS) requirement in data-link layer (DLL). This paper analyzes EC of amplify-and-forward wireless relay network with different relay selection (RS) protocols. First, through the analysis of the probability density function (PDF) of received signal-to-noise ratio (SNR), the exact expressions of EC for direct transmission (DT), random relay (RR), random relay with direct transmission (RR-WDT), best relay (BR) protocols are derived. Then a novel best relay with direct transmission (BR-WDT) protocol is proposed to maximize EC and an exact expression of EC for BR-WDT protocol is developed. Simulations demonstrate that the derived analytical results well match those of Monte-Carlo simulations. The proposed BR-WDT protocol can always achieve larger EC than other protocols while guaranteeing the delay QoS requirement. Moreover, the influence of distance between source and relay on EC is discussed, and optimal relay position for different RS protocols is estimated. Furthermore, EC of all protocols becomes smaller while delay QoS exponent becomes larger, and EC of BR-WDT becomes better while the number of relays becomes larger.

  • An Efficient Double-Sourced Energy Transfer Scheme for Mobility-Constrained IoT Applications

    Chao WU  Yuan'an LIU  Fan WU  Suyan LIU  

     
    PAPER-Energy in Electronics Communications

      Pubricized:
    2018/04/11
      Vol:
    E101-B No:10
      Page(s):
    2213-2221

    The energy efficiency of Internet of Things (IoT) could be improved by RF energy transfer technologies.Aiming at IoT applications with a mobility-constrained mobile sink, a double-sourced energy transfer (D-ET) scheme is proposed. Based on the hierarchical routing information of network nodes, the Simultaneous Wireless Information and Power Transfer (SWIPT) method helps to improve the global data gathering performance. A genetic algorithm and graph theory are combined to analyze the node energy consumption distribution. Then dedicated charger nodes are deployed on the basis of the genetic algorithm's output. Experiments are conducted using Network Simulator-3 (NS-3) to evaluate the performance of the D-ET scheme. The simulation results show D-ET outperforms other schemes in terms of network lifetime and data gathering performance.

2661-2680hit(22683hit)