The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2701-2720hit(22683hit)

  • Wideband Waveguide Short-Slot 2-Plane Coupler Using Frequency Shift of Propagating Modes

    Dong-Hun KIM  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E101-C No:10
      Page(s):
    815-821

    A wideband design of the waveguide short-slot 2-plane coupler with 2×2 input/output ports is designed, fabricated, and evaluated. Using coupling coefficients of complementary propagating modes which are TE11, TE21, and TE30 modes, the flatness of the output amplitudes of 2-plane coupler is improved. The coupler operates from 4.96GHz to 5.27GHz (bandwidth 6.1%) which is wider than the former coupler without considering the complementary propagating mode from 5.04GHz to 5.17GHz (bandwidth 2.5%).

  • Improving Per-Node Computing Efficiency by an Adaptive Lock-Free Scheduling Model

    Zhishuo ZHENG  Deyu QI  Naqin ZHOU  Xinyang WANG  Mincong YU  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2018/07/06
      Vol:
    E101-D No:10
      Page(s):
    2423-2435

    Job scheduling on many-core computers with tens or even hundreds of processing cores is one of the key technologies in High Performance Computing (HPC) systems. Despite many scheduling algorithms have been proposed, scheduling remains a challenge for executing highly effective jobs that are assigned in a single computing node with diverse scheduling objectives. On the other hand, the increasing scale and the need for rapid response to changing requirements are hard to meet with existing scheduling models in an HPC node. To address these issues, we propose a novel adaptive scheduling model that is applied to a single node with a many-core processor; this model solves the problems of scheduling efficiency and scalability through an adaptive optimistic control mechanism. This mechanism exposes information such that all the cores are provided with jobs and the tools necessary to take advantage of that information and thus compete for resources in an uncoordinated manner. At the same time, the mechanism is equipped with adaptive control, allowing it to adjust the number of running tools dynamically when frequent conflict happens. We justify this scheduling model and present the simulation results for synthetic and real-world HPC workloads, in which we compare our proposed model with two widely used scheduling models, i.e. multi-path monolithic and two-level scheduling. The proposed approach outperforms the other models in scheduling efficiency and scalability. Our results demonstrate that the adaptive optimistic control affords significant improvements for HPC workloads in the parallelism of the node-level scheduling model and performance.

  • Uncertain Rule Based Method for Determining Data Currency

    Mohan LI  Jianzhong LI  Siyao CHENG  Yanbin SUN  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/07/10
      Vol:
    E101-D No:10
      Page(s):
    2447-2457

    Currency is one of the important measurements of data quality. The main purpose of the study on data currency is to determine whether a given data item is up-to-date. Though there are already several works on determining data currency, all the proposed methods have limitations. Some works require timestamps of data items that are not always available, and others are based on certain currency rules that can only decide relevant currency and cannot express uncertain semantics. To overcome the limitations of the previous methods, this paper introduces a new approach for determining data currency based on uncertain currency rules. First, a class of uncertain currency rules is provided to infer the possible valid time for a given data item, and then based on the rules, data currency is formally defined. After that, a polynomial time algorithm for evaluating data currency is given based on the uncertain currency rules. Using real-life data sets, the effectiveness and efficiency of the proposed method are experimentally verified.

  • Individuality-Preserving Gait Pattern Prediction Based on Gait Feature Transitions

    Tsuyoshi HIGASHIGUCHI  Norimichi UKITA  Masayuki KANBARA  Norihiro HAGITA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2018/07/20
      Vol:
    E101-D No:10
      Page(s):
    2501-2508

    This paper proposes a method for predicting individuality-preserving gait patterns. Physical rehabilitation can be performed using visual and/or physical instructions by physiotherapists or exoskeletal robots. However, a template-based rehabilitation may produce discomfort and pain in a patient because of deviations from the natural gait of each patient. Our work addresses this problem by predicting an individuality-preserving gait pattern for each patient. In this prediction, the transition of the gait patterns is modeled by associating the sequence of a 3D skeleton in gait with its continuous-value gait features (e.g., walking speed or step width). In the space of the prediction model, the arrangement of the gait patterns are optimized so that (1) similar gait patterns are close to each other and (2) the gait feature changes smoothly between neighboring gait patterns. This model allows to predict individuality-preserving gait patterns of each patient even if his/her various gait patterns are not available for prediction. The effectiveness of the proposed method is demonstrated quantitatively. with two datasets.

  • RbWL: Recency-Based Static Wear Leveling for Lifetime Extension and Overhead Reduction in NAND Flash Memory Systems

    Sang-Ho HWANG  Jong Wook KWAK  

     
    LETTER-Software System

      Pubricized:
    2018/07/09
      Vol:
    E101-D No:10
      Page(s):
    2518-2522

    In this letter, we propose a static wear leveling technique, called Recency-based Wear Leveling (RbWL). The basic idea of RbWL is to execute static wear leveling at minimum levels, because the frequent migrations of cold data by static wear leveling cause significant overhead in a NAND flash memory system. RbWL adjusts the execution frequency according to a threshold value that reflects the lifetime difference of the hot/cold blocks and the total lifetime of the NAND flash memory system. The evaluation results show that RbWL improves the lifetime of NAND flash memory systems by 52%, and it also reduces the overhead of wear leveling from 8% to 42% and from 13% to 51%, in terms of the number of erase operations and the number of page migrations of valid pages, respectively, compared with other algorithms.

  • Twofold Correlation Filtering for Tracking Integration

    Wei WANG  Weiguang LI  Zhaoming CHEN  Mingquan SHI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/07/10
      Vol:
    E101-D No:10
      Page(s):
    2547-2550

    In general, effective integrating the advantages of different trackers can achieve unified performance promotion. In this work, we study the integration of multiple correlation filter (CF) trackers; propose a novel but simple tracking integration method that combines different trackers in filter level. Due to the variety of their correlation filter and features, there is no comparability between different CF tracking results for tracking integration. To tackle this, we propose twofold CF to unify these various response maps so that the results of different tracking algorithms can be compared, so as to boost the tracking performance like ensemble learning. Experiment of two CF methods integration on the data sets OTB demonstrates that the proposed method is effective and promising.

  • Design of Capacitive Coupler in Underwater Wireless Power Transfer Focusing on kQ Product

    Masaya TAMURA  Yasumasa NAKA  Kousuke MURAI  

     
    PAPER

      Vol:
    E101-C No:10
      Page(s):
    759-766

    This paper presents the design of a capacitive coupler for underwater wireless power transfer (U-WPT) focusing on kQ product. Power transfer efficiency hinges on the coupling coefficient k between the couplers and Q-factor of water calculated from the complex permittivity. High efficiency can be achieved by handling k and the Q-factor effectively. First, the pivotal elements on k are derived from the equivalent circuit of the coupler. Next, the frequency characteristic of the Q-factor in tap water is calculated from the measured results. Then, the design parameters in which kQ product has the maximal values are determined. Finally, it is demonstrated that the efficiency of U-WPT with the capacitive coupling designed by our method achieves approximately 80%.

  • TDOA Estimation Algorithm Based on Generalized Cyclic Correntropy in Impulsive Noise and Cochannel Interference

    Xing CHEN  Tianshuang QIU  Cheng LIU  Jitong MA  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1625-1630

    This paper mainly discusses the time-difference-of-arrival (TDOA) estimation problem of digital modulation signal under impulsive noise and cochannel interference environment. Since the conventional TDOA estimation algorithms based on the second-order cyclic statistics degenerate severely in impulsive noise and the TDOA estimation algorithms based on correntropy are out of work in cochannel interference, a novel signal-selective algorithm based on the generalized cyclic correntropy is proposed, which can suppress both impulsive noise and cochannel interference. Theoretical derivation and simulation results demonstrate the effectiveness and robustness of the proposed algorithm.

  • Recovery Performance of IHT and HTP Algorithms under General Perturbations

    Xiaobo ZHANG  Wenbo XU  Yupeng CUI  Jiaru LIN  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1698-1702

    In compressed sensing, most previous researches have studied the recovery performance of a sparse signal x based on the acquired model y=Φx+n, where n denotes the noise vector. There are also related studies for general perturbation environment, i.e., y=(Φ+E)x+n, where E is the measurement perturbation. IHT and HTP algorithms are the classical algorithms for sparse signal reconstruction in compressed sensing. Under the general perturbations, this paper derive the required sufficient conditions and the error bounds of IHT and HTP algorithms.

  • Quadruped Locomotion Patterns Generated by Desymmetrization of Symmetric Central Pattern Generator Hardware Network

    Naruki SASAGAWA  Kentaro TANI  Takashi IMAMURA  Yoshinobu MAEDA  

     
    PAPER-Nonlinear Problems

      Vol:
    E101-A No:10
      Page(s):
    1658-1667

    Reproducing quadruped locomotion from an engineering viewpoint is important not only to control robot locomotion but also to clarify the nonlinear mechanism for switching between locomotion patterns. In this paper, we reproduced a quadruped locomotion pattern, gallop, using a central pattern generator (CPG) hardware network based on the abelian group Z4×Z2, originally proposed by Golubitsky et al. We have already used the network to generate three locomotion patterns, walk, trot, and bound, by controlling the voltage, EMLR, inputted to all CPGs which acts as a signal from the midbrain locomotor region (MLR). In order to generate the gallop and canter patterns, we first analyzed the network symmetry using group theory. Based on the results of the group theory analysis, we desymmetrized the contralateral couplings of the CPG network using a new parameter in addition to EMLR, because, whereas the walk, trot, and bound patterns were able to be generated from the spatio-temporal symmetry of the product group Z4×Z2, the gallop and canter patterns were not. As a result, using a constant element $hat{kappa}$ on Z2, the gallop and canter locomotion patterns were generated by the network on ${f Z}_4+hat{kappa}{f Z}_4$, and actually in this paper, the gallop locomotion pattern was generated on the actual circuit.

  • MinDoS: A Priority-Based SDN Safe-Guard Architecture for DoS Attacks

    Tao WANG  Hongchang CHEN  Chao QI  

     
    PAPER-Information Network

      Pubricized:
    2018/05/02
      Vol:
    E101-D No:10
      Page(s):
    2458-2464

    Software-defined networking (SDN) has rapidly emerged as a promising new technology for future networks and gained considerable attention from both academia and industry. However, due to the separation between the control plane and the data plane, the SDN controller can easily become the target of denial-of service (DoS) attacks. To mitigate DoS attacks in OpenFlow networks, our solution, MinDoS, contains two key techniques/modules: the simplified DoS detection module and the priority manager. The proposed architecture sends requests into multiple buffer queues with different priorities and then schedules the processing of these flow requests to ensure better controller protection. The results show that MinDoS is effective and adds only minor overhead to the entire SDN/OpenFlow infrastructure.

  • DCD-Based Branch and Bound Detector with Reduced Complexity for MIMO Systems

    Zhi QUAN  Ting TIAN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/04/09
      Vol:
    E101-B No:10
      Page(s):
    2230-2238

    In many communications applications, maximum-likelihood decoding reduces to solving an integer least-squares problem, which is NP-hard in the worst case. It has recently been shown that over a wide range of dimensions and SNRs, the branch and bound (BB) algorithm can be used to find the exact solution with an expected complexity that is roughly cubic in the dimension of the problem. However, the computational complexity becomes prohibitive if the SNR is too low and/or the dimension of the problem is too large. The dichotomous coordinate descent (DCD) algorithm provides low complexity, but its detection performance is not as good as that of the BB detector. Two methods are developed to bound the optimal detector cost to reduce the complexity of BB in this paper. These methods are DCD-based detectors for MIMO and multiuser detection in the scenario of a large number of transmitting antennas/users. First, a combined detection technique based on the BB and DCD algorithms is proposed. The technique maintains the advantages of both algorithms and achieves a good trade-off between performance and complexity compared to using only the BB or DCD algorithm. Second, since the first feasible solution obtained from the BB search is the solution of the decorrelating decision feedback (DF) method and because DCD results in better accuracy than the decorrelating DF solution, we propose that the first feasible solution of the BB algorithm be obtained by the box-constrained DCD algorithm rather than the decorrelating DF detector. This method improves the precision of the initial solution and identifies more branches that can be eliminated from the search tree. The results show that the DCD-based BB detector provides optimal detection with reduced worst-case complexity compared to that of the decorrelating DF-based BB detector.

  • Generic Constructions for Fully Secure Revocable Attribute-Based Encryption

    Kotoko YAMADA  Nuttapong ATTRAPADUNG  Keita EMURA  Goichiro HANAOKA  Keisuke TANAKA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1456-1472

    Attribute-based encryption (ABE), a cryptographic primitive, realizes fine-grained access control. Because of its attractive functionality, many systems based on ABE have been constructed to date. In such cryptographic systems, revocation functionality is indispensable to handle withdrawal of users, secret key exposure, and others. Although many ABE schemes with various functionalities have been proposed, only a few of these are revocable ABE (RABE). In this paper, we propose two generic constructions of RABE from ABE. Our first construction employs the pair encoding framework (Attrapadung, EUROCRYPT 2014), and combines identity-based revocation and ABE via the generic conjunctive conversion of Attrapadung and Yamada (CT-RSA 2015). Our second construction converts ABE to RABE directly when ABE supports Boolean formulae. Because our constructions preserve functionalities of the underlying ABE, we can instantiate various fully secure RABE schemes for the first time, e.g., supporting regular languages, with unbounded attribute size and policy structure, and with constant-size ciphertext and secret key.

  • Designing Coded Aperture Camera Based on PCA and NMF for Light Field Acquisition

    Yusuke YAGI  Keita TAKAHASHI  Toshiaki FUJII  Toshiki SONODA  Hajime NAGAHARA  

     
    PAPER

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2190-2200

    A light field, which is often understood as a set of dense multi-view images, has been utilized in various 2D/3D applications. Efficient light field acquisition using a coded aperture camera is the target problem considered in this paper. Specifically, the entire light field, which consists of many images, should be reconstructed from only a few images that are captured through different aperture patterns. In previous work, this problem has often been discussed from the context of compressed sensing (CS), where sparse representations on a pre-trained dictionary or basis are explored to reconstruct the light field. In contrast, we formulated this problem from the perspective of principal component analysis (PCA) and non-negative matrix factorization (NMF), where only a small number of basis vectors are selected in advance based on the analysis of the training dataset. From this formulation, we derived optimal non-negative aperture patterns and a straight-forward reconstruction algorithm. Even though our method is based on conventional techniques, it has proven to be more accurate and much faster than a state-of-the-art CS-based method.

  • Free-Space Optical Systems over Correlated Atmospheric Fading Channels: Spatial Diversity or Multihop Relaying?

    Phuc V. TRINH  Thanh V. PHAM  Anh T. PHAM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    2033-2046

    Both spatial diversity and multihop relaying are considered to be effective methods for mitigating the impact of atmospheric turbulence-induced fading on the performance of free-space optical (FSO) systems. Multihop relaying can significantly reduce the impact of fading by relaying the information over a number of shorter hops. However, it is not feasible or economical to deploy relays in many practical scenarios. Spatial diversity could substantially reduce the fading variance by introducing additional degrees of freedom in the spatial domain. Nevertheless, its superiority is diminished when the fading sub-channels are correlated. In this paper, our aim is to study the fundamental performance limits of spatial diversity suffering from correlated Gamma-Gamma (G-G) fading channels in multihop coherent FSO systems. For the performance analysis, we propose to approximate the sum of correlated G-G random variables (RVs) as a G-G RV, which is then verified by the Kolmogorov-Smirnov (KS) goodness-of-fit statistical test. Performance metrics, including the outage probability and the ergodic capacity, are newly derived in closed-form expressions and thoroughly investigated. Monte-Carlo (M-C) simulations are also performed to validate the analytical results.

  • A Propagation Method for Multi Object Tracklet Repair

    Nii L. SOWAH  Qingbo WU  Fanman MENG  Liangzhi TANG  Yinan LIU  Linfeng XU  

     
    LETTER-Pattern Recognition

      Pubricized:
    2018/05/29
      Vol:
    E101-D No:9
      Page(s):
    2413-2416

    In this paper, we improve upon the accuracy of existing tracklet generation methods by repairing tracklets based on their quality evaluation and detection propagation. Starting from object detections, we generate tracklets using three existing methods. Then we perform co-tracklet quality evaluation to score each tracklet and filtered out good tracklet based on their scores. A detection propagation method is designed to transfer the detections in the good tracklets to the bad ones so as to repair bad tracklets. The tracklet quality evaluation in our method is implemented by intra-tracklet detection consistency and inter-tracklet detection completeness. Two propagation methods; global propagation and local propagation are defined to achieve more accurate tracklet propagation. We demonstrate the effectiveness of the proposed method on the MOT 15 dataset

  • Parameterized Algorithms to Compute Ising Partition Function

    Hidefumi HIRAISHI  Hiroshi IMAI  Yoichi IWATA  Bingkai LIN  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1398-1403

    Computing the partition function of the Ising model on a graph has been investigated from both sides of computer science and statistical physics, with producing fertile results of P cases, FPTAS/FPRAS cases, inapproximability and intractability. Recently, measurement-based quantum computing as well as quantum annealing open up another bridge between two fields by relating a tree tensor network representing a quantum graph state to a rank decomposition of the graph. This paper makes this bridge wider in both directions. An $O^*(2^{ rac{omega}{2} bw(G)})$-time algorithm is developed for the partition function on n-vertex graph G with branch decomposition of width bw(G), where O* ignores a polynomial factor in n and ω is the matrix multiplication parameter less than 2.37287. Related algorithms of $O^*(4^{rw( ilde{G})})$ time for the tree tensor network are given which are of interest in quantum computation, given rank decomposition of a subdivided graph $ ilde{G}$ with width $rw( ilde{G})$. These algorithms are parameter-exponential, i.e., O*(cp) for constant c and parameter p, and such an algorithm is not known for a more general case of computing the Tutte polynomial in terms of bw(G) (the current best time is O*(min{2n, bw(G)O(bw(G))})) with a negative result in terms of the clique-width, related to the rank-width, under ETH.

  • On Aggregating Two Metrics with Relaxed Triangle Inequalities by the Weighted Harmonic Mean

    Toshiya ITOH  Yoshinori TAKEI  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1404-1411

    An important problem in mathematics and data science, given two or more metric spaces, is obtaining a metric of the product space by aggregating the source metrics using a multivariate function. In 1981, Borsík and Doboš solved the problem, and much progress has subsequently been made in generalizations of the problem. The triangle inequality is a key property for a bivariate function to be a metric. In the metric aggregation, requesting the triangle inequality of the resulting metric imposes the subadditivity on the aggregating function. However, in some applications, such as the image matching, a relaxed notion of the triangle inequality is useful and this relaxation may enlarge the scope of the aggregators to include some natural superadditive functions such as the harmonic mean. This paper examines the aggregation of two semimetrics (i.e. metrics with a relaxed triangle inequality) by the harmonic mean is studied and shows that such aggregation weakly preserves the relaxed triangle inequalities. As an application, the paper presents an alternative simple proof of the relaxed triangle inequality satisfied by the robust Jaccard-Tanimoto set dissimilarity, which was originally shown by Gragera and Suppakitpaisarn in 2016.

  • Information Delivery Delay Reduction by Relay-Assisted Broadcast Transmission for ITS V2V Communications

    Le Tien TRIEN  Yasushi YAMAO  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1290-1297

    V2V broadcast communication is not only promising for safety driving assistance but also enhancing automated driving ability by sharing information of vehicle moving behavior with other vehicles. However, an important issue is how to reduce information delivery delay and achieve dependable communication that is essential for automated vehicle control by machine. Since radio propagation often exhibits fading and shadowing on the road, V2V packet error happens probabilistically. Although repeated transmission method can enhance reliability of broadcast transmission, information delivery delay significantly increases as packet reception rate decreases. In order to reduce the delay, a relay-assisted broadcast transmission scheme is employed in this paper. The scheme can improve packet reception rate by path diversity and remarkably reduce average delivery delay due to repeated transmission. Performance with roadside relay stations considering urban environment with multiple intersections is evaluated through large-scale network simulation. The obtained results show that the average delivery delay is remarkably reduced by the relay-assist scheme to less than 20ms, which is less than a quarter of the direct V2V communication.

  • Rep-Cubes: Dissection of a Cube into Nets

    Dawei XU  Jinfeng HUANG  Yuta NAKANE  Tomoo YOKOYAMA  Takashi HORIYAMA  Ryuhei UEHARA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1420-1430

    Last year, a new notion of rep-cube was proposed. A rep-cube is a polyomino that is a net of a cube, and it can be divided into some polyominoes such that each of them can be folded into a cube. This notion was inspired by the notions of polyomino and rep-tile, which were introduced by Solomon W. Golomb. It was proved that there are infinitely many distinct rep-cubes. In this paper, we investigate this new notion and show further results.

2701-2720hit(22683hit)