The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2761-2780hit(22683hit)

  • Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field

    Yuta KODERA  Takeru MIYAZAKI  Md. Al-Amin KHANDAKER  Md. Arshad ALI  Takuya KUSAKA  Yasuyuki NOGAMI  Satoshi UEHARA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1525-1536

    The authors have proposed a multi-value sequence called an NTU sequence which is generated by a trace function and the Legendre symbol over a finite field. Most of the properties for NTU sequence such as period, linear complexity, autocorrelation, and cross-correlation have been theoretically shown in our previous work. However, the distribution of digit patterns, which is one of the most important features for security applications, has not been shown yet. In this paper, the distribution has been formulated with a theoretic proof by focusing on the number of 0's contained in the digit pattern.

  • Variational-Bayesian Single-Image Devignetting

    Motoharu SONOGASHIRA  Masaaki IIYAMA  Michihiko MINOH  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2018/06/18
      Vol:
    E101-D No:9
      Page(s):
    2368-2380

    Vignetting is a common type of image degradation that makes peripheral parts of an image darker than the central part. Single-image devignetting aims to remove undesirable vignetting from an image without resorting to calibration, thereby providing high-quality images required for a wide range of applications. Previous studies into single-image devignetting have focused on the estimation of vignetting functions under the assumption that degradation other than vignetting is negligible. However, noise in real-world observations remains unremoved after inversion of vignetting, and prevents stable estimation of vignetting functions, thereby resulting in low quality of restored images. In this paper, we introduce a methodology of image restoration based on variational Bayes (VB) to devignetting, aiming at high-quality devignetting in the presence of noise. Through VB inference, we jointly estimate a vignetting function and a latent image free from both vignetting and noise, using a general image prior for noise removal. Compared with state-of-the-art methods, the proposed VB approach to single-image devignetting maintains effectiveness in the presence of noise, as we demonstrate experimentally.

  • Attribute-Based Encryption for Range Attributes

    Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Kazuto OGAWA  Go OHTAKE  Hajime WATANABE  Shota YAMADA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1440-1455

    Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where access control mechanisms based on attributes and policies are possible. In conventional ABE, attributes are specified as strings. However, there are certain applications where it is useful to specify attributes as numerical values and consider a predicate that determines if a certain numerical range would include a certain value. Examples of these types of attributes include time, position coordinate, person's age, rank, identity, and so on. In this paper, we introduce ABE for boolean formulae over Range Membership (ABE-RM). We show generic methods to convert conventional ABE to ABE-RM. Our generic conversions are efficient as they introduce only logarithmic overheads (in key and ciphertext sizes), as opposed to trivial methods, which would pose linear overheads. By applying our conversion to previous ABE schemes, we obtain new efficient and expressive ABE-RM schemes. Previous works that considered ABE with range attributes are specific and can only deal with either a single relation of range membership (Paterson and Quaglia at SCN'10, and Kasamatsu et al. at SCN'12), or limited classes of policies, namely, only AND-gates of range attributes (Shi et al. at IEEE S&P'07, and some subsequent work). Our schemes are generic and can deal with expressive boolean formulae.

  • A Study on Loop Gain Measurement Method Using Output Impedance in DC-DC Buck Converter

    Nobukazu TSUKIJI  Yasunori KOBORI  Haruo KOBAYASHI  

     
    PAPER-Energy in Electronics Communications

      Pubricized:
    2018/02/23
      Vol:
    E101-B No:9
      Page(s):
    1940-1948

    We propose a method to derive the loop gain from the open-loop and closed-loop output impedances in a dc-dc buck converter with voltage mode and current mode controls. This enables the loop gain to be measured without injecting a signal into the feedback loop, i.e. without breaking the feedback loop; hence the proposed method can be applied to the control circuits implemented on an IC. Our simulation and experiment show that the loop gain determined by the proposed method closely matches that yielded by the conventional method, which has to break the feedback loop. These results confirm that the proposed method can accurately estimate the phase margin.

  • Comfortable Intelligence for Evaluating Passenger Characteristics in Autonomous Wheelchairs

    Taishi SAWABE  Masayuki KANBARA  Norihiro HAGITA  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1308-1316

    In recent years, autonomous driving technologies are being developed for vehicles and personal mobility devices including golf carts and autonomous wheelchairs for various use cases, not only outside areas but inside areas like shopping malls, hospitals and airpots. The main purpose of developing these autonomous vehicles is to avoid the traffic accidents caused by human errors, to assist people with walking, and to improve human comfort by relieving them from driving. Most relevant research focuses on the efficiency and safety of autonomous driving, however, in order to use by the widespread of people in the society, it is important to consider passenger comfort inside vehicles as well as safety and efficiency. Therefore, in this work, we emphasize the importance of considering passenger comfort in designing the control loop of autonomous navigation for the concept of comfortable intelligence in the future autonomous mobility. Moreover, passenger characteristics, in terms of ride comfort in an autonomous vehicle, have not been investigated with regard to safety and comfort, depending on each passenger's driving experience, habits, knowledge, personality, and preference. There are still few studies on the optimization of autonomous driving control reflecting passenger characteristics and different stress factors during the ride. In this study, passenger stress characteristics with different stress factors were objectively analyzed using physiological indices (heart rate and galvanic skin response sensors) during autonomous wheelchair usages. Two different experimental results from 12 participants suggest that there are always at least two types of passengers: one who experiences stress and the other who does not, depending on the stress factors considered. Moreover, with regard to the classification result for the stress reduction method, there are two types of passenger groups, for whom the solution method is, respectively, either effective or ineffective.

  • Depth Two (n-2)-Majority Circuits for n-Majority

    Kazuyuki AMANO  Masafumi YOSHIDA  

     
    LETTER

      Vol:
    E101-A No:9
      Page(s):
    1543-1545

    We present an explicit construction of a MAJn-2 °MAJn-2 circuit computing MAJn for every odd n≥7. This gives a partial solution to an open problem by Kulikov and Podolskii (Proc. of STACS 2017, Article No.49).

  • A Fused Continuous Floating-Point MAC on FPGA

    Min YUAN  Qianjian XING  Zhenguo MA  Feng YU  Yingke XU  

     
    LETTER-Circuit Theory

      Vol:
    E101-A No:9
      Page(s):
    1594-1598

    In this letter, we present a novel single-precision floating-point multiply-accumulator (FNA-MAC) to achieve lower hardware resource, reduced computing latency and improved computing accuracy for continuous dot product operations. By further fusing the normalization and alignment in the traditional FMA algorithm, the proposed architecture eliminates the first N-1 normalization and rounding operations for an N-point dot product, and preserves the precision of interim results in a significant bit size that is twice of that in the traditional methods. The normalization and rounding of the final result is processed at the cost of consuming an additional multiply-add operation. The simulation results show that the improvement in computational accuracy is significant. Meanwhile, when comparing to a recently published FMA design, the proposed FNA-MAC can reduce the slice look-up table/flip-flop resource and computing latency by a fact of 18%, 33.3%, respectively.

  • Inserting Layer-5 to Provide Applications with Richer Functions through Common API

    Hiroki WATANABE  Takao KONDO  Kunitake KANEKO  Fumio TERAOKA  

     
    PAPER-Network

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    1967-1981

    Recently, application demands placed on the network have become more multifaceted. Highly functional application-to-application communication services such as bandwidth aggregation, fault tolerant communication, and delay/disruption tolerant networking (DTN) were developed independently in the network layer, the transport layer, and the application layer. As a result, protocol layering has become complicated. This paper proposes to insert Layer-5 (L5) between the application layer and the transport layer to separate communication policies and communication mechanisms to make protocol layering clearer. The transport layer (L4) provides end-to-end communication mechanisms such as reliable byte stream while L5 realizes communication policies such as bandwidth aggregation by combining the communication mechanisms in L4. This paper proposes five types of L5-paths as communication policies: (1) the L5 bundled path for bandwidth aggregation or fault tolerant communication, (2) the L5 spatially-spliced path for communication with middleboxes, (3) the L5 temporally-spliced path for DTN, (4) the L5 spliced-bundled path, and (5) the L5 bundled over spatially-spliced path. An application can select and use an appropriate L5-path depending on the network circumstances through a common API. A prototype of L5 is implemented in the Linux user space as a library to make deployment and maintenance easier. An evaluation shows that establishment time of L5-paths is short enough and performance of L5-paths is comparable or superior to existing technologies.

  • Data Recovery Aware Garbage Collection Mechanism in Flash-Based Storage Devices

    Joon-Young PAIK  Rize JIN  Tae-Sun CHUNG  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2404-2408

    In terms of system reliability, data recovery is a crucial capability. The lack of data recovery leads to the permanent loss of valuable data. This paper aims at improving data recovery in flash-based storage devices where extremely poor data recovery is shown. For this, we focus on garbage collection that determines the life span of data which have high possibility of data recovery requests by users. A new garbage collection mechanism with awareness of data recovery is proposed. First, deleted or overwritten data are categorized into shallow invalid data and deep invalid data based on the possibility of data recovery requests. Second, the proposed mechanism selects victim area for reclamation of free space, considering the shallow invalid data that have the high possibility of data recovery requests. Our proposal prohibits more shallow invalid data from being eliminated during garbage collections. The experimental results show that our garbage collection mechanism can improve data recovery with minor performance degradation.

  • Coding Theoretic Construction of Quantum Ramp Secret Sharing

    Ryutaroh MATSUMOTO  

     
    PAPER-Coding Theory

      Vol:
    E101-A No:8
      Page(s):
    1215-1222

    We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Necessary and sufficient conditions for qualified sets and forbidden sets are given in terms of combinatorial properties of nested linear codes. An algebraic geometric construction for quantum secret sharing is also given.

  • Winding Ratio Design of Transformer in Equivalent Circuit of Circular Patch Array Absorber

    Ryosuke SUGA  Tomohiko NAKAMURA  Daisuke KITAHARA  Kiyomichi ARAKI  Osamu HASHIMOTO  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    651-654

    An equivalent circuit of a circular patch array absorber has been proposed, however the method to identify a winding ratio of a transformer in its circuit have never been reported. In this paper, it is indicated that the ratio is proportionate to the area ratio between patch and unit cell of the absorber, and the design method of the winding ratio is proposed. The winding ratio derived by the proposed method is agreed well with that by using electromagnetic simulator within 3% error. Moreover, the operating frequency and 15 dB bandwidth of the fabricated absorber designed by proposed method are agreed with those derived by the circuit simulation within 0.4% and 0.1% errors. Thus the validity of the proposed method is verified.

  • A Novel Recommendation Algorithm Incorporating Temporal Dynamics, Reviews and Item Correlation

    Ting WU  Yong FENG  JiaXing SANG  BaoHua QIANG  YaNan WANG  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/05/18
      Vol:
    E101-D No:8
      Page(s):
    2027-2034

    Recommender systems (RS) exploit user ratings on items and side information to make personalized recommendations. In order to recommend the right products to users, RS must accurately model the implicit preferences of each user and the properties of each product. In reality, both user preferences and item properties are changing dynamically over time, so treating the historical decisions of a user or the received comments of an item as static is inappropriate. Besides, the review text accompanied with a rating score can help us to understand why a user likes or dislikes an item, so temporal dynamics and text information in reviews are important side information for recommender systems. Moreover, compared with the large number of available items, the number of items a user can buy is very limited, which is called the sparsity problem. In order to solve this problem, utilizing item correlation provides a promising solution. Although famous methods like TimeSVD++, TopicMF and CoFactor partially take temporal dynamics, reviews and correlation into consideration, none of them combine these information together for accurate recommendation. Therefore, in this paper we propose a novel combined model called TmRevCo which is based on matrix factorization. Our model combines the dynamic user factor of TimeSVD++ with the hidden topic of each review text mined by the topic model of TopicMF through a new transformation function. Meanwhile, to support our five-scoring datasets, we use a more appropriate item correlation measure in CoFactor and associate the item factors of CoFactor with that of matrix factorization. Our model comprehensively combines the temporal dynamics, review information and item correlation simultaneously. Experimental results on three real-world datasets show that our proposed model leads to significant improvement compared with the baseline methods.

  • DOA Estimation of Quasi-Stationary Signals Exploiting Virtual Extension of Coprime Array Imbibing Difference and Sum Co-Array

    Tarek Hasan AL MAHMUD  Zhongfu YE  Kashif SHABIR  Yawar Ali SHEIKH  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1876-1883

    Using local time frames to treat non-stationary real world signals as stationary yields Quasi-Stationary Signals (QSS). In this paper, direction of arrival (DOA) estimation of uncorrelated non-circular QSS is analyzed by applying a novel technique to achieve larger consecutive lags using coprime array. A scheme of virtual extension of coprime array is proposed that exploits the difference and sum co-array which can increase consecutive co-array lags in remarkable number by using less number of sensors. In the proposed method, cross lags as well as self lags are exploited for virtual extension of co-arrays both for differences and sums. The method offers higher degrees of freedom (DOF) with a larger number of non-negative consecutive lags equal to MN+2M+1 by using only M+N-1 number of sensors where M and N are coprime with congenial interelement spacings. A larger covariance matrix can be achieved by performing covariance like computations with the Khatri-Rao (KR) subspace based approach which can operate in undetermined cases and even can deal with unknown noise covariances. This paper concentrates on only non-negative consecutive lags and subspace based method like Multiple Signal Classification (MUSIC) based approach has been executed for DOA estimation. Hence, the proposed method, named Virtual Extension of Coprime Array imbibing Difference and Sum (VECADS), in this work is promising to create larger covariance matrix with higher DOF for high resolution DOA estimation. The coprime distribution yielded by the proposed approach can yield higher resolution DOA estimation while avoiding the mutual coupling effect. Simulation results demonstrate its effectiveness in terms of the accuracy of DOA estimation even with tightly aligned sources using fewer sensors compared with other techniques like prototype coprime, conventional coprime, Coprime Array with Displaced Subarrays (CADiS), CADiS after Coprime Array with Compressed Inter-element Spacing (CACIS) and nested array seizing only difference co-array.

  • Power Allocation for Zero-Forcing Strategy in Two-User X Channel

    Xianglan JIN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1916-1922

    In an X channel, multiple transmitters transmit independent signals to different receivers. Separate zero-forcing (ZF) precoding is used at transmitters in the two-user X channel with two transmitters and two receivers. A closed-form optimal power allocation is derived under the sum power constraint (SPC) to maximize the squared minimum distance. The ZF strategy with optimal power allocation achieves a significant signal to noise ratio (SNR) improvement. Under the individual power constraint (IPC), a suboptimal power allocation that achieves better performance compared to the existing algorithms is also proposed.

  • Effects of Finite Superstrate and Asymmetrical Ground on High Gain Superstrate Antenna

    Jae-Gon LEE  Taek-Sun KWON  Jeong-Hae LEE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/02/16
      Vol:
    E101-B No:8
      Page(s):
    1884-1890

    In this paper, we present the effects of finite superstrates and asymmetrical grounds on the performance of high gain superstrate antennas. First, when the source of a superstrate antenna is located at an edge of a ground plane, that is, an asymmetric ground plane, the gain of the superstrate antenna can be made to match the gain of the superstrate antenna with a symmetrical ground plane using the PEC (E-plane asymmetric) or the AMC wall (H-plane asymmetric) near the edge. Second, the gain of the superstrate antenna, which has a ground plane with dimensions sufficiently close to infinite, is found to be roughly proportional to the reflection magnitude of a partially reflective surface (PRS). It is found that when the square ground size has a finite dimension of two wavelengths or less, the reflection magnitude of the PRS should have the optimum value for achieving maximum gain. Finally, the gain of the superstrate antenna is studied when the ground plane differs from a PRS. For the above three cases, the performances of the superstrate antenna are verified and compared by analysis, full-wave simulation, and measurement.

  • Averaging Area of Incident Power Density for Human Exposure from Patch Antenna Arrays

    Daisuke FUNAHASHI  Takahiro ITO  Akimasa HIRATA  Takahiro IYAMA  Teruo ONISHI  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    644-646

    This study discusses an area-averaged incident power density to estimate surface temperature elevation from patch antenna arrays with 4 and 9 elements at the frequencies above 10 GHz. We computationally demonstrate that a smaller averaging area (1 cm2) of power density should be considered at the frequency of 30 GHz or higher compared with that at lower frequencies (4 cm2).

  • Binary Sequence Pairs of Period pm-1 with Optimal Three-Level Correlation

    Lianfei LUO  Wenping MA  Feifei ZHAO  

     
    LETTER-Information Theory

      Vol:
    E101-A No:8
      Page(s):
    1263-1266

    Let Fpm be the field of pm elements where p is an odd prime. In this letter, binary sequence pairs of period N=pm-1 are presented, where sequences are generated from the polynomial x2-c for any c Fpm{0}. The cross-correlation values of sequence pairs are completely determined, our results show that those binary sequence pairs have optimal three-level correlation.

  • Safety Technologies in Autonomous Decentralized Railway Control System and its Future Studies Open Access

    Shinichi RYOKI  Takashi KUNIFUJI  Toshihiro ITOH  

     
    INVITED PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1768-1774

    Along with the sophistication of society, the requirements for infrastructure systems are also becoming more sophisticated. Conventionally, infrastructure systems have been accepted if they were safe and stable, but nowadays they are required for serviceability as a matter of course. For this reason, not only the expansion of the scope of the control system but also the integration with the information service system has been frequently carried out. In this paper, we describe safety technology based on autonomous decentralized technology as one of the measures to secure safety in a control system integrating such information service functions. And we propose its future studies.

  • An Emotion Similarity Based Severity Prediction of Software Bugs: A Case Study of Open Source Projects

    Geunseok YANG  Tao ZHANG  Byungjeong LEE  

     
    PAPER-Software Engineering

      Pubricized:
    2018/05/02
      Vol:
    E101-D No:8
      Page(s):
    2015-2026

    Many software development teams usually tend to focus on maintenance activities in general. Recently, many studies on bug severity prediction have been proposed to help a bug reporter determine severity. But they do not consider the reporter's expression of emotion appearing in the bug report when they predict the bug severity level. In this paper, we propose a novel approach to severity prediction for reported bugs by using emotion similarity. First, we do not only compute an emotion-word probability vector by using smoothed unigram model (UM), but we also use the new bug report to find similar-emotion bug reports with Kullback-Leibler divergence (KL-divergence). Then, we introduce a new algorithm, Emotion Similarity (ES)-Multinomial, which modifies the original Naïve Bayes Multinomial algorithm. We train the model with emotion bug reports by using ES-Multinomial. Finally, we can predict the bug severity level in the new bug report. To compare the performance in bug severity prediction, we select related studies including Emotion Words-based Dictionary (EWD)-Multinomial, Naïve Bayes Multinomial, and another study as baseline approaches in open source projects (e.g., Eclipse, GNU, JBoss, Mozilla, and WireShark). The results show that our approach outperforms the baselines, and can reflect reporters' emotional expressions during the bug reporting.

  • A Design for Testability of Open Defects at Interconnects in 3D Stacked ICs

    Fara ASHIKIN  Masaki HASHIZUME  Hiroyuki YOTSUYANAGI  Shyue-Kung LU  Zvi ROTH  

     
    PAPER-Dependable Computing

      Pubricized:
    2018/05/09
      Vol:
    E101-D No:8
      Page(s):
    2053-2063

    A design-for-testability method and an electrical interconnect test method are proposed to detect open defects occurring at interconnects among dies and input/output pins in 3D stacked ICs. As part of the design method, an nMOS and a diode are added to each input interconnect. The test method is based on measuring the quiescent current that is made to flow through an interconnect to be tested. The testability is examined both by SPICE simulation and by experimentation. The test method enabled the detection of open defects occurring at the newly designed interconnects of dies at experiments test speed of 1MHz. The simulation results reveal that an open defect generating additional delay of 279psec is detectable by the test method at a test speed of 200MHz beside of open defects that generate no logical errors.

2761-2780hit(22683hit)