The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

1381-1400hit(22683hit)

  • Difficulty-Based SPOC Video Clustering Using Video-Watching Data

    Feng ZHANG  Di LIU  Cong LIU  

     
    PAPER-Educational Technology

      Pubricized:
    2020/11/30
      Vol:
    E104-D No:3
      Page(s):
    430-440

    The pervasive application of Small Private Online Course (SPOC) provides a powerful impetus for the reform of higher education. During the teaching process, a teacher needs to understand the difficulty of SPOC videos for students in real time to be more focused on the difficulties and key points of the course in a flipped classroom. However, existing educational data mining techniques pay little attention to the SPOC video difficulty clustering or classification. In this paper, we propose an approach to cluster SPOC videos based on the difficulty using video-watching data in a SPOC. Specifically, a bipartite graph that expresses the learning relationship between students and videos is constructed based on the number of video-watching times. Then, the SimRank++ algorithm is used to measure the similarity of the difficulty between any two videos. Finally, the spectral clustering algorithm is used to implement the video clustering based on the obtained similarity of difficulty. Experiments on a real data set in a SPOC show that the proposed approach has better clustering accuracy than other existing ones. This approach facilitates teachers learn about the overall difficulty of a SPOC video for students in real time, and therefore knowledge points can be explained more effectively in a flipped classroom.

  • A Suspended Stripline Fed Dual-Polarized Open-Ended Waveguide Subarray with Metal Posts for Phased Array Antennas

    Narihiro NAKAMOTO  Toru TAKAHASHI  Toru FUKASAWA  Naofumi YONEDA  Hiroaki MIYASHITA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/09/09
      Vol:
    E104-B No:3
      Page(s):
    295-303

    This paper proposes a dual linear-polarized open-ended waveguide subarray designed for use in phased array antennas. The proposed subarray is a one-dimensional linear array that consists of open-ended waveguide antenna elements and suspended stripline feed networks to realize vertical and horizontal polarizations. The antenna includes a novel suspended stripline-to-waveguide transition that combines double- and quad-ridge waveguides to minimize the size of the transition and enhance the port isolation. Metal posts are installed on the waveguide apertures to eliminate scan-blindness. Prototype subarrays are fabricated and tested in an array of 16 subarrays. The experimental tests and numerical simulations indicate that the prototype subarray offers a low reflection coefficient of less than -11.4dB, low cross-polarization of less than -26dB, and antenna efficiency above 69% in the frequency bandwidth of 14%.

  • Noise Robust Acoustic Anomaly Detection System with Nonnegative Matrix Factorization Based on Generalized Gaussian Distribution

    Akihito AIBA  Minoru YOSHIDA  Daichi KITAMURA  Shinnosuke TAKAMICHI  Hiroshi SARUWATARI  

     
    PAPER-Speech and Hearing

      Pubricized:
    2020/12/18
      Vol:
    E104-D No:3
      Page(s):
    441-449

    We studied an acoustic anomaly detection system for equipments, where the outlier detection method based on recorded sounds is used. In a real environment, the SNR of the target sound against background noise is low, and there is the problem that it is necessary to catch slight changes in sound buried in noise. In this paper, we propose a system in which a sound source extraction process is provided at the preliminary stage of the outlier detection process. In the proposed system, nonnegative matrix factorization based on generalized Gaussian distribution (GGD-NMF) is used as a sound source extraction process. We evaluated the improvement of the anomaly detection performance in a low-SNR environment. In this experiment, SNR capable of detecting an anomaly was greatly improved by providing GGD-NMF for preprocessing.

  • A Novel Hybrid Network Model Based on Attentional Multi-Feature Fusion for Deception Detection

    Yuanbo FANG  Hongliang FU  Huawei TAO  Ruiyu LIANG  Li ZHAO  

     
    LETTER-Speech and Hearing

      Pubricized:
    2020/09/24
      Vol:
    E104-A No:3
      Page(s):
    622-626

    Speech based deception detection using deep learning is one of the technologies to realize a deception detection system with high recognition rate in the future. Multi-network feature extraction technology can effectively improve the recognition performance of the system, but due to the limited labeled data and the lack of effective feature fusion methods, the performance of the network is limited. Based on this, a novel hybrid network model based on attentional multi-feature fusion (HN-AMFF) is proposed. Firstly, the static features of large amounts of unlabeled speech data are input into DAE for unsupervised training. Secondly, the frame-level features and static features of a small amount of labeled speech data are simultaneously input into the LSTM network and the encoded output part of DAE for joint supervised training. Finally, a feature fusion algorithm based on attention mechanism is proposed, which can get the optimal feature set in the training process. Simulation results show that the proposed feature fusion method is significantly better than traditional feature fusion methods, and the model can achieve advanced performance with only a small amount of labeled data.

  • Interference Management and Resource Allocation in Multi-Channel Ad Hoc Cognitive Radio Network

    Ke WANG  Wei HENG  Xiang LI  Jing WU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/09/11
      Vol:
    E104-B No:3
      Page(s):
    320-327

    Cognitive radio network (CRN) provides an effective way of improving efficiency and flexibility in spectrum usage. Due to the coexistence of secondary user (SU) and primary user (PU), managing interference is a critical issue to be addressed if we are to reap the full benefits. In this paper, we consider the problem of joint interference management and resource allocation in a multi-channel ad hoc CRN. We formulate the problem as an overlapping coalition formation game to maximize the sum rate of SU links while guaranteeing the quality of service (QoS) of PU links. In the game, each SU link can make an autonomous decision and is allowed to participate in one or more cooperative coalitions simultaneously to maximize its payoff. To obtain the solution of the formulated game, a distributed, self-organizing algorithm is proposed for performing coalition formation. We analyze the properties of the algorithm and show that SU links can cooperate to reach a final stable coalition structure. Compared with existing approaches, the proposed scheme achieves appreciable performance improvement in terms of the sum rate of SU links, which is demonstrated by simulation results.

  • Radio Techniques Incorporating Sparse Modeling Open Access

    Toshihiko NISHIMURA  Yasutaka OGAWA  Takeo OHGANE  Junichiro HAGIWARA  

     
    INVITED SURVEY PAPER-Digital Signal Processing

      Pubricized:
    2020/09/01
      Vol:
    E104-A No:3
      Page(s):
    591-603

    Sparse modeling is one of the most active research areas in engineering and science. The technique provides solutions from far fewer samples exploiting sparsity, that is, the majority of the data are zero. This paper reviews sparse modeling in radio techniques. The first half of this paper introduces direction-of-arrival (DOA) estimation from signals received by multiple antennas. The estimation is carried out using compressed sensing, an effective tool for the sparse modeling, which produces solutions to an underdetermined linear system with a sparse regularization term. The DOA estimation performance is compared among three compressed sensing algorithms. The second half reviews channel state information (CSI) acquisitions in multiple-input multiple-output (MIMO) systems. In time-varying environments, CSI estimated with pilot symbols may be outdated at the actual transmission time. We describe CSI prediction based on sparse DOA estimation, and show excellent precoding performance when using the CSI prediction. The other topic in the second half is sparse Bayesian learning (SBL)-based channel estimation. A base station (BS) has many antennas in a massive MIMO system. A major obstacle for using the massive MIMO system in frequency-division duplex mode is an overhead for downlink CSI acquisition because we need to send many pilot symbols from the BS and to get the feedback from user equipment. An SBL-based channel estimation method can mitigate this issue. In this paper, we describe the outline of the method, and show that the technique can reduce the downlink pilot symbols.

  • Efficient Hybrid GF(2m) Multiplier for All-One Polynomial Using Varied Karatsuba Algorithm

    Yu ZHANG  Yin LI  

     
    LETTER-VLSI Design Technology and CAD

      Pubricized:
    2020/09/15
      Vol:
    E104-A No:3
      Page(s):
    636-639

    The PCHS (Park-Chang-Hong-Seo) algorithm is a varied Karatsuba algorithm (KA) that utilizes a different splitting strategy with no overlap module. Such an algorithm has been applied to develop efficient hybrid GF(2m) multipliers for irreducible trinomials and pentanomials. However, compared with KA-based hybrid multipliers, these multipliers usually match space complexity but require more gates delay. In this paper, we proposed a new design of hybrid multiplier using PCHS algorithm for irreducible all-one polynomial. The proposed scheme skillfully utilizes redundant representation to combine and simplify the subexpressions computation, which result in a significant speedup of the implementation. As a main contribution, the proposed multiplier has exactly the same space and time complexities compared with the KA-based scheme. It is the first time to show that different splitting strategy for KA also can develop the same efficient multiplier.

  • A PAPR Reduction Technique for OFDM Systems Using Phase-Changed Peak Windowing Method

    Xiaoran CHEN  Xin QIU  Xurong CHAI  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2020/09/04
      Vol:
    E104-A No:3
      Page(s):
    627-631

    Orthogonal frequency division multiplexing (OFDM) technique has been widely used in communication systems in pursuit of the most efficient utilization of spectrum. However, the increase of the number of orthogonal subcarriers will lead to the rise of the peak-to-average power ratio (PAPR) of the waveform, thus reducing the efficiency of the power amplifiers. In this letter we propose a phase-changed PAPR reduction technique based on windowing function architecture for OFDM systems. This technique is based on the idea of phase change, which makes the spectrum of output signal almost free of regrowth caused by peak clipping. It can reduce more than 28dBc adjacent channel power ratio (ACPR) compared with the traditional peak windowing clipping methods in situation that peak is maximally suppressed. This technique also has low algorithm complexity so it can be easily laid out on hardware. The proposed algorithm has been laid out on a low-cost field-programmable gate array (FPGA) to verify its effectiveness and feasibility. A 64-QAM modulated 20M LTE-A waveform is used for measurement, which has a sampling rate of 245.67M.

  • Empirical Study of Low-Latency Network Model with Orchestrator in MEC Open Access

    Krittin INTHARAWIJITR  Katsuyoshi IIDA  Hiroyuki KOGA  Katsunori YAMAOKA  

     
    PAPER-Network

      Pubricized:
    2020/09/01
      Vol:
    E104-B No:3
      Page(s):
    229-239

    The Internet of Things (IoT) with its support for cyber-physical systems (CPS) will provide many latency-sensitive services that require very fast responses from network services. Mobile edge computing (MEC), one of the distributed computing models, is a promising component of the low-latency network architecture. In network architectures with MEC, mobile devices will offload heavy computing tasks to edge servers. There exist numbers of researches about low-latency network architecture with MEC. However, none of the existing researches simultaneously satisfy the followings: (1) guarantee the latency of computing tasks and (2) implement a real system. In this paper, we designed and implemented an MEC based network architecture that guarantees the latency of offloading tasks. More specifically, we first estimate the total latency including computing and communication ones at the centralized node called orchestrator. If the estimated value exceeds the latency requirement, the task will be rejected. We then evaluated its performance in terms of the blocking probability of the tasks. To analyze the results, we compared the performance between obtained from experiments and simulations. Based on the comparisons, we clarified that the computing latency estimation accuracy is a significant factor for this system.

  • Optimization by Neural Networks in the Coherent Ising Machine and its Application to Wireless Communication Systems Open Access

    Mikio HASEGAWA  Hirotake ITO  Hiroki TAKESUE  Kazuyuki AIHARA  

     
    INVITED PAPER-Wireless Communication Technologies

      Pubricized:
    2020/09/01
      Vol:
    E104-B No:3
      Page(s):
    210-216

    Recently, new optimization machines based on non-silicon physical systems, such as quantum annealing machines, have been developed, and their commercialization has been started. These machines solve the problems by searching the state of the Ising spins, which minimizes the Ising Hamiltonian. Such a property of minimization of the Ising Hamiltonian can be applied to various combinatorial optimization problems. In this paper, we introduce the coherent Ising machine (CIM), which can solve the problems in a milli-second order, and has higher performance than the quantum annealing machines especially on the problems with dense mutual connections in the corresponding Ising model. We explain how a target problem can be implemented on the CIM, based on the optimization scheme using the mutually connected neural networks. We apply the CIM to traveling salesman problems as an example benchmark, and show experimental results of the real machine of the CIM. We also apply the CIM to several combinatorial optimization problems in wireless communication systems, such as channel assignment problems. The CIM's ultra-fast optimization may enable a real-time optimization of various communication systems even in a dynamic communication environment.

  • Partial Scrambling Overlapped Selected Mapping PAPR Reduction for OFDM/OQAM Systems

    Tomoya KAGEYAMA  Osamu MUTA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/09/24
      Vol:
    E104-B No:3
      Page(s):
    338-347

    Offset quadrature amplitude modulation based orthogonal frequency division multiplexing (OFDM/OQAM) is a promising multi-carrier modulation technique to achieve a low-sidelobe spectrum while maintaining orthogonality among subcarriers. However, a major shortcoming of OFDM/OQAM systems is the high peak-to-average power ratio (PAPR) of the transmit signal. To resolve the high-PAPR issue of traditional OFDM, a self-synchronized-scrambler-based selected-mapping has been investigated, where the transmit sequence is scrambled to reduce PAPR. In this method, the receiver must use a descrambler to recover the original data. However, the descrambling process leads to error propagation, which degrades the bit error rate (BER). As described herein, a partial scrambling overlapped selected mapping (PS-OSLM) scheme is proposed for PAPR reduction of OFDM/OQAM signals, where candidate sequences are generated using partial scrambling of original data. The best candidate, the one that minimizes the peak amplitude within multiple OFDM/OQAM symbols, is selected. In the proposed method, an overlap search algorithm for SLM is applied to reduce the PAPR of OFDM/OQAM signals. Numerical results demonstrate that our PS-OSLM proposal achieves better BER than full-scrambling overlapped SLM (FS-OSLM) in OFDM/OQAM systems while maintaining almost equivalent PAPR reduction capability as FS-OSLM and better PAPR than SLM without overlap search. Additionally, we derive a theoretical lower bound expression for OFDM/OQAM with PS-OSLM, and clarify the effectiveness of the proposed scheme.

  • Randomization Approaches for Reducing PAPR with Partial Transmit Sequence and Semidefinite Relaxation Open Access

    Hirofumi TSUDA  Ken UMENO  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2020/09/01
      Vol:
    E104-B No:3
      Page(s):
    262-276

    To reduce peak-to-average power ratio, we propose a method of choosing suitable vectors in a partial transmit sequence technique. Conventional approaches require that a suitable vector be selected from a large number of candidates. By contrast, our method does not include such a selecting procedure, and instead generates random vectors from the Gaussian distribution whose covariance matrix is a solution of a relaxed problem. The suitable vector is chosen from the random vectors. This yields lower peak-to-average power ratio than a conventional method.

  • Asymptotic Approximation Ratios for Certain Classes of Online Bin Packing Algorithms

    Hiroshi FUJIWARA  Yuta WANIKAWA  Hiroaki YAMAMOTO  

     
    PAPER

      Pubricized:
    2020/10/12
      Vol:
    E104-D No:3
      Page(s):
    362-369

    The performance of online algorithms for the bin packing problem is usually measured by the asymptotic approximation ratio. However, even if an online algorithm is explicitly described, it is in general difficult to obtain the exact value of the asymptotic approximation ratio. In this paper we show a theorem that gives the exact value of the asymptotic approximation ratio in a closed form when the item sizes and the online algorithm satisfy some conditions. Moreover, we demonstrate that our theorem serves as a powerful tool for the design of online algorithms combined with mathematical optimization.

  • Forward Regularity Preservation Property of Register Pushdown Systems

    Ryoma SENDA  Yoshiaki TAKATA  Hiroyuki SEKI  

     
    PAPER

      Pubricized:
    2020/10/02
      Vol:
    E104-D No:3
      Page(s):
    370-380

    It is well-known that pushdown systems (PDS) effectively preserve regularity. This property implies the decidability of the reachability problem for PDS and has been applied to automatic program verification. The backward regularity preservation property was also shown for an extension of PDS by adding registers. This paper aims to show the forward regularity preservation property. First, we provide a concise definition of the register model called register pushdown systems (RPDS). Second, we show the forward regularity preservation property of RPDS by providing a saturation algorithm that constructs a register automaton (RA) recognizing $post^{ast}_calP(L(calA))$ where $calA$ and $calP$ are a given RA and an RPDS, respectively, and $post^{ast}_calP$ is the forward image of the mapping induced by $calP$. We also give an example of applying the proposed algorithm to malware detection.

  • A Note on Enumeration of 3-Edge-Connected Spanning Subgraphs in Plane Graphs

    Yasuko MATSUI  Kenta OZEKI  

     
    LETTER

      Pubricized:
    2020/10/07
      Vol:
    E104-D No:3
      Page(s):
    389-391

    This paper deals with the problem of enumerating 3-edge-connected spanning subgraphs of an input plane graph. In 2018, Yamanaka et al. proposed two enumeration algorithms for such a problem. Their algorithm generates each 2-edge-connected spanning subgraph of a given plane graph with n vertices in O(n) time, and another one generates each k-edge-connected spanning subgraph of a general graph with m edges in O(mT) time, where T is the running time to check the k-edge connectivity of a graph. This paper focuses on the case of the 3-edge-connectivity in a plane graph. We give an algorithm which generates each 3-edge-connected spanning subgraph of the input plane graph in O(n2) time. This time complexity is the same as the algorithm by Yamanaka et al., but our algorithm is simpler than theirs.

  • On the Separating Redundancy of Ternary Golay Codes

    Haiyang LIU  Lianrong MA  Hao ZHANG  

     
    LETTER-Coding Theory

      Pubricized:
    2020/09/17
      Vol:
    E104-A No:3
      Page(s):
    650-655

    Let G11 (resp., G12) be the ternary Golay code of length 11 (resp., 12). In this letter, we investigate the separating redundancies of G11 and G12. In particular, we determine the values of sl(G11) for l = 1, 3, 4 and sl(G12) for l = 1, 4, 5, where sl(G11) (resp., sl(G12)) is the l-th separating redundancy of G11 (resp., G12). We also provide lower and upper bounds on s2(G11), s2(G12), and s3(G12).

  • Constructions and Some Search Results of Ternary LRCs with d = 6 Open Access

    Youliang ZHENG  Ruihu LI  Jingjie LV  Qiang FU  

     
    LETTER-Coding Theory

      Pubricized:
    2020/09/01
      Vol:
    E104-A No:3
      Page(s):
    644-649

    Locally repairable codes (LRCs) are a type of new erasure codes designed for modern distributed storage systems (DSSs). In order to obtain ternary LRCs of distance 6, firstly, we propose constructions with disjoint repair groups and construct several families of LRCs with 1 ≤ r ≤ 6, where codes with 3 ≤ r ≤ 6 are obtained through a search algorithm. Then, we propose a new method to extend the length of codes without changing the distance. By employing the methods such as expansion and deletion, we obtain more LRCs from a known LRC. The resulting LRCs are optimal or near optimal in terms of the Cadambe-Mazumdar (C-M) bound.

  • Real-Time Distant Sound Source Suppression Using Spectral Phase Difference

    Kazuhiro MURAKAMI  Arata KAWAMURA  Yoh-ichi FUJISAKA  Nobuhiko HIRUMA  Youji IIGUNI  

     
    PAPER-Engineering Acoustics

      Pubricized:
    2020/09/24
      Vol:
    E104-A No:3
      Page(s):
    604-612

    In this paper, we propose a real-time BSS (Blind Source Separation) system with two microphones that extracts only desired sound sources. Under the assumption that the desired sound sources are close to the microphones, the proposed BSS system suppresses distant sound sources as undesired sound sources. We previously developed a BSS system that can estimate the distance from a microphone to a sound source and suppress distant sound sources, but it was not a real-time processing system. The proposed BSS system is a real-time version of our previous BSS system. To develop the proposed BSS system, we simplify some BSS procedures of the previous system. Simulation results showed that the proposed system can effectively suppress the distant source signals in real-time and has almost the same capability as the previous system.

  • Robustness of Deep Learning Models in Dermatological Evaluation: A Critical Assessment

    Sourav MISHRA  Subhajit CHAUDHURY  Hideaki IMAIZUMI  Toshihiko YAMASAKI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2020/12/22
      Vol:
    E104-D No:3
      Page(s):
    419-429

    Our paper attempts to critically assess the robustness of deep learning methods in dermatological evaluation. Although deep learning is being increasingly sought as a means to improve dermatological diagnostics, the performance of models and methods have been rarely investigated beyond studies done under ideal settings. We aim to look beyond results obtained on curated and ideal data corpus, by investigating resilience and performance on user-submitted data. Assessing via few imitated conditions, we have found the overall accuracy to drop and individual predictions change significantly in many cases despite of robust training.

  • Lightweight Operation History Graph for Traceability on Program Elements

    Takayuki OMORI  Katsuhisa MARUYAMA  Atsushi OHNISHI  

     
    PAPER-Software System

      Pubricized:
    2020/12/15
      Vol:
    E104-D No:3
      Page(s):
    404-418

    History data of edit operations are more beneficial than those stored in version control systems since they provide detailed information on how source code was changed. Meanwhile, a large number of recorded edit operations discourage developers and researchers from roughly understanding the changes. To assist with this task, it is desirable that they easily obtain traceability links for changed program elements over two source code snapshots before and after a code change. In this paper, we propose a graph representation called Operation History Graph (OHG), which presents code change information with such traceability links that are inferred from the history of edit operations. An OHG instance is generated by parsing any source code snapshot restored by edit histories and combining resultant abstract syntax trees (ASTs) into a single graph structure. To improve the performance of building graph instances, we avoided simply maintaining every program element. Any program element presenting the inner-structure of methods and non-changed elements are omitted. In addition, we adopted a lightweight static analysis for type name resolving to reduce required memory resource in the analysis while the accuracy of name resolving is preserved. Moreover, we assign a specific ID to each node and edge in the graph instance so that a part of the graph data can be separately stored and loaded on demand. These decisions make it feasible to build, manipulate, and store the graph with limited computer resources. To demonstrate the usefulness of the proposed operation history graph and verify whether detected traceability links are sufficient to reveal actual changes of program elements, we implemented tools to generate and manipulate OHG instances. The evaluation on graph generation performance shows that our tool can reduce the required computer resource as compared to another tool authors previously proposed. Moreover, the evaluation on traceability shows that OHG provides traceability links with sufficient accuracy as compared to the baseline approach using GumTree.

1381-1400hit(22683hit)