The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Z(5900hit)

661-680hit(5900hit)

  • A Note on Two Constructions of Zero-Difference Balanced Functions

    Zongxiang YI  Yuyin YU  Chunming TANG  Yanbin ZHENG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:4
      Page(s):
    680-684

    Notes on two constructions of zero-difference balanced (ZDB) functions are made in this letter. Then ZDB functions over Ze×∏ki=0 Fqi are obtained. And it shows that all the known ZDB functions using cyclotomic cosets over Zn are special cases of a generic construction. Moreover, applications of these ZDB functions are presented.

  • A Novel Radio Resource Optimization Scheme in Closed Access Femtocell Networks Based on Bat Algorithm Open Access

    I Wayan MUSTIKA  Nifty FATH  Selo SULISTYO  Koji YAMAMOTO  Hidekazu MURATA  

     
    INVITED PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    660-669

    Femtocell has been considered as a key promising technology to improve the capacity of a cellular system. However, the femtocells deployed inside a macrocell coverage are potentially suffered from excessive interference. This paper proposes a novel radio resource optimization in closed access femtocell networks based on bat algorithm. Bat algorithm is inspired by the behavior of bats in their echolocation process. While the original bat algorithm is designed to solve the complex optimization problem in continuous search space, the proposed modified bat algorithm extends the search optimization in a discrete search space which is suitable for radio resource allocation problem. The simulation results verify the convergence of the proposed optimization scheme to the global optimal solution and reveal that the proposed scheme based on modified bat algorithm facilitates the improvement of the femtocell network capacity.

  • Distributed Compressed Sensing via Generalized Approximate Message Passing for Jointly Sparse Signals

    Jingjing SI  Yinbo CHENG  Kai LIU  

     
    LETTER-Image

      Vol:
    E102-A No:4
      Page(s):
    702-707

    Generalized approximate message passing (GAMP) is introduced into distributed compressed sensing (DCS) to reconstruct jointly sparse signals under the mixed support-set model. A GAMP algorithm with known support-set is presented and the matching pursuit generalized approximate message passing (MPGAMP) algorithm is modified. Then, a new joint recovery algorithm, referred to as the joint MPGAMP algorithm, is proposed. It sets up the jointly shared support-set of the signal ensemble with the support exploration ability of matching pursuit and recovers the signals' amplitudes on the support-set with the good reconstruction performance of GAMP. Numerical investigation shows that the joint MPGAMP algorithm provides performance improvements in DCS reconstruction compared to joint orthogonal matching pursuit, joint look ahead orthogonal matching pursuit and regular MPGAMP.

  • Simple and Complete Resynchronization for Wireless Sensor Networks Open Access

    Hiromi YAGIRI  Takeshi OKADOME  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    679-689

    The methods proposed in this paper enable resynchronization when a synchronization deviation occurs in a sensor node without a beacon or an ack in a wireless sensor network under ultra-limited but stable resources such as the energy generated from tiny solar cell batteries. The method for a single-hop network is straightforward; when a receiver does not receive data, it is simply placed in recovery mode, in which the receiver sets its cycle length TB to (b±γ)T, where b is non-negative integer, 0 < γ < 1, and T is its cycle length in normal mode, and in which the receiver sets its active interval WB to a value that satisfies WB ≥ W + γT, where W is its active interval in normal mode. In contrast, a sender stays in normal mode. Resynchronization methods for linear multi-hop and tree-based multi-hop sensor networks are constructed using the method for a single-hop network. All the methods proposed here are complete because they are always able to resynchronize networks. The results of simulations based on the resynchronization methods are given and those of an experiment using actual sensor nodes with wireless modules are also presented, which show that the methods are feasible.

  • High-Frequency and Integrated Design Based on Flip-Chip Interconnection Technique (Hi-FIT) for High-Speed (>100 Gbaud) Optical Devices Open Access

    Shigeru KANAZAWA  Hiroshi YAMAZAKI  Yuta UEDA  Wataru KOBAYASHI  Yoshihiro OGISO  Johsuke OZAKI  Takahiko SHINDO  Satoshi TSUNASHIMA  Hiromasa TANOBE  Atsushi ARARATAKE  

     
    INVITED PAPER

      Vol:
    E102-C No:4
      Page(s):
    340-346

    We developed a high-frequency and integrated design based on a flip-chip interconnection technique (Hi-FIT) as a wire-free interconnection technique that provides a high modulation bandwidth. The Hi-FIT can be applied to various high-speed (>100 Gbaud) optical devices. The Hi-FIT EA-DFB laser module has a 3-dB bandwidth of 59 GHz. And with a 4-intensity-level pulse amplitude modulation (PAM) operation at 107 Gbaud, we obtained a bit-error rate (BER) of less than 3.8×10-3, which is an error-free condition, by using a 7%-overhead (OH) hard-decision forward error correction (HD-FEC) code, even after a 10-km SMF transmission. The 3-dB bandwidth of the Hi-FIT employing an InP-MZM sub-assembly was more than 67 GHz, which was the limit of our measuring instrument. We also demonstrated a 120-Gbaud rate IQ modulation.

  • Learning of Nonnegative Matrix Factorization Models for Inconsistent Resolution Dataset Analysis

    Masahiro KOHJIMA  Tatsushi MATSUBAYASHI  Hiroshi SAWADA  

     
    INVITED PAPER

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:4
      Page(s):
    715-723

    Due to the need to protect personal information and the impracticality of exhaustive data collection, there is increasing need to deal with datasets with various levels of granularity, such as user-individual data and user-group data. In this study, we propose a new method for jointly analyzing multiple datasets with different granularity. The proposed method is a probabilistic model based on nonnegative matrix factorization, which is derived by introducing latent variables that indicate the high-resolution data underlying the low-resolution data. Experiments on purchase logs show that the proposed method has a better performance than the existing methods. Furthermore, by deriving an extension of the proposed method, we show that the proposed method is a new fundamental approach for analyzing datasets with different granularity.

  • NFRR: A Novel Family Relationship Recognition Algorithm Based on Telecom Social Network Spectrum

    Kun NIU  Haizhen JIAO  Cheng CHENG  Huiyang ZHANG  Xiao XU  

     
    PAPER

      Pubricized:
    2019/01/11
      Vol:
    E102-D No:4
      Page(s):
    759-767

    There are different types of social ties among people, and recognizing specialized types of relationship, such as family or friend, has important significance. It can be applied to personal credit, criminal investigation, anti-terrorism and many other business scenarios. So far, some machine learning algorithms have been used to establish social relationship inferencing models, such as Decision Tree, Support Vector Machine, Naive Bayesian and so on. Although these algorithms discover family members in some context, they still suffer from low accuracy, parameter sensitive, and weak robustness. In this work, we develop a Novel Family Relationship Recognition (NFRR) algorithm on telecom dataset for identifying one's family members from its contact list. In telecom dataset, all attributes are divided into three series, temporal, spatial and behavioral. First, we discover the most probable places of residence and workplace by statistical models, then we aggregate data and select the top-ranked contacts as the user's intimate contacts. Next, we establish Relational Spectrum Matrix (RSM) of each user and its intimate contacts to form communication feature. Then we search the user's nearest neighbors in labelled training set and generate its Specialized Family Spectrum (SFS). Finally, we decide family relationship by comparing the similarity between RSM of intimate contacts and the SFS. We conduct complete experiments to exhibit effectiveness of the proposed algorithm, and experimental results also show that it has a lower complexity.

  • A MAC Address Routing VPN Architecture for Connecting Non-IP Wireless Sensor Networks to Data Centers

    Hiroaki HATA  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    690-698

    Most wireless networks are specified as using the data link protocol, i.e. layer 2 (L2). Recently, IoT and big data processing have promoted the use of wireless sensor networks to connect and send data to data center applications over the Internet. To do so, the implementation of an IP stack on the wireless node, or the gateway of the IP and wireless L2 network, has been proposed. Both approaches were developed to allow applications on the IP network to access L2 wireless network nodes. However, since wireless sensor networks do not require any network protocol, an IP is not essential for collecting data. Therefore, we propose a novel bridging VPN for connecting wireless networks, in which the application and wireless end nodes are not required to acknowledge an IP address or network protocol. In this way, the IP network merely serves to transport the data link frames of wireless networks. We believe that this is another style of IoT and recommend that this VPN be used as a test bed for small IoT businesses and institutions before they start to implement an IP stack on their systems.

  • On the Glide of the 3x+1 Problem

    Yuyin YU  Zongxiang YI  Chuanming TANG  Jian GAO  

     
    LETTER-Mathematical Systems Science

      Vol:
    E102-A No:3
      Page(s):
    613-615

    For any positive integer n, define an iterated function $f(n)=left{ egin{array}{ll} n/2, & mbox{ $n$ even, } 3n+1, & mbox{ $n$ odd. } end{array} ight.$ Suppose k (if it exists) is the lowest number such that fk(n)

  • Congestion Avoidance Using Multiple Virtual Networks

    Tsuyoshi OGURA  Tatsuya FUJII  

     
    PAPER-Network

      Pubricized:
    2018/08/31
      Vol:
    E102-B No:3
      Page(s):
    557-570

    If a shared IP network is to deliver large-volume streaming media content, such as real-time videos, we need a technique for explicitly setting and dynamically changing the transmission paths used to respond to the congestion situation of the network, including multi-path transmission of a single-flow, to maximize network bandwidth utilization and stabilize transmission quality. However, current technologies cannot realize flexible multi-path transmission because they require complicated algorithms for route searching and the control load for route changing is excessive. This paper proposes a scheme that realizes routing control for multi-path transmission by combining multiple virtual networks on the same physical network. The proposed scheme lowers the control load incurred in creating a detour route because routing control is performed by combining existing routing planes. In addition, our scheme simplifies route searching procedure because congestion avoidance control of multi-path transmission can be realized by the control of a single path. An experiment on the JGN-X network virtualization platform finds that while the time taken to build an inter-slice link must be improved, the time required to inspect whether each slice has virtual nodes that can be connected to the original slice and be used as a detour destination can be as short as 40 microseconds per slice even with large slices having more than 100 virtual nodes.

  • Passive Localization Algorithm for Spaceborne SAR Using NYFR and Sparse Bayesian Learning

    Yifei LIU  Yuan ZHAO  Jun ZHU  Bin TANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E102-A No:3
      Page(s):
    581-585

    A novel Nyquist Folding Receiver (NYFR) based passive localization algorithm with Sparse Bayesian Learning (SBL) is proposed to estimate the position of a spaceborne Synthetic Aperture Radar (SAR).Taking the geometry and kinematics of a satellite into consideration, this paper presents a surveillance geometry model, which formulates the localization problem into a sparse vector recovery problem. A NYFR technology is utilized to intercept the SAR signal. Then, a convergence algorithm with SBL is introduced to recover the sparse vector. Furthermore, simulation results demonstrate the availability and performance of our algorithm.

  • Induced Synchronization of Chaos-Chaos Intermittency Maintaining Asynchronous State of Chaotic Orbits by External Feedback Signals Open Access

    Sou NOBUKAWA  Haruhiko NISHIMURA  Teruya YAMANISHI  Hirotaka DOHO  

     
    PAPER-Nonlinear Problems

      Vol:
    E102-A No:3
      Page(s):
    524-531

    It is well-known that chaos synchronization in coupled chaotic systems arises from conditions with specific coupling, such as complete, phase, and generalized synchronization. Recently, several methods for controlling this chaos synchronization using a nonlinear feedback controller have been proposed. In this study, we applied a proposed reducing range of orbit feedback method to coupled cubic maps in order to control synchronization of chaos-chaos intermittency. By evaluating the system's behavior and its dependence on the feedback and coupling strength, we confirmed that synchronization of chaos-chaos intermittency could be induced using this nonlinear feedback controller, despite the fact that the asynchronous state within a unilateral attractor is maintained. In particular, the degree of synchronization is high at the edge between the chaos-chaos intermittency parameter region for feedback strength and the non-chaos-chaos intermittency region. These characteristics are largely maintained on large-scale coupled cubic maps.

  • Program File Placement Problem for Machine-to-Machine Service Network Platform Open Access

    Takehiro SATO  Eiji OKI  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    418-428

    The Machine-to-Machine (M2M) service network platform accommodates M2M communications traffic efficiently by using tree-structured networks and the computation resources deployed on network nodes. In the M2M service network platform, program files required for controlling devices are placed on network nodes, which have different amounts of computation resources according to their position in the hierarchy. The program files must be dynamically repositioned in response to service quality requests from each device, such as computation power, link bandwidth, and latency. This paper proposes a Program File Placement (PFP) method for the M2M service network platform. First, the PFP problem is formulated in the Mixed-Integer Linear Programming (MILP) approach. We prove that the decision version of the PFP problem is NP-complete. Next, we present heuristic algorithms that attain sub-optimal but attractive solutions. Evaluations show that the heuristic algorithm based on the number of devices that share a program file reduces the total number of placed program files compared to the algorithm that moves program files based on their position.

  • Modification of Velvet Noise for Speech Waveform Generation by Using Vocoder-Based Speech Synthesizer Open Access

    Masanori MORISE  

     
    LETTER-Speech and Hearing

      Pubricized:
    2018/12/05
      Vol:
    E102-D No:3
      Page(s):
    663-665

    This paper introduces a new noise generation algorithm for vocoder-based speech waveform generation. White noise is generally used for generating an aperiodic component. Since short-term white noise includes a zero-frequency component (ZFC) and inaudible components below 20 Hz, they are reduced in advance when synthesizing. We propose a new noise generation algorithm based on that for velvet noise to overcome the problem. The objective evaluation demonstrated that the proposed algorithm can reduce the unwanted components.

  • A 6th-Order Quadrature Bandpass Delta Sigma AD Modulator Using Dynamic Amplifier and Noise Coupling SAR Quantizer

    Chunhui PAN  Hao SAN  

     
    PAPER

      Vol:
    E102-A No:3
      Page(s):
    507-517

    This paper presents a 6th-order quadrature bandpass delta sigma AD modulator (QBPDSM) with 2nd-order image rejection using dynamic amplifier and noise coupling (NC) SAR quantizer embedded by passive adder for the application of wireless communication system. A novel complex integrator using dynamic amplifier is proposed to improve the energy efficiency of the QBPDSM. The NC SAR quantizer can realize an additional 2nd-order noise shaping and 2nd-order image rejection by the digital domain noise coupling technique. As a result, the 6th-order QBPDSM with 2nd-order image rejection is realized by two complex integrators using dynamic amplifier and the NC SAR quantizer. The SPICE simulation results demonstrate the feasibility of the proposed QBPDSM in 90nm CMOS technology. Simulated SNDR of 76.30dB is realized while a sinusoid -3.25dBFS input is sampled at 33.3MS/s and the bandwidth of 2.083MHz (OSR=8) is achieved. The total power consumption in the modulator is 6.74mW while the supply voltage is 1.2V.

  • Optimization of Power Allocation for Chase Combining Hybrid ARQ

    Chen JI  Juan CAO  Guo'an ZHANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    613-622

    This paper studies power allocation for Chase combining (CC) hybrid ARQ (HARQ) in block-fading channels, with causal channel state information (CSI) available both at the receiver and transmitter. A best-effort power allocation scheme is proposed to improve the average throughput of CC HARQ. The scheme is formulated as an optimization problem that, for each round, allocating the transmit power to maximize the average incremental information according to the HARQ retransmission status and CSI. By convex optimization, the solution is derived in simple analytical form. At the same time, the HARQ performance metrics including throughput and outage probability are computed by recursive numerical integral. With at most 4 transmission rounds, this best-effort method achieves about 75% of ergodic capacity in independent Rayleigh block fading channels.

  • Network Embedding with Deep Metric Learning

    Xiaotao CHENG  Lixin JI  Ruiyang HUANG  Ruifei CUI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/12/26
      Vol:
    E102-D No:3
      Page(s):
    568-578

    Network embedding has attracted an increasing amount of attention in recent years due to its wide-ranging applications in graph mining tasks such as vertex classification, community detection, and network visualization. Network embedding is an important method to learn low-dimensional representations of vertices in networks, aiming to capture and preserve the network structure. Almost all the existing network embedding methods adopt the so-called Skip-gram model in Word2vec. However, as a bag-of-words model, the skip-gram model mainly utilized the local structure information. The lack of information metrics for vertices in global network leads to the mix of vertices with different labels in the new embedding space. To solve this problem, in this paper we propose a Network Representation Learning method with Deep Metric Learning, namely DML-NRL. By setting the initialized anchor vertices and adding the similarity measure in the training progress, the distance information between different labels of vertices in the network is integrated into the vertex representation, which improves the accuracy of network embedding algorithm effectively. We compare our method with baselines by applying them to the tasks of multi-label classification and data visualization of vertices. The experimental results show that our method outperforms the baselines in all three datasets, and the method has proved to be effective and robust.

  • Low-Complexity Joint Antenna and User Selection Scheme for the Downlink Multiuser Massive MIMO System with Complexity Reduction Factors

    Aye Mon HTUN  Maung SANN MAW  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    592-602

    Multiuser massive multi-input multi-output (MU massive MIMO) is considered as a promising technology for the fifth generation (5G) of the wireless communication system. In this paper, we propose a low-complexity joint antenna and user selection scheme with block diagonalization (BD) precoding for MU massive MIMO downlink channel in the time division duplex (TDD) system. The base station (BS) is equipped with a large-scale transmit antenna array while each user is using the single receive antenna in the system. To reduce the hardware cost, BS will be implemented by limited number of radio frequency (RF) chains and BS must activate some selected transmit antennas in the BS side for data transmitting and some users' receive antennas in user side for data receiving. To achieve the reduction in the computation complexity in the antenna and user selection while maintaining the same or higher sum-rate in the system, the proposed scheme relies on three complexity reduction key factors. The first key factor is that finding the average channel gains for the transmit antenna in the BS side and the receive antenna in the user side to select the best channel gain antennas and users. The second key factor called the complexity control factor ξ(Xi) for the antenna set and the user set limitation is used to control the complexity of the brute force search. The third one is that using the assumption of the point-to-point deterministic MIMO channel model to avoid the singular value decomposition (SVD) computation in the brute force search. We show that the proposed scheme offers enormous reduction in the computation complexity while ensuring the acceptable performance in terms of total system sum-rate compared with optimal and other conventional schemes.

  • Shortcut Creation for MeNW in the Consideration of Topological Structure and Message Exchanged Open Access

    Masahiro JIBIKI  Suyong EUM  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    464-473

    This article proposes a method to improve the performance of Message Exchange Network (MeNW) which is modern data distribution network incorporating the search and obtain mechanism. We explore an idea of shortcut creation which can be widely adapted to a topological structure of various network applications. We first define a metric called Efficiency Coefficient (EC) that quantifies the performance enhancement by a shortcut creation. In the design of EC, we consider not only diameter of the topology but also the amount of messages exchanged in the network. Then, we theoretically analyze the creation of a single optimal shortcut in the system based on the performance metric. The simulation results show that the shortcut by the proposed method reduces the network resource to further 30% compared with conventional approaches.

  • Generation of Efficient Obfuscated Code through Just-in-Time Compilation

    Muhammad HATABA  Ahmed EL-MAHDY  Kazunori UEDA  

     
    LETTER-Dependable Computing

      Pubricized:
    2018/11/22
      Vol:
    E102-D No:3
      Page(s):
    645-649

    Nowadays the computing technology is going through a major paradigm shift. Local processing platforms are being replaced by physically out of reach yet more powerful and scalable environments such as the cloud computing platforms. Previously, we introduced the OJIT system as a novel approach for obfuscating remotely executed programs, making them difficult for adversaries to reverse-engineer. The system exploited the JIT compilation technology to randomly and dynamically transform the code, making it constantly changing, thereby complicating the execution state. This work aims to propose the new design iOJIT, as an enhanced approach that patches the old systems shortcomings, and potentially provides more effective obfuscation. Here, we present an analytic study of the obfuscation techniques on the generated code and the cost of applying such transformations in terms of execution time and performance overhead. Based upon this profiling study, we implemented a new algorithm to choose which obfuscation techniques would be better chosen for “efficient” obfuscation according to our metrics, i.e., less prone to security attacks. Another goal was to study the system performance with different applications. Therefore, we applied our system on a cloud platform running different standard benchmarks from SPEC suite.

661-680hit(5900hit)