The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] drop(118hit)

1-20hit(118hit)

  • Shift Quality Classifier Using Deep Neural Networks on Small Data with Dropout and Semi-Supervised Learning

    Takefumi KAWAKAMI  Takanori IDE  Kunihito HOKI  Masakazu MURAMATSU  

     
    PAPER-Pattern Recognition

      Pubricized:
    2023/09/05
      Vol:
    E106-D No:12
      Page(s):
    2078-2084

    In this paper, we apply two methods in machine learning, dropout and semi-supervised learning, to a recently proposed method called CSQ-SDL which uses deep neural networks for evaluating shift quality from time-series measurement data. When developing a new Automatic Transmission (AT), calibration takes place where many parameters of the AT are adjusted to realize pleasant driving experience in all situations that occur on all roads around the world. Calibration requires an expert to visually assess the shift quality from the time-series measurement data of the experiments each time the parameters are changed, which is iterative and time-consuming. The CSQ-SDL was developed to shorten time consumed by the visual assessment, and its effectiveness depends on acquiring a sufficient number of data points. In practice, however, data amounts are often insufficient. The methods proposed here can handle such cases. For the cases wherein only a small number of labeled data points is available, we propose a method that uses dropout. For those cases wherein the number of labeled data points is small but the number of unlabeled data is sufficient, we propose a method that uses semi-supervised learning. Experiments show that while the former gives moderate improvement, the latter offers a significant performance improvement.

  • GPU-Accelerated Estimation and Targeted Reduction of Peak IR-Drop during Scan Chain Shifting

    Shiling SHI  Stefan HOLST  Xiaoqing WEN  

     
    PAPER-Dependable Computing

      Pubricized:
    2023/07/07
      Vol:
    E106-D No:10
      Page(s):
    1694-1704

    High power dissipation during scan test often causes undue yield loss, especially for low-power circuits. One major reason is that the resulting IR-drop in shift mode may corrupt test data. A common approach to solving this problem is partial-shift, in which multiple scan chains are formed and only one group of scan chains is shifted at a time. However, existing partial-shift based methods suffer from two major problems: (1) their IR-drop estimation is not accurate enough or computationally too expensive to be done for each shift cycle; (2) partial-shift is hence applied to all shift cycles, resulting in long test time. This paper addresses these two problems with a novel IR-drop-aware scan shift method, featuring: (1) Cycle-based IR-Drop Estimation (CIDE) supported by a GPU-accelerated dynamic power simulator to quickly find potential shift cycles with excessive peak IR-drop; (2) a scan shift scheduling method that generates a scan chain grouping targeted for each considered shift cycle to reduce the impact on test time. Experiments on ITC'99 benchmark circuits show that: (1) the CIDE is computationally feasible; (2) the proposed scan shift schedule can achieve a global peak IR-drop reduction of up to 47%. Its scheduling efficiency is 58.4% higher than that of an existing typical method on average, which means our method has less test time.

  • The Effect of Channel Estimation Error on Secrecy Outage Capacity of Dual Selection in the Presence of Multiple Eavesdroppers

    Donghun LEE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/02/14
      Vol:
    E105-B No:8
      Page(s):
    969-974

    This work investigates the effect of channel estimation error on the average secrecy outage capacity of dual selection in the presence of multiple eavesdroppers. The dual selection selects a transmit antenna of Alice and Bob (i.e., user terminal) which provide the best received signal to noise ratio (SNR) using channel state information from every user terminals. Using Gaussian approximation, this paper obtains the tight analytical expression of the dual selection for the average secrecy outage capacity over channel estimation error and multiple eavesdroppers. Using asymptotic analysis, this work quantifies the high SNR power offset and the high SNR slope for the average secrecy outage capacity at high SNR.

  • Bicolored Path Embedding Problems Inspired by Protein Folding Models

    Tianfeng FENG  Ryuhei UEHARA  Giovanni VIGLIETTA  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2021/12/07
      Vol:
    E105-D No:3
      Page(s):
    623-633

    In this paper, we introduce a path embedding problem inspired by the well-known hydrophobic-polar (HP) model of protein folding. A graph is said bicolored if each vertex is assigned a label in the set {red, blue}. For a given bicolored path P and a given bicolored graph G, our problem asks whether we can embed P into G in such a way as to match the colors of the vertices. In our model, G represents a protein's “blueprint,” and P is an amino acid sequence that has to be folded to form (part of) G. We first show that the bicolored path embedding problem is NP-complete even if G is a rectangular grid (a typical scenario in protein folding models) and P and G have the same number of vertices. By contrast, we prove that the problem becomes tractable if the height of the rectangular grid G is constant, even if the length of P is independent of G. Our proof is constructive: we give a polynomial-time algorithm that computes an embedding (or reports that no embedding exists), which implies that the problem is in XP when parameterized according to the height of G. Additionally, we show that the problem of embedding P into a rectangular grid G in such a way as to maximize the number of red-red contacts is NP-hard. (This problem is directly inspired by the HP model of protein folding; it was previously known to be NP-hard if G is not given, and P can be embedded in any way on a grid.) Finally, we show that, given a bicolored graph G, the problem of constructing a path P that embeds in G maximizing red-red contacts is Poly-APX-hard.

  • On the Efficacy of Scan Chain Grouping for Mitigating IR-Drop-Induced Test Data Corruption

    Yucong ZHANG  Stefan HOLST  Xiaoqing WEN  Kohei MIYASE  Seiji KAJIHARA  Jun QIAN  

     
    PAPER-Dependable Computing

      Pubricized:
    2021/03/08
      Vol:
    E104-D No:6
      Page(s):
    816-827

    Loading test vectors and unloading test responses in shift mode during scan testing cause many scan flip-flops to switch simultaneously. The resulting shift switching activity around scan flip-flops can cause excessive local IR-drop that can change the states of some scan flip-flops, leading to test data corruption. A common approach solving this problem is partial-shift, in which multiple scan chains are formed and only one group of the scan chains is shifted at a time. However, previous methods based on this approach use random grouping, which may reduce global shift switching activity, but may not be optimized to reduce local shift switching activity, resulting in remaining high risk of test data corruption even when partial-shift is applied. This paper proposes novel algorithms (one optimal and one heuristic) to group scan chains, focusing on reducing local shift switching activity around scan flip-flops, thus reducing the risk of test data corruption. Experimental results on all large ITC'99 benchmark circuits demonstrate the effectiveness of the proposed optimal and heuristic algorithms as well as the scalability of the heuristic algorithm.

  • Evaluation of the Dynamic Characteristics of Microdroplets by Vibration

    Kosuke FUJISHIRO  Satomitsu IMAI  

     
    BRIEF PAPER

      Pubricized:
    2020/12/01
      Vol:
    E104-C No:6
      Page(s):
    210-212

    In fields such as medicine and chemistry, methods for transporting microdroplets are currently necessitated, which include the analysis of reagents, mixing, and separation. As microdroplets become finer, their movement becomes difficult to control as a result of surface tension. This has resulted in the use of an excessive amount of reagents. In this study, we evaluated the dynamic characteristics of microdroplets and the excitation force. Microdroplets were dropped onto a tilted glass substrate, and the displacement of the microdroplets was measured while changing the droplet amount, vibration frequency, and vibration direction. Moreover, the behavior of the droplet just before it started to move was observed, and the relationship between the displacement of the minute droplet and the vibration force was compared and examined.

  • A Throughput Drop Estimation Model for Concurrent Communications under Partially Overlapping Channels without Channel Bonding and Its Application to Channel Assignment in IEEE 802.11n WLAN

    Kwenga ISMAEL MUNENE  Nobuo FUNABIKI  Hendy BRIANTORO  Md. MAHBUBUR RAHMAN  Fatema AKHTER  Minoru KURIBAYASHI  Wen-Chung KAO  

     
    PAPER

      Pubricized:
    2021/02/16
      Vol:
    E104-D No:5
      Page(s):
    585-596

    Currently, the IEEE 802.11n wireless local-area network (WLAN) has been extensively deployed world-wide. For the efficient channel assignment to access-points (APs) from the limited number of partially overlapping channels (POCs) at 2.4GHz band, we have studied the throughput drop estimation model for concurrently communicating links using the channel bonding (CB). However, non-CB links should be used in dense WLANs, since the CB links often reduce the transmission capacity due to high interferences from other links. In this paper, we examine the throughput drop estimation model for concurrently communicating links without using the CB in 802.11n WLAN, and its application to the POC assignment to the APs. First, we verify the model accuracy through experiments in two network fields. The results show that the average error is 9.946% and 6.285% for the high and low interference case respectively. Then, we verify the effectiveness of the POC assignment to the APs using the model through simulations and experiments. The results show that the model improves the smallest throughput of a host by 22.195% and the total throughput of all the hosts by 22.196% on average in simulations for three large topologies, and the total throughput by 12.89% on average in experiments for two small topologies.

  • Ultra-Low Quiescent Current LDO with FVF-Based Load Transient Enhanced Circuit Open Access

    Kenji MII  Akihito NAGAHAMA  Hirobumi WATANABE  

     
    PAPER-Electronic Circuits

      Pubricized:
    2020/05/28
      Vol:
    E103-C No:10
      Page(s):
    466-471

    This paper proposes an ultra-low quiescent current low-dropout regulator (LDO) with a flipped voltage follower (FVF)-based load transient enhanced circuit for wireless sensor network (WSN). Some characteristics of an FVF are low output impedance, low voltage operation, and simple circuit configuration [1]. In this paper, we focus on the characteristics of low output impedance and low quiescent current. A load transient enhanced circuit based on an FVF circuit configuration for an LDO was designed in this study. The proposed LDO, including the new circuit, was fabricated in a 0.6 µm CMOS process. The designed LDO achieved an undershoot of 75 mV under experimental conditions of a large load transient of 100 µA to 10 mA and a current slew rate (SR) of 1 µs. The quiescent current consumed by the LDO at no load operation was 204 nA.

  • In situ Observation of Immobilization of Cytochrome c into Hydrophobic DNA Nano-Film

    Naoki MATSUDA  Hirotaka OKABE  Ayako OMURA  Miki NAKANO  Koji MIYAKE  Toshihiko NAGAMURA  Hideki KAWAI  

     
    BRIEF PAPER

      Vol:
    E102-C No:6
      Page(s):
    471-474

    Hydrophobic DNA (H-DNA) nano-film was formed as the surface modifier on a thin glass plate working as a slab optical waveguide (SOWF). Cytochrom c (cytc) molecules were immobilized from aqueous solution with direct contacting to the H-DNA nano-film for 30 minutes. From SOWG absorption spectral changes during automated solution exchange (SE) processes, it was found that about 28.1% of cytc molecules was immobilized in the H-DNA nano-film with keeping their reduction functionality by reducing reagent.

  • Proactive Eavesdropping for Suspicious Millimeter Wave Wireless Communications with Spoofing Relay

    Cheng CHEN  Haibo DAI  Tianwen GUO  Qiang YU  Baoyun WANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E102-A No:4
      Page(s):
    691-696

    This paper investigates the wireless information surveillance in a suspicious millimeter wave (mmWave) wireless communication system via the spoofing relay based proactive eavesdropping approach. Specifically, the legitimate monitor in the system acts as a relay to simultaneously eavesdrop and send spoofing signals to vary the source transmission rate. To maximize the effective eavesdropping rate, an optimization problem for both hybrid precoding design and power distribution is formulated. Since the problem is fractional and non-convex, we resort to the Dinkelbach method to equivalently reduce the original problem into a series of non-fractional problems, which is still coupling. Afterwards, based on the BCD-type method, the non-fractional problem is reduced to three subproblems with two introduced parameters. Then the GS-PDD-based algorithm is proposed to obtain the optimal solution by alternately optimizing the three subproblems and simultaneously updating the introduced parameters. Numerical results verify the effectiveness and superiority of our proposed scheme.

  • Assessment of Node- and Link- Level Blocking and Creating Cost-Effective Networks in the Era of Large Bandwidth Services Open Access

    Shuhei YAMAKAMI  Masaki NIWA  Yojiro MORI  Hiroshi HASEGAWA  Ken-ichi SATO  Fumikazu INUZUKA  Akira HIRANO  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2018/08/31
      Vol:
    E102-B No:3
      Page(s):
    510-521

    Link-level and node-level blocking in photonic networks has been intensively investigated for several decades and the C/D/C approach to OXCs/ROADMs is often emphasized. However, this understanding will have to change in the future large traffic environment. We herein elucidate that exploiting node-level blocking can yield cost-effective large-capacity wavelength routing networks in the near future. We analyze the impact of link-level and node-level blocking in terms of traffic demand and assess the fiber utilization and the amount of hardware needed to develop OXCs/ROADMs, where the necessary number of link fibers and that of WSSs are used as metrics. We clarify that the careful introduction of node-level blocking is the more effective direction in creating future cost effective networks; compared to C/D/C OXCs/ROADMs, it offers a more than 70% reduction in the number of WSSs while the fiber increment is less than ~2%.

  • In situ Observation of Capturing BTB Molecules from Aqueous Solutions with Hydrophobic DNA Nano-Film

    Naoki MATSUDA  Hirotaka OKABE  Ayako OMURA  Miki NAKANO  Koji MIYAKE  Toshihiko NAGAMURA  Hideki KAWAI  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    203-206

    Hydrophobic DNA (H-DNA) nano-film was formed on a thin glass plate of 50μm thick working as a slab optical waveguide. Bromothymol blue (BTB) molecules were immobilized from aqueous solution with direct contacting to the H-DNA nano-film for 20 minutes. From changes in absorption spectra observed with slab optical wave guide (SOWG) during automated solution exchange (SE) processes for 100 times, it was found that about 95% of bromothymol blue (BTB) molecules was immobilized in the H-DNA nano-film with keeping their functionality of color change responsible to pH change in the solution.

  • Measuring Lost Packets with Minimum Counters in Traffic Matrix Estimation

    Kohei WATABE  Toru MANO  Takeru INOUE  Kimihiro MIZUTANI  Osamu AKASHI  Kenji NAKAGAWA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/07/02
      Vol:
    E102-B No:1
      Page(s):
    76-87

    Traffic matrix (TM) estimation has been extensively studied for decades. Although conventional estimation techniques assume that traffic volumes are unchanged between origins and destinations, packets are often lost on a path due to traffic burstiness, silent failures, etc. Counting every path at every link, we could easily get the traffic volumes with their change, but this approach significantly increases the measurement cost since counters are usually implemented using expensive memory structures like a SRAM. This paper proposes a mathematical model to estimate TMs including volume changes. The method is established on a Boolean fault localization technique; the technique requires fewer counters as it simply determines whether each link is lossy. This paper extends the Boolean technique so as to deal with traffic volumes with error bounds that requires only a few counters. In our method, the estimation errors can be controlled through parameter settings, while the minimum-cost counter placement is determined with submodular optimization. Numerical experiments are conducted with real network datasets to evaluate our method.

  • Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:11
      Page(s):
    1970-1974

    This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.

  • Secrecy Throughput Analysis for Time-Switching SWIPT Networks with Full-Duplex Jamming

    Xuanxuan TANG  Wendong YANG  Yueming CAI  Weiwei YANG  Yuyang ZHANG  Xiaoli SUN  Yufeng QIAN  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E101-A No:7
      Page(s):
    1136-1140

    This paper studies the secrecy throughput performance of the three-node wireless-powered networks and proposes two secure transmission schemes, namely the half-duplex maximal ratio combining (HD&MRC) scheme and the full-duplex jamming scheme based on time switching simultaneous wireless information and power transfer (FDJ&TS-SWIPT). The closed-form expressions of the secrecy throughput are derived, and intuitive comparison of the two schemes is provided. It is illustrated that the HD&MRC scheme only applies to the low and medium signal-to-noise ratio (SNR) regime. On the contrary, the suitable SNR regime of the FDJ&TS-SWIPT is much wider. It is depicted that FDJ&TS-SWIPT combing with current passive self-interference cancellation (SIC) algorithm outperforms HD&MRC significantly, especially when a medium or high transmit SNR is provided. Numerical simulations are conducted for verifying the validity of the analysis.

  • Proactive Eavesdropping through a Third-Party Jammer

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:5
      Page(s):
    878-882

    This letter considers a legitimate proactive eavesdropping scenario, where a half-duplex legitimate monitor hires a third-party jammer for jamming the suspicious communication to improve the eavesdropping performance. The interaction between the third-party jammer and the monitor is modeled as a Stackelberg game, where the jammer moves first and sets the price for jamming the suspicious communication, and then the legitimate monitor moves subsequently and determines the requested transmit power of the jamming signals. We derive the optimal jamming price and the optimal jamming transmit power. It is shown that the proposed price-based proactive eavesdropping scheme is effective in improving the successful eavesdropping probability compared to the case without jamming. It is also shown that the proposed scheme outperforms the existing full-duplex scheme when the residual self-interference cannot be neglected.

  • Robust Secure Transmit Design for SWIPT System with Many Types of Wireless Users and Passive Eavesdropper

    Pham-Viet TUAN  Insoo KOO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    441-450

    This paper studies a simultaneous wireless information and power transfer (SWIPT) system in which the transmitter not only sends data and energy to many types of wireless users, such as multiple information decoding users, multiple hybrid power-splitting users (i.e., users with a power-splitting structure to receive both information and energy), and multiple energy harvesting users, but also prevents information from being intercepted by a passive eavesdropper. The transmitter is equipped with multiple antennas, whereas all users and the eavesdropper are assumed to be equipped with a single antenna. Since the transmitter does not have any channel state information (CSI) about the eavesdropper, artificial noise (AN) power is maximized to mask information as well as to interfere with the eavesdropper as much as possible. The non-convex optimization problem is formulated to minimize the transmit power satisfying all signal-to-interference-plus-noise (SINR) and harvested energy requirements for all users so that the remaining power for generating AN is maximized. With perfect CSI, a semidefinite relaxation (SDR) technique is applied, and the optimal solution is proven to be tight. With imperfect CSI, SDR and a Gaussian randomization algorithm are proposed to find the suboptimal solution. Finally, numerical performance with respect to the maximum SINR at the eavesdropper is determined by a Monte-Carlo simulation to compare the proposed AN scenario with a no-AN scenario, as well as to compare perfect CSI with imperfect CSI.

  • Legitimate Surveillance with a Wireless Powered Monitor in Rayleigh Fading Channels

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:1
      Page(s):
    293-297

    This letter investigates the performance of a legitimate surveillance system, where a wireless powered legitimate monitor aims to eavesdrop a suspicious communication link. Power splitting technique is adopted at the monitor for simultaneous information eavesdropping and energy harvesting. In order to maximize the successful eavesdropping probability, the power splitting ratio is optimized under the minimum harvested energy constraint. Assuming that perfect channel state information (CSI) or only the channel distribution information (CDI) is available, the closed-form maximum successful eavesdropping probability is obtained in Rayleigh fading channels. It is shown that the minimum harvested energy constraint has no impact on the eavesdropping performance if the minimum harvested energy constraint is loose. It is also shown that the eavesdropping performance loss due to partial knowledge of CSI is negligible when the eavesdropping link channel condition is much better than that of the suspicious communication link channel.

  • Joint User and Power Allocation in Underlay Cognitive Radio Networks with Multiple Primary Users' Security Constraints

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:9
      Page(s):
    2061-2064

    In this letter, we consider a cognitive radio network where multiple secondary users (SUs) share the spectrum bands with multiple primary users (PUs) who are facing security threats from multiple eavesdroppers. By adopting the PU secrecy outage constraint to protect the PUs, we optimize the joint user and power allocation for the SUs to maximize the SU ergodic transmission rate. Simulation results are presented to verify the effectiveness of the proposed algorithm. It is shown that the proposed algorithm outperforms the existing scheme, especially for a large number of PUs and a small number of SUs. It is also shown that the number of eavesdroppers has negligible impact on the performance improvement of the proposed algorithm compared to the existing scheme. In addition, it is shown that increasing the number of eavesdroppers has insignificant impact on the SU performance if the number of eavesdroppers is already large.

  • Power-Supply Rejection Model Analysis of Capacitor-Less LDO Regulator Designs

    Soyeon JOO  Jintae KIM  SoYoung KIM  

     
    PAPER-Electronic Circuits

      Vol:
    E100-C No:5
      Page(s):
    504-512

    This paper presents accurate DC and high frequency power-supply rejection (PSR) models for low drop-out (LDO) regulators using different types of active loads and pass transistors. Based on the proposed PSR model, we suggest design guidelines to achieve a high DC PSR or flat bandwidth (BW) by choosing appropriate active loads and pass transistors. Our PSR model captures the intricate interaction between the error amplifiers (EAs) and the pass devices by redefining the transfer function of the LDO topologies. The accuracy of our model has been verified through SPICE simulation and measurements. Moreover, the measurement results of the LDOs fabricated using the 0.18 µm CMOS process are consistent with the design guidelines suggested in this work.

1-20hit(118hit)