The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] dual(419hit)

81-100hit(419hit)

  • Strategic Dual Image Method for Non-Axisymmetric Three-dimensional Magnetic Field Problems

    Kengo SUGAHARA  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E101-C No:1
      Page(s):
    52-55

    Strategic Dual Image method (SDI) for three-dimensional magnetic field problems is proposed. The basic idea of the SDI method is that the open boundary solution is in-between the Dirichlet and Neumann solutions. The relationship between the specific topology (e.g. sphere, and ellipsoid) of the boundary and the averaging weight has been discussed in the previous literature, however no discussions on the arbitrary topology. In this paper, combined with “the perturbation approach using equivalence theorem”, the methodology to derive the averaging weight of Dirichlet and Neumann solutions on the arbitrary topology has been proposed. Some numerical examples are also demonstrated.

  • A Spectrum Efficient Spatial Polarized QAM Modulation Scheme for Physical Layer Security in Dual-Polarized Satellite Systems

    Zhangkai LUO  Huali WANG  Huan HAO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/07/13
      Vol:
    E101-B No:1
      Page(s):
    146-153

    In this paper, a spectrum efficient spatial polarized quadrature amplitude modulation (SPQM) scheme for physical layer security in dual-polarized satellite systems is proposed, which uses the carrier's polarization state, amplitude, phase and the polarization characteristics of the transmitting beams as information bearing parameters, which can improve the transmission efficiency and enhance the transmission security at the same time. As we know, the depolarization effect is the main drawback that affects the symbol error rate performance when polarization states are used to carry information. To solve the problem, we exploit an additional degree of freedom, time, in the proposed scheme, which means that two components of the polarized signal are transmitted in turn in two symbol periods, thus they can be recovered without mutual interference. Furthermore, orthogonal polarizations of the transmitting beam are used as spatial modulation for further increasing the throughput. In addition, in order to improve the transmission security, two transmitting beams are designed to transmit the two components of the polarized signal respectively. In this way, a secure transmission link is formed from the transmitter to the receiver to prevent eavesdropping. Finally, superiorities of SPQM are validated by the theoretical analysis and simulation results in dual-polarized satellite systems.

  • A Class of Left Dihedral Codes Over Rings $mathbb{F}_q+umathbb{F}_q$

    Yuan CAO  Yonglin CAO  Jian GAO  

     
    PAPER-Coding Theory and Techniques

      Vol:
    E100-A No:12
      Page(s):
    2585-2593

    Let $mathbb{F}_q$ be a finite field of q elements, $R=mathbb{F}_q+umathbb{F}_q$ (u2=0) and D2n= be a dihedral group of order n. Left ideals of the group ring R[D2n] are called left dihedral codes over R of length 2n, and abbreviated as left D2n-codes over R. Let n be a positive factor of qe+1 for some positive integer e. In this paper, any left D2n-code over R is uniquely decomposed into a direct sum of concatenated codes with inner codes Ai and outer codes Ci, where Ai is a cyclic code over R of length n and Ci is a linear code of length 2 over a Galois extension ring of R. More precisely, a generator matrix for each outer code Ci is given. Moreover, a formula to count the number of these codes is obtained, the dual code for each left D2n-code is determined and all self-dual left D2n-codes over R are presented, respectively.

  • A SOI Multi-VDD Dual-Port SRAM Macro for Serial Access Applications

    Nobutaro SHIBATA  Mayumi WATANABE  Takako ISHIHARA  

     
    PAPER-Integrated Electronics

      Vol:
    E100-C No:11
      Page(s):
    1061-1068

    Multiport SRAMs are frequently installed in network and/or telecommunication VLSIs to implement smart functions. This paper presents a high speed and low-power dual-port (i.e., 1W+1R two-port) SRAM macro customized for serial access operations. To reduce the wasted power dissipation due to subthreshold leakage currents, the supply voltage for 10T memory cells is lowered to 1 V and a power switch is prepared for every 64 word drivers. The switch is activated with look-ahead decoder-segment activation logic, so there is no penalty when selecting a wordline. The data I/O circuitry with a new column-based configuration makes it possible to hide the bitline precharge operation with the sensing operation in the read cycle ahead of it; that is, we have successfully reduced the read latency by a half clock cycle, resulting in a pure two-stage pipeline. The SRAM macro installed in a 4K-entry × 33-bit FIFO memory, fabricated with a 0.3-µm fully-depleted-SOI CMOS process, achieved a 500-MHz operation in the typical conditions of 2- and 1-V power supplies, and 25°C. The power consumption during the standby time was less than 1.0 mW, and that at a practical operating frequency of 400 MHz was in a range of 47-57 mW, depending on the bit-stream data pattern.

  • MacWilliams Identities of Linear Codes with Respect to RT Metric over Mn×s(F2[u,v]/<uk,v2,uv-vu>)

    Minjia SHI  Jie TANG  Maorong GE  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:11
      Page(s):
    2522-2527

    The definitions of the Lee complete ρ weight enumerator and the exact complete ρ weight enumerator over Mn×s(F2[u,v]/) are introduced, and the MacWilliams identities with respect to the RT metric for these two weight enumerators of linear codes over Mn×s(F2[u,v]/) are obtained. Finally, we give two examples to illustrate the results we obtained.

  • Forecasting Network Traffic at Large Time Scales by Using Dual-Related Method

    Liangrui TANG  Shiyu JI  Shimo DU  Yun REN  Runze WU  Xin WU  

     
    PAPER-Network

      Pubricized:
    2017/04/24
      Vol:
    E100-B No:11
      Page(s):
    2049-2059

    Network traffic forecasts, as it is well known, can be useful for network resource optimization. In order to minimize the forecast error by maximizing information utilization with low complexity, this paper concerns the difference of traffic trends at large time scales and fits a dual-related model to predict it. First, by analyzing traffic trends based on user behavior, we find both hour-to-hour and day-to-day patterns, which means that models based on either of the single trends are unable to offer precise predictions. Then, a prediction method with the consideration of both daily and hourly traffic patterns, called the dual-related forecasting method, is proposed. Finally, the correlation for traffic data is analyzed based on model parameters. Simulation results demonstrate the proposed model is more effective in reducing forecasting error than other models.

  • Study on Effect of Company Rules and Regulations in Telework Involving Personal Devices

    Takashi HATASHIMA  Yasuhisa SAKAMOTO  

     
    LETTER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2458-2461

    We surveyed employees who use personal devices for work. Residual analysis for cross-tabulation was carried out for three groups classified based on company rules and regulations established for mobile work. We show that the behavior of employees working with personal devices to process business data changes due to the presence or absence of the company rules and regulations.

  • Change-Prone Java Method Prediction by Focusing on Individual Differences in Comment Density

    Aji ERY BURHANDENNY  Hirohisa AMAN  Minoru KAWAHARA  

     
    LETTER-Software Engineering

      Pubricized:
    2017/02/15
      Vol:
    E100-D No:5
      Page(s):
    1128-1131

    This paper focuses on differences in comment densities among individual programmers, and proposes to adjust the conventional code complexity metric (the cyclomatic complexity) by using the abnormality of the comment density. An empirical study with nine popular open source Java products (including 103,246 methods) shows that the proposed metric performs better than the conventional one in predicting change-prone methods; the proposed metric improves the area under the ROC curve (AUC) by about 3.4% on average.

  • On the Performance of Dual-Hop Variable-Gain AF Relaying with Beamforming over η-µ Fading Channels

    Ayaz HUSSAIN  Sang-Hyo KIM  Seok-Ho CHANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/10/17
      Vol:
    E100-B No:4
      Page(s):
    619-626

    A dual-hop amplify-and-forward (AF) relaying system with beamforming is analyzed over η-µ fading channels that includes Nakagami-m, Nakagami-q (Hoyt), and Rayleigh fading channels as special cases. New and exact expressions for the outage probability (OP) and average capacity are derived. Moreover, a new asymptotic analysis is also conducted for the OP and average capacity in terms of basic elementary functions which make it easy to understand the system behavior and the impact of channel parameters. The viability of the analysis is verified by Monte Carlo simulations.

  • Self-Dual Cyclic Codes over $mathbb{Z}_4+umathbb{Z}_4$

    Rong LUO  Udaya PARAMPALLI  

     
    LETTER-Coding Theory

      Vol:
    E100-A No:4
      Page(s):
    969-974

    In this paper we study the structure of self-dual cyclic codes over the ring $Lambda= Z_4+uZ_4$. The ring Λ is a local Frobenius ring but not a chain ring. We characterize self-dual cyclic codes of odd length n over Λ. The results can be used to construct some optimal binary, quaternary cyclic and self-dual codes.

  • Analyzing Fine Motion Considering Individual Habit for Appearance-Based Proficiency Evaluation

    Yudai MIYASHITA  Hirokatsu KATAOKA  Akio NAKAMURA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/10/18
      Vol:
    E100-D No:1
      Page(s):
    166-174

    We propose an appearance-based proficiency evaluation methodology based on fine-motion analysis. We consider the effects of individual habit in evaluating proficiency and analyze the fine motion of guitar-picking. We first extract multiple features on a large number of dense trajectories of fine motion. To facilitate analysis, we then generate a histogram of motion features using a bag-of-words model and change the number of visual words as appropriate. To remove the effects of individual habit, we extract the common principal histogram elements corresponding to experts or beginners according to discrimination's contribution rates using random forests. We finally calculate the similarity of the histograms to evaluate the proficiency of a guitar-picking motion. By optimizing the number of visual words for proficiency evaluation, we demonstrate that our method distinguishes experts from beginners with an accuracy of about 86%. Moreover, we verify experimentally that our proposed methodology can evaluate proficiency while removing the effects of individual habit.

  • Light Space Partitioned Shadow Maps

    Bin TANG  Jianxin LUO  Guiqiang NI  Weiwei DUAN  Yi GAO  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    234-237

    This letter proposes a Light Space Partitioned Shadow Maps (LSPSMs) algorithm which implements shadow rendering based on a novel partitioning scheme in light space. In stead of splitting the view frustum like traditional Z-partitioning methods, we split partitions from the projection of refined view frustum in light space. The partitioning scheme is performed dual-directionally while limiting the wasted space. Partitions are created in dynamic number corresponding to the light and view directions. Experiments demonstrate that high quality shadows can be rendered in high efficiency with our algorithm.

  • Efficient Search for High-Rate Punctured Convolutional Codes Using Dual Codes

    Sen MORIYA  Kana KIKUCHI  Hiroshi SASANO  

     
    PAPER-Coding Theory and Techniques

      Vol:
    E99-A No:12
      Page(s):
    2162-2169

    In this study, we consider techniques to search for high-rate punctured convolutional code (PCC) encoders using dual code encoders. A low-rate R=1/n convolutional code (CC) has a dual code that is identical to a PCC with rate R=(n-1)/n. This implies that a rate R=1/n convolutional code encoder can assist in searches for high-rate PCC encoders. On the other hand, we can derive a rate R=1/n CC encoder from good PCC encoders with rate R=(n-1)/n using dual code encoders. This paper proposes a method to obtain improved high-rate PCC encoders, using exhaustive search results of PCC encoders with rate R=1/3 original encoders, and dual code encoders. We also show some PCC encoders obtained by searches that utilized our method.

  • A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage

    Tatsuyuki MATSUSHITA  Shinji YAMANAKA  Fangming ZHAO  

     
    PAPER-Distributed system

      Pubricized:
    2016/08/25
      Vol:
    E99-D No:12
      Page(s):
    2956-2967

    Peer-to-peer (P2P) networks have attracted increasing attention in the distribution of large-volume and frequently accessed content. In this paper, we mainly consider the problem of key leakage in secure P2P content distribution. In secure content distribution, content is encrypted so that only legitimate users can access the content. Usually, users (peers) cannot be fully trusted in a P2P network because malicious ones might leak their decryption keys. If the redistribution of decryption keys occurs, copyright holders may incur great losses caused by free riders who access content without purchasing it. To decrease the damage caused by the key leakage, the individualization of encrypted content is necessary. The individualization means that a different (set of) decryption key(s) is required for each user to access content. In this paper, we propose a P2P content distribution scheme resilient to the key leakage that achieves the individualization of encrypted content. We show the feasibility of our scheme by conducting a large-scale P2P experiment in a real network.

  • Non-Native Text-to-Speech Preserving Speaker Individuality Based on Partial Correction of Prosodic and Phonetic Characteristics

    Yuji OSHIMA  Shinnosuke TAKAMICHI  Tomoki TODA  Graham NEUBIG  Sakriani SAKTI  Satoshi NAKAMURA  

     
    PAPER-Speech and Hearing

      Pubricized:
    2016/08/30
      Vol:
    E99-D No:12
      Page(s):
    3132-3139

    This paper presents a novel non-native speech synthesis technique that preserves the individuality of a non-native speaker. Cross-lingual speech synthesis based on voice conversion or Hidden Markov Model (HMM)-based speech synthesis is a technique to synthesize foreign language speech using a target speaker's natural speech uttered in his/her mother tongue. Although the technique holds promise to improve a wide variety of applications, it tends to cause degradation of target speaker's individuality in synthetic speech compared to intra-lingual speech synthesis. This paper proposes a new approach to speech synthesis that preserves speaker individuality by using non-native speech spoken by the target speaker. Although the use of non-native speech makes it possible to preserve the speaker individuality in the synthesized target speech, naturalness is significantly degraded as the synthesized speech waveform is directly affected by unnatural prosody and pronunciation often caused by differences in the linguistic systems of the source and target languages. To improve naturalness while preserving speaker individuality, we propose (1) a prosody correction method based on model adaptation, and (2) a phonetic correction method based on spectrum replacement for unvoiced consonants. The experimental results using English speech uttered by native Japanese speakers demonstrate that (1) the proposed methods are capable of significantly improving naturalness while preserving the speaker individuality in synthetic speech, and (2) the proposed methods also improve intelligibility as confirmed by a dictation test.

  • Tunable Dual-Frequency Immittance Inverters on Dual-Composite Right/Left-Handed Transmission Lines (D-CRLH TL) with Variable Capacitors

    Dmitry KHOLODNYAK  Evgenia ZAMESHAEVA  Viacheslav TURGALIEV  Evgenii VOROBEV  

     
    PAPER

      Vol:
    E99-C No:10
      Page(s):
    1113-1121

    Design of lumped-element immittance inverters which support dual-frequency operation and tuning of both operational frequencies is presented. Unique properties of the dual-composite right/left-handed transmission lines (D-CRLH TL) give an opportunity to design immittance inverters with two non-multiple operational frequencies and a stop band between them. Replacement of capacitors of D-CRLH TL unit cells with variable ones enables inverter tunability. Tunability analysis of such immittance inverters is given. It is shown that a tuning range of the operational frequencies is limited by a tolerable variation of the inverter parameter. The design concept is verified by results of electromagnetic simulation and measured frequency characteristics of fixed (non-tunable) as well as tunable dual-frequency immittance inverters and dual-band filters using the inverters.

  • A 10-bit 6.8-GS/s Direct Digital Frequency Synthesizer Employing Complementary Dual-Phase Latch-Based Architecture

    Abdel MARTINEZ ALONSO  Masaya MIYAHARA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E99-C No:10
      Page(s):
    1200-1210

    This paper introduces a novel Direct Digital Frequency Synthesizer based on Complementary Dual-Phase Latch-Based sequencing method. Compared to conventional Direct Digital Frequency Synthesizer using Flip-Flop as synchronizing element, the proposed architecture allows to double the data sampling rate while trading-off area and Power Efficiency. Digital domain modulations can be easily implemented by using a Direct Digital Frequency Synthesizer. However, due to performance limitations, CMOS-based applications have been almost exclusively restricted to VHF, UHF and L bands. This work aims to increase the operation speed and extend the applicability of this technology to Multi-band Multi-standard wireless systems operating up to 2.7 GHz. The design features a 24 bits pipelined Phase Accumulator and a 14x10 bits Phase to Amplitude Converter. The Phase to Amplitude Converter module is compressed by using Quarter Wave Symmetry technique and is entirely made up of combinational logic inserted into 12 Complementary Dual-Phase Latch-Based pipeline stages. The logic is represented in the form of Sum of Product terms obtained from a 14x10 bits sinusoidal Look-Up-Table. The proposed Direct Digital Frequency Synthesizer is designed and simulated based on 65nm CMOS standard-cell technology. A maximum data sampling rate of 6.8 GS/s is expected. Estimated Spurious Free Dynamic Range and Power Efficiency are 61 dBc and 22 mW/(GS/s) respectively.

  • Analysis over Spectral Efficiency and Power Scaling in Massive MIMO Dual-Hop Systems with Multi-Pair Users

    Yi WANG  Baofeng JI  Yongming HUANG  Chunguo LI  Ying HU  Yewang QIAN  Luxi YANG  

     
    PAPER-Information Theory

      Vol:
    E99-A No:9
      Page(s):
    1665-1673

    This paper considers a massive multiple-input-multiple-output (MIMO) relaying system with multi-pair single-antenna users. The relay node adopts maximum-ratio combining/maximum-ratio transmission (MRC/MRT) stratagem for reception/transmission. We analyze the spectral efficiency (SE) and power scaling laws with respect to the number of relay antennas and other system parameters. First, by using the law of large numbers, we derive the closed-form expression of the SE, based on which, it is shown that the SE per user increases with the number of relay antennas but decreases with the number of user pairs, both logarithmically. It is further discovered that the transmit power at the source users and the relay can be continuously reduced as the number of relay antennas becomes large while the SE can maintains a constant value, which also means that the energy efficiency gain can be obtained simultaneously. Moreover, it is proved that the number of served user pairs can grow proportionally over the number of relay antennas with arbitrary SE requirement and no extra power cost. All the analytical results are verified through the numerical simulations.

  • Energy-Efficient Resource Allocation in Sensing-Based Spectrum Sharing for Cooperative Cognitive Radio Networks

    Wanming HAO  Shouyi YANG  Osamu MUTA  Haris GACANIN  Hiroshi FURUKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1763-1771

    Energy-efficient resource allocation is considered in sensing-based spectrum sharing for cooperative cognitive radio networks (CCRNs). The secondary user first listens to the spectrum allocated to the primary user (PU) to detect the PU state and then initiates data transmission with two power levels based on the sensing decision (e.g., idle or busy). Under this model, the optimization problem of maximizing energy efficiency (EE) is formulated over the transmission power and sensing time subject to some practical limitations, such as the individual power constraint for secondary source and relay, the quality of service (QoS) for the secondary system, and effective protection for the PU. Given the complexity of this problem, two simplified versions (i.e., perfect and imperfect sensing cases) are studied in this paper. We transform the considered problem in fractional form into an equivalent optimization problem in subtractive form. Then, for perfect sensing, the Lagrange dual decomposition and iterative algorithm are applied to acquire the optimal power allocation policy; for imperfect sensing, an exhaustive search and iterative algorithm are proposed to obtain the optimal sensing time and corresponding power allocation strategy. Finally, numerical results show that the energy-efficient design greatly improves EE compared with the conventional spectrum-efficient design.

  • Efficient Residual Coding Method of Spatial Audio Object Coding with Two-Step Coding Structure for Interactive Audio Services

    Byonghwa LEE  Kwangki KIM  Minsoo HAHN  

     
    LETTER-Speech and Hearing

      Pubricized:
    2016/04/08
      Vol:
    E99-D No:7
      Page(s):
    1949-1952

    In interactive audio services, users can render audio objects rather freely to match their desires and the spatial audio object coding (SAOC) scheme is fairly good both in the sense of bitrate and audio quality. But rather perceptible audio quality degradation can occur when an object is suppressed or played alone. To complement this, the SAOC scheme with Two-Step Coding (SAOC-TSC) was proposed. But the bitrate of the side information increases two times compared to that of the original SAOC due to the bitrate needed for the residual coding used to enhance the audio quality. In this paper, an efficient residual coding method of the SAOC-TSC is proposed to reduce the side information bitrate without audio quality degradation or complexity increase.

81-100hit(419hit)