Strategic Dual Image method (SDI) for three-dimensional magnetic field problems is proposed. The basic idea of the SDI method is that the open boundary solution is in-between the Dirichlet and Neumann solutions. The relationship between the specific topology (e.g. sphere, and ellipsoid) of the boundary and the averaging weight has been discussed in the previous literature, however no discussions on the arbitrary topology. In this paper, combined with “the perturbation approach using equivalence theorem”, the methodology to derive the averaging weight of Dirichlet and Neumann solutions on the arbitrary topology has been proposed. Some numerical examples are also demonstrated.
Zhangkai LUO Huali WANG Huan HAO
In this paper, a spectrum efficient spatial polarized quadrature amplitude modulation (SPQM) scheme for physical layer security in dual-polarized satellite systems is proposed, which uses the carrier's polarization state, amplitude, phase and the polarization characteristics of the transmitting beams as information bearing parameters, which can improve the transmission efficiency and enhance the transmission security at the same time. As we know, the depolarization effect is the main drawback that affects the symbol error rate performance when polarization states are used to carry information. To solve the problem, we exploit an additional degree of freedom, time, in the proposed scheme, which means that two components of the polarized signal are transmitted in turn in two symbol periods, thus they can be recovered without mutual interference. Furthermore, orthogonal polarizations of the transmitting beam are used as spatial modulation for further increasing the throughput. In addition, in order to improve the transmission security, two transmitting beams are designed to transmit the two components of the polarized signal respectively. In this way, a secure transmission link is formed from the transmitter to the receiver to prevent eavesdropping. Finally, superiorities of SPQM are validated by the theoretical analysis and simulation results in dual-polarized satellite systems.
Let $mathbb{F}_q$ be a finite field of q elements, $R=mathbb{F}_q+umathbb{F}_q$ (u2=0) and D2n=
Nobutaro SHIBATA Mayumi WATANABE Takako ISHIHARA
Multiport SRAMs are frequently installed in network and/or telecommunication VLSIs to implement smart functions. This paper presents a high speed and low-power dual-port (i.e., 1W+1R two-port) SRAM macro customized for serial access operations. To reduce the wasted power dissipation due to subthreshold leakage currents, the supply voltage for 10T memory cells is lowered to 1 V and a power switch is prepared for every 64 word drivers. The switch is activated with look-ahead decoder-segment activation logic, so there is no penalty when selecting a wordline. The data I/O circuitry with a new column-based configuration makes it possible to hide the bitline precharge operation with the sensing operation in the read cycle ahead of it; that is, we have successfully reduced the read latency by a half clock cycle, resulting in a pure two-stage pipeline. The SRAM macro installed in a 4K-entry × 33-bit FIFO memory, fabricated with a 0.3-µm fully-depleted-SOI CMOS process, achieved a 500-MHz operation in the typical conditions of 2- and 1-V power supplies, and 25°C. The power consumption during the standby time was less than 1.0 mW, and that at a practical operating frequency of 400 MHz was in a range of 47-57 mW, depending on the bit-stream data pattern.
Minjia SHI Jie TANG Maorong GE
The definitions of the Lee complete ρ weight enumerator and the exact complete ρ weight enumerator over Mn×s(F2[u,v]/
Liangrui TANG Shiyu JI Shimo DU Yun REN Runze WU Xin WU
Network traffic forecasts, as it is well known, can be useful for network resource optimization. In order to minimize the forecast error by maximizing information utilization with low complexity, this paper concerns the difference of traffic trends at large time scales and fits a dual-related model to predict it. First, by analyzing traffic trends based on user behavior, we find both hour-to-hour and day-to-day patterns, which means that models based on either of the single trends are unable to offer precise predictions. Then, a prediction method with the consideration of both daily and hourly traffic patterns, called the dual-related forecasting method, is proposed. Finally, the correlation for traffic data is analyzed based on model parameters. Simulation results demonstrate the proposed model is more effective in reducing forecasting error than other models.
Takashi HATASHIMA Yasuhisa SAKAMOTO
We surveyed employees who use personal devices for work. Residual analysis for cross-tabulation was carried out for three groups classified based on company rules and regulations established for mobile work. We show that the behavior of employees working with personal devices to process business data changes due to the presence or absence of the company rules and regulations.
Aji ERY BURHANDENNY Hirohisa AMAN Minoru KAWAHARA
This paper focuses on differences in comment densities among individual programmers, and proposes to adjust the conventional code complexity metric (the cyclomatic complexity) by using the abnormality of the comment density. An empirical study with nine popular open source Java products (including 103,246 methods) shows that the proposed metric performs better than the conventional one in predicting change-prone methods; the proposed metric improves the area under the ROC curve (AUC) by about 3.4% on average.
Ayaz HUSSAIN Sang-Hyo KIM Seok-Ho CHANG
A dual-hop amplify-and-forward (AF) relaying system with beamforming is analyzed over η-µ fading channels that includes Nakagami-m, Nakagami-q (Hoyt), and Rayleigh fading channels as special cases. New and exact expressions for the outage probability (OP) and average capacity are derived. Moreover, a new asymptotic analysis is also conducted for the OP and average capacity in terms of basic elementary functions which make it easy to understand the system behavior and the impact of channel parameters. The viability of the analysis is verified by Monte Carlo simulations.
In this paper we study the structure of self-dual cyclic codes over the ring $Lambda= Z_4+uZ_4$. The ring Λ is a local Frobenius ring but not a chain ring. We characterize self-dual cyclic codes of odd length n over Λ. The results can be used to construct some optimal binary, quaternary cyclic and self-dual codes.
Yudai MIYASHITA Hirokatsu KATAOKA Akio NAKAMURA
We propose an appearance-based proficiency evaluation methodology based on fine-motion analysis. We consider the effects of individual habit in evaluating proficiency and analyze the fine motion of guitar-picking. We first extract multiple features on a large number of dense trajectories of fine motion. To facilitate analysis, we then generate a histogram of motion features using a bag-of-words model and change the number of visual words as appropriate. To remove the effects of individual habit, we extract the common principal histogram elements corresponding to experts or beginners according to discrimination's contribution rates using random forests. We finally calculate the similarity of the histograms to evaluate the proficiency of a guitar-picking motion. By optimizing the number of visual words for proficiency evaluation, we demonstrate that our method distinguishes experts from beginners with an accuracy of about 86%. Moreover, we verify experimentally that our proposed methodology can evaluate proficiency while removing the effects of individual habit.
Bin TANG Jianxin LUO Guiqiang NI Weiwei DUAN Yi GAO
This letter proposes a Light Space Partitioned Shadow Maps (LSPSMs) algorithm which implements shadow rendering based on a novel partitioning scheme in light space. In stead of splitting the view frustum like traditional Z-partitioning methods, we split partitions from the projection of refined view frustum in light space. The partitioning scheme is performed dual-directionally while limiting the wasted space. Partitions are created in dynamic number corresponding to the light and view directions. Experiments demonstrate that high quality shadows can be rendered in high efficiency with our algorithm.
Sen MORIYA Kana KIKUCHI Hiroshi SASANO
In this study, we consider techniques to search for high-rate punctured convolutional code (PCC) encoders using dual code encoders. A low-rate R=1/n convolutional code (CC) has a dual code that is identical to a PCC with rate R=(n-1)/n. This implies that a rate R=1/n convolutional code encoder can assist in searches for high-rate PCC encoders. On the other hand, we can derive a rate R=1/n CC encoder from good PCC encoders with rate R=(n-1)/n using dual code encoders. This paper proposes a method to obtain improved high-rate PCC encoders, using exhaustive search results of PCC encoders with rate R=1/3 original encoders, and dual code encoders. We also show some PCC encoders obtained by searches that utilized our method.
Tatsuyuki MATSUSHITA Shinji YAMANAKA Fangming ZHAO
Peer-to-peer (P2P) networks have attracted increasing attention in the distribution of large-volume and frequently accessed content. In this paper, we mainly consider the problem of key leakage in secure P2P content distribution. In secure content distribution, content is encrypted so that only legitimate users can access the content. Usually, users (peers) cannot be fully trusted in a P2P network because malicious ones might leak their decryption keys. If the redistribution of decryption keys occurs, copyright holders may incur great losses caused by free riders who access content without purchasing it. To decrease the damage caused by the key leakage, the individualization of encrypted content is necessary. The individualization means that a different (set of) decryption key(s) is required for each user to access content. In this paper, we propose a P2P content distribution scheme resilient to the key leakage that achieves the individualization of encrypted content. We show the feasibility of our scheme by conducting a large-scale P2P experiment in a real network.
Yuji OSHIMA Shinnosuke TAKAMICHI Tomoki TODA Graham NEUBIG Sakriani SAKTI Satoshi NAKAMURA
This paper presents a novel non-native speech synthesis technique that preserves the individuality of a non-native speaker. Cross-lingual speech synthesis based on voice conversion or Hidden Markov Model (HMM)-based speech synthesis is a technique to synthesize foreign language speech using a target speaker's natural speech uttered in his/her mother tongue. Although the technique holds promise to improve a wide variety of applications, it tends to cause degradation of target speaker's individuality in synthetic speech compared to intra-lingual speech synthesis. This paper proposes a new approach to speech synthesis that preserves speaker individuality by using non-native speech spoken by the target speaker. Although the use of non-native speech makes it possible to preserve the speaker individuality in the synthesized target speech, naturalness is significantly degraded as the synthesized speech waveform is directly affected by unnatural prosody and pronunciation often caused by differences in the linguistic systems of the source and target languages. To improve naturalness while preserving speaker individuality, we propose (1) a prosody correction method based on model adaptation, and (2) a phonetic correction method based on spectrum replacement for unvoiced consonants. The experimental results using English speech uttered by native Japanese speakers demonstrate that (1) the proposed methods are capable of significantly improving naturalness while preserving the speaker individuality in synthetic speech, and (2) the proposed methods also improve intelligibility as confirmed by a dictation test.
Dmitry KHOLODNYAK Evgenia ZAMESHAEVA Viacheslav TURGALIEV Evgenii VOROBEV
Design of lumped-element immittance inverters which support dual-frequency operation and tuning of both operational frequencies is presented. Unique properties of the dual-composite right/left-handed transmission lines (D-CRLH TL) give an opportunity to design immittance inverters with two non-multiple operational frequencies and a stop band between them. Replacement of capacitors of D-CRLH TL unit cells with variable ones enables inverter tunability. Tunability analysis of such immittance inverters is given. It is shown that a tuning range of the operational frequencies is limited by a tolerable variation of the inverter parameter. The design concept is verified by results of electromagnetic simulation and measured frequency characteristics of fixed (non-tunable) as well as tunable dual-frequency immittance inverters and dual-band filters using the inverters.
Abdel MARTINEZ ALONSO Masaya MIYAHARA Akira MATSUZAWA
This paper introduces a novel Direct Digital Frequency Synthesizer based on Complementary Dual-Phase Latch-Based sequencing method. Compared to conventional Direct Digital Frequency Synthesizer using Flip-Flop as synchronizing element, the proposed architecture allows to double the data sampling rate while trading-off area and Power Efficiency. Digital domain modulations can be easily implemented by using a Direct Digital Frequency Synthesizer. However, due to performance limitations, CMOS-based applications have been almost exclusively restricted to VHF, UHF and L bands. This work aims to increase the operation speed and extend the applicability of this technology to Multi-band Multi-standard wireless systems operating up to 2.7 GHz. The design features a 24 bits pipelined Phase Accumulator and a 14x10 bits Phase to Amplitude Converter. The Phase to Amplitude Converter module is compressed by using Quarter Wave Symmetry technique and is entirely made up of combinational logic inserted into 12 Complementary Dual-Phase Latch-Based pipeline stages. The logic is represented in the form of Sum of Product terms obtained from a 14x10 bits sinusoidal Look-Up-Table. The proposed Direct Digital Frequency Synthesizer is designed and simulated based on 65nm CMOS standard-cell technology. A maximum data sampling rate of 6.8 GS/s is expected. Estimated Spurious Free Dynamic Range and Power Efficiency are 61 dBc and 22 mW/(GS/s) respectively.
Yi WANG Baofeng JI Yongming HUANG Chunguo LI Ying HU Yewang QIAN Luxi YANG
This paper considers a massive multiple-input-multiple-output (MIMO) relaying system with multi-pair single-antenna users. The relay node adopts maximum-ratio combining/maximum-ratio transmission (MRC/MRT) stratagem for reception/transmission. We analyze the spectral efficiency (SE) and power scaling laws with respect to the number of relay antennas and other system parameters. First, by using the law of large numbers, we derive the closed-form expression of the SE, based on which, it is shown that the SE per user increases with the number of relay antennas but decreases with the number of user pairs, both logarithmically. It is further discovered that the transmit power at the source users and the relay can be continuously reduced as the number of relay antennas becomes large while the SE can maintains a constant value, which also means that the energy efficiency gain can be obtained simultaneously. Moreover, it is proved that the number of served user pairs can grow proportionally over the number of relay antennas with arbitrary SE requirement and no extra power cost. All the analytical results are verified through the numerical simulations.
Wanming HAO Shouyi YANG Osamu MUTA Haris GACANIN Hiroshi FURUKAWA
Energy-efficient resource allocation is considered in sensing-based spectrum sharing for cooperative cognitive radio networks (CCRNs). The secondary user first listens to the spectrum allocated to the primary user (PU) to detect the PU state and then initiates data transmission with two power levels based on the sensing decision (e.g., idle or busy). Under this model, the optimization problem of maximizing energy efficiency (EE) is formulated over the transmission power and sensing time subject to some practical limitations, such as the individual power constraint for secondary source and relay, the quality of service (QoS) for the secondary system, and effective protection for the PU. Given the complexity of this problem, two simplified versions (i.e., perfect and imperfect sensing cases) are studied in this paper. We transform the considered problem in fractional form into an equivalent optimization problem in subtractive form. Then, for perfect sensing, the Lagrange dual decomposition and iterative algorithm are applied to acquire the optimal power allocation policy; for imperfect sensing, an exhaustive search and iterative algorithm are proposed to obtain the optimal sensing time and corresponding power allocation strategy. Finally, numerical results show that the energy-efficient design greatly improves EE compared with the conventional spectrum-efficient design.
Byonghwa LEE Kwangki KIM Minsoo HAHN
In interactive audio services, users can render audio objects rather freely to match their desires and the spatial audio object coding (SAOC) scheme is fairly good both in the sense of bitrate and audio quality. But rather perceptible audio quality degradation can occur when an object is suppressed or played alone. To complement this, the SAOC scheme with Two-Step Coding (SAOC-TSC) was proposed. But the bitrate of the side information increases two times compared to that of the original SAOC due to the bitrate needed for the residual coding used to enhance the audio quality. In this paper, an efficient residual coding method of the SAOC-TSC is proposed to reduce the side information bitrate without audio quality degradation or complexity increase.