The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] file(200hit)

1-20hit(200hit)

  • A Study on Evaluation Method for Beam Profile of Phased Array by Using Two-Dimensional Measurement Equipment Open Access

    Kazuki YUKAWA  Takayuki MATSUMURO  Toshio ISHIZAKI  Yohei ISHIKAWA  

     
    INVITED PAPER

      Pubricized:
    2023/05/31
      Vol:
    E106-C No:11
      Page(s):
    643-650

    Recently, “Both-Side Retrodirective System” was proposed, as a beam convergence technique, for microwave high power transmission. To demonstrate the effectiveness of the both-side retrodirective system by experiment, the authors propose a 2-dimensional measurement equipment. Propagation in the parallel plate waveguide was analogized based on free-space propagation, and the theory and characteristics were clarified by simulation. The electric field distribution in the waveguide was measured by electric probe with the proposed equipment. Two types of measurement equipment were developed. One is a 4-element experiment system, which is a small-scale device for principle verification. The other is a 16-element measurement equipment, which is intended to evaluate beam convergence of a both-side retrodirective system in the next step. The measured results were compared with simulation results. As a result, it was confirmed that the beam formed in the waveguide was successfully measured. Thus, the effectiveness of 2-dimensional measurement equipment for evaluation of beam convergence was shown.

  • A Novel Displacement Sensor Based on a Frequency Delta-Sigma Modulator and its Application to a Stylus Surface Profiler

    Koichi MAEZAWA  Umer FAROOQ  Masayuki MORI  

     
    BRIEF PAPER-Electronic Circuits

      Pubricized:
    2023/03/16
      Vol:
    E106-C No:9
      Page(s):
    486-490

    A novel displacement sensor was proposed based on a frequency delta-sigma modulator (FDSM) employing a microwave oscillator. To demonstrate basic operation, we fabricated a stylus surface profiler using a cylindrical cavity resonator, where one end of the cavity is replaced by a thin metal diaphragm with a stylus probe tip. Good surface profile was successfully obtained with this device. A 10 nm depth trench was clearly observed together with a 10 µm trench in a single scan without gain control. This result clearly demonstrates an extremely wide dynamic range of the FDSM displacement sensors.

  • Policy-Based Method for Applying OAuth 2.0-Based Security Profiles

    Takashi NORIMATSU  Yuichi NAKAMURA  Toshihiro YAMAUCHI  

     
    PAPER

      Pubricized:
    2023/06/20
      Vol:
    E106-D No:9
      Page(s):
    1364-1379

    Two problems occur when an authorization server is utilized for a use case where a different security profile needs to be applied to a unique client request for accessing a distinct type of an API, such as open banking. A security profile can be applied to a client request by using the settings of an authorization server and client. However, this method can only apply the same security profile to all client requests. Therefore, multiple authorization servers or isolated environments, such as realms of an authorization server, are needed to apply a different security profile. However, this increases managerial costs for the authorization server administration. Moreover, new settings and logic need to be added to an authorization server if the existing client settings are inadequate for applying a security profile, which requires modification of an authorization server's source code. We aims to propose the policy-based method that resolves these problems. The proposed method does not completely rely on the settings of a client and can determine an applied security profile using a policy and the context of the client's request. Therefore, only one authorization server or isolated environment, such as a realm of an authorization server, is required to support multiple different security profiles. Additionally, the proposed method can implement a security profile as a pluggable software module. Thus, the source code of the authorization server need not be modified. The proposed method and Financial-grade application programming interface (FAPI) security profiles were implemented in Keycloak, which is an open-source identity and access management solution, and evaluation scenarios were executed. The results of the evaluation confirmed that the proposed method resolves these problems. The implementation has been contributed to Keycloak, making the proposed method and FAPI security profiles publicly available.

  • Band Characteristics of a Polarization Splitter with Circular Cores and Hollow Pits

    Midori NAGASAKA  Taiki ARAKAWA  Yutaro MOCHIDA  Kazunori KAMEDA  Shinichi FURUKAWA  

     
    PAPER

      Pubricized:
    2022/10/17
      Vol:
    E106-C No:4
      Page(s):
    127-135

    In this study, we discuss a structure that realizes a wideband polarization splitter comprising fiber 1 with a single core and fiber 2 with circular pits, which touch the top and bottom of a single core. The refractive index profile of the W type was adopted in the core of fiber 1 to realize the wideband. We compared the maximum bandwidth of BW-15 (bandwidth at an extinction ratio of -15dB) for the W type obtained in this study with those (our previous results) of BW-15 for the step and graded types with cores and pits at the same location; this comparison clarified that the maximum bandwidth of BW-15 for the W type is 5.22 and 4.96 times wider than those of step and graded types, respectively. Furthermore, the device length at the maximum bandwidth improved, becoming slightly shorter. The main results of the FPS in this study are all obtained by numerical analysis based on our proposed MM-DM (a method that combines the multipole method and the difference method for the inhomogeneous region). Our MM-DM is a quite reliable method for high accuracy analysis of the FPS composed of inhomogeneous circular regions.

  • Hiding Data in the Padding Area of Android Applications without Re-Packaging

    Geochang JEON  Jeong Hyun YI  Haehyun CHO  

     
    LETTER

      Pubricized:
    2022/06/13
      Vol:
    E105-D No:11
      Page(s):
    1928-1929

    Anonymous attackers have been targeting the Android ecosystem for performing severe malicious activities. Despite the complement of various vulnerabilities by security researchers, new vulnerabilities are continuously emerging. In this paper, we introduce a new type of vulnerability that can be exploited to hide data in an application file, bypassing the Android's signing policy. Specifically, we exploit padding areas that can be created by using the alignment option when applications are packaged. We present a proof-of-concept implementation for exploiting the vulnerability. Finally, we demonstrate the effectiveness of VeileDroid by using a synthetic application that hides data in the padding area and updates the data without re-signing and updating the application on an Android device.

  • Feasibility Study of Wi-SUN JUTA Profile-Compliant F-RIT Protocol Open Access

    Ryota OKUMURA  Keiichi MIZUTANI  Hiroshi HARADA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2021/03/31
      Vol:
    E104-B No:10
      Page(s):
    1354-1365

    In this paper, the world's first experimental evaluation of the Wi-SUN Japan Utility Telemetering Association (JUTA) profile-compliant feathery receiver-initiated transmission (JUTA F-RIT) protocol is conducted. Firstly, the transmission success rate in an interference environment is evaluated by theoretical analysis and computer simulations. The analysis is derived from the interference model focusing on the carrier sense. The analysis and simulation results agree as regards the transmission success rate of the JUTA F-RIT protocol. Secondly, we develop the dongle-type prototype that hosts the JUTA F-RIT protocol. Measurement results in a cochannel interference environment show that the transmission success rate at the lower MAC layer is around 94% when the number of terminals is 20. When the waiting time for the establishment of the communication link can be extended to exceed 10 s, the JUTA F-RIT protocol can achieve the transmission success rate of over 90% without the re-establishment of the communication link and re-transmission of data frames. Moreover, the experimental results are examined from two viewpoints of the performance of the frame transmissions and the timeout incident, and the feature of the JUTA F-RIT protocol are discussed.

  • Alleviating File System Journaling Problem in Containers for DBMS Consolidation

    Asraa ABDULRAZAK ALI MARDAN  Kenji KONO  

     
    PAPER-Software System

      Pubricized:
    2021/04/01
      Vol:
    E104-D No:7
      Page(s):
    931-940

    Containers offer a lightweight alternative over virtual machines and become a preferable choice for application consolidation in the clouds. However, the sharing of kernel components can violate the I/O performance and isolation in containers. It is widely recognized that file system journaling has terrible performance side effects in containers, especially when consolidating database management systems (DBMSs). The sharing of journaling modules among containers causes performance dependency among them. This dependency violates resource consumption enforced by the resource controller, and degrades I/O performance due to the contention of the journaling module. The operating system developers have been working on novel designs of file systems or new journaling mechanisms to solve the journaling problems. This paper shows that it is possible to overcome journaling problems without re-designing file systems or implementing a new journaling method. A careful configuration of containers in existing file systems can gracefully solve the problems. Our recommended configuration consists of 1) per-container journaling by presenting each container with a virtual block device to have its own journaling module, and 2) accounting journaling I/Os separately for each container. Our experimental results show that our configuration resolves journaling-related problems, improves MySQL performance by 3.4x, and achieves reasonable performance isolation among containers.

  • Efficient Hardware Accelerator for Compressed Sparse Deep Neural Network

    Hao XIAO  Kaikai ZHAO  Guangzhu LIU  

     
    LETTER-Computer System

      Pubricized:
    2021/02/19
      Vol:
    E104-D No:5
      Page(s):
    772-775

    This work presents a DNN accelerator architecture specifically designed for performing efficient inference on compressed and sparse DNN models. Leveraging the data sparsity, a runtime processing scheme is proposed to deal with the encoded weights and activations directly in the compressed domain without decompressing. Furthermore, a new data flow is proposed to facilitate the reusage of input activations across the fully-connected (FC) layers. The proposed design is implemented and verified using the Xilinx Virtex-7 FPGA. Experimental results show it achieves 1.99×, 1.95× faster and 20.38×, 3.04× more energy efficient than CPU and mGPU platforms, respectively, running AlexNet.

  • Low Profile High-Efficiency Transmitarray Antenna Based on Hybrid Frequency Selective Surface

    Chang-Hyun LEE  Jeong-Hae LEE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/07/17
      Vol:
    E104-B No:1
      Page(s):
    49-54

    This paper presents a low profile high-efficiency transmitarray (TA) antenna based on a hybrid frequency selective surface (FSS). The hybrid FSS consists of two types of unit cells that have different incident angles and TE/TM polarization. This design minimizes the performance degradation caused by the oblique incident angle when designing a low profile TA antenna. In addition, the set of transmission phases to minimize transmission loss is selected by employing the optimal output phase reference. To verify its feasibility, a low profile TA (focal length/diameter of FSS =0.24) antenna that employs a unit patch antenna with a low gain and wide beamwidth as a feed antenna without an additional structure is designed. The simulated and measured results are in good agreement. In particular, the high simulated and measured aperture efficiencies of 42.7% and 41.9%, respectively, are obtained at 10GHz, respectively.

  • Job-Aware File-Storage Optimization for Improved Hadoop I/O Performance

    Makoto NAKAGAMI  Jose A.B. FORTES  Saneyasu YAMAGUCHI  

     
    PAPER-Software System

      Pubricized:
    2020/06/30
      Vol:
    E103-D No:10
      Page(s):
    2083-2093

    Hadoop is a popular data-analytics platform based on Google's MapReduce programming model. Hard-disk drives (HDDs) are generally used in big-data analysis, and the effectiveness of the Hadoop platform can be optimized by enhancing its I/O performance. HDD performance varies depending on whether the data are stored in the inner or outer disk zones. This paper proposes a method that utilizes the knowledge of job characteristics to realize efficient data storage in HDDs, which in turn, helps improve Hadoop performance. Per the proposed method, job files that need to be frequently accessed are stored in outer disk tracks which are capable of facilitating sequential-access speeds that are higher than those provided by inner tracks. Thus, the proposed method stores temporary and permanent files in the outer and inner zones, respectively, thereby facilitating fast access to frequently required data. Results of performance evaluation demonstrate that the proposed method improves Hadoop performance by 15.4% when compared to normal cases when file placement is not used. Additionally, the proposed method outperforms a previously proposed placement approach by 11.1%.

  • An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency

    Zeynep YÜCEL  Parisa SUPITAYAKUL  Akito MONDEN  Pattara LEELAPRUTE  

     
    PAPER-Educational Technology

      Pubricized:
    2020/05/07
      Vol:
    E103-D No:8
      Page(s):
    1865-1874

    This study focuses on computer based foreign language vocabulary learning systems. Our objective is to automatically build vocabulary decks with desired levels of relative difficulty relations. To realize this goal, we exploit the fact that word frequency is a good indicator of vocabulary difficulty. Subsequently, for composing the decks, we pose two requirements as uniformity and diversity. Namely, the difficulty level of the cards in the same deck needs to be uniform enough so that they can be grouped together and difficulty levels of the cards in different decks need to be diverse enough so that they can be grouped in different decks. To assess uniformity and diversity, we use rank-biserial correlation and propose an iterative algorithm, which helps in attaining desired levels of uniformity and diversity based on word frequency in daily use of language. In experiments, we employed a spaced repetition flashcard software and presented users various decks built with the proposed algorithm, which contain cards from different content types. From users' activity logs, we derived several behavioral variables and examined the polyserial correlation between these variables and difficulty levels across different word classes. This analysis confirmed that the decks compiled with the proposed algorithm induce an effect on behavioral variables in line with the expectations. In addition, a series of experiments with decks involving varying content types confirmed that this relation is independent of word class.

  • A Two-Stage Feedback Protocol Based on Multipath Profile for MU-MIMO Networks

    Aijing LI  Chao DONG  Zhimin LI  Qihui WU  Guodong WU  

     
    PAPER-Network

      Pubricized:
    2019/11/21
      Vol:
    E103-B No:5
      Page(s):
    559-569

    As a key technology for 5G and beyond, Multi-User Multi-Input Multi-Output (MU-MIMO) can achieve Gbps downlink rate by allowing concurrent transmission from one Access Point (AP) to multiple users. However, the huge overhead of full CSI feedback may overwhelm the gain yielded by beamforming. Although there have been many works on compress CSI to reduce the feedback overhead, the performance of beamforming may decrease because the accuracy of channel state degrades. To address the tradeoff between feedback overhead and accuracy, we present a two-stage Multipath Profile based Feedback protocol (MPF). In the first stage, compared with CSI feedback, the channel state is represented by multipath profile which has a smaller size but is accurate enough for user selection. Meanwhile, we propose an implicit polling scheme to decrease the feedback further. In the second stage, only the selected users send their CSI information to the AP to guarantee the low overhead and accuracy of steering matrix calculation. We implement and evaluate MPF with USRP N210. Experiments show that MPF can outperform alternative schemes in a variety of radio environments.

  • Joint Bandwidth Assignment and Routing for Power Saving on Large File Transfer with Time Constraints

    Kazuhiko KINOSHITA  Masahiko AIHARA  Nariyoshi YAMAI  Takashi WATANABE  

     
    PAPER-Network Management/Operation

      Pubricized:
    2019/09/27
      Vol:
    E103-B No:4
      Page(s):
    431-439

    The increase in network traffic in recent years has led to increased power consumption. Accordingly, many studies have tried to reduce the energy consumption of network devices. Various types of data have become available in large quantities via large high-speed computer networks. Time-constrained file transfer is receiving much attention as an advanced service. In this model, a request must be completed within a user-specified deadline or rejected if the requested deadline cannot be met. Some bandwidth assignment and routing methods to accept more requests have been proposed. However, these existing methods do not consider energy consumption. Herein, we propose a joint bandwidth assignment and routing method that reduces energy consumption for time-constrained large file transfer. The bandwidth assignment method reduces the power consumption of mediate node, typically router, by waiting for requests and transferring several requests at the same time. The routing method reduces the power consumption by selecting the path with the least predicted energy consumption. Finally, we evaluate the proposed method through simulation experiments.

  • Low-Profile of Monocone Antenna by Using Planar Inverted-F Antenna Structure

    Kazuya MATSUBAYASHI  Naobumi MICHISHITA  Hisashi MORISHITA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/06/17
      Vol:
    E102-B No:12
      Page(s):
    2260-2266

    The monocone antenna is a type of monopole antenna that has wideband characteristics. This paper proposes a low-profile monocone antenna with a planar inverted-F structure. The characteristics of the proposed antenna are analyzed through a simulation. The results demonstrate that the low-profile antenna offers wideband performance, and the relative bandwidth of VSWR ≤ 2 is found to be more than 190%. In addition, miniaturization of the monocone antenna is elucidated. The proposed antenna is prototyped, and the validity of the simulation is verified through measurements.

  • Copy-on-Write with Adaptive Differential Logging for Persistent Memory

    Taeho HWANG  Youjip WON  

     
    PAPER-Software System

      Pubricized:
    2019/09/25
      Vol:
    E102-D No:12
      Page(s):
    2451-2460

    File systems based on persistent memory deploy Copy-on-Write (COW) or logging to guarantee data consistency. However, COW has a write amplification problem and logging has a double write problem. Both COW and logging increase write traffic on persistent memory. In this work, we present adaptive differential logging and zero-copy logging for persistent memory. Adaptive differential logging applies COW or logging selectively to each block. If the updated size of a block is smaller than or equal to half of the block size, we apply logging to the block. If the updated size of a block is larger than half of the block size, we apply COW to the block. Zero-copy logging treats an user buffer on persistent memory as a redo log. Zero-copy logging does not incur any additional data copy. We implement adaptive differential logging and zero-copy logging on both NOVA and PMFS file systems. Our measurement on real workloads shows that adaptive differential logging and zero-copy logging get 150.6% and 149.2% performance improvement over COW, respectively.

  • Low-Profile and Small Monocone Antenna Composed of a Circular Plate and Three Oblique Short Elements

    Kazuya MATSUBAYASHI  Naobumi MICHISHITA  Hisashi MORISHITA  

     
    PAPER

      Vol:
    E102-C No:10
      Page(s):
    740-747

    A monocone antenna is a type of monopole antenna with wideband characteristics. In this paper, a low-profile and small monocone antenna is proposed, by loading a circular plate and three oblique short elements. The characteristics of the proposed antenna are analyzed via simulation. Consequently, a low-profile and small monocone antenna can be obtained while maintaining the wideband characteristics. The relative bandwidth of the proposed antenna (voltage standing wave ratio (VSWR) ≤ 2) is greater than 158.9%. The frequency band of digital terrestrial television broadcasting and the mobile communication systems (from 470 to 3600MHz) in Japan can be completely covered with VSWR ≤ 2. In addition, the radiation patterns of the proposed antenna are omni-directional. The proposed antenna is prototyped, and the validity of the simulation is verified through measurement.

  • An Efficient Block Assignment Policy in Hadoop Distributed File System for Multimedia Data Processing

    Cheolgi KIM  Daechul LEE  Jaehyun LEE  Jaehwan LEE  

     
    LETTER-Computer System

      Pubricized:
    2019/05/21
      Vol:
    E102-D No:8
      Page(s):
    1569-1571

    Hadoop, a distributed processing framework for big-data, is now widely used for multimedia processing. However, when processing video data from a Hadoop distributed file system (HDFS), unnecessary network traffic is generated due to an inefficient HDFS block slice policy for picture frames in video files. We propose a new block replication policy to solve this problem and compare the newly proposed HDFS with the original HDFS via extensive experiments. The proposed HDFS reduces network traffic, and increases locality between processing cores and file locations.

  • Low-Profile Supergain Antenna Composed of Asymmetric Dipole Elements Backed by Planar Reflector for IoT Applications Open Access

    Suguru KOJIMA  Takuji ARIMA  Toru UNO  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    884-890

    This paper proposes a low-profile unidirectional supergain antenna applicable to wireless communication devices such as mobile terminals, the Internet of Things and so on. The antennas used for such systems are required to be not only electrically low-profile but also unsusceptible to surrounding objects such as human body and/or electrical equipment. The proposed antenna achieves both requirements due to its supergain property using planar elements and a closely placed planar reflector. The primary antenna is an asymmetric dipole type, and consists of a monopole element mounted on an edge of a rectangular conducting plane. Both elements are placed on a dielectric substrate backed by the planar reflector. It is numerically and experimentally shown that the supergain property is achieved by optimizing the geometrical parameters of the antenna. It is also shown that the impedance characteristics can be successfully adjusted by changing the lengths of the ground plane element and the monopole element. Thus, no additional impedance matching circuit is necessary. Furthermore, it is shown that surrounding objects have insignificant impact on the antenna performance.

  • A Dynamic-Clustering Backup Scheme for High-Availability Distributed File Sharing Systems

    Hoai Son NGUYEN   Dinh Nghia NGUYEN  Shinji SUGAWARA  

     
    PAPER-Network

      Pubricized:
    2018/09/10
      Vol:
    E102-B No:3
      Page(s):
    545-556

    DHT routing algorithms can provide efficient mechanisms for resource placement and lookup for distributed file sharing systems. However, we must still deal with irregular and frequent join/leave of nodes and the problem of load unbalancing between nodes in DHT-based file sharing systems. This paper presents an efficient file backup scheme based on dynamic DHT key space clustering in order to guarantee data availability and support load balancing. The main idea of our method is to dynamically divide the DHT network into a number of clusters, each of which locally stores and maintains data chunks of data files to guarantee the data availability of user data files even when node churn occurs. Further, high-capacity nodes in clusters are selected as backup nodes to achieve adequate load balancing. Simulation results demonstrate the superior effectiveness of the proposed scheme over other file replication schemes.

  • File Systems are Hard to Test — Learning from Xfstests

    Naohiro AOTA  Kenji KONO  

     
    PAPER-Software System

      Pubricized:
    2018/11/07
      Vol:
    E102-D No:2
      Page(s):
    269-279

    Modern file systems, such as ext4, btrfs, and XFS, are evolving and enable the introduction of new features to meet ever-changing demands and improve reliability. File system developers are struggling to eliminate all software bugs, but the operating system community points out that file systems are a hotbed of critical software bugs. This paper analyzes the code coverage of xfstests, a widely used suite of file system tests, on three major file systems (ext4, btrfs, and XFS). The coverage is 72.34%, and the uncovered code runs into 23,232 lines of code. To understand why the code coverage is low, the uncovered code is manually examined line by line. We identified three major causes, peculiar to file systems, that hinder higher coverage. First, covering all the features is difficult because each file system provides a wide variety of file-system specific features, and some features can be tested only on special storage devices. Second, covering all the execution paths is difficult because they depend on file system configurations and internal on-disk states. Finally, the code for maintaining backward-compatibility is executed only when a file system encounters old formats. Our findings will help file system developers improve the coverage of test suites and provide insights into fostering the development of new methodologies for testing file systems.

1-20hit(200hit)