The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] form(3161hit)

261-280hit(3161hit)

  • Efficient Hybrid DOA Estimation for Massive Uniform Rectangular Array

    Wei JHANG  Shiaw-Wu CHEN  Ann-Chen CHANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E103-A No:6
      Page(s):
    836-840

    In this letter, an efficient hybrid direction-of-arrival (DOA) estimation scheme is devised for massive uniform rectangular array. In this scheme, the DOA estimator based on a two-dimensional (2D) discrete Fourier transform is first applied to acquire coarse initial DOA estimates for single data snapshot. Then, the fine DOA is accurately estimated through using the iterative search estimator within a very small region. Meanwhile, a Nyström-based method is utilized to correctly compute the required noise-subspace projection matrix, avoiding the direct computation of full-dimensional sample correlation matrix and its eigenvalue decomposition. Therefore, the proposed scheme not only can estimate DOA, but also save computational cost, especially in massive antenna arrays scenarios. Simulation results are included to demonstrate the effectiveness of the proposed hybrid estimate scheme.

  • A New Construction of (m+k,m)-Functions with Low Differential Uniformity Open Access

    Tailin NIU  Xi CHEN  Longjiang QU  Chao LI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E103-A No:6
      Page(s):
    850-855

    (m+k,m)-functions with good cryptographic properties when 1≤k

  • Non-Steady Trading Day Detection Based on Stock Index Time-Series Information

    Hideaki IWATA  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E103-A No:6
      Page(s):
    821-828

    Outlier detection in a data set is very important in performing proper data mining. In this paper, we propose a method for efficiently detecting outliers by performing cluster analysis using the DS algorithm improved from the k-means algorithm. This method is simpler to detect outliers than traditional methods, and these detected outliers can quantitatively indicate “the degree of outlier”. Using this method, we detect abnormal trading days from OHLCs for S&P500 and FTSA, which are typical and world-wide stock indexes, from the beginning of 2005 to the end of 2015. They are defined as non-steady trading days, and the conditions for becoming the non-steady markets are mined as new knowledge. Applying the mined knowledge to OHLCs from the beginning of 2016 to the end of 2018, we can predict the non-steady trading days during that period. By verifying the predicted content, we show the fact that the appropriate knowledge has been successfully mined and show the effectiveness of the outlier detection method proposed in this paper. Furthermore, we mutually reference and comparatively analyze the results of applying this method to multiple stock indexes. This analyzes possible to visualize when and where social and economic impacts occur and how they propagate through the earth. This is one of the new applications using this method.

  • Performance Evaluation of Beam Shapes in a Two-Step-Precoded Massive MIMO System Open Access

    Jumpei YAMAMOTO  Toshihiko NISHIMURA  Takeo OHGANE  Yasutaka OGAWA  Daiki TAKEDA  Yoshihisa KISHIYAMA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/12/09
      Vol:
    E103-B No:6
      Page(s):
    703-711

    Massive MIMO is known as a promising technology for multiuser multiplexing in the fifth generation mobile communication system to accommodate the rapidly-increasing traffic. It has a large number of antenna elements and thus provides very sharp beams. As seen in hybrid beamforming, there have already been many papers on the concatenation of two precoders (beamformers). The inner precoder, i.e., a multi-beam former, performs a linear transformation between the element space and the beam space. The outer precoder forms nulls in the limited beam space spanned by selected beams to suppress the inter-user interference. In this two-step precoder, the beam shape is expected to determine the system performance. In this paper, we evaluate the achievable throughput performance for different beam-shaping schemes: a discrete Fourier transform (DFT) beam, Chebyshev weighted beams, and Taylor weighted beam. Simulations show that the DFT beam provides the best performance except the case of imperfect precoding and cell edge SNR of 30dB.

  • Supporting Predictable Performance Guarantees for SMT Processors

    Xin JIN  Ningmei YU  Yaoyang ZHOU  Bowen HUANG  Zihao YU  Xusheng ZHAN  Huizhe WANG  Sa WANG  Yungang BAO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E103-A No:6
      Page(s):
    806-820

    Simultaneous multithreading (SMT) technology improves CPU throughput, but also causes unpredictable performance fluctuations for co-running workloads. Although recent major SMT processors have adopted some techniques to promote hardware support for quality-of-service (QoS), achieving both precise performance guarantees and high throughput on SMT architectures is still a challenging open problem. In this paper, we demonstrate through some comprehensive investigations on a cycle-accurate simulator that not only almost all in-core resources suffer from severe contention as workloads vary but also there is a non-linear relationship between performance and available quotas of resources. We consider these observations as the fundamental reason leading to the challenging problem above. Thus, we introduce QoSMT, a novel hardware scheme that leverages a closed-loop controlling mechanism consisting of detection, prediction and adjustment to enforce precise performance guarantees for specific targets, e.g. achieving 85%, 90% or 95% of the performance of a workload running alone respectively. We implement a prototype on GEM5 simulator. Experimental results show that the average control error is only 1.4%, 0.5% and 3.6%.

  • Transmission-Quality-Aware Online Network Design and Provisioning Enabled by Optical Performance Monitoring

    Keisuke KAYANO  Yojiro MORI  Hiroshi HASEGAWA  Ken-ichi SATO  Shoichiro ODA  Setsuo YOSHIDA  Takeshi HOSHIDA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2019/12/04
      Vol:
    E103-B No:6
      Page(s):
    670-678

    The spectral efficiency of photonic networks can be enhanced by the use of higher modulation orders and narrower channel bandwidth. Unfortunately, these solutions are precluded by the margins required to offset uncertainties in system performance. Furthermore, as recently highlighted, the disaggregation of optical transport systems increases the required margin. We propose here highly spectrally efficient networks, whose margins are minimized by transmission-quality-aware adaptive modulation-order/channel-bandwidth assignment enabled by optical performance monitoring (OPM). Their effectiveness is confirmed by experiments on 400-Gbps dual-polarization quadrature phase shift keying (DP-QPSK) and 16-ary quadrature amplitude modulation (DP-16QAM) signals with the application of recently developed Q-factor-based OPM. Four-subcarrier 32-Gbaud DP-QPSK signals within 150/162.5/175GHz and two-subcarrier 32-Gbaud DP-16QAM signals within 75/87.5/100GHz are experimentally analyzed. Numerical network simulations in conjunction with the experimental results demonstrate that the proposed scheme can drastically improve network spectral efficiency.

  • An Enhanced Well-Changed GGNMOS for 3.3-V ESD Protection in 0.13-µm SOI Process

    Mo ZHOU  Yi SHAN  Yemin DONG  

     
    BRIEF PAPER-Electromagnetic Theory

      Pubricized:
    2020/01/07
      Vol:
    E103-C No:6
      Page(s):
    332-334

    In this paper, an enhanced well-changed GGNMOS (EW-GGNMOS) is proposed and demonstrated. The new device has the same topology as the conventional 3.3V GGNMOS, except that its well has been changed to the 1.2V p-well. Attributed to higher doping concentration, resulting in a much lower trigger voltage and desirable turn-on uniformity compared to conventional 3.3V GGNMOS. Therefore, we can use EW-GGNMOS as a 3.3V ESD protection device without any additional process.

  • Constructions of Semi-Bent Functions by Modifying the Supports of Quadratic Boolean Functions

    Feng HU  Sihong SU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E103-A No:5
      Page(s):
    749-756

    Semi-bent functions have almost maximal nonlinearity. In this paper, two classes of semi-bent functions are constructed by modifying the supports of two quadratic Boolean functions $f_1(x_1,x_2,cdots,x_n)=igopluslimits^{k}_{i=1}x_{2i-1}x_{2i}$ with $n=2k+1geq3$ and $f_2(x_1,x_2,cdots,x_n)=igopluslimits^{k}_{i=1}x_{2i-1}x_{2i}$ with $n=2k+2geq4$. Meanwhile, the algebraic normal forms of the newly constructed semi-bent functions are determined.

  • New Optimal Difference Systems of Sets from Ideal Sequences and Perfect Ternary Sequences

    Yong WANG  Wei SU  

     
    LETTER-Coding Theory

      Vol:
    E103-A No:5
      Page(s):
    792-797

    Difference systems of sets (DSSs) introduced by Levenstein are combinatorial structures used to construct comma-free codes for synchronization. In this letter, two classes of optimal DSSs are presented. One class is obtained based on q-ary ideal sequences with d-form property and difference-balanced property. The other class of optimal and perfect DSSs is derived from perfect ternary sequences given by Ipatov in 1995. Compared with known constructions (Zhou, Tang, Optimal and perfect difference systems of sets from q-ary sequences with difference-balanced property, Des. Codes Cryptography, 57(2), 215-223, 2010), the proposed DSSs lead to comma-free codes with nonzero code rate.

  • Energy Efficiency Optimization for Secure SWIPT System

    Chao MENG  Gang WANG  Bingjian YAN  Yongmei LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/10/29
      Vol:
    E103-B No:5
      Page(s):
    582-590

    This paper investigates the secrecy energy efficiency maximization (SEEM) problem in a simultaneous wireless information and power transfer (SWIPT) system, wherein a legitimate user (LU) exploits the power splitting (PS) scheme for simultaneous information decoding (ID) and energy harvesting (EH). To prevent interference from eavesdroppers on the LU, artificial noise (AN) is incorporated into the confidential signal at the transmitter. We maximize the secrecy energy efficiency (SEE) by joining the power of the confidential signal, the AN power, and the PS ratio, while taking into account the minimum secrecy rate requirement of the LU, the required minimum harvested energy, the allowed maximum radio frequency transmission power, and the PS ratio. The formulated SEEM problem involves nonconvex fractional programming and is generally intractable. Our solution is Lagrangian relaxation method than can transform the original problem into a two-layer optimization problem. The outer layer problem is a single variable optimization problem with a Lagrange multiplier, which can be solved easily. Meanwhile, the inner layer one is fractional programming, which can be transformed into a subtractive form solved using the Dinkelbach method. A closed-form solution is derived for the power of the confidential signal. Simulation results verify the efficiency of the proposed SEEM algorithm and prove that AN-aided design is an effective method for improving system SEE.

  • Vehicle Key Information Detection Algorithm Based on Improved SSD

    Ende WANG  Yong LI  Yuebin WANG  Peng WANG  Jinlei JIAO  Xiaosheng YU  

     
    PAPER-Intelligent Transport System

      Vol:
    E103-A No:5
      Page(s):
    769-779

    With the rapid development of technology and economy, the number of cars is increasing rapidly, which brings a series of traffic problems. To solve these traffic problems, the development of intelligent transportation systems are accelerated in many cities. While vehicles and their detailed information detection are great significance to the development of urban intelligent transportation system, the traditional vehicle detection algorithm is not satisfactory in the case of complex environment and high real-time requirement. The vehicle detection algorithm based on motion information is unable to detect the stationary vehicles in video. At present, the application of deep learning method in the task of target detection effectively improves the existing problems in traditional algorithms. However, there are few dataset for vehicles detailed information, i.e. driver, car inspection sign, copilot, plate and vehicle object, which are key information for intelligent transportation. This paper constructs a deep learning dataset containing 10,000 representative images about vehicles and their key information detection. Then, the SSD (Single Shot MultiBox Detector) target detection algorithm is improved and the improved algorithm is applied to the video surveillance system. The detection accuracy of small targets is improved by adding deconvolution modules to the detection network. The experimental results show that the proposed method can detect the vehicle, driver, car inspection sign, copilot and plate, which are vehicle key information, at the same time, and the improved algorithm in this paper has achieved better results in the accuracy and real-time performance of video surveillance than the SSD algorithm.

  • Loss Analysis from Capacitance between Windings in Multilayer Transformer and Loss Improvement by Winding Layer Layout Considering Working Voltage

    Toshiyuki WATANABE  Tetsuya OSHIKATA  Kimihiro NISHIJIMA  Fujio KUROKAWA  

     
    PAPER-Energy in Electronics Communications

      Pubricized:
    2019/11/12
      Vol:
    E103-B No:5
      Page(s):
    517-523

    An LLC converter has high efficiency and low noise and has thus recently attracted attention in the field of power supplies for use in information and communication systems. A planar transformer is thought to be particularly effective in a high-frequency switching power supply because an ideal primary-secondary interleave structure can be formed by the multilayer structure, and the alternating-current (AC) resistance can be reduced. Based on these facts, we investigated the use of planar transformers in LLC converters. However, high-frequency oscillation, which is not observed in a normal winding transformer, appears in the secondary side current, and the power supply loss is also higher. Our investigation found that the current oscillation and an increase in loss were caused by a primary-secondary capacitance of the transformer. This paper presents countermeasures used to reduce the capacitance between the primary and secondary windings, and a new layer structure for the transformer that reduces the capacitance. The loss is calculated through a simulation and experimentally, and good agreement is obtained. The proposed transformer offers the high efficiency of 98.1% in a 200 W, 12 V output power supply.

  • A Retrieval Method for 3D CAD Assembly Models Using 3D Radon Transform and Spherical Harmonic Transform

    Kaoru KATAYAMA  Takashi HIRASHIMA  

     
    PAPER

      Pubricized:
    2020/02/20
      Vol:
    E103-D No:5
      Page(s):
    992-1001

    We present a retrieval method for 3D CAD assemblies consisted of multiple components. The proposed method distinguishes not only shapes of 3D CAD assemblies but also layouts of their components. Similarity between two assemblies is computed from feature quantities of the components constituting the assemblies. In order to make the similarity robust to translation and rotation of an assembly in 3D space, we use the 3D Radon transform and the spherical harmonic transform. We show that this method has better retrieval precision and efficiency than targets for comparison by experimental evaluation.

  • Information Floating for Sensor Networking to Provide Available Routes in Disaster Situations Open Access

    Naoyuki KARASAWA  Kazuyuki MIYAKITA  Yuto INAGAWA  Kodai KOBAYASHI  Hiroshi TAMURA  Keisuke NAKANO  

     
    PAPER

      Pubricized:
    2019/10/08
      Vol:
    E103-B No:4
      Page(s):
    321-334

    Information floating (IF) permits mobile nodes to transmit information to other nodes by direct wireless communication only in transmittable areas (TAs), thus avoiding unneeded and inefficient information distribution to irrelevant areas, which is a problem with the so-called epidemic communication used in delay tolerant networks. In this paper, we propose applying IF to sensor networking to find and share available routes in disaster situations. In this proposal, IF gathers and shares information without any assistance from gateways, which is normally required for conventional wireless sensor networks. A performance evaluation based on computer simulation results is presented. Furthermore, we demonstrate that the proposed method is effective by highlighting its advantageous properties and directly comparing it with a method based on epidemic communication. Our findings suggest that the proposed method is a promising step toward more effective countermeasures against restricted access in disaster zones.

  • A New Closed-Form Algorithm for Spatial Three-Dimensional Localization with Multiple One-Dimensional Uniform Linear Arrays

    Yifan WEI  Wanchun LI  Yuning GUO  Hongshu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E103-A No:4
      Page(s):
    704-709

    This paper presents a three-dimensional (3D) spatial localization algorithm by using multiple one-dimensional uniform linear arrays (ULA). We first discuss geometric features of the angle-of-arrival (AOA) measurements of the array and present the corresponding principle of spatial cone angle intersection positioning with an angular measurement model. Then, we propose a new positioning method with an analytic study on the geometric dilution of precision (GDOP) of target location in different cases. The results of simulation show that the estimation accuracy of this method can attain the Cramér-Rao Bound (CRB) under low measurement noise.

  • Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings

    Uraiwan BUATOOM  Waree KONGPRAWECHNON  Thanaruk THEERAMUNKONG  

     
    PAPER

      Pubricized:
    2020/01/08
      Vol:
    E103-D No:4
      Page(s):
    748-758

    The outcome of document clustering depends on the scheme used to assign a weight to each term in a document. While recent works have tried to use distributions related to class to enhance the discrimination ability. It is worth exploring whether a deviation approach or an entropy approach is more effective. This paper presents a comparison between deviation-based distribution and entropy-based distribution as constraints in term weighting. In addition, their potential combinations are investigated to find optimal solutions in guiding the clustering process. In the experiments, the seeded k-means method is used for clustering, and the performances of deviation-based, entropy-based, and hybrid approaches, are analyzed using two English and one Thai text datasets. The result showed that the deviation-based distribution outperformed the entropy-based distribution, and a suitable combination of these distributions increases the clustering accuracy by 10%.

  • Improvement in the Effectiveness of Cutting Skill Practice for Paper-Cutting Creations Based on the Steering Law

    Takafumi HIGASHI  Hideaki KANAI  

     
    PAPER

      Pubricized:
    2019/11/29
      Vol:
    E103-D No:4
      Page(s):
    730-738

    To improve the cutting skills of learners, we developed a method for improving the skill involved in creating paper cuttings based on a steering task in the field of human-computer interaction. TaWe made patterns using the white and black boundaries that make up a picture. The index of difficulty (ID) is a numerical value based on the width and distance of the steering law. First, we evaluated novice and expert pattern-cutters, and measured their moving time (MT), error rate, and compliance with the steering law, confirming that the MT and error rate are affected by pattern width and distance. Moreover, we quantified the skills of novices and experts using ID and MT based models. We then observed changes in the cutting skills of novices who practiced with various widths and evaluated the impact of the difficulty level on skill improvement. Patterns considered to be moderately difficult for novices led to a significant improvement in skills.

  • Broadband Direction of Arrival Estimation Based on Convolutional Neural Network Open Access

    Wenli ZHU  Min ZHANG  Chenxi WU  Lingqing ZENG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/08/27
      Vol:
    E103-B No:3
      Page(s):
    148-154

    A convolutional neural network (CNN) for broadband direction of arrival (DOA) estimation of far-field electromagnetic signals is presented. The proposed algorithm performs a nonlinear inverse mapping from received signal to angle of arrival. The signal model used for algorithm is based on the circular antenna array geometry, and the phase component extracted from the spatial covariance matrix is used as the input of the CNN network. A CNN model including three convolutional layers is then established to approximate the nonlinear mapping. The performance of the CNN model is evaluated in a noisy environment for various values of signal-to-noise ratio (SNR). The results demonstrate that the proposed CNN model with the phase component of the spatial covariance matrix as the input is able to achieve fast and accurate broadband DOA estimation and attains perfect performance at lower SNR values.

  • Symbolic Representation of Time Petri Nets for Efficient Bounded Model Checking

    Nao IGAWA  Tomoyuki YOKOGAWA  Sousuke AMASAKI  Masafumi KONDO  Yoichiro SATO  Kazutami ARIMOTO  

     
    LETTER-Software System

      Pubricized:
    2019/12/20
      Vol:
    E103-D No:3
      Page(s):
    702-705

    Safety critical systems are often modeled using Time Petri Nets (TPN) for analyzing their reliability with formal verification methods. This paper proposed an efficient verification method for TPN introducing bounded model checking based on satisfiability solving. The proposed method expresses time constraints of TPN by Difference Logic (DL) and uses SMT solvers for verification. Its effectiveness was also demonstrated with an experiment.

  • Analysis of Antenna Performance Degradation due to Coupled Electromagnetic Interference from Nearby Circuits

    Hosang LEE  Jawad YOUSAF  Kwangho KIM  Seongjin MUN  Chanseok HWANG  Wansoo NAH  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2019/08/27
      Vol:
    E103-C No:3
      Page(s):
    110-118

    This paper analyzes and compares two methods to estimate electromagnetically coupled noises introduced to an antenna due to the nearby circuits at a circuit design stage. One of them is to estimate the power spectrum, and the other one is to estimate the active S11 parameter at the victim antenna, respectively, and both of them use simulated standard S-parameters for the electromagnetic coupling in the circuit. They also need the assumed or measured excitation of noise sources. To confirm the validness of the two methods, an evaluation board consisting of an antenna and noise sources were designed and fabricated in which voltage controlled oscillator (VCO) chips are placed as noise sources. The generated electromagnetic noises are transferred to an antenna via loop-shaped transmission lines, degrading the performance of the antenna. In this paper, detailed analysis procedures are described using the evaluation board, and it is shown that the two methods are equivalent to each other in terms of the induced voltages in the antenna. Finally, a procedure to estimate antenna performance degradation at the design stage is summarized.

261-280hit(3161hit)