The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] form(3161hit)

661-680hit(3161hit)

  • Novel Reconfigurable Hardware Accelerator for Protein Sequence Alignment Using Smith-Waterman Algorithm

    Atef IBRAHIM  Hamed ELSIMARY  Abdullah ALJUMAH  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:3
      Page(s):
    683-690

    This paper presents novel reconfigurable semi-systolic array architecture for the Smith-Waterman with an affine gap penalty algorithm to align protein sequences optimized for shorter database sequences. This architecture has been modified to enable hardware reuse rather than replicating processing elements of the semi-systolic array in multiple FPGAs. The proposed hardware architecture and the previously published conventional one are described at the Register Transfer Level (RTL) using VHDL language and implemented using the FPGA technology. The results show that the proposed design has significant higher normalized speedup (up to 125%) over the conventional one for query sequence lengths less than 512 residues. According to the UniProtKB/TrEMBL protein database (release 2015_05) statistics, the largest number of sequences (about 80%) have sequence length less than 512 residues that makes the proposed design outperforms the conventional one in terms of speed and area in this sequence lengths range.

  • Nanophotonic Devices Based on Semiconductor Quantum Nanostructures Open Access

    Kazuhiro KOMORI  Takeyoshi SUGAYA  Takeru AMANO  Keishiro GOSHIMA  

     
    INVITED PAPER

      Vol:
    E99-C No:3
      Page(s):
    346-357

    In this study, our recent research activities on nanophotonic devices with semiconductor quantum nanostructures are reviewed. We have developed a technique for nanofabricating of high-quality and high-density semiconductor quantum dots (QDs). On the basis of this core technology, we have studied next-generation nanophotonic devices fabricated using high-quality QDs, including (1) a high-performance QD laser for long-wavelength optical communications, (2) high-efficiency compound-type solar cell structures, and (3) single-QD devices for future applications related to quantum information. These devices are expected to be used in high-speed optical communication systems, high-performance renewable energy systems, and future high-security quantum computation and communication systems.

  • Adaptive Weighting of Structural Dependency and Textual Similarity in Software Architecture Recovery

    Jae-Chul UM  Ki-Seong LEE  Chan-Gun LEE  

     
    LETTER-Software Engineering

      Pubricized:
    2015/12/15
      Vol:
    E99-D No:3
      Page(s):
    756-759

    Software architecture recovery techniques are often adopted to derive a module view of software from its source code in case software architecture documents are unavailable or outdated. The module view is one of the most important perspectives of software architecture. In this paper, we propose a novel approach to derive a module view by adaptively integrating structural dependency and textual similarity. Our approach utilizes Newman modularity and Shannon information entropy to determine the appropriate weights of the dependencies during the integration. We apply our approach to various open-source projects and show the experimental results validating the effectiveness of the approach.

  • An Efficient Selection Method of a Transmitted OFDM Signal Sequence for Various SLM Schemes

    Kee-Hoon KIM  Hyun-Seung JOO  Jong-Seon NO  Dong-Joon SHIN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:3
      Page(s):
    703-713

    Many selected mapping (SLM) schemes have been proposed to reduce the peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signal sequences. In this paper, an efficient selection (ES) method of the OFDM signal sequence with minimum PAPR among many alternative OFDM signal sequences is proposed; it supports various SLM schemes. Utilizing the fact that OFDM signal components can be sequentially generated in many SLM schemes, the generation and PAPR observation of the OFDM signal sequence are processed concurrently. While the u-th alternative OFDM signal components are being generated, by applying the proposed ES method, the generation of that alternative OFDM signal components can be interrupted (or stopped) according to the selection criteria of the best OFDM signal sequence in the considered SLM scheme. Such interruption substantially reduces the average computational complexity of SLM schemes without degradation of PAPR reduction performance, which is confirmed by analytical and numerical results. Note that the proposed method is not an isolated SLM scheme but a subsidiary method which can be easily adopted in many SLM schemes in order to further reduce the computational complexity of considered SLM schemes.

  • Closed-Form Approximations for Gaussian Sum Smoother with Nonlinear Model

    Haiming DU  Jinfeng CHEN  Huadong WANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:3
      Page(s):
    691-701

    Research into closed-form Gaussian sum smoother has provided an attractive approach for tracking in clutter, joint detection and tracking (in clutter), and multiple target tracking (in clutter) via the probability hypothesis density (PHD). However, Gaussian sum smoother with nonlinear target model has particular nonlinear expressions in the backward smoothed density that are different from the other filters and smoothers. In order to extend the closed-form solution of linear Gaussian sum smoother to nonlinear model, two closed-form approximations for nonlinear Gaussian sum smoother are proposed, which use Gaussian particle approximation and unscented transformation approximation, separately. Since the estimated target number of PHD smoother is not stable, a heuristic approximation method is added. At last, the Bernoulli smoother and PHD smoother are simulated using Gaussian particle approximation and unscented transformation approximation, and simulation results show that the two proposed algorithms can obtain smoothed tracks with nonlinear models, and have better performance than filter.

  • The Structural Vulnerability Analysis of Power Grids Based on Overall Information Centrality

    Yi-Jia ZHANG  Zhong-Jian KANG  Xin-Ling GUO  Zhe-Ming LU  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/12/11
      Vol:
    E99-D No:3
      Page(s):
    769-772

    The power grid defines one of the most important technological networks of our times and has been widely studied as a kind of complex network. It has been developed for more than one century and becomes an extremely huge and seemingly robust system. But it becomes extremely fragile as well because some unexpected minimal failures may lead to sudden and massive blackouts. Many works have been carried out to investigate the structural vulnerability of power grids from the topological point of view based on the complex network theory. This Letter focuses on the structural vulnerability of the power grid under the effect of selective node removal. We propose a new kind of node centrality called overall information centrality (OIC) to guide the node removal attack. We test the effectiveness of our centrality in guiding the node removal based on several IEEE power grids. Simulation results show that, compared with other node centralities such as degree centrality (DC), betweenness centrality (BC) and closeness centrality (CC), our OIC is more effective to guide the node removal and can destroy the power grid in less steps.

  • Fast Vanishing Point Estimation Based on Particle Swarm Optimization

    Xun PAN  Wa SI  Harutoshi OGAI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/11/06
      Vol:
    E99-D No:2
      Page(s):
    505-513

    Vanishing point estimation is an important issue for vision based road detection, especially in unstructured roads. However, most of the existing methods suffer from the long calculating time. This paper focuses on improving the efficiency of vanishing point estimation by using a heuristic voting method based on particle swarm optimization (PSO). Experiments prove that with our proposed method, the efficiency of vanishing point estimation is significantly improved with almost no loss in accuracy. Moreover, for sequenced images, this method is further improved and can get even better performance, by making full use of inter-frame information to optimize the performance of PSO.

  • Advanced Beamforming Scheme Using Power Control for IoT Applications in Batteryless Backscatter System

    Su-Hyun JUNG  Young-Min KO  Seongjoo LEE  Hyoung-Kyu SONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:2
      Page(s):
    656-659

    Nowadays, the batteryless sensor system is widely used for Internet of things (IoT) system. Especially, batteryless backscatter system has a great significance in that it permits us to communicate without power supply devices. However, conventional backscatter system requires high power reader and this can be a problem with the communication efficiency. Therefore, this letter proposes a new transmission scheme on the batteryless backscatter system in order to solve this problem. In the proposed scheme, the mobile devices which embed Wi-Fi chipset are used as a reader. The tag obtains Internet connectivity from the reader. Since the tag can not decode the general Wi-Fi packet, new algorithm of the scheme uses a specially designed packet. In this letter, the designing method for the decodable packet is proposed. Moreover, the scheme implements beamforming to improve the reliability. By concentrating the power to the designated direction, the robust communication can be achieved. The simulation results show that the proposed scheme offers reliable Internet connectivity without extra battery.

  • A Method for Extraction of Future Reference Sentences Based on Semantic Role Labeling

    Yoko NAKAJIMA  Michal PTASZYNSKI  Hirotoshi HONMA  Fumito MASUI  

     
    PAPER-Natural Language Processing

      Pubricized:
    2015/11/18
      Vol:
    E99-D No:2
      Page(s):
    514-524

    In everyday life, people use past events and their own knowledge in predicting probable unfolding of events. To obtain the necessary knowledge for such predictions, newspapers and the Internet provide a general source of information. Newspapers contain various expressions describing past events, but also current and future events, and opinions. In our research we focused on automatically obtaining sentences that make reference to the future. Such sentences can contain expressions that not only explicitly refer to future events, but could also refer to past or current events. For example, if people read a news article that states “In the near future, there will be an upward trend in the price of gasoline,” they may be likely to buy gasoline now. However, if the article says “The cost of gasoline has just risen 10 yen per liter,” people will not rush to buy gasoline, because they accept this as reality and may expect the cost to decrease in the future. In the following study we firstly investigate future reference sentences in newspapers and Web news. Next, we propose a method for automatic extraction of such sentences by using semantic role labels, without typical approaches (temporal expressions, etc.). In a series of experiments, we extract semantic role patterns from future reference sentences and examine the validity of the extracted patterns in classification of future reference sentences.

  • Performance Analysis of All-Optical Wavelength-Shift-Free Format Conversion from QPSK to Two BPSK Tributaries Using FWM and Interference

    Rina ANDO  Hiroki KISHIKAWA  Nobuo GOTO  Shin-ichiro YANAGIYA  Lawrence R. CHEN  

     
    PAPER

      Vol:
    E99-C No:2
      Page(s):
    219-226

    Conversion between multi-level modulation formats is one of key processing functions for flexible networking aimed at high spectral efficiency (SE) in optical fiber transmission. The authors previously proposed an all-optical format conversion system from binary phase-shift keying (BPSK) to quadrature PSK (QPSK) and reported an experimental demonstration. In this paper, we consider its reversed conversion, that is, from QPSK to BPSK. The proposed system consists of a highly nonlinear fiber used to generate complex conjugate signal, and a 3-dB directional coupler used to produce converted signals by interfering the incident signal with the complex conjugate signal. The incident QPSK stream is converted into two BPSK tributaries without any loss of transmitting data. We show the system performances such as bit-error-rate and optical signal-to-noise ratio penalty evaluated by numerical simulation.

  • A Refined Estimator of Multicomponent Third-Order Polynomial Phase Signals

    GuoJian OU  ShiZhong YANG  JianXun DENG  QingPing JIANG  TianQi ZHANG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:1
      Page(s):
    143-151

    This paper describes a fast and effective algorithm for refining the parameter estimates of multicomponent third-order polynomial phase signals (PPSs). The efficiency of the proposed algorithm is accompanied by lower signal-to-noise ratio (SNR) threshold, and computational complexity. A two-step procedure is used to estimate the parameters of multicomponent third-order PPSs. In the first step, an initial estimate for the phase parameters can be obtained by using fast Fourier transformation (FFT), k-means algorithm and three time positions. In the second step, these initial estimates are refined by a simple moving average filter and singular value decomposition (SVD). The SNR threshold of the proposed algorithm is lower than those of the non-linear least square (NLS) method and the estimation refinement method even though it uses a simple moving average filter. In addition, the proposed method is characterized by significantly lower complexity than computationally intensive NLS methods. Simulations confirm the effectiveness of the proposed method.

  • Frequency-Domain Uniform Asymptotic Solution for Scattered Field by a Coated Cylinder with a Thin Lossy Medium

    Keiji GOTO  Naokatsu SUMIKAWA  Ryo ASAI  Taweedej SANTIKUL  

     
    PAPER

      Vol:
    E99-C No:1
      Page(s):
    18-27

    A frequency-domain (FD) uniform asymptotic solution (FD-UAS) which is useful for engineering applications is newly derived for the two-dimensional scattered magnetic field by a coated conducting cylinder covered with a thin lossy medium. The FD-UAS is uniform in the sense that it remains valid within the transition region adjacent to the shadow boundary, and it smoothly connects a geometric optical ray (GO) solution and a geometrical theory of diffraction (GTD) solution exterior to the transition region, respectively. We assume that the thickness of a coating medium is thin as compared with one wavelength of a cylindrical wave radiated from a magnetic line source. This uniform asymptotic solution is represented by a combination of scattered field component solutions, namely, the GO solution composed of a direct GO (DGO) and a reflected GO, the extended uniform GTD (extended UTD) solution made up of a DGO and a pseudo surface diffracted ray (pseudo SD), the modified UTD solution representing SD series, and the GTD solution for a lowest order SD. The FD-UAS is valid for a source point and/or an observation point located either near the coating surface or in the far-zone. The effectiveness and usefulness of the FD-UAS presented here are confirmed by comparing with both the exact solution and the conventional UTD shadow region solution.

  • The Impact of Information Richness on Fault Localization

    Yan LEI  Min ZHANG  Bixin LI  Jingan REN  Yinhua JIANG  

     
    LETTER-Software Engineering

      Pubricized:
    2015/10/14
      Vol:
    E99-D No:1
      Page(s):
    265-269

    Many recent studies have focused on leveraging rich information types to increase useful information for improving fault localization effectiveness. However, they rarely investigate the impact of information richness on fault localization to give guidance on how to enrich information for improving localization effectiveness. This paper presents the first systematic study to fill this void. Our study chooses four representative information types and investigates the relationship between their richness and the localization effectiveness. The results show that information richness related to frequency execution count involves a high risk of degrading the localization effectiveness, and backward slice is effective in improving localization effectiveness.

  • Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013

    Yasufumi HASHIMOTO  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    58-65

    In PQCrypto 2013, Yasuda, Takagi and Sakurai proposed a new signature scheme as one of multivariate public key cryptosystems (MPKCs). This scheme (called YTS) is based on the fact that there are two isometry classes of non-degenerate quadratic forms on a vector space with a prescribed dimension. The advantage of YTS is its efficiency. In fact, its signature generation is eight or nine times faster than Rainbow of similar size. For the security, it is known that the direct attack, the IP attack and the min-rank attack are applicable on YTS, and the running times are exponential time for the first and the second attacks and sub-exponential time for the third attack. In the present paper, we give a new attack on YTS whose approach is to use the diagonalization of matrices. Our attack works in polynomial time and it actually recovers equivalent secret keys of YTS having 140-bits security against min-rank attack in around fifteen seconds.

  • Method of Audio Watermarking Based on Adaptive Phase Modulation

    Nhut Minh NGO  Masashi UNOKI  

     
    PAPER

      Pubricized:
    2015/10/21
      Vol:
    E99-D No:1
      Page(s):
    92-101

    This paper proposes a method of watermarking for digital audio signals based on adaptive phase modulation. Audio signals are usually non-stationary, i.e., their own characteristics are time-variant. The features for watermarking are usually not selected by combining the principle of variability, which affects the performance of the whole watermarking system. The proposed method embeds a watermark into an audio signal by adaptively modulating its phase with the watermark using IIR all-pass filters. The frequency location of the pole-zero of an IIR all-pass filter that characterizes the transfer function of the filter is adapted on the basis of signal power distribution on sub-bands in a magnitude spectrum domain. The pole-zero locations are adapted so that the phase modulation produces slight distortion in watermarked signals to achieve the best sound quality. The experimental results show that the proposed method could embed inaudible watermarks into various kinds of audio signals and correctly detect watermarks without the aid of original signals. A reasonable trade-off between inaudibility and robustness could be obtained by balancing the phase modulation scheme. The proposed method can embed a watermark into audio signals up to 100 bits per second with 99% accuracy and 6 bits per second with 94.3% accuracy in the cases of no attack and attacks, respectively.

  • Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation

    Keita EMURA  Jae Hong SEO  Taek-Young YOUN  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    83-91

    Boneh and Franklin considered to add the revocation functionality to identity-based encryption (IBE). Though this methodology is applicable to any IBE and hierarchical IBE (HIBE), the resulting scheme is non-scalable. Therefore, a generic transformation of scalable revocable (H)IBE (R(H)IBE) from non-scalable R(H)IBE is really desirable. Towards this final goal, in this paper we introduce prototype RHIBE which does not require to be scalable (but requires some conditions), and propose a generic transformation of scalable RHIBE from prototype RHIBE. Moreover, we construct a prototype RHIBE scheme based on the decisional bilinear Diffie-Hellman (DBDH) assumption. Since our prototype RHIBE provides history-free update, insider security, and decryption key exposure resistance, our construction yields the first RHIBE scheme based on the static assumption with these desirable properties.

  • FFT-Based Block Diagonalization at User Terminal for Implicit Beamforming in Multiuser MIMO System

    Hayate KIMOTO  Kentaro NISHIMORI  Takefumi HIRAGURI  Hideo MAKINO  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    115-123

    This paper proposes Fast Fourier Transform (FFT) based orthogonal beam selection method at the user terminals (UTs) to reduce the number of nulls for the other users except an intended user by the Block Diagonalization (BD) algorithm in multiuser MIMO (MU-MIMO) sytems. The BD algorithm has been proposed in order to realize MU-MIMO broadcast transmission with a realistic signal processing burden. The BD algorithm cancels inter-user interference by creating the weights so that the channel matrixes for the other users are set to be zero matrixes. However, when the number of transmit antennas is equals to the total number of received antennas, the transmission rate by the BD algorithm is decreased. The proposed method realizes the performance improvement compared to the conventional BD algorithm without the burden on the UTs. It is verified via bit error rate (BER) evaluation that the proposed method is effective compared to the conventional BD algorithm and antenna selection method. Moreover, the effectiveness of proposed method is verified by the performance evaluation considering medium access control (MAC) layer in a comparison with the conventional BD algorithm which needs the channel state information (CSI) feedback. Because the proposed method can be easily applied to beamforming without the CSI feedback (implicit beamforming), it is shown that the propose method is effective from a point of view on the transmission efficiency in MU-MIMO system.

  • Reversible Audio Data Hiding Based on Variable Error-Expansion of Linear Prediction for Segmental Audio and G.711 Speech

    Akira NISHIMURA  

     
    PAPER

      Pubricized:
    2015/10/21
      Vol:
    E99-D No:1
      Page(s):
    83-91

    Reversible data hiding is a technique in which hidden data are embedded in host data such that the consistency of the host is perfectly preserved and its data are restored during extraction of the hidden data. In this paper, a linear prediction technique for reversible data hiding of audio waveforms is improved. The proposed variable expansion method is able to control the payload size through varying the expansion factor. The proposed technique is combined with the prediction error expansion method. Reversible embedding, perfect payload detection, and perfect recovery of the host signal are achieved for a framed audio signal. A smaller expansion factor results in a smaller payload size and less degradation in the stego audio quality. Computer simulations reveal that embedding a random-bit payload of less than 0.4 bits per sample into CD-format music signals provide stego audio with acceptable objective quality. The method is also applied to G.711 µ-law-coded speech signals. Computer simulations reveal that embedding a random-bit payload of less than 0.1 bits per sample into speech signals provide stego speech with good objective quality.

  • Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems

    Ibuki NAKAMURA  Yoshihide TONOMURA  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2015/10/21
      Vol:
    E99-D No:1
      Page(s):
    60-68

    We focus on the feature transform approach as one methodology for biometric template protection, where the template consists of the features extracted from the biometric trait. This study considers some properties of the unitary (including orthogonal) transform-based template protection in particular. It is known that the Euclidean distance between the templates protected by a unitary transform is the same as that between original (non-protected) ones as a property. In this study, moreover, it is shown that it provides the same results in l2-norm minimization problems as those of original templates. This means that there is no degradation of recognition performance in authentication systems using l2-norm minimization. Therefore, the protected templates can be reissued multiple times without original templates. In addition, a DFT-based template protection scheme is proposed as an unitary transform-based one. The proposed scheme enables to efficiently generate protected templates by the FFT, in addition to the useful properties. It is also applied to face recognition experiments to evaluate the effectiveness.

  • Indoor Channel Characterization and Performance Evaluation with Directional Antenna and Multiple Beam Combining

    Xiaoya ZUO  Ding WANG  Rugui YAO  Guomei ZHANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    104-114

    Ultra-wideband (UWB) beamforming is now attracting significant research attention for attaining spatial gain from array antennas. It is commonly believed that directional antenna based communication could improve the system performance. In order to further make clear the relationship between system performance and the antenna array beamforming, UWB indoor channels are extracted from practical measurements and circular horn antenna is used to characterize the channel properties and to evaluate the system performance. Using a single beam directional antenna with a certain half power beamwidth (HPBW), the channel capacity and the bit-error-rate (BER) performance of a UWB RAKE receiver are evaluated. In the line-of-sight (LOS) environments, the channel capacity and BER performance are improved with the beamwidth becoming smaller. However in the non-line-of-sight (NLOS) environments, the capacity and BER performance are not always better with directional antennas. And the variation trend between the system performance and the antenna beamwidth disappears. This is mainly because that there exist no dominant strong path components like those seen in LOS environments. Then beam combining is introduced to further improve the system performance. Simulation results show that the channel capacity and BER performance cloud be greatly improved by multiple beam combining, especially for the NLOS environments. This reminds us that when antenna beamforming is used to obtain array gain, the beamwidth should be carefully designed and beam combining is necessary to obtain optimal performance, especially in NLOS environments.

661-680hit(3161hit)