Yoshitaka HARA Kazuyoshi OSHIMA
This paper proposes a pilot-based channel state information (CSI) feedback from a terminal to a base station (BS), considering the terminal's co-channel interference in a time-division duplex/multi-input multi-output system. In the proposed method, the terminal determines a precoding matrix according to the terminal's co-channel interference characteristics and transmits the precoded pilot signals on uplink. Using the responses of the precoded pilot signals, the BS determines appropriate weight vectors for downlink transmit beams considering the terminal's interference characteristics. Furthermore, the BS can predict the terminal's output signal-to-interference-plus-noise power ratio (SINR) for the downlink data stream. Numerical results show that the BS can achieve efficient transmission and accurate SINR prediction using the proposed CSI feedback.
Nonnegative matrix factorization (NMF) and its extensions such as Nonnegative Tensor Factorization (NTF) have become prominent techniques for blind sources separation (BSS), analysis of image databases, data mining and other information retrieval and clustering applications. In this paper we propose a family of efficient algorithms for NMF/NTF, as well as sparse nonnegative coding and representation, that has many potential applications in computational neuroscience, multi-sensory processing, compressed sensing and multidimensional data analysis. We have developed a class of optimized local algorithms which are referred to as Hierarchical Alternating Least Squares (HALS) algorithms. For these purposes, we have performed sequential constrained minimization on a set of squared Euclidean distances. We then extend this approach to robust cost functions using the alpha and beta divergences and derive flexible update rules. Our algorithms are locally stable and work well for NMF-based blind source separation (BSS) not only for the over-determined case but also for an under-determined (over-complete) case (i.e., for a system which has less sensors than sources) if data are sufficiently sparse. The NMF learning rules are extended and generalized for N-th order nonnegative tensor factorization (NTF). Moreover, these algorithms can be tuned to different noise statistics by adjusting a single parameter. Extensive experimental results confirm the accuracy and computational performance of the developed algorithms, especially, with usage of multi-layer hierarchical NMF approach [3].
We propose a new filter method for feature selection for SELDI-TOF mass spectrum datasets. In the method, a new relevance index was defined to represent the goodness of a feature by considering the distribution of samples based on the counts. The relevance index can be used to obtain the feature sets for classification. Our method can be applied to mass spectrum datasets with extremely high dimensions and process the clinical datasets with practical sizes in acceptable calculation time since it is based on simple counting of samples. The new method was applied to the three public mass spectrum datasets and showed better or comparable results than conventional filter methods.
Ryoso HAMANE Toshiya ITOH Kouhei TOMITA
When a store sells items to customers, the store wishes to determine the prices of the items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a set E of m customers who wish to buy those items, and also assume that each item i ∈ V has the production cost di and each customer ej ∈ E has the valuation vj on the bundle ej ⊆ V of items. When the store sells an item i ∈ V at the price ri, the profit for the item i is pi=ri-di. The goal of the store is to decide the price of each item to maximize its total profit. We refer to this maximization problem as the item pricing problem. In most of the previous works, the item pricing problem was considered under the assumption that pi ≥ 0 for each i ∈ V, however, Balcan, et al. [In Proc. of WINE, LNCS 4858, 2007] introduced the notion of "loss-leader," and showed that the seller can get more total profit in the case that pi < 0 is allowed than in the case that pi < 0 is not allowed. In this paper, we derive approximation preserving reductions among several item pricing problems and show that all of them have algorithms with good approximation ratio.
Kamya Yekeh YAZDANDOOST Ryuji KOHNO
The medical care day by day and more and more is associated with and reliant upon concepts and advances of electronics and electromagnetics. Numerous medical devices are implanted in the body for medical use. Tissue implanted devices are of great interest for wireless medical applications due to the promising of different clinical usage to promote a patient independence. It can be used in hospitals, health care facilities and home to transmit patient measurement data, such as pulse and respiration rates to a nearby receiver, permitting greater patient mobility and increased comfort. As this service permits remote monitoring of several patients simultaneously it could also potentially decrease health care costs. Advancement in radio frequency communications and miniaturization of bioelectronics are supporting medical implant applications. A central component of wireless implanted device is an antenna and there are several issues to consider when designing an in-body antenna, including power consumption, size, frequency, biocompatibility and the unique RF transmission challenges posed by the human body. The radiation characteristics of such devices are important in terms of both safety and performance. The implanted antenna and human body as a medium for wireless communication are discussed over Medical Implant Communications Service (MICS) band in the frequency range of 402-405 MHz.
Jingyu HUA Limin MENG Gang LI Dongming WANG Xiaohu YOU
In this letter, we first investigate the bias of Doppler shift estimator based on autocorrelation function (ACF). Then we derive a signal-to-noise ratio (SNR) independent condition for Doppler shift estimation and achieve this condition by a adaptive process. Moreover, we present theoretical analysis about the convergency of our adaptive Doppler shift estimator, and derive a close-form expression for its mean square error (MSE). We verify the proposed estimator by computer simulation, the results of which are in agreement with the analysis, i.e., the proposed method achieves a good SNR-independent performance in a wide range of velocities and SNRs.
Jung-Soo CHUNG Young-Sik KIM Tae-Hyung LIM Jong-Seon NO Habong CHUNG
In this letter, we enumerate the number of cyclically inequivalent M-ary Sidel'nikov sequences of given length as well as the number of distinct autocorrelation distributions that they can have, while we change the primitive element for generating the sequence.
Takehito SUZUKI Jiro HIROKAWA Makoto ANDO
This paper presents the formulation for the evaluation of external coupling in the alternating-phase feed single-layer slotted waveguide array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. A one-dimensional slot array is extracted from the array by assuming the periodicity in transversal direction and introducing the perfect electric conductors in the external region. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot pair which accelerate the iteration. Experiment at 25.3 GHz demonstrates good uniformity of the aperture field distribution as well as the effects of the baffles. The directivity is 32.7 dB which corresponds to the aperture efficiency 90.5% and the reflection is below -15.0 dB over 1.3 GHz.
Yang CUI Eiichiro FUJISAKI Goichiro HANAOKA Hideki IMAI Rui ZHANG
In a seminal paper of identity based encryption (IBE), Boneh and Franklin [6] mentioned an interesting transform from an IBE scheme to a signature scheme, which was observed by Moni Naor. In this paper, we give formal security treatments for this transform and discover several implications and separations among security notions of IBE and transformed signature. For example, we show for such a successful transform, one-wayness of IBE is an essential condition. Additionally, we give a sufficient and necessary condition for converting a semantically secure IBE scheme into an existentially unforgeable signature scheme. Our results help establish strategies on design and automatic security proof of signature schemes from (possibly weak) IBE schemes. We also show some separation results which strongly support that one-wayness, rather than semantic security, of IBE captures an essential condition to achieve secure signature.
Khoongming KHOO Guanhan CHEW Guang GONG Hian-Kiat LEE
In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a general Maiorana-McFarland function. This allows us to apply the attack to a wider class of stream ciphers. Second, we highlight how the choice of different Maiorana-McFarland functions can affect the effectiveness of our attack. Third, we show that the attack can be modified to apply on filter functions which are smaller than the LFSR and on filter-combiner stream ciphers. This allows us to cryptanalyze other configurations commonly found in practice. Finally, filter functions with vector output are sometimes used in stream ciphers to improve the throughput. Therefore the case when the Maiorana-McFarland functions have vector output is investigated. We found that the extra speed comes at the price of additional weaknesses which make the attacks easier.
This paper presents an easy and efficient modification of simplified 2D ray-launching method, by approximately including multiple reflection effect inside walls for indoor environment. In order to precisely carry out the ray-launching procedure inside lossy wall, a simple modification using a true real refraction angle is first introduced, instead of complex one. Furthermore, an efficient approximation is carried out to collect the internal multiple reflected rays into the primary one. We here call it collective ray approach. Consequently, it is confirmed from the detailed considerations that the present ray representations obtained by introducing the real refraction angle are well suitable for indoor propagation analysis, and in particular the collective ray solution can be utilized confidently even when the internal reflections strongly contribute to the propagation feature of the considered indoor environment.
In this letter, a novel power allocation scheme is proposed to improve the outage performance of an amplify-and-forward (AF) cooperative communication network with multiple potential relays under the assumption that only mean channel gains are available at the transmitters. In this scheme, power allocation is studied jointly with a relay selection algorithm which has low computational complexity. Simulation results demonstrate the performance improvement of the proposed scheme in terms of outage behavior.
Ruicong ZHI Qiuqi RUAN Jiying WU
This paper proposes a novel algorithm for image feature extraction-the dual two-dimensional fuzzy class preserving projections ((2D)2FCPP). The main advantages of (2D)2FCPP over two-dimensional locality preserving projections (2DLPP) are: (1) utilizing the fuzzy assignation mechanisms to construct the weight matrix, which can improve the classification results; (2) incorporating 2DLPP and alternative 2DLPP to get a more efficient dimensionality reduction method-(2D)2LPP.
Kazuhiro OGATA Kokichi FUTATSUGI
Proofs written in algebraic specification languages are called proof scores. The proof score approach to design verification is attractive because it provides a flexible way to prove that designs for systems satisfy properties. Thus far, however, the approach has focused on safety properties. In this paper, we describe a way to verify that designs for systems satisfy liveness properties with the approach. A mutual exclusion protocol using a queue is used as an example. We describe the design verification and explain how it is verified that the protocol satisfies the lockout freedom property.
Takeshi ITO Hiroyuki OHSAKI Makoto IMASE
In this paper, we propose an extension to GridFTP that optimizes its performance by dynamically adjusting the number of parallel TCP connections. GridFTP has been used as a data transfer protocol to effectively transfer a large volume of data in Grid computing. GridFTP supports a feature called parallel data transfer that improves throughput by establishing multiple TCP connections in parallel. However, for achieving high GridFTP throughput, the number of TCP connections should be optimized based on the network status. In this paper, we propose an automatic parallelism tuning mechanism called GridFTP-APT (GridFTP with Automatic Parallelism Tuning) that adjusts the number of parallel TCP connections according to information available to the Grid middleware. Through simulations, we demonstrate that GridFTP-APT significantly improves the performance of GridFTP in various network environments.
Yi WANG Xuan ZENG Jun TAO Hengliang ZHU Wei CAI
In this paper, we propose an Adaptive Stochastic Collocation Method for block-based Statistical Static Timing Analysis (SSTA). A novel adaptive method is proposed to perform SSTA with delays of gates and interconnects modeled by quadratic polynomials based on Homogeneous Chaos expansion. In order to approximate the key atomic operator MAX in the full random space during timing analysis, the proposed method adaptively chooses the optimal algorithm from a set of stochastic collocation methods by considering different input conditions. Compared with the existing stochastic collocation methods, including the one using dimension reduction technique and the one using Sparse Grid technique, the proposed method has 10x improvements in the accuracy while using the same order of computation time. The proposed algorithm also shows great improvement in accuracy compared with a moment matching method. Compared with the 10,000 Monte Carlo simulations on ISCAS85 benchmark circuits, the results of the proposed method show less than 1% error in the mean and variance, and nearly 100x speeds up.
Alexander JESSER Stefan LAEMMERMANN Alexander PACHOLIK Roland WEISS Juergen RUF Lars HEDRICH Wolfgang FENGLER Thomas KROPF Wolfgang ROSENSTIEL
Functional and formal verification are important methodologies for complex mixed-signal design validation. However the industry is still verifying such systems by pure simulation. This process lacks on error localization and formal verifications methods. This is the existing verification gap between the analog and digital blocks within a mixed-signal system. Our approach improves the verification process by creating temporal properties named mixed-signal assertions which are described by a combination of digital assertions and analog properties. The proposed method is a new assertion-based verification flow for designing mixed-signal circuits. The effectiveness of the approach is demonstrated on a Σ/Δ-converter.
Zhaoxi FANG Liangbin LI Zongxin WANG
This letter studies the asymptotic bit error rate (BER) performance of multihop communication systems with amplify-and-forward relaying over Nakagami-m fading channels. Since it is difficult to find the exact probability density function (PDF) of the output signal-to-noise ratio (SNR) at the destination, we resort to the series expansion of this PDF in the neighborhood of zero. Building upon this result, a closed-form expression for the average BER in the high SNR region is derived. Numeric results show that the derived asymptotic BER expression is accurate at medium and high SNR for both independent identically distributed (i.i.d.) and independent non-identically distributed (i.n.i.d.) channels.
Hongwei ZHU Ilie I. LUICAN Florin BALASA Dhiraj K. PRADHAN
In real-time data-dominated communication and multimedia processing applications, a multi-layer memory hierarchy is typically used to enhance the system performance and also to reduce the energy consumption. Savings of dynamic energy can be obtained by accessing frequently used data from smaller on-chip memories rather than from large background memories. This paper focuses on the reduction of the dynamic energy consumption in the memory subsystem of multidimensional signal processing systems, starting from the high-level algorithmic specification of the application. The paper presents a formal model which identifies those parts of arrays more intensely accessed, taking also into account the relative lifetimes of the signals. Tested on a two-layer memory hierarchy, this model led to savings of dynamic energy from 40% to over 70% relative to the energy used in the case of flat memory designs.
Yuen-Hong Alvin HO Chi-Un LEI Hing-Kit KWAN Ngai WONG
In the context of multiple constant multiplication (MCM) design, we propose a novel common sub-expression elimination (CSE) algorithm that models the optimal synthesis of coefficients into a 0-1 mixed-integer linear programming (MILP) problem with a user-defined generic logic depth constraint. We also propose an efficient solution space, which combines all minimal signed digit (MSD) representations and the shifted sum (difference) of coefficients. In the examples we demonstrate, the combination of the proposed algorithm and solution space gives a better solution comparing to existing algorithms.