The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ions(1385hit)

161-180hit(1385hit)

  • Energy/Space-Efficient Rapid Single-Flux-Quantum Circuits by Using π-Shifted Josephson Junctions

    Tomohiro KAMIYA  Masamitsu TANAKA  Kyosuke SANO  Akira FUJIMAKI  

     
    PAPER

      Vol:
    E101-C No:5
      Page(s):
    385-390

    We present a concept of an advanced rapid single-flux-quantum (RSFQ) logic circuit family using the combination of 0-shifted and π-shifted Josephson junctions. A π-shift in the current-phase relationship can be obtained in several types of Josephson junctions, such as Josephson junctions containing a ferromagnet barrier layer, depending on its thickness and temperature. We use a superconducting quantum interference devices composed of a pair of 0- and π-shifted Josephson junctions (0-π SQUIDs) as a basic circuit element. Unlike the conventional RSFQ logic, bistability is obtained by spontaneous circular currents without using a large superconductor loop, and the state can be flipped by smaller driving currents. These features lead to energy- and/or space-efficient logic gates. In this paper, we show several example circuits where we represent signals by flips of the states of a 0-π SQUID. We obtained successful operation of the circuits from numerical simulation.

  • Extraction and Recognition of Shoe Logos with a Wide Variety of Appearance Using Two-Stage Classifiers

    Kazunori AOKI  Wataru OHYAMA  Tetsushi WAKABAYASHI  

     
    PAPER-Machine Vision and its Applications

      Pubricized:
    2018/02/16
      Vol:
    E101-D No:5
      Page(s):
    1325-1332

    A logo is a symbolic presentation that is designed not only to identify a product manufacturer but also to attract the attention of shoppers. Shoe logos are a challenging subject for automatic extraction and recognition using image analysis techniques because they have characteristics that distinguish them from those of other products; that is, there is much within-class variation in the appearance of shoe logos. In this paper, we propose an automatic extraction and recognition method for shoe logos with a wide variety of appearance using a limited number of training samples. The proposed method employs maximally stable extremal regions for the initial region extraction, an iterative algorithm for region grouping, and gradient features and a support vector machine for logo recognition. The results of performance evaluation experiments using a logo dataset that consists of a wide variety of appearances show that the proposed method achieves promising performance for both logo extraction and recognition.

  • Having an Insight into Malware Phylogeny: Building Persistent Phylogeny Tree of Families

    Jing LIU  Pei Dai XIE  Meng Zhu LIU  Yong Jun WANG  

     
    LETTER-Information Network

      Pubricized:
    2018/01/09
      Vol:
    E101-D No:4
      Page(s):
    1199-1202

    Malware phylogeny refers to inferring evolutionary relationships between instances of families. It has gained a lot of attention over the past several years, due to its efficiency in accelerating reverse engineering of new variants within families. Previous researches mainly focused on tree-based models. However, those approaches merely demonstrate lineage of families using dendrograms or directed trees with rough evolution information. In this paper, we propose a novel malware phylogeny construction method taking advantage of persistent phylogeny tree model, whose nodes correspond to input instances and edges represent the gain or lost of functional characters. It can not only depict directed ancestor-descendant relationships between malware instances, but also show concrete function inheritance and variation between ancestor and descendant, which is significant in variants defense. We evaluate our algorithm on three malware families and one benign family whose ground truth are known, and compare with competing algorithms. Experiments demonstrate that our method achieves a higher mean accuracy of 61.4%.

  • Sentiment Classification for Hotel Booking Review Based on Sentence Dependency Structure and Sub-Opinion Analysis

    Tran Sy BANG  Virach SORNLERTLAMVANICH  

     
    PAPER-Datamining Technologies

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    909-916

    This paper presents a supervised method to classify a document at the sub-sentence level. Traditionally, sentiment analysis often classifies sentence polarity based on word features, syllable features, or N-gram features. A sentence, as a whole, may contain several phrases and words which carry their own specific sentiment. However, classifying a sentence based on phrases and words can sometimes be incoherent because they are ungrammatically formed. In order to overcome this problem, we need to arrange words and phrase in a dependency form to capture their semantic scope of sentiment. Thus, we transform a sentence into a dependency tree structure. A dependency tree is composed of subtrees, and each subtree allocates words and syllables in a grammatical order. Moreover, a sentence dependency tree structure can mitigate word sense ambiguity or solve the inherent polysemy of words by determining their word sense. In our experiment, we provide the details of the proposed subtree polarity classification for sub-opinion analysis. To conclude our discussion, we also elaborate on the effectiveness of the analysis result.

  • A 28-GHz Fractional-N Frequency Synthesizer with Reference and Frequency Doublers for 5G Mobile Communications in 65nm CMOS

    Hanli LIU  Teerachot SIRIBURANON  Kengo NAKATA  Wei DENG  Ju Ho SON  Dae Young LEE  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E101-C No:4
      Page(s):
    187-196

    This paper presents a 27.5-29.6GHz fractional-N frequency synthesizer using reference and frequency doublers to achieve low in-band and out-of-band phase-noise for 5G mobile communications. A consideration of the baseband carrier recovery circuit helps estimate phase noise requirement for high modulation scheme. The push-push amplifier and 28GHz balun help achieving differential signals with low out-of-band phase noise while consuming low power. A charge pump with gated offset as well as reference doubler help reducing PD noise resulting in low in-band phase noise while sampling loop filter helps reduce spurs. The proposed synthesizer has been implemented in 65nm CMOS technology achieving an in-band and out-of-band phase noise of -78dBc/Hz and -126dBc/Hz, respectively. It consumes only a total power of 33mW. The jitter-power figure-of-merit (FOM) is -231dB which is the highest among the state of the art >20GHz fractional-N PLLs using a low reference clock (<200MHz). The measured reference spurs are less than -80dBc.

  • vEPC Optimal Resource Assignment Method for Accommodating M2M Communications

    Kazuki TANABE  Hiroki NAKAYAMA  Tsunemasa HAYASHI  Katsunori YAMAOKA  

     
    PAPER

      Pubricized:
    2017/09/19
      Vol:
    E101-B No:3
      Page(s):
    637-647

    The 5G mobile network environment has been studied and developed, and the concept of a vEPC (Virtualized Evolved Packet Core) has been introduced as a framework for Network Functions Virtualization (NFV). Machine-to-Machine (M2M) communications in 5G networks require much faster response than are possible in 4G networks. However, if both the control plane (C-plane) and the data plane (D-plane) functions of the EPC are migrated into a single vEPC server, M2M devices and other user equipments (UEs) share the same resources. To accommodate delay-sensitive M2M sessions in vEPC networks, not only signaling performance on the C-plane but also packet processing performance on the D-plane must be optimized. In this paper, we propose a method for optimizing resource assignment of C-plane and D-plane Virtualized Network Functions (VNFs) in a vEPC server, called the vEPC-ORA method. We distinguish the communications of M2M devices and smartphones and model the vEPC server by using queueing theory. Numerical analysis of optimal resource assignment shows that our proposed method minimizes the blocking rates of M2M sessions and smartphone sessions. We also confirmed that the mean packet processing time is kept within the allowable delay for each communication type, as long as the vEPC server has enough VM resources. Moreover, we study a resource granularity effect on the optimal resource assignment. Numerical analysis under a fixed number of hardware resources of MME and S/P-GW is done for various resource granularities of the vEPC server. The evaluation results of numerical analyses showed that the vEPC-ORA method derives the optimal resource assignment in practical calculation times.

  • A Sub-1-µs Start-Up Time, Fully-Integrated 32-MHz Relaxation Oscillator for Low-Power Intermittent Systems

    Hiroki ASANO  Tetsuya HIROSE  Taro MIYOSHI  Keishi TSUBAKI  Toshihiro OZAKI  Nobutaka KUROKI  Masahiro NUMA  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:3
      Page(s):
    161-169

    This paper presents a fully integrated 32-MHz relaxation oscillator (ROSC) capable of sub-1-µs start-up time operation for low-power intermittent VLSI systems. The proposed ROSC employs current mode architecture that is different from conventional voltage mode architecture. This enables compact and fast switching speed to be achieved. By designing transistor sizes equally between one in a bias circuit and another in a voltage to current converter, the effect of process variation can be minimized. A prototype chip in a 0.18-µm CMOS demonstrated that the ROSC generates a stable clock frequency of 32.6 MHz within 1-µs start-up time. Measured line regulation and temperature coefficient were ±0.69% and ±0.38%, respectively.

  • Construction of Permutations and Bent Functions

    Shanqi PANG  Miao FENG  Xunan WANG  Jing WANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E101-A No:3
      Page(s):
    604-607

    Bent functions have been applied to cryptography, spread spectrum, coding theory, and combinatorial design. Permutations play an important role in the design of cryptographic transformations such as block ciphers, hash functions and stream ciphers. By using the Kronecker product this paper presents a general recursive construction method of permutations over finite field. As applications of our method, several infinite classes of permutations are obtained. By means of the permutations obtained and M-M functions we construct several infinite families of bent functions.

  • An Overview of China Millimeter-Wave Multiple Gigabit Wireless Local Area Network System Open Access

    Wei HONG  Shiwen HE  Haiming WANG  Guangqi YANG  Yongming HUANG  Jixing CHEN  Jianyi ZHOU  Xiaowei ZHU  Nianzhu ZHANG  Jianfeng ZHAI  Luxi YANG  Zhihao JIANG  Chao YU  

     
    INVITED PAPER

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    262-276

    This paper presents an overview of the advance of the China millimeter-wave multiple gigabit (CMMG) wireless local area network (WLAN) system which operates in the 45 GHz frequency band. The CMMG WLAN system adopts the multiple antennas technologies to support data rate up to 15Gbps. During the progress of CMMG WLAN standardization, some new key technologies were introduced to adapt the millimeter-wave characteristic, including the usage of the zero correlation zone (ZCZ) sequence, a novel lower density parity check code (LDPC)-based packet encoding, and multiple input multiple output (MIMO) single carrier transmission. Extensive numerical results and system prototype test are also given to validate the performance of the technologies adopted by CMMG WLAN system.

  • Workload Estimation for Firewall Rule Processing on Network Functions Virtualization

    Dai SUZUKI  Satoshi IMAI  Toru KATAGIRI  

     
    PAPER-Network

      Pubricized:
    2017/08/08
      Vol:
    E101-B No:2
      Page(s):
    528-537

    Network Functions Virtualization (NFV) is expected to provide network systems that offer significantly lower cost and greatly flexibility to network service providers and their users. Unfortunately, it is extremely difficult to implement Virtualized Network Functions (VNFs) that can equal the performance of Physical Network Functions. To realize NFV systems that have adequate performance, it is critical to accurately grasp VNF workload. In this paper, we focus on the virtual firewall as a representative VNF. The workload of the virtual firewall is mostly determined by firewall rule processing and the Access Control List (ACL) configurations. Therefore, we first reveal the major factors influencing the workload of the virtual firewall and some issues of monitoring CPU load as a traditional way of understanding the workload of virtual firewalls through preliminary experiments. Additionally, we propose a new workload metric for the virtual firewall that is derived by mathematical models of the firewall workload in consideration of the packet processing in each rule and the ACL configurations. Furthermore, we show the effectiveness of the proposed workload metric through various experiments.

  • Facial Expression Recognition via Regression-Based Robust Locality Preserving Projections

    Jingjie YAN  Bojie YAN  Ruiyu LIANG  Guanming LU  Haibo LI  Shipeng XIE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/11/06
      Vol:
    E101-D No:2
      Page(s):
    564-567

    In this paper, we present a novel regression-based robust locality preserving projections (RRLPP) method to effectively deal with the issue of noise and occlusion in facial expression recognition. Similar to robust principal component analysis (RPCA) and robust regression (RR) approach, the basic idea of the presented RRLPP approach is also to lead in the low-rank term and the sparse term of facial expression image sample matrix to simultaneously overcome the shortcoming of the locality preserving projections (LPP) method and enhance the robustness of facial expression recognition. However, RRLPP is a nonlinear robust subspace method which can effectively describe the local structure of facial expression images. The test results on the Multi-PIE facial expression database indicate that the RRLPP method can effectively eliminate the noise and the occlusion problem of facial expression images, and it also can achieve better or comparative facial expression recognition rate compared to the non-robust and robust subspace methods meantime.

  • Performance Evaluation of Variable Bandwidth Channel Allocation Scheme in Multiple Subcarrier Multiple Access

    Nitish RAJORIA  Hiromu KAMEI  Jin MITSUGI  Yuusuke KAWAKITA  Haruhisa ICHIKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/03
      Vol:
    E101-B No:2
      Page(s):
    564-572

    Multiple Subcarrier Multiple Access (MSMA) enables concurrent sensor data streamings from multiple wireless and batteryless sensors using the principle of subcarrier backscatter used extensively in passive RFID. Since the interference cancellation performance of MSMA depends on the Signal to Interference plus Noise Ratio of each subcarrier, the choice of channel allocation scheme is essential. Since the channel allocation is a combinatorial problem, obtaining the true optimal allocation requires a vast amount of examinations which is impracticable in a system where we have tens of sensor RF tags. It is particularly true when we have variable distance and variable bandwidth sensor RF tags. This paper proposes a channel allocation scheme in the variable distance and variable bandwidth MSMA system based on a newly introduced performance index, total contamination power, to prioritize indecision cases. The performance of the proposal is evaluated with existing methods in terms of average communication capacity and system fairness using MATLAB Monte Carlo simulation to reveal its advantage. The accuracy of the simulation is also verified with the result obtained from the brute force method.

  • Learning Deep Relationship for Object Detection

    Nuo XU  Chunlei HUO  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/09/28
      Vol:
    E101-D No:1
      Page(s):
    273-276

    Object detection has been a hot topic of image processing, computer vision and pattern recognition. In recent years, training a model from labeled images using machine learning technique becomes popular. However, the relationship between training samples is usually ignored by existing approaches. To address this problem, a novel approach is proposed, which trains Siamese convolutional neural network on feature pairs and finely tunes the network driven by a small amount of training samples. Since the proposed method considers not only the discriminative information between objects and background, but also the relationship between intraclass features, it outperforms the state-of-arts on real images.

  • Wiener-Hopf Analysis of the Plane Wave Diffraction by a Thin Material Strip: the Case of E Polarization

    Takashi NAGASAKA  Kazuya KOBAYASHI  

     
    PAPER-Electromagnetic Theory

      Vol:
    E101-C No:1
      Page(s):
    12-19

    The problem of E-polarized plane wave diffraction by a thin material strip is analyzed using the Wiener-Hopf technique together with approximate boundary conditions. Exact and high-frequency asymptotic solutions are obtained. Our final solution is valid for the case where the strip thickness is small and the strip width is large in comparison to the wavelength. The scattered field is evaluated asymptotically based on the saddle point method and a far field expression is derived. Numerical examples on the radar cross section (RCS) are presented for various physical parameters and the scattering characteristics of the strip are discussed in detail.

  • Bounded Real Balanced Truncation of RLC Networks with Reciprocity Consideration

    Yuichi TANJI  

     
    PAPER

      Vol:
    E100-A No:12
      Page(s):
    2816-2823

    An efficient reciprocity and passivity preserving balanced truncation for RLC networks is presented in this paper. Reciprocity and passivity are fundamental principles of linear passive networks. Hence, reduction with preservation of reciprocity and passivity is necessary to simulate behavior of the circuits including the RLC networks accurately and stably. Moreover, the proposed method is more efficient than the previous balanced truncation methods, because sparsity patterns of the coefficient matrices for the circuit equations of the RLC networks are fully available. In the illustrative examples, we will show that the proposed method is compatible with PRIMA, which is known as a general reduction method of RLC networks, in efficiency and used memory, and is more accurate at high frequencies than PRIMA.

  • An Efficient GPU Implementation of CKY Parsing Using the Bitwise Parallel Bulk Computation Technique

    Toru FUJITA  Koji NAKANO  Yasuaki ITO  Daisuke TAKAFUJI  

     
    PAPER-GPU computing

      Pubricized:
    2017/08/04
      Vol:
    E100-D No:12
      Page(s):
    2857-2865

    The main contribution of this paper is to present an efficient GPU implementation of bulk computation of the CKY parsing for a context-free grammar, which determines if a context-free grammar derives each of a lot of input strings. The bulk computation is to execute the same algorithm for a lot of inputs in turn or at the same time. The CKY parsing is to determine if a context-free grammar derives a given string. We show that the bulk computation of the CKY parsing can be implemented in the GPU efficiently using Bitwise Parallel Bulk Computation (BPBC) technique. We also show the rule minimization technique and the dynamic scheduling method for further acceleration of the CKY parsing on the GPU. The experimental results using NVIDIA TITAN X GPU show that our implementation of the bitwise-parallel CKY parsing for strings of length 32 takes 395µs per string with 131072 production rules for 512 non-terminal symbols.

  • Triple Prediction from Texts by Using Distributed Representations of Words

    Takuma EBISU  Ryutaro ICHISE  

     
    PAPER-Natural Language Processing

      Pubricized:
    2017/09/12
      Vol:
    E100-D No:12
      Page(s):
    3001-3009

    Knowledge graphs have been shown to be useful to many tasks in artificial intelligence. Triples of knowledge graphs are traditionally structured by human editors or extracted from semi-structured information; however, editing is expensive, and semi-structured information is not common. On the other hand, most such information is stored as text. Hence, it is necessary to develop a method that can extract knowledge from texts and then construct or populate a knowledge graph; this has been attempted in various ways. Currently, there are two approaches to constructing a knowledge graph. One is open information extraction (Open IE), and the other is knowledge graph embedding; however, neither is without problems. Stanford Open IE, the current best such system, requires labeled sentences as training data, and knowledge graph embedding systems require numerous triples. Recently, distributed representations of words have become a hot topic in the field of natural language processing, since this approach does not require labeled data for training. These require only plain text, but Mikolov showed that it can perform well with the word analogy task, answering questions such as, “a is to b as c is to __?.” This can be considered as a knowledge extraction task from a text for finding the missing entity of a triple. However, the accuracy is not sufficiently high when applied in a straightforward manner to relations in knowledge graphs, since the method uses only one triple as a positive example. In this paper, we analyze why distributed representations perform such tasks well; we also propose a new method for extracting knowledge from texts that requires much less annotated data. Experiments show that the proposed method achieves considerable improvement compared with the baseline; in particular, the improvement in HITS@10 was more than doubled for some relations.

  • Wireless Packet Communications Protected by Secret Sharing and Vector Coding

    Shoichiro YAMASAKI  Tomoko K. MATSUSHIMA  Shinichiro MIYAZAKI  Kotoku OMURA  Hirokazu TANAKA  

     
    PAPER-Communication Theory and Systems

      Vol:
    E100-A No:12
      Page(s):
    2680-2690

    Secret sharing is a method to protect information for security. The information is divided into n shares, and the information is reconstructed from any k shares but no knowledge of it is revealed from k-1 shares. Physical layer security is a method to yield a favorable receive condition to an authorized destination terminal in wireless communications based on multi-antenna transmission. In this study, we propose wireless packet communications protected by the secret sharing based on Reed Solomon coding and the physical layer security based on vector coding, which implements a single-antenna system and a multi-antenna system. Evaluation results show the validity of the proposed scheme.

  • Weighted Voting of Discriminative Regions for Face Recognition

    Wenming YANG  Riqiang GAO  Qingmin LIAO  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/08/04
      Vol:
    E100-D No:11
      Page(s):
    2734-2737

    This paper presents a strategy, Weighted Voting of Discriminative Regions (WVDR), to improve the face recognition performance, especially in Small Sample Size (SSS) and occlusion situations. In WVDR, we extract the discriminative regions according to facial key points and abandon the rest parts. Considering different regions of face make different contributions to recognition, we assign weights to regions for weighted voting. We construct a decision dictionary according to the recognition results of selected regions in the training phase, and this dictionary is used in a self-defined loss function to obtain weights. The final identity of test sample is the weighted voting of selected regions. In this paper, we combine the WVDR strategy with CRC and SRC separately, and extensive experiments show that our method outperforms the baseline and some representative algorithms.

  • esVHO: Energy Saving Vertical Handover Extension for Local SDN in Non-Interconnected Environment

    Toan Nguyen DUC  Eiji KAMIOKA  

     
    PAPER

      Pubricized:
    2017/05/16
      Vol:
    E100-B No:11
      Page(s):
    2027-2037

    Wireless technologies that offer high data rate are generally energy-consuming ones while low-energy technologies commonly provide low data rate. Both kinds of technologies have been integrated in a single mobile device for different services. Therefore, if the service does not always require high data rate, the low energy technology, i.e., Bluetooth, can be used instead of the energy-consuming one, i.e., Wi-Fi, for saving energy. It is obvious that energy savings are maximized by turning the unused technology off. However, when active sessions of ongoing services migrate between different technologies, the network-layer connectivity must be maintained, or a vertical handover (VHO) between different networks is required. Moreover, when the networks are not interconnected, the VHO must be fully controlled by the device itself. The device typically navigates traffic through the firmware of the wireless network interface cards (WNIC) using their drivers, which are dependent on the vendors. To control the traffic navigation between WNICs without any modification of the WNICs' drivers, Software-Defined Networking (SDN) can be applied locally on the mobile device, the so called local SDN. In the local SDN architecture, a local SDN controller (SDNC) is used to control a virtual OpenFlow switch, which turns WNICs into its switch ports. Although the SDNC can navigate the traffic, it lacks the global view of the network topology. Hence, to correctly navigate traffic in a VHO process, an extended SDN controller (extSDNC) was proposed in a previous work. With the extSDNC, the SDNC can perform VHO based on a link layer trigger but with a significant packet loss rate. Therefore, in this paper, a framework named esVHO is proposed that executes VHO at the network layer to reduce the packet loss rate and reduce energy consumption. Experiments on VHO performance prove that esVHO can reduce the packet loss rate considerably. Moreover, the results of an energy saving experiment show that esVHO performs high energy saving up to 4.89 times compared to the others.

161-180hit(1385hit)