The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] order(489hit)

1-20hit(489hit)

  • Permanent Magnet Synchronous Motor Speed Control System Based on Fractional Order Integral Sliding Mode Control Open Access

    Jun-Feng LIU  Yuan FENG  Zeng-Hui LI  Jing-Wei TANG  

     
    LETTER-Systems and Control

      Pubricized:
    2024/03/04
      Vol:
    E107-A No:8
      Page(s):
    1378-1381

    To improve the control performance of the permanent magnet synchronous motor speed control system, the fractional order calculus theory is combined with the sliding mode control to design the fractional order integral sliding mode sliding mode surface (FOISM) to improve the robustness of the system. Secondly, considering the existence of chattering phenomenon in sliding mode control, a new second-order sliding mode reaching law (NSOSMRL) is designed to improve the control accuracy of the system. Finally, the effectiveness of the proposed strategy is demonstrated by simulation.

  • Zero-Order-Hold Triggered Control of a Chain of Integrators with an Arbitrary Sampling Period Open Access

    Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Pubricized:
    2023/12/25
      Vol:
    E107-A No:8
      Page(s):
    1374-1377

    We propose a zero-order-hold triggered control for a chain of integrators with an arbitrary sampling period. We analytically show that our control scheme globally asymptotically stabilizes the considered system. The key feature is that the pre-specified sampling period can be enlarged as desired by adjusting a gain-scaling factor. An example with various simulation results is given for clear illustration.

  • Secrecy Outage Probability and Secrecy Diversity Order of Alamouti STBC with Decision Feedback Detection over Time-Selective Fading Channels Open Access

    Gyulim KIM  Hoojin LEE  Xinrong LI  Seong Ho CHAE  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2023/09/19
      Vol:
    E107-A No:6
      Page(s):
    923-927

    This letter studies the secrecy outage probability (SOP) and the secrecy diversity order of Alamouti STBC with decision feedback (DF) detection over the time-selective fading channels. For given temporal correlations, we have derived the exact SOPs and their asymptotic approximations for all possible combinations of detection schemes including joint maximum likehood (JML), zero-forcing (ZF), and DF at Bob and Eve. We reveal that the SOP is mainly influenced by the detection scheme of the legitimate receiver rather than eavesdropper and the achievable secrecy diversity order converges to two and one for JML only at Bob (i.e., JML-JML/ZF/DF) and for the other cases (i.e., ZF-JML/ZF/DF, DF-JML/ZF/DF), respectively. Here, p-q combination pair indicates that Bob and Eve adopt the detection method p ∈ {JML, ZF, DF} and q ∈ {JML, ZF, DF}, respectively.

  • A Fundamental Limit of Variable-Length Compression with Worst-Case Criteria in Terms of Side Information

    Sho HIGUCHI  Yuta SAKAI  

     
    PAPER-Source Coding and Data Compression

      Pubricized:
    2023/07/03
      Vol:
    E107-A No:3
      Page(s):
    384-392

    In this study, we consider the data compression with side information available at both the encoder and the decoder. The information source is assigned to a variable-length code that does not have to satisfy the prefix-free constraints. We define several classes of codes whose codeword lengths and error probabilities satisfy worse-case criteria in terms of side-information. As a main result, we investigate the exact first-order asymptotics with second-order bounds scaled as Θ(√n) as blocklength n increases under the regime of nonvanishing error probabilities. To get this result, we also derive its one-shot bounds by employing the cutoff operation.

  • Low Complexity Overloaded MIMO Non-Linear Detector with Iterative LLR Estimation

    Satoshi DENNO  Shuhei MAKABE  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E107-B No:3
      Page(s):
    339-348

    This paper proposes a non-linear overloaded MIMO detector that outperforms the conventional soft-input maximum likelihood detector (MLD) with less computational complexity. We propose iterative log-likelihood ratio (LLR) estimation and multi stage LLR estimation for the proposed detector to achieve such superior performance. While the iterative LLR estimation achieves better BER performance, the multi stage LLR estimation makes the detector less complex than the conventional soft-input maximum likelihood detector (MLD). The computer simulation reveals that the proposed detector achieves about 0.6dB better BER performance than the soft-input MLD with about half of the soft-input MLD's complexity in a 6×3 overloaded MIMO OFDM system.

  • Optimization Algorithm with Automatic Adjustment of the Number of Switches in the Order/Radix Problem

    Masaki TSUKAMOTO  Yoshiko HANADA  Masahiro NAKAO  Keiji YAMAMOTO  

     
    PAPER

      Pubricized:
    2023/06/12
      Vol:
    E106-D No:12
      Page(s):
    1979-1987

    The Order/Radix Problem (ORP) is an optimization problem that can be solved to find an optimal network topology in distributed memory systems. It is important to find the optimum number of switches in the ORP. In the case of a regular graph, a good estimation of the preferred number of switches has been proposed, and it has been shown that simulated annealing (SA) finds a good solution given a fixed number of switches. However, generally the optimal graph does not necessarily satisfy the regular condition, which greatly increases the computational costs required to find a good solution with a suitable number of switches for each case. This study improved the new method based on SA to find a suitable number of switches. By introducing neighborhood searches in which the number of switches is increased or decreased, our method can optimize a graph by changing the number of switches adaptively during the search. In numerical experiments, we verified that our method shows a good approximation for the best setting for the number of switches, and can simultaneously generate a graph with a small host-to-host average shortest path length, using instances presented by Graph Golf, an international ORP competition.

  • General Closed-Form Transfer Function Expressions for Fast Filter Bank

    Jinguang HAO  Gang WANG  Honggang WANG  Lili WANG  Xuefeng LIU  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2023/04/14
      Vol:
    E106-A No:10
      Page(s):
    1354-1357

    The existing literature focuses on the applications of fast filter bank due to its excellent frequency responses with low complexity. However, the topic is not addressed related to the general transfer function expressions of the corresponding subfilters for a specific channel. To do this, in this paper, general closed-form transfer function expressions for fast filter bank are derived. Firstly, the cascaded structure of fast filter bank is modelled by a binary tree, with which the index of the subfilter at each stage within the channel can be determined. Then the transfer functions for the two outputs of a subfilter are expressed in a unified form. Finally, the general closed-form transfer functions for the channel and its corresponding subfilters are obtained by variables replacement if the prototype lowpass filters for the stages are given. Analytical results and simulations verify the general expressions. With such closed-form expressions lend themselves easily to analysis and direct computation of the transfer functions and the frequency responses without the structure graph.

  • A Novel Quad-Band Branched Monopole Antenna with a Filter Suppressing Higher Order Modes

    Shingo YAMAURA  Kengo NISHIMOTO  Yasuhiro NISHIOKA  Ryosuke KOBAYASHI  Takahiro INO  Yoshio INASAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2023/05/16
      Vol:
    E106-B No:10
      Page(s):
    938-948

    This paper proposes a novel quad-band branched monopole antenna with a filter. The proposed antenna has a simple configuration in which branch-elements are added to a basic configuration consisting of a mast and dielectric wires. The antenna is characterized by performances such as wideband impedance matching, gain stabilization, and gain enhancement. Wideband impedance characteristics satisfying the voltage standing ratio of less than 2 are obtained by exciting a parallel resonance at the lowest band and multi-resonance at high bands. The filter suppressing higher order modes is used for gain stabilization, so that averaged gains above 5dBi are obtained at the quad-band. The antenna has a high gain of 11.1dBi because the branch-elements work as an end-fire array antenna at the highest band. Furthermore, it is clarified that an operating frequency is switched by using a variable bandpass filter at the lowest band. Last, a scale model of the antenna is fabricated and measured, then the effectiveness of the proposed antenna is demonstrated.

  • Computational Complexity of Allow Rule Ordering and Its Greedy Algorithm

    Takashi FUCHINO  Takashi HARADA  Ken TANAKA  Kenji MIKAWA  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2023/03/20
      Vol:
    E106-A No:9
      Page(s):
    1111-1118

    Packet classification is used to determine the behavior of incoming packets in network devices according to defined rules. As it is achieved using a linear search on a classification rule list, a large number of rules will lead to longer communication latency. To solve this, the problem of finding the order of rules minimizing the latency has been studied. Misherghi et al. and Harada et al. have proposed a problem that relaxes to policy-based constraints. In this paper, we show that the Relaxed Optimal Rule Ordering (RORO) for the allowlist is NP-hard, and by reducing from this we show that RORO for the general rule list is NP-hard. We also propose a heuristic algorithm based on the greedy method for an allowlist. Furthermore, we demonstrate the effectiveness of our method using ClassBench, which is a benchmark for packet classification algorithms.

  • Promoting Students' Higher Order Thinking with Concept Map Recomposition

    Nurmaya  Aryo PINANDITO  Yusuke HAYASHI  Tsukasa HIRASHIMA  

     
    PAPER-Educational Technology

      Pubricized:
    2023/05/23
      Vol:
    E106-D No:8
      Page(s):
    1262-1274

    Involving higher-order thinking in learning activities can produce meaningful learning. It impacts the student's ability to solve problems in new situations. Concept mapping is a learning strategy that has been proven to promote higher-order thinking. Concept map recomposition (KB-mapping) in the Kit-Build system is a closed concept mapping where learners are given concepts and links to build a concept map, and it has advantage that the recomposed map can be automatically diagnosed. It has been proven that KB-mapping improves the students' learning achievement similar to the traditional concept mapping called scratch concept map composition (SC-mapping). However, the study on the effect of KB-mapping in fostering students' higher-order thinking has yet to be evaluated. This study designed and conducted an experiment to compare the impact of KB-mapping and SC-mapping on promoting students' ability in higher-order thinking. Fifty-four undergraduate students were assigned to either KB-Mapping or SC-Mapping for learning activities. The result of this study suggested that students who learn with KB-mapping had better abilities to solve questions of higher-order thinking than those who applied SC-mapping. The findings also suggested that the quality of students' concept maps affected their performance in solving higher-order thinking questions.

  • Variable Ordering in Binary Decision Diagram Using Spider Monkey Optimization for Node and Path Length Optimization

    Mohammed BALAL SIDDIQUI  Mirza TARIQ BEG  Syed NASEEM AHMAD  

     
    PAPER-VLSI Design Technology and CAD

      Pubricized:
    2023/01/16
      Vol:
    E106-A No:7
      Page(s):
    976-989

    Binary Decision Diagrams (BDDs) are an important data structure for the design of digital circuits using VLSI CAD tools. The ordering of variables affects the total number of nodes and path length in the BDDs. Finding a good variable ordering is an optimization problem and previously many optimization approaches have been implemented for BDDs in a number of research works. In this paper, an optimization approach based on Spider Monkey Optimization (SMO) algorithm is proposed for the BDD variable ordering problem targeting number of nodes and longest path length. SMO is a well-known swarm intelligence-based optimization approach based on spider monkeys foraging behavior. The proposed work has been compared with other latest BDD reordering approaches using Particle Swarm Optimization (PSO) algorithm. The results obtained show significant improvement over the Particle Swarm Optimization method. The proposed SMO-based method is applied to different benchmark digital circuits having different levels of complexities. The node count and longest path length for the maximum number of tested circuits are found to be better in SMO than PSO.

  • DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph

    Yu CHEN  Zulie PAN  Yuanchao CHEN  Yuwei LI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/07/26
      Vol:
    E106-A No:2
      Page(s):
    133-145

    Web application second-order vulnerabilities first inject malicious code into the persistent data stores of the web server and then execute it at later sensitive operations, causing severe impact. Nevertheless, the dynamic features, the complex data propagation, and the inter-state dependencies bring many challenges in discovering such vulnerabilities. To address these challenges, we propose DISOV, a web application property graph (WAPG) based method to discover second-order vulnerabilities. Specifically, DISOV first constructs WAPG to represent data propagation and inter-state dependencies of the web application, which can be further leveraged to find the potential second-order vulnerabilities paths. Then, it leverages fuzz testing to verify the potential vulnerabilities paths. To verify the effectiveness of DISOV, we tested it in 13 popular web applications in real-world and compared with Black Widow, the state-of-the-art web vulnerability scanner. DISOV discovered 43 second-order vulnerabilities, including 23 second-order XSS vulnerabilities, 3 second-order SQL injection vulnerabilities, and 17 second-order RCE vulnerabilities. While Black Widow only discovered 18 second-order XSS vulnerabilities, with none second-order SQL injection vulnerability and second-order RCE vulnerability. In addition, DISOV has found 12 0-day second-order vulnerabilities, demonstrating its effectiveness in practice.

  • Verikube: Automatic and Efficient Verification for Container Network Policies

    Haney KANG  Seungwon SHIN  

     
    LETTER-Information Network

      Pubricized:
    2022/08/26
      Vol:
    E105-D No:12
      Page(s):
    2131-2134

    Recently, Linux Container has been the de-facto standard for a cloud system, enabling cloud providers to create a virtual environment in a much more scaled manner. However, configuring container networks remains immature and requires automatic verification for efficient cloud management. We propose Verikube, which utilizes a novel graph structure representing policies to reduce memory consumption and accelerate verification. Moreover, unlike existing works, Verikube is compatible with the complex semantics of Cilium Policy which a cloud adopts from its advantage of performance. Our evaluation results show that Verikube performs at least seven times better for memory efficiency, at least 1.5 times faster for data structure management, and 20K times better for verification.

  • A Multi-Tree Approach to Mutable Order-Preserving Encoding

    Seungkwang LEE  Nam-su JHO  

     
    LETTER

      Pubricized:
    2022/07/28
      Vol:
    E105-D No:11
      Page(s):
    1930-1933

    Order-preserving encryption using the hypergeomatric probability distribution leaks about the half bits of a plaintext and the distance between two arbitrary plaintexts. To solve these problems, Popa et al. proposed a mutable order-preserving encoding. This is a keyless encoding scheme that adopts an order-preserving index locating the corresponding ciphertext via tree-based data structures. Unfortunately, it has the following shortcomings. First, the frequency of the ciphertexts reveals that of the plaintexts. Second, the indices are highly correlated to the corresponding plaintexts. For these reasons, statistical cryptanalysis may identify the encrypted fields using public information. To overcome these limitations, we propose a multi-tree approach to the mutable order-preserving encoding. The cost of interactions increases by the increased number of trees, but the proposed scheme mitigates the distribution leakage of plaintexts and also reduces the problematic correlation to plaintexts.

  • Order Statistics Based Low-Power Flash ADC with On-Chip Comparator Selection

    Takehiro KITAMURA  Mahfuzul ISLAM  Takashi HISAKADO  Osami WADA  

     
    PAPER

      Pubricized:
    2022/05/13
      Vol:
    E105-A No:11
      Page(s):
    1450-1457

    High-speed flash ADCs are useful in high-speed applications such as communication receivers. Due to offset voltage variation in the sub-micron processes, the power consumption and the area increase significantly to suppress variation. As an alternative to suppressing the variation, we have developed a flash ADC architecture that selects the comparators based on offset voltage ranking for reference generation. Specifically, with the order statistics as a basis, our method selects the minimum number of comparators to obtain equally spaced reference values. Because the proposed ADC utilizes offset voltages as references, no resistor ladder is required. We also developed a time-domain sorting mechanism for the offset voltages to achieve on-chip comparator selection. We first perform a detailed analysis of the order statistics based selection method and then design a 4-bit ADC in a commercial 65-nm process and perform transistor-level simulation. When using 127 comparators, INLs of 20 virtual chips are in the range of -0.34LSB/+0.29LSB to -0.83LSB/+0.74LSB, and DNLs are in the range of -0.33LSB/+0.24LSB to -0.77LSB/+1.18LSB at 1-GS/s operation. Our ADC achieves the SNDR of 20.9dB at Nyquist-frequency input and the power consumption of 0.84mW.

  • Practical Order-Revealing Encryption with Short Ciphertext

    Taek Young YOUN  Bo Sun KWAK  Seungkwang LEE  Hyun Sook RHEE  

     
    LETTER

      Pubricized:
    2022/07/19
      Vol:
    E105-D No:11
      Page(s):
    1934-1937

    To support secure database management, a number of value-added encryption schemes have been studied including order-revealing encryption (ORE) schemes. One of outstanding features of ORE schemes is the efficiency of range queries in an encrypted form. Compared to existing encryption methods, ORE leads to an increase in the length of ciphertexts. To improve the efficiency of ORE schemes in terms of the length of ciphertext, a new ORE scheme with shorter ciphertext has been proposed by Kim. In this paper, we revisit Kim's ORE scheme and show that the length of ciphertexts is not as short as analyzed in their paper. We also introduce a simple modification reducing the memory requirement than existing ORE schemes.

  • The Lower Bound of Second-Order Nonlinearity of a Class of Boolean Functions Open Access

    Luozhong GONG  Shangzhao LI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/03/10
      Vol:
    E105-A No:9
      Page(s):
    1317-1321

    The r-th nonlinearity of Boolean functions is an important cryptographic criterion associated with higher order linearity attacks on stream and block ciphers. In this paper, we tighten the lower bound of the second-order nonlinearity of a class of Boolean function over finite field F2n, fλ(x)=Tr(λxd), where λ∈F*2r, d=22r+2r+1 and n=7r. This bound is much better than the lower bound of Iwata-Kurosawa.

  • Classifying Near-Miss Traffic Incidents through Video, Sensor, and Object Features

    Shuhei YAMAMOTO  Takeshi KURASHIMA  Hiroyuki TODA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/11/01
      Vol:
    E105-D No:2
      Page(s):
    377-386

    Front video and sensor data captured by vehicle-mounted event recorders are used for not only traffic accident evidence but also safe-driving education as near-miss traffic incident data. However, most event recorder (ER) data shows only regular driving events. To utilize near-miss data for safe-driving education, we need to be able to easily and rapidly locate the appropriate data from large amounts of ER data through labels attached to the scenes/events of interest. This paper proposes a method that can automatically identify near-misses with objects such as pedestrians and bicycles by processing the ER data. The proposed method extracts two deep feature representations that consider car status and the environment surrounding the car. The first feature representation is generated by considering the temporal transitions of car status. The second one can extract the positional relationship between the car and surrounding objects by processing object detection results. Experiments on actual ER data demonstrate that the proposed method can accurately identify and tag near-miss events.

  • MPTCP-meLearning: A Multi-Expert Learning-Based MPTCP Extension to Enhance Multipathing Robustness against Network Attacks

    Yuanlong CAO  Ruiwen JI  Lejun JI  Xun SHAO  Gang LEI  Hao WANG  

     
    PAPER

      Pubricized:
    2021/07/08
      Vol:
    E104-D No:11
      Page(s):
    1795-1804

    With multiple network interfaces are being widely equipped in modern mobile devices, the Multipath TCP (MPTCP) is increasingly becoming the preferred transport technique since it can uses multiple network interfaces simultaneously to spread the data across multiple network paths for throughput improvement. However, the MPTCP performance can be seriously affected by the use of a poor-performing path in multipath transmission, especially in the presence of network attacks, in which an MPTCP path would abrupt and frequent become underperforming caused by attacks. In this paper, we propose a multi-expert Learning-based MPTCP variant, called MPTCP-meLearning, to enhance MPTCP performance robustness against network attacks. MPTCP-meLearning introduces a new kind of predictor to possibly achieve better quality prediction accuracy for each of multiple paths, by leveraging a group of representative formula-based predictors. MPTCP-meLearning includes a novel mechanism to intelligently manage multiple paths in order to possibly mitigate the out-of-order reception and receive buffer blocking problems. Experimental results demonstrate that MPTCP-meLearning can achieve better transmission performance and quality of service than the baseline MPTCP scheme.

  • Research on Map Folding with Boundary Order on Simple Fold Open Access

    Yiyang JIA  Jun MITANI  Ryuhei UEHARA  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1116-1126

    Folding an m×n square grid pattern along the edges of a grid is called map folding. We consider a decision problem in terms of whether a partial overlapping order of the squares aligning on the boundary of an m×n map is valid in a particular fold model called simple fold. This is a variation of the decision problem of valid total orders of the map in a simple fold model. We provide a linear-time algorithm to solve this problem, by defining an equivalence relation and computing the folding sequence sequentially, either uniquely or representatively.

1-20hit(489hit)