The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] probability(432hit)

21-40hit(432hit)

  • An Extended Scheme for Shape Matching with Local Descriptors

    Kazunori IWATA  Hiroki YAMAMOTO  Kazushi MIMURA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2020/10/27
      Vol:
    E104-D No:2
      Page(s):
    285-293

    Shape matching with local descriptors is an underlying scheme in shape analysis. We can visually confirm the matching results and also assess them for shape classification. Generally, shape matching is implemented by determining the correspondence between shapes that are represented by their respective sets of sampled points. Some matching methods have already been proposed; the main difference between them lies in their choice of matching cost function. This function measures the dissimilarity between the local distribution of sampled points around a focusing point of one shape and the local distribution of sampled points around a referring point of another shape. A local descriptor is used to describe the distribution of sampled points around the point of the shape. In this paper, we propose an extended scheme for shape matching that can compensate for errors in existing local descriptors. It is convenient for local descriptors to adopt our scheme because it does not require the local descriptors to be modified. The main idea of our scheme is to consider the correspondence of neighboring sampled points to a focusing point when determining the correspondence of the focusing point. This is useful because it increases the chance of finding a suitable correspondence. However, considering the correspondence of neighboring points causes a problem regarding computational feasibility, because there is a substantial increase in the number of possible correspondences that need to be considered in shape matching. We solve this problem using a branch-and-bound algorithm, for efficient approximation. Using several shape datasets, we demonstrate that our scheme yields a more suitable matching than the conventional scheme that does not consider the correspondence of neighboring sampled points, even though our scheme requires only a small increase in execution time.

  • Multi-Resolution Fusion Convolutional Neural Networks for Intrapulse Modulation LPI Radar Waveforms Recognition

    Xue NI  Huali WANG  Ying ZHU  Fan MENG  

     
    PAPER-Sensing

      Pubricized:
    2020/06/15
      Vol:
    E103-B No:12
      Page(s):
    1470-1476

    Low Probability of Intercept (LPI) radar waveform has complex and diverse modulation schemes, which cannot be easily identified by the traditional methods. The research on intrapulse modulation LPI radar waveform recognition has received increasing attention. In this paper, we propose an automatic LPI radar waveform recognition algorithm that uses a multi-resolution fusion convolutional neural network. First, signals embedded within the noise are processed using Choi-William Distribution (CWD) to obtain time-frequency feature images. Then, the images are resized by interpolation and sent to the proposed network for training and identification. The network takes a dual-channel CNN structure to obtain features at different resolutions and makes features fusion by using the concatenation and Inception module. Extensive simulations are carried out on twelve types of LPI radar waveforms, including BPSK, Costas, Frank, LFM, P1~P4, and T1~T4, corrupted with additive white Gaussian noise of SNR from 10dB to -8dB. The results show that the overall recognition rate of the proposed algorithm reaches 95.1% when the SNR is -6dB. We also try various sample selection methods related to the recognition task of the system. The conclusion is that reducing the samples with SNR above 2dB or below -8dB can effectively improve the training speed of the network while maintaining recognition accuracy.

  • A Comprehensive Performance Evaluation on Iterative Algorithms for Sensitivity Analysis of Continuous-Time Markov Chains

    Yepeng CHENG  Hiroyuki OKAMURA  Tadashi DOHI  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E103-A No:11
      Page(s):
    1252-1259

    This paper discusses how to compute the parametric sensitivity function in continuous-time Markov chains (CTMC). The sensitivity function is the first derivative of the steady-state probability vector regarding a CTMC parameter. Since the sensitivity function is given as a solution of linear equations with a sparse matrix, several linear equation solvers are available to obtain it. In this paper, we consider Jacobi and successive-over relaxation as variants of the Gauss-Seidel algorithm. In addition, we develop an algorithm based on the Takahashi method for the sensitivity function. In numerical experiments, we comprehensively evaluate the performance of these algorithms from the viewpoint of computation time and accuracy.

  • Neural Networks Probability-Based PWL Sigmoid Function Approximation

    Vantruong NGUYEN  Jueping CAI  Linyu WEI  Jie CHU  

     
    LETTER-Biocybernetics, Neurocomputing

      Pubricized:
    2020/06/11
      Vol:
    E103-D No:9
      Page(s):
    2023-2026

    In this letter, a piecewise linear (PWL) sigmoid function approximation based on the statistical distribution probability of the neurons' values in each layer is proposed to improve the network recognition accuracy with only addition circuit. The sigmoid function is first divided into three fixed regions, and then according to the neurons' values distribution probability, the curve in each region is segmented into sub-regions to reduce the approximation error and improve the recognition accuracy. Experiments performed on Xilinx's FPGA-XC7A200T for MNIST and CIFAR-10 datasets show that the proposed method achieves 97.45% recognition accuracy in DNN, 98.42% in CNN on MNIST and 72.22% on CIFAR-10, up to 0.84%, 0.57% and 2.01% higher than other approximation methods with only addition circuit.

  • Method for Defining APD-Based Emission Limit for Electromagnetic Pulsed Disturbance with Low Probability of Occurrence

    Toshio CHIYOJIMA  Akihiro ODA  Go ISHIWATA  Kazuhiro TAKAYA  Yasushi MATSUMOTO  

     
    PAPER

      Pubricized:
    2020/04/08
      Vol:
    E103-B No:9
      Page(s):
    911-921

    A method of determining emission limits was studied by using the amplitude probability distribution (APD) for low-probability pulsed electromagnetic disturbances due to discharge. The features of this method are 1) without using the previously reported relationship between APD and bit error rate, the limits are derived using the measured impact of a pulsed disturbance on various wireless communication systems having different bandwidths, and 2) disturbances caused by discharge with poor reproducibility are simulated by regularly repeated pulse-modulated sine waves to enable stable evaluation of the communication quality. APD-based limits are determined from the pulse repetition frequency of the simulated disturbance such that the block error rate (BLER) is less than a certain limit in wireless systems that are most sensitive to the pulsed disturbance. In the international standard CISPR 32 regulating electromagnetic disturbance, radiated disturbance due to discharge is excluded from the application of peak detection limits because of its low occurrence probability. In this paper we quantitatively determine appropriate criteria of the probability for the exclusion. Using the method, we measured the impact of low-probability pulsed interference on major wireless systems and found that GSM and Wi-Fi systems were the most sensitive. New APD-based limits were derived on the basis of these findings. The APD-based limits determined by the proposed method enable a valid evaluation of low-occurrence-probability pulsed disturbances without unconditionally excluding the measurement.

  • Evaluation the Redundancy of the IoT System Based on Individual Sensing Probability

    Ryuichi TAKAHASHI  

     
    PAPER-Formal Approaches

      Pubricized:
    2020/05/14
      Vol:
    E103-D No:8
      Page(s):
    1783-1793

    In IoT systems, data acquired by many sensors are required. However, since sensor operation depends on the actual environment, it is important to ensure sensor redundancy to improve system reliability in IoT systems. To evaluate the safety of the system, it is important to estimate the achievement probability of the function based on the sensing probability. In this research, we proposed a method to automatically generate a PRISM model from the sensor configuration of the target system and calculate and verify the function achievement probability in the assumed environment. By designing and evaluating iteratively until the target achievement probability is reached, the reliability of the system can be estimated at the initial design phase. This method reduces the possibility that the lack of reliability will be found after implementation and the redesign accompanying it will occur.

  • Interference Management Using Beamforming Techniques for Line-of-Sight Femtocell Networks

    Khalid Sheikhidris MOHAMED  Mohamad Yusoff ALIAS  Mardeni ROSLEE  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2020/01/24
      Vol:
    E103-B No:8
      Page(s):
    881-887

    Femtocell structures can offer better voice and data exchange in cellular networks. However, interference in such networks poses a major challenge in the practical development of cellular communication. To tackle this issue, an advanced interference mitigation scheme for Line-Of-Sight (LOS) femtocell networks in indoor environments is proposed in this paper. Using a femtocell management system (FMS) that controls all femtocells in a service area, the aggressor femtocells are identified and then the transmitted beam patterns are adjusted using the linear array antenna equipped in each femtocell to mitigate the interference contribution to the neighbouring femtocells. Prior to that, the affected users are switched to the femtocells that provide better throughput levels to avoid increasing the outage probability. This paper considers different femtocell deployment indexes to verify and justifies the feasibility of the findings in different density areas. Relative to fixed and adaptive power control schemes, the proposed scheme achieves approximately 5% spectral efficiency (SE) improvement, about 10% outage probability reduction, and about 7% Mbps average user throughput improvement.

  • A New Upper Bound for Finding Defective Samples in Group Testing

    Jin-Taek SEONG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2020/02/17
      Vol:
    E103-D No:5
      Page(s):
    1164-1167

    The aim of this paper is to show an upper bound for finding defective samples in a group testing framework. To this end, we exploit minimization of Hamming weights in coding theory and define probability of error for our decoding scheme. We derive a new upper bound on the probability of error. We show that both upper and lower bounds coincide with each other at an optimal density ratio of a group matrix. We conclude that as defective rate increases, a group matrix should be sparser to find defective samples with only a small number of tests.

  • Statistical Analysis of Phase-Only Correlation Functions Between Two Signals with Stochastic Phase-Spectra Following Bivariate Circular Probability Distributions

    Shunsuke YAMAKI  Ryo SUZUKI  Makoto YOSHIZAWA  

     
    PAPER-Digital Signal Processing

      Vol:
    E103-A No:2
      Page(s):
    478-485

    This paper proposes statistical analysis of phase-only correlation functions between two signals with stochastic phase-spectra following bivariate circular probability distributions based on directional statistics. We give general expressions for the expectation and variance of phase-only correlation functions in terms of joint characteristic functions of the bivariate circular probability density function. In particular, if we assume bivariate wrapped distributions for the phase-spectra, we obtain exactly the same results between in case of a bivariate linear distribution and its corresponding bivariate wrapped distribution.

  • An Adaptive Fusion Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check

    Yuhuan WANG  Hang YIN  Zhanxin YANG  Yansong LV  Lu SI  Xinle YU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/07/08
      Vol:
    E103-B No:1
      Page(s):
    43-51

    In this paper, we propose an adaptive fusion successive cancellation list decoder (ADF-SCL) for polar codes with single cyclic redundancy check. The proposed ADF-SCL decoder reasonably avoids unnecessary calculations by selecting the successive cancellation (SC) decoder or the adaptive successive cancellation list (AD-SCL) decoder depending on a log-likelihood ratio (LLR) threshold in the decoding process. Simulation results show that compared to the AD-SCL decoder, the proposed decoder can achieve significant reduction of the average complexity in the low signal-to-noise ratio (SNR) region without degradation of the performance. When Lmax=32 and Eb/N0=0.5dB, the average complexity of the proposed decoder is 14.23% lower than that of the AD-SCL decoder.

  • On the Bit Error Probability of OFDM and FBMC-OQAM Systems in Rayleigh and Rician Multipath Fading Channels Open Access

    Liming LI  Yang WANG  Liqin DING  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/06/17
      Vol:
    E102-B No:12
      Page(s):
    2276-2285

    Filter bank multicarrier with offset quadrature amplitude modulation (FBMC-OQAM) is considered an alternative to conventional orthogonal frequency division multiplexing (OFDM) to meet the various requirements proposed by future communication networks. Among the different perspectives on the merits of FBMC-OQAM and OFDM, a straightforward metric is the bit error probability (BEP). This paper presents a general analytical framework for BEP evaluation that is applicable to FBMC-OQAM and OFDM systems in both Rayleigh and Rician multipath fading channels. Explicit BEP expressions are derived for Gray-coded pulse amplitude modulation (PAM) and square quadrature amplitude modulation (QAM) signals with arbitrary constellation sizes. The theoretical analysis results show excellent agreement with the numerical simulation results in different channel scenarios.

  • Security Performance Analysis of Joint Multi-Relay and Jammer Selection for Physical-Layer Security under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Mingxi GUO  Kui XU  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:12
      Page(s):
    2015-2020

    In this paper, we investigate a novel joint multi-relay and jammer selection (JMRJS) scheme in order to improve the physical layer security of wireless networks. In the JMRJS scheme, all the relays succeeding in source decoding are selected to assist in the source signal transmission and meanwhile, all the remaining relay nodes are employed to act as friendly jammers to disturb the eavesdroppers by broadcasting artificial noise. Based on the more general Nakagami-m fading channel, we analyze the security performance of the JMRJS scheme for protecting the source signal against eavesdropping. The exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the JMRJS scheme over Nakagami-m fading channel are derived. Moreover, we analyze the security-reliability tradeoff (SRT) of this scheme. Simulation results show that as the number of decode-and-forward (DF)relay nodes increases, the SRT of the JMRJS scheme improves notably. And when the transmit power is below a certain value, the SRT of the JMRJS scheme consistently outperforms the joint single-relay and jammer selection (JSRJS) scheme and joint equal-relay and jammer selection (JERJS) scheme respectively. In addition, the SRT of this scheme is always better than that of the multi-relay selection (MRS) scheme.

  • On Scaling Property of Information-Centric Networking

    Ryo NAKAMURA  Hiroyuki OHSAKI  

     
    PAPER

      Pubricized:
    2019/03/22
      Vol:
    E102-B No:9
      Page(s):
    1804-1812

    In this paper, we focus on a large-scale ICN (Information-Centric Networking), and reveal the scaling property of ICN. Because of in-network content caching, ICN is a sort of cache networks and expected to be a promising architecture for replacing future Internet. To realize a global-scale (e.g., Internet-scale) ICN, it is crucial to understand the fundamental properties of such large-scale cache networks. However, the scaling property of ICN has not been well understood due to the lack of theoretical foundations and analysis methodologies. For answering research questions regarding the scaling property of ICN, we derive the cache hit probability at each router, the average content delivery delay of each entity, and the average content delivery delay of all entities over a content distribution tree comprised of a single repository (i.e., content provider), multiple routers, and multiple entities (i.e., content consumers). Through several numerical examples, we investigate the effect of the topology and the size of the content distribution tree and the cache size at routers on the average content delivery delay of all entities. Our findings include that the average content delivery delay of ICNs converges to a constant value if the cache size of routers are not small, which implies high scalability of ICNs, and that even when the network size would grow indefinitely, the average content delivery delay is upper-bounded by a constant value if routers in the network are provided with a fair amount of content caches.

  • Direct Log-Density Gradient Estimation with Gaussian Mixture Models and Its Application to Clustering

    Qi ZHANG  Hiroaki SASAKI  Kazushi IKEDA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/03/22
      Vol:
    E102-D No:6
      Page(s):
    1154-1162

    Estimation of the gradient of the logarithm of a probability density function is a versatile tool in statistical data analysis. A recent method for model-seeking clustering called the least-squares log-density gradient clustering (LSLDGC) [Sasaki et al., 2014] employs a sophisticated gradient estimator, which directly estimates the log-density gradients without going through density estimation. However, the typical implementation of LSLDGC is based on a spherical Gaussian function, which may not work well when the probability density function for data has highly correlated local structures. To cope with this problem, we propose a new gradient estimator for log-density gradients with Gaussian mixture models (GMMs). Covariance matrices in GMMs enable the new estimator to capture the highly correlated structures. Through the application of the new gradient estimator to mode-seeking clustering and hierarchical clustering, we experimentally demonstrate the usefulness of our clustering methods over existing methods.

  • Bit-Error-Rate Degradation Due to Inter-Channel Crosstalk of Different Signal Format

    Naruki SHINOHARA  Koji IGARASHI  Kyo INOUE  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2018/10/26
      Vol:
    E102-B No:5
      Page(s):
    1000-1004

    Inter-channel crosstalk is one of the crucial issues in multichannel optical systems. Conventional studies assume that the crosstalk and the main signals have identical format. The present study, in contrast, considers different signal formats for the main and crosstalk lights, and shows that bit error degradation is different depending on the modulation format. Statistical properties of the crosstalk are also investigated. The result quantitatively confirms that a crosstalk light whose signal distribution is closer to a Gaussian profile causes larger degradation.

  • Error Rate Analysis of DF Cooperative Network Based on Distributed STBCs Employing Antenna Switching Technique

    Minhwan CHOI  Hoojin LEE  Haewoon NAM  

     
    LETTER-Communication Theory and Signals

      Vol:
    E102-A No:5
      Page(s):
    741-746

    This letter presents a comprehensive analytical framework for average pairwise error probability (PEP) of decode-and-forward cooperative network based on various distributed space-time block codes (DSTBCs) with antenna switching (DDF-AS) technique over quasi-static Rayleigh fading channels. Utilizing the analytical framework, exact and asymptotic PEP expressions can be effectively formulated, which are based on the Lauricella multiplicative hypergeometric function, when various DSTBCs are adopted for the DDF-AS system. The derived asymptotic PEP formulas and some numerical results enable us to verify that the DDF-AS scheme outperforms the conventional cooperative schemes in terms of error rate performance. Furthermore, the asymptotic PEP formulas can also provide explicit and useful insights into the full diversity transmission achieved by the DDF-AS system.

  • Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Shijie WANG  Kui XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    603-612

    In this paper, we investigate a cooperative communication system comprised of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of a potential malicious eavesdropper is within or without the coverage area of the source. Based on the more general Nakagami-m fading channels, we analyze the security performance of the single-relay selection and multi-relay selection schemes for protecting the source against eavesdropping. In the single-relay selection scheme, only the best relay is chosen to assist in the source transmission. Differing from the single-relay selection, multi-relay selection scheme allows multiple relays to forward the source to the destination. We also consider the classic direct transmission as a benchmark scheme to compare with the two relay selection schemes. We derive the exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the direct transmission, the single-relay selection as well as the multi-relay selection scheme over Nakagami-m fading channel when the eavesdropper is within and without the coverage area of the source. Moreover, the security-reliability tradeoff (SRT) of these three schemes are also analyzed. It is verified that the SRT of the multi-relay selection consistently outperforms the single-relay selection, which of both the single-relay and multi-relay selection schemes outperform the direct transmission when the number of relays is large, no matter the eavesdropper is within or without the coverage of the source. In addition, as the number of DF relays increases, the SRT of relay selection schemes improve notably. However, the SRT of both two relay selection approaches become worse when the eavesdropper is within the coverage area of the source.

  • Error Performance Analysis of Network Coded Cooperation for Gaussian Relay Networks

    Hironori SOEN  Motohiko ISAKA  

     
    PAPER-Coding theory and techniques

      Vol:
    E101-A No:12
      Page(s):
    2026-2036

    Performance of network coded cooperation over the Gaussian channel in which multiple communication nodes send each one's message to a common destination is analyzed. The nodes first broadcast the message, and subsequently relay the XOR of subset of decoded messages to the destination. The received vector at the destination can be equivalently regarded as the output of a point-to-point channel, except that the underlying codes are drawn probabilistically and symbol errors may occur before transmission of a codeword. We analyze the error performance of this system from coding theoretic viewpoint.

  • A Low-Complexity and Fast Convergence Message Passing Receiver Based on Partial Codeword Transmission for SCMA Systems

    Xuewan ZHANG  Wenping GE  Xiong WU  Wenli DAI  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2018/05/16
      Vol:
    E101-B No:11
      Page(s):
    2259-2266

    Sparse code multiple access (SCMA) based on the message passing algorithm (MPA) for multiuser detection is a competitive non-orthogonal multiple access technique for fifth-generation wireless communication networks Among the existing multiuser detection schemes for uplink (UP) SCMA systems, the serial MPA (S-MPA) scheme, where messages are updated sequentially, generally converges faster than the conventional MPA (C-MPA) scheme, where all messages are updated in a parallel manner. In this paper, the optimization of message scheduling in the S-MPA scheme is proposed. Firstly, some statistical results for the probability density function (PDF) of the received signal are obtained at various signal-to-noise ratios (SNR) by using the Monte Carlo method. Then, based on the non-orthogonal property of SCMA, the data mapping relationship between resource nodes and user nodes is comprehensively analyzed. A partial codeword transmission of S-MPA (PCTS-MPA) with threshold decision scheme of PDF is proposed and verified. Simulations show that the proposed PCTS-MPA not only reduces the complexity of MPA without changing the bit error ratio (BER), but also has a faster convergence than S-MPA, especially at high SNR values.

  • Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:11
      Page(s):
    1970-1974

    This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.

21-40hit(432hit)