The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] symmetric(201hit)

81-100hit(201hit)

  • Decoupled 3-D Near-Field Source Localization with UCA via Centrosymmetric Subarrays

    Bum-Soo KWON  Tae-Jin JUNG  Chang-Hong SHIN  Kyun-Kyung LEE  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:11
      Page(s):
    3143-3146

    A novel algorithm is presented for estimating the 3-D location (azimuth angle, elevation angle, and range) of multiple sources with a uniform circular array (UCA). Based on its centrosymmetric property, a UCA is divided into two subarrays. The steering vectors for these subarrays then yield a 2-D direction of arrival (DOA)-related rotational invariance property in the signal subspace, which enables 2-D DOA estimations using a generalized-ESPRIT algorithm. Based on the estimated 2-D DOAs, a range estimation can then be obtained for each source by defining the 1-D MUSIC spectrum. Despite its low computational complexity, the proposed algorithm can almost match the performance of the benchmark estimator 3-D MUSIC.

  • Decoupled Location Parameter Estimation of Near-Field Sources with Symmetric ULA

    Bum-Soo KWON  Tae-Jin JUNG  Kyun-Kyung LEE  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:9
      Page(s):
    2646-2649

    A novel algorithm is presented for near-field source localization with a symmetric uniform linear array (ULA) consisting of an even number of sensors. Based on element reordering of a symmetric ULA, the steering vector is factorised with respect to the range-independent bearing parameters and range-relevant 2-D location parameters, which allows the range-independent bearing estimation with rank-reduction idea. With the estimated bearing, the range estimation for each source is then obtained by defining the 1-D MUSIC spectrum. Simulation results are presented to validate the performance of the proposed algorithm.

  • Detailed Analysis of Multilayer Broad-Side Coupler with a Symmetric Structure

    Hiroshi OKAZAKI  Kiyomichi ARAKI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E94-C No:8
      Page(s):
    1253-1261

    A detailed analysis of a multilayer symmetric coupler employing symmetrical broad-side coupled lines is presented. We confirm that the coupler can be designed using a well-known even-odd mode analysis of two strip lines while the coupler has four strip lines. We also confirm that the previously reported poor isolation originates from port mismatching. To verify the analysis, couplers that have different dimensions are fabricated. One example exhibits a coupling loss of 4.50.5 dB, a return loss better than 15 dB, and isolation characteristics higher than 12 dB in the 6.5 to 15.1 GHz frequency range. These results agree well with the obtained simulation results. The results show that the coupler has the potential to provide tight and ideal coupling.

  • Constructing Correlation Immune Symmetric Boolean Functions

    Jie PENG  Haibin KAN  

     
    LETTER-Coding Theory

      Vol:
    E94-A No:7
      Page(s):
    1591-1596

    A Boolean function is said to be correlation immune if its output leaks no information about its input values. Such functions have many applications in computer security practices including the construction of key stream generators from a set of shift registers. Finding methods for easy construction of correlation immune Boolean functions has been an active research area since the introduction of the notion by Siegenthaler. In this paper, we present several constructions of nonpalindromic correlation immune symmetric Boolean functions. Our methods involve finding binomial coefficient identities and obtaining new correlation immune functions from known correlation immune functions. We also consider the construction of higher order correlation immunity symmetric functions and propose a class of third order correlation immune symmetric functions on n variables, where n+1(≥ 9) is a perfect square.

  • Spectral Analysis of Random Sparse Matrices

    Tomonori ANDO  Yoshiyuki KABASHIMA  Hisanao TAKAHASHI  Osamu WATANABE  Masaki YAMAMOTO  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1247-1256

    We study nn random symmetric matrices whose entries above the diagonal are iid random variables each of which takes 1 with probability p and 0 with probability 1-p, for a given density parameter p=α/n for sufficiently large α. For a given such matrix A, we consider a matrix A ' that is obtained by removing some rows and corresponding columns with too many value 1 entries. Then for this A', we show that the largest eigenvalue is asymptotically close to α+1 and its eigenvector is almost parallel to all one vector (1,...,1).

  • Annihilators and Algebraic Immunity of Symmetric Boolean Functions

    Jie PENG  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:6
      Page(s):
    1434-1440

    In this paper, we deal with the algebraic immunity of the symmetric Boolean functions. The algebraic immunity is a property which measures the resistance against the algebraic attacks on symmetric ciphers. It is well known that the algebraic immunity of the symmetric Boolean functions is completely determined by a narrow class of annihilators with low degree which is denoted by G(n,). We study and determine the weight support of part of these functions. Basing on this, we obtain some relations between the algebraic immunity of a symmetric Boolean function and its simplified value vector. For applications, we put forward an upper bound on the number of the symmetric Boolean functions with algebraic immunity at least d and prove that the algebraic immunity of the symmetric palindromic functions is not high.

  • Non-iterative Symmetric Two-Dimensional Linear Discriminant Analysis

    Kohei INOUE  Kenji HARA  Kiichi URAHAMA  

     
    LETTER-Pattern Recognition

      Vol:
    E94-D No:4
      Page(s):
    926-929

    Linear discriminant analysis (LDA) is one of the well-known schemes for feature extraction and dimensionality reduction of labeled data. Recently, two-dimensional LDA (2DLDA) for matrices such as images has been reformulated into symmetric 2DLDA (S2DLDA), which is solved by an iterative algorithm. In this paper, we propose a non-iterative S2DLDA and experimentally show that the proposed method achieves comparable classification accuracy with the conventional S2DLDA, while the proposed method is computationally more efficient than the conventional S2DLDA.

  • Error Probability Analysis of Majority Decision in Tree Network Composed of BSC

    Kazutaka NISHINO  Shinji TANI  Ikuo OKA  Shingo ATA  

     
    LETTER-Network

      Vol:
    E94-B No:2
      Page(s):
    562-564

    A path diversity is an effective technique to get highly reliable communications in the sensor network. In this paper, the path diversity is examined for a tree network composed of binary symmetric channels (BSC) from the view point of bit error probability (BEP). End-nodes of the network are connected to a fusion center, which sums up the received data. The probability density function (pdf) of decision variable conditioned on a source node data is derived by an iterative algorithm to obtain BEP. Numerical results show that in the case of a majority decision, BEP at the fusion center is almost the same as the BSC crossover probability due to the path diversity effects, even if the number of relay links increases.

  • Constructing Even-Variable Symmetric Boolean Functions with High Algebraic Immunity

    Yuan LI  Hui WANG  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    362-366

    In this paper, we explicitly construct a large class of symmetric Boolean functions on 2k variables with algebraic immunity not less than d, where integer k is given arbitrarily and d is a given suffix of k in binary representation. If let d = k, our constructed functions achieve the maximum algebraic immunity. Remarkably, 2⌊ log2k ⌋ + 2 symmetric Boolean functions on 2k variables with maximum algebraic immunity are constructed, which are much more than the previous constructions. Based on our construction, a lower bound of symmetric Boolean functions with algebraic immunity not less than d is derived, which is 2⌊ log2d ⌋ + 2(k-d+1). As far as we know, this is the first lower bound of this kind.

  • Cross-Layer Scheme to Control Contention Window for Per-Flow in Asymmetric Multi-Hop Networks

    Pham Thanh GIANG  Kenji NAKAGAWA  

     
    PAPER-Network

      Vol:
    E93-B No:9
      Page(s):
    2326-2335

    The IEEE 802.11 MAC standard for wireless ad hoc networks adopts Binary Exponential Back-off (BEB) mechanism to resolve bandwidth contention between stations. BEB mechanism controls the bandwidth allocation for each station by choosing a back-off value from one to CW according to the uniform random distribution, where CW is the contention window size. However, in asymmetric multi-hop networks, some stations are disadvantaged in opportunity of access to the shared channel and may suffer severe throughput degradation when the traffic load is large. Then, the network performance is degraded in terms of throughput and fairness. In this paper, we propose a new cross-layer scheme aiming to solve the per-flow unfairness problem and achieve good throughput performance in IEEE 802.11 multi-hop ad hoc networks. Our cross-layer scheme collects useful information from the physical, MAC and link layers of own station. This information is used to determine the optimal Contention Window (CW) size for per-station fairness. We also use this information to adjust CW size for each flow in the station in order to achieve per-flow fairness. Performance of our cross-layer scheme is examined on various asymmetric multi-hop network topologies by using Network Simulator (NS-2).

  • Impact and Use of the Asymmetric Property in Bi-directional Cooperative Relaying under Asymmetric Traffic Conditions

    Takaaki SAEKI  Koji YAMAMOTO  Hidekazu MURATA  Susumu YOSHIDA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:8
      Page(s):
    2126-2134

    Cooperative relaying (CR) is a promising technique to provide spatial diversity by combining multiple signals from source and relay stations. In the present paper, the impact and use of the asymmetric property in bi-directional CR under asymmetric traffic conditions are discussed assuming that CR involves one communication pair and one relay station in a time division duplex (TDD) system. The asymmetric property means that the average communication quality differs for each transmission direction because of the difference in signal power between the combined signals for each direction. First, numerical results show the asymmetric property of bi-directional CR. Next, in order to evaluate the impact of the asymmetric property, the optimal relay position and resource allocation are compared to those in simple multi-hop relaying, which does not have the asymmetric property. Numerical results show that, in order to maximize the overall quality of bi-directional communication, the optimal relay position in CR depends on the offered traffic ratio, which is defined as the traffic ratio of each transmission direction, while the offered traffic ratio does not affect the optimal relay position in multi-hop relaying. Finally, the asymmetric property is used to enhance the overall quality. Specifically, a high overall quality can be achieved by, for example, opportunistically switching to the transmission direction with higher quality. Under asymmetric traffic conditions, weighted proportionally fair scheduling (WPFS), which is proposed in the context of downlink scheduling in a cellular network, is applied to transmission direction switching. Numerical results reveal that WPFS provides a high overall quality and that the quality ratio is similar to the offered traffic ratio.

  • Fast Surface Profiling by White-Light Interferometry Using Symmetric Spectral Optical Filter

    Akira HIRABAYASHI  

     
    PAPER-Measurement Technology

      Vol:
    E93-A No:2
      Page(s):
    542-549

    We propose a surface profiling algorithm by white-light interferometry that extends sampling interval to twice of the widest interval among those used in conventional algorithms. The proposed algorithm uses a novel function called an in-phase component of an interferogram to detect the peak of the interferogram, while conventional algorithms used the squared-envelope function or the envelope function. We show that the in-phase component has the same peak as the corresponding interferogram when an optical filter has a symmetric spectral distribution. We further show that the in-phase component can be reconstructed from sampled values of the interferogram using the so-called quadrature sampling technique. Since reconstruction formulas used in the algorithm are very simple, the proposed algorithm requires low computational costs. Simulation results show the effectiveness of the proposed algorithm.

  • An Instantaneous Frequency Estimator Based on the Symmetric Higher Order Differential Energy Operator

    Byeong-Gwan IEM  

     
    PAPER-Digital Signal Processing

      Vol:
    E93-A No:1
      Page(s):
    227-232

    A generalized formulation of the instantaneous frequency based on the symmetric higher order differential energy operator is proposed. The motivation for the formulation is that there is some frequency misalignment in time when the ordinary higher order differential energy operator is used for the instantaneous frequency estimator. The special cases of the generalized formulation are also presented. The proposed instantaneous frequency estimators are compared with existing methods in terms of error performance measured in the mean absolute error. In terms of the estimation error performance, the third order instantaneous frequency estimator with the symmetrical structure shows the best result under noise free condition. Under noisy situation, the fourth order instantaneous frequency estimator with the symmetrical structure produces the best results. Application examples are provided to show the usefulness of the estimator.

  • A Model Checking Method of Soundness for Workflow Nets

    Munenori YAMAGUCHI  Shingo YAMAGUCHI  Minoru TANAKA  

     
    PAPER

      Vol:
    E92-A No:11
      Page(s):
    2723-2731

    Workflow nets (WF-nets) are Petri nets which represent workflows. Soundness is a criterion of logical correctness defined for WF-nets. It is known that soundness verification is intractable. In this paper, we propose a method to verify soundness using a Linear Temporal Logic (LTL) model checking tool, SPIN. We give an LTL necessary and sufficient condition to verify soundness for WF-nets without livelock. Acyclic WF-nets have no livelock, but cyclic WF-nets may have livelock. We also give a necessary and sufficient condition to verify livelock. Meanwhile, we show that any LTL model checking tool cannot verify soundness for WF-nets with livelock. We give necessary conditions to verify soundness for them. Those conditions enable us to use SPIN even if a given WF-net has livelock. We also develop a tool to verify soundness based on our method. We show effectiveness of our method by comparing our tool with existing soundness verification tools on verification time for 200 cyclic ACWF-nets.

  • M-Ary Substitution/Deletion/Insertion/Adjacent-Symbol-Transposition Error Correcting Codes for Data Entry Systems

    Haruhiko KANEKO  Eiji FUJIWARA  

     
    PAPER-Coding Theory

      Vol:
    E92-A No:7
      Page(s):
    1668-1676

    Nonbinary M-ary data processed by data entry systems, such as keyboard devices and character recognition systems, often have various types of error, such as symbol-substitution errors, deletion errors, insertion errors, and adjacent-symbol-transposition errors. This paper proposes nonsystematic M-ary codes capable of correcting these errors. The code is defined as a set of codewords that satisfy three conditions required to correct substitution, deletion/insertion, and adjacent-symbol-transposition errors. Since symbol-substitution errors in data entry systems are usually asymmetric, this paper also presents asymmetric-symbol-substitution error correcting codes capable of correcting deletion, insertion, and adjacent-symbol-transposition errors. For asymmetric-symbol-substitution error correction, we employ a mapping derived from the vertex coloring in an error directionality graph. The evaluation shows that the asymmetric codes have three to five times larger number of codewords than the symmetric codes.

  • Printed Modified Bow-Tie Dipole Antenna for Multi-Band Applications

    I-Fong CHEN  Chia-Mei PENG  Ching-Chih HUNG  Han-Chao CHEN  

     
    LETTER-Antennas and Propagation

      Vol:
    E92-B No:4
      Page(s):
    1404-1405

    The ability of a modified bow-tie dipole antenna, which has an asymmetric-feed structure to operate at UHF-band (470-862 MHz) and dual ISM-band (2.4 GHz and 5.8 GHz) is demonstrated. Experimental results indicate that the VSWR 2:1 bandwidths achieved were 125.7%, 8.2% and 23.6% at 660 MHz, 2.45 GHz and 5.5 GHz. The proposed modified bow-tie dipole exhibits a nearly omni-directional radiation pattern with very easy to fabricate structure, and so is suitable for various commercial wideband applications.

  • Asymmetric Fragile Watermarking Using a Number Theoretic Transform

    Hideaki TAMORI  Tsuyoshi YAMAMOTO  

     
    LETTER

      Vol:
    E92-A No:3
      Page(s):
    836-838

    We propose an asymmetric fragile watermarking technique that uses a number theoretic transform (NTT). Signature data is extracted from a watermarked image by determining correlation functions that are computed using the NTT. The effectiveness of the proposed method is evaluated by simulated detection of altering.

  • Transitional Dynamics and Quasi-Periodic Solution Observed in Two Asymmetrical Coupled Oscillators

    Kuniyasu SHIMIZU  Tetsuro ENDO  Takuya YOSHIMURA  

     
    PAPER-Nonlinear Problems

      Vol:
    E92-A No:1
      Page(s):
    270-278

    In this paper, we investigate the transitional dynamics and quasi-periodic solution appearing after the Saddle-Node (SN) bifurcation of a periodic solution in an inductor-coupled asymmetrical van der Pol oscillators with hard-type nonlinearity. In particular, we elucidate, by investigating global bifurcation of unstable manifold (UM) of saddles, that transitional dynamics and quasi-periodic solution after the SN bifurcation appear based on different structure of UM.

  • Symmetricity of the Protocols Related to Oblivious Transfer

    Daisuke INOUE  Keisuke TANAKA  

     
    LETTER

      Vol:
    E92-A No:1
      Page(s):
    217-221

    In this paper, we show that each of the special cases of strong conditional oblivious transfer can be obtained from only one instance of its inverse. Each of our constructions is simple and efficient, and preserves the same security level of its inverse.

  • Design of Band-Stop Filters Using Discrete-Time Domain Techniques

    Lin-Chuan TSAI  Kuo-Chih CHU  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E91-B No:12
      Page(s):
    3899-3903

    A new formulation of equal-length asymmetric parallel coupled line (APCLs) having zero at z=-1 (θ = π) is employed to study band-stop filters. Such representations offer additional flexibility in the design of filter circuits through two extra variables. An optimization algorithm is used to tune the characteristic impedances of APCLs so that the transfer function of the signal line is close to the system function of an ideal prototype filter. Two band-stop filters are realized in the form of microstrip lines and their frequency responses are measured to validate this new formulation.

81-100hit(201hit)