The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

481-500hit(3183hit)

  • Synchronization of Relaxation Oscillators Having Individual Difference by Non-Periodic Signal Injection

    Takuya KURIHARA  Kenya JIN'NO  

     
    PAPER-Nonlinear Problems

      Vol:
    E99-A No:6
      Page(s):
    1188-1197

    In this study we investigate the synchronization of relaxation oscillators having individual differences by using non-periodic signal injection. When a common non-periodic signal is injected into the relaxation oscillators, the oscillators exhibit synchronization phenomena. Such synchronization phenomena can be classified as injection locking. We also consider the relation between the synchronization state and the individual difference. Further, we pay attention to the effect of the fluctuation range of the non-periodic injected signal. When the fluctuation range is wide, we confirm that the synchronization range increases if the individual difference is small.

  • A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness

    Tinghuai MA  Limin GUO  Meili TANG  Yuan TIAN  Mznah AL-RODHAAN  Abdullah AL-DHELAAN  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/03/09
      Vol:
    E99-D No:6
      Page(s):
    1512-1520

    User-based and item-based collaborative filtering (CF) are two of the most important and popular techniques in recommender systems. Although they are widely used, there are still some limitations, such as not being well adapted to the sparsity of data sets, failure to consider the hierarchical structure of the items, and changes in users' interests when calculating the similarity of items. To overcome these shortcomings, we propose an evolutionary approach based on hierarchical structure for dynamic recommendation system named Hierarchical Temporal Collaborative Filtering (HTCF). The main contribution of the paper is displayed in the following two aspects. One is the exploration of hierarchical structure between items to improve similarity, and the other is the improvement of the prediction accuracy by utilizing a time weight function. A unique feature of our method is that it selects neighbors mainly based on hierarchical structure between items, which is more reliable than co-rated items utilized in traditional CF. To the best of our knowledge, there is little previous work on researching CF algorithm by combining object implicit or latent object-structure relations. The experimental results show that our method outperforms several current recommendation algorithms on recommendation accuracy (in terms of MAE).

  • A Visible Watermarking with Automated Location Technique for Copyright Protection of Portrait Images

    Antonio CEDILLO-HERNANDEZ  Manuel CEDILLO-HERNANDEZ  Francisco GARCIA-UGALDE  Mariko NAKANO-MIYATAKE  Hector PEREZ-MEANA  

     
    PAPER-Information Network

      Pubricized:
    2016/03/10
      Vol:
    E99-D No:6
      Page(s):
    1541-1552

    A visible watermarking technique to provide copyright protection for portrait images is proposed in this paper. The proposal is focused on real-world applications where a portrait image is printed and illegitimately used for commercial purposes. It is well known that this is one of the most difficult challenges to prove ownership through current watermark techniques. We propose an original approach which avoids the deficiencies of typical watermarking methods in practical scenarios by introducing a smart process to automatically detect the most suitable region of the portrait image, where the visible watermark goes unnoticed to the naked eye of a viewer and is robust enough to remain visible when printed. The position of the watermark is determined by performing an analysis of the portrait image characteristics taking into account several conditions of their spatial information together with human visual system properties. Once the location is set, the watermark embedding process is performed adaptively by creating a contrast effect between the watermark and its background. Several experiments are performed to illustrate the proper functioning of the proposed watermark algorithm on portrait images with different characteristics, including dimensions, backgrounds, illumination and texture, with the conclusion that it can be applied in many practical situations.

  • Input-Output Manifold Learning with State Space Models

    Daisuke TANAKA  Takamitsu MATSUBARA  Kenji SUGIMOTO  

     
    PAPER-Systems and Control

      Vol:
    E99-A No:6
      Page(s):
    1179-1187

    In this paper, the system identification problem from the high-dimensional input and output is considered. If the relationship between the features extracted from the data is represented as a linear time-invariant dynamical system, the input-output manifold learning method has shown to be a powerful tool for solving such a system identification problem. However, in the previous study, the system is assumed to be initially relaxed because the transfer function model is used for system representation. This assumption may not hold in several tasks. To handle the initially non-relaxed system, we propose the alternative approach of the input-output manifold learning with state space model for the system representation. The effectiveness of our proposed method is confirmed by experiments with synthetic data and motion capture data of human-human conversation.

  • The Direct Method of Effective Availability for Switching Networks with Multi-Service Traffic

    Slawomir HANCZEWSKI  Maciej SOBIERAJ  Michal Dominik STASIAK  

     
    PAPER

      Vol:
    E99-B No:6
      Page(s):
    1291-1301

    This article presents a novel, approximate method that makes it possible to analyse multi-service switching networks. The method belongs to the group of the so-called effective availability methods and is characterized by very high accuracy for single-service and multi-service switching networks alike. The operation of the proposed method is presented with an example of a number of three-stage switching networks with different ways of the execution of inter-stage connections. A comparison of analytical and simulation results confirms high accuracy of the proposed method that is independent of the structure of a switching network.

  • Queuing Systems for the Internet Open Access

    Maciej STASIAK  

     
    INVITED PAPER

      Vol:
    E99-B No:6
      Page(s):
    1234-1242

    This article proposes a versatile model of a multiservice queueing system with elastic traffic. The model can provide a basis for an analysis of telecommunications and computer network systems, internet network systems in particular. The advantage of the proposed approach is a possibility of a determination of delays in network nodes for a number of selected classes of calls offered in modern telecommunications networks.

  • Cooperation between Distributed Power Modules for SoC Power Management Open Access

    Po-Chiun HUANG  Shin-Jie HUANG  Po-Hsiang LAN  

     
    INVITED PAPER

      Vol:
    E99-C No:6
      Page(s):
    606-613

    Distributed power delivery is blooming in SoC power system because the fine-grained power management needs separate power sources to adjust each voltage island dynamically. In addition, dedicated power sources for critical circuit blocks can achieve better signal integrity. To extensively utilize the power modules when they are redundant and idle, this work applies the cooperation concept in SoC power management. The key controller is a mixed-signal estimator that executes the intelligent procedures, like real-time swap the power module depending on its loading and healthy condition, automatically configure the power system with phase interleaving, and support all the peripheral functions. To demonstrate the proposed concept, a prototype chip for voltage down-conversion is implemented. This chip contains four switched-inductor converter modules to emulate the cooperative power network. Each module is small therefore the power efficiency is not optimal for the heavy load. With the cooperation between power modules, the power efficiency is 88% for 300mA load, that is 8.5% higher than the single module operation.

  • Optimal Stabilizing Controller for the Region of Weak Attraction under the Influence of Disturbances

    Sasinee PRUEKPRASERT  Toshimitsu USHIO  

     
    PAPER-Formal Methods

      Pubricized:
    2016/05/02
      Vol:
    E99-D No:6
      Page(s):
    1428-1435

    This paper considers an optimal stabilization problem of quantitative discrete event systems (DESs) under the influence of disturbances. We model a DES by a deterministic weighted automaton. The control cost is concerned with the sum of the weights along the generated trajectories reaching the target state. The region of weak attraction is the set of states of the system such that all trajectories starting from them can be controlled to reach a specified set of target states and stay there indefinitely. An optimal stabilizing controller is a controller that drives the states in this region to the set of target states with minimum control cost and keeps them there. We consider two control objectives: to minimize the worst-case control cost (1) subject to all enabled trajectories and (2) subject to the enabled trajectories starting by controllable events. Moreover, we consider the disturbances which are uncontrollable events that rarely occur in the real system but may degrade the control performance when they occur. We propose a linearithmic time algorithm for the synthesis of an optimal stabilizing controller which is robust to disturbances.

  • Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage

    Yohei WATANABE  Junji SHIKATA  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1097-1106

    An (≤n,≤ω)-one-time secure broadcast encryption scheme (BES) allows a sender to choose any subset of receivers so that only the designated users can decrypt a ciphertext. In this paper, we first show an efficient construction of an (≤n,≤ω)-one-time secure BES with general ciphertext sizes. Specifically, we propose a generic construction of an (≤n,≤ω)-one-time secure BES from key predistribution systems (KPSs) when its ciphertext size is equal to integer multiple of the plaintext size, and our construction includes all known constructions. However, there are many possible combinations of the KPSs to realize the BES in our construction methodology, and therefore, we show that which combination is the best one in the sense that secret-key size can be minimized. Our (optimized) construction provides a flexible parameter setup (i.e. we can adjust the secret-key sizes) by setting arbitrary ciphertext sizes based on restrictions on channels such as channel capacity and channel bandwidth.

  • Neural Network Based Transmit Power Control and Interference Cancellation for MIMO Small Cell Networks

    Michael Andri WIJAYA  Kazuhiko FUKAWA  Hiroshi SUZUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:5
      Page(s):
    1157-1169

    The random deployment of small cell base stations (BSs) causes the coverage areas of neighboring cells to overlap, which increases intercell interference and degrades the system capacity. This paper proposes a new intercell interference management (IIM) scheme to improve the system capacity in multiple-input multiple-output (MIMO) small cell networks. The proposed IIM scheme consists of both an interference cancellation (IC) technique on the receiver side, and a neural network (NN) based power control algorithm for intercell interference coordination (ICIC) on the transmitter side. In order to improve the system capacity, the NN power control optimizes downlink transmit power while IC eliminates interfering signals from received signals. Computer simulations compare the system capacity of the MIMO network with several ICIC algorithms: the NN, the greedy search, the belief propagation (BP), the distributed pricing (DP), and the maximum power, all of which can be combined with IC reception. Furthermore, this paper investigates the application of a multi-layered NN structure called deep learning and its pre-training scheme, into the mobile communication field. It is shown that the performance of NN is better than that of BP and very close to that of greedy search. The low complexity of the NN algorithm makes it suitable for IIM. It is also demonstrated that combining IC and sectorization of BSs acquires high capacity gain owing to reduced interference.

  • V2V Mobile Content Transmission for Mobile Devices Using Network Coding

    Woojin AHN  Young Yong KIM  Ronny Yongho KIM  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:5
      Page(s):
    1224-1232

    In order to minimize packet error rate in extremely dynamic vehicular networks, a novel vehicle to vehicle (V2V) mobile content transmission scheme that jointly employs random network coding and shuffling/scattering techniques is proposed in this paper. The proposed scheme consists of 3 steps: Step 1-The original mobile content data consisting of several packets is encoded to generate encoded blocks using random network coding for efficient error recovery. Step 2-The encoded blocks are shuffled for averaging the error rate among the encoded blocks. Step 3-The shuffled blocks are scattered at different vehicle locations to overcome the estimation error of optimum transmission location. Applying the proposed scheme in vehicular networks can yield error free transmission with high efficiency. Our simulation results corroborate that the proposed scheme significantly improves the packet error rate performance in high mobility environments. Thanks to the flexibility of network coding, the proposed scheme can be designed as a separate module in the physical layer of various wireless access technologies.

  • Optimizing Hash Join with MapReduce on Multi-Core CPUs

    Tong YUAN  Zhijing LIU  Hui LIU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/02/04
      Vol:
    E99-D No:5
      Page(s):
    1316-1325

    In this paper, we exploit MapReduce framework and other optimizations to improve the performance of hash join algorithms on multi-core CPUs, including No partition hash join and partition hash join. We first implement hash join algorithms with a shared-memory MapReduce model on multi-core CPUs, including partition phase, build phase, and probe phase. Then we design an improved cuckoo hash table for our hash join, which consists of a cuckoo hash table and a chained hash table. Based on our implementation, we also propose two optimizations, one for the usage of SIMD instructions, and the other for partition phase. Through experimental result and analysis, we finally find that the partition hash join often outperforms the No partition hash join, and our hash join algorithm is faster than previous work by an average of 30%.

  • Self Optimization Beam-Forming Null Control Based SINR Improvement

    Modick BASNET  Jeich MAR  

     
    PAPER-Measurement Technology

      Vol:
    E99-A No:5
      Page(s):
    963-972

    In this paper, a self optimization beamforming null control (SOBNC) scheme is proposed. There is a need of maintaining signal to interference plus noise ratio (SINR) threshold to control modulation and coding schemes (MCS) in recent technologies like Wi-Fi, Long Term Evolution (LTE) and Long Term Evolution Advanced (LTE-A). Selection of MCS depends on the SINR threshold that allows maintaining key performance index (KPI) like block error rate (BLER), bit error rate (BER) and throughput at certain level. The SOBNC is used to control the antenna pattern for SINR estimation and improve the SINR performance of the wireless communication systems. The nulling comes with a price; if wider nulls are introduced, i.e. more number of nulls are used, the 3dB beam-width and peak side lobe level (SLL) in antenna pattern changes critically. This paper proposes a method which automatically controls the number of nulls in the antenna pattern as per the changing environment based on adaptive-network based fuzzy interference system (ANFIS) to maintain output SINR level higher or equal to the required threshold. Finally, simulation results show a performance superiority of the proposed SOBNC compared with minimum mean square error (MMSE) based adaptive nulling control algorithm and conventional fixed null scheme.

  • Cyber Physical Security for Industrial Control Systems and IoT Open Access

    Kazukuni KOBARA  

     
    INVITED PAPER

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    787-795

    Cyber-attacks and cybersecurity used to be the issues for those who use Internet and computers. The issues, however, are expanding to anyone who does not even use them directly. The society is gradually and heavily depending on networks and computers. They are not closed within a cyberspace anymore and having interaction with our real world with sensors and actuators. Such systems are known as CPS (Cyber Physical Systems), IoT/E (Internet of Things/Everything), Industry 4.0, Industrial Internet, M2M, etc. No matter what they are called, exploitation of any of these systems may cause a serious influence to our real life and appropriate countermeasures must be taken to mitigate the risks. In this paper, cybersecurity in ICS (Industrial Control Systems) is reviewed as a leading example of cyber physical security for critical infrastructures. Then as a future aspect of it, IoT security for consumers is explained.

  • Management and Technology Innovation in Rail Industry as Social Infrastructure for Improved Quality of Life Open Access

    Masaki OGATA  

     
    INVITED PAPER

      Vol:
    E99-B No:4
      Page(s):
    778-785

    East Japan Railway Company has created new businesses such as life-style business and information technology business on the basis of railway business for sustainable growth. These businesses generate and provide synergy to one another effectively because each business is autonomous decentralized system based on diversified infrastructure. The infrastructure includes not just structure but management, technology, operation and maintenance: we call this “MTOMI Model.” The MTOMI Model is the key concept of JR East's businesses and can generate JR East's ecosystem.

  • Parallel Design of Feedback Control Systems Utilizing Dead Time for Embedded Multicore Processors

    Yuta SUZUKI  Kota SATA  Jun'ichi KAKO  Kohei YAMAGUCHI  Fumio ARAKAWA  Masato EDAHIRO  

     
    PAPER-Electronic Instrumentation and Control

      Vol:
    E99-C No:4
      Page(s):
    491-502

    This paper presents a parallelization method utilizing dead time to implement higher precision feedback control systems in multicore processors. The feedback control system is known to be difficult to parallelize, and it is difficult to deal with the dead time in control systems. In our method, the dead time is explicitly represented as delay elements. Then, these delay elements are distributed to the overall systems with equivalent transformation so that the system can be simulated or executed in parallel pipeline operation. In addition, we introduce a method of delay-element addition for parallelization. For a spring-mass-damper model with a dead time, parallel execution of the model using our technique achieves 3.4 times performance acceleration compared with its sequential execution on an ideal four-core simulation and 1.8 times on a cycle-accurate simulator of a four-core embedded processor as a threaded application on a real-time operating system.

  • Autonomous Decentralized Database System Self Configuration Technology for High Response

    Carlos PEREZ-LEGUIZAMO  

     
    PAPER

      Vol:
    E99-B No:4
      Page(s):
    794-802

    In recent years, society has experienced several changes in its ways and methods of consuming. Nowadays, the diversity and the customization of products and services have provoked that the consumer needs continuously change. Hence, the database systems support e-business processes are required to be timeliness and adaptable to the changing preferences. Autonomous Decentralized Database System (ADDS), has been proposed in order to satisfy the enhanced requirements of current on-line e-business applications. Autonomy and decentralization of subsystems help to achieve short response times in highly competitive situations and an autonomous Coordination Mobile Agent (CMA) has been proposed to achieve flexibility in a highly dynamic environment. However, a problem in ADDS is as the number of sites increases, the distribution and harmonization of product information among the sites are turning difficult. Therefore, many users cannot be satisfied quickly. As a result, system timeliness is inadequate. To solve this problem, a self configuration technology is proposed. This technology can configure the system to the evolving situation dynamically for achieving high response. A simulation shows the effectiveness of the proposed technology in a large-scale system. Finally, an implementation of this technology is presented.

  • A Healthcare Information System for Secure Delivery and Remote Management of Medical Records

    Hyoung-Kee CHOI  Ki-Eun SHIN  Hyoungshick KIM  

     
    PAPER-Privacy protection in information systems

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    883-890

    With the rapid merger of healthcare business and information technology, more healthcare institutions and medical practices are sharing information. Since these records often contain patients' sensitive personal information, Healthcare Information Systems (HISs) should be properly designed to manage these records in a secure manner. We propose a novel security design for the HIS complying with the security and privacy rules. The proposed system defines protocols to ensure secure delivery of medical records over insecure public networks and reliable management of medical record in the remote server without incurring excessive costs to implement services for security. We demonstrate the practicality of the proposed system through a security analysis and performance evaluation.

  • Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense

    Bumsoon JANG  Seokjoo DOO  Soojin LEE  Hyunsoo YOON  

     
    PAPER

      Pubricized:
    2016/01/29
      Vol:
    E99-D No:4
      Page(s):
    1081-1091

    Due to the periodic recovery of virtual machines regardless of whether malicious intrusions exist, proactive recovery-based Intrusion Tolerant Systems (ITSs) are being considered for mission-critical applications. However, the virtual replicas can easily be exposed to attacks during their working period, and additionally, proactive recovery-based ITSs are ineffective in eliminating the vulnerability of exposure time, which is closely related to service availability. To address these problems, we propose a novel hybrid recovery-based ITS in this paper. The proposed method utilizes availability-driven recovery and dynamic cluster resizing. The availability-driven recovery method operates the recovery process by both proactive and reactive ways for the system to gain shorter exposure times and higher success rates. The dynamic cluster resizing method reduces the overhead of the system that occurs from dynamic workload fluctuations. The performance of the proposed ITS with various synthetic and real workloads using CloudSim showed that it guarantees higher availability and reliability of the system, even under malicious intrusions such as DDoS attacks.

  • A Study on Dynamic Clustering for Large-Scale Multi-User MIMO Distributed Antenna Systems with Spatial Correlation

    Ou ZHAO  Hidekazu MURATA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:4
      Page(s):
    928-938

    Distributed antenna systems (DASs) combined with multi-user multiple-input multiple-output (MU-MIMO) transmission techniques have recently attracted significant attention. To establish MU-MIMO DASs that have wide service areas, the use of a dynamic clustering scheme (CS) is necessary to reduce computation in precoding. In the present study, we propose a simple method for dynamic clustering to establish a single cell large-scale MU-MIMO DAS and investigate its performance. We also compare the characteristics of the proposal to those of other schemes such as exhaustive search, traditional location-based adaptive CS, and improved norm-based CS in terms of sum rate improvement. Additionally, to make our results more universal, we further introduce spatial correlation to the considered system. Computer simulation results indicate that the proposed CS for the considered system provides better performance than the existing schemes and can achieve a sum rate close to that of exhaustive search but at a lower computational cost.

481-500hit(3183hit)