The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

3161-3180hit(42807hit)

  • Research on the Performance of Multi-GNSS Medium Length Baseline RTK with LEO-Augmented

    Weisheng HU  Xuwen LIANG  Huiling HOU  Zhuochen XIE  Xiaohe HE  

     
    LETTER-Digital Signal Processing

      Vol:
    E103-A No:5
      Page(s):
    780-784

    In this letter, we simulate GNSS/LEO measurements and propose a process strategy for LEO-augmented GNSS medium length baseline RTK. Experiments show that, the performance of GNSS medium length baseline RTK can be significantly improved by introducing LEO satellites. The convergence speed of LEO-augmented GPS or BDS float solution maybe better than GPS/BDS combined under the conditions of similar satellite geometry. Besides, the RMS error of fixed solutions are improved to better than 4cm from sub-decimeter level.

  • End-to-End Deep ROI Image Compression

    Hiroaki AKUTSU  Takahiro NARUKO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2020/01/24
      Vol:
    E103-D No:5
      Page(s):
    1031-1038

    In this paper, we present the effectiveness of image compression based on a convolutional auto encoder (CAE) with region of interest (ROI) for quality control. We propose a method that adapts image quality for prioritized parts and non-prioritized parts for CAE-based compression. The proposed method uses annotation information for the distortion weights of the MS-SSIM-based loss function. We show experimental results using a road damage image dataset that is used to check damaged parts and an image dataset with segmentation data (ADE20K). The experimental results reveals that the proposed weighted loss function with CAE-based compression from F. Mentzer et al. learns some characteristics and preferred bit allocations of the prioritized parts by end-to-end training. In the case of using road damage image dataset, our method reduces bpp by 31% compared to the original method while meeting quality requirements that an average weighted MS-SSIM for the road damaged parts be larger than 0.97 and an average weighted MS-SSIM for the other parts be larger than 0.95.

  • A Novel Technique to Suppress Multiple-Triggering Effect in Typical DTSCRs under ESD Stress Open Access

    Lizhong ZHANG  Yuan WANG  Yandong HE  

     
    BRIEF PAPER-Semiconductor Materials and Devices

      Pubricized:
    2019/11/29
      Vol:
    E103-C No:5
      Page(s):
    274-278

    This work reports a new technique to suppress the undesirable multiple-triggering effect in the typical diode triggered silicon controlled rectifier (DTSCR), which is frequently used as an ESD protection element in the advanced CMOS technologies. The technique is featured by inserting additional N-Well areas under the N+ region of intrinsic SCR, which helps to improve the substrate resistance. As a consequence, the delay of intrinsic SCR is reduced as the required triggering current is largely decreased and multiple-triggering related higher trigger voltage is removed. The novel DTSCR structures can alter the stacked diodes to achieve the precise trigger voltage to meet different ESD protection requirements. All explored DTSCR structures are fabricated in a 65-nm CMOS process. Transmission-line-pulsing (TLP) and Very-Fast-Transmission-line-pulsing (VF-TLP) test systems are adopted to confirm the validity of this technique and the test results accord well with our analysis.

  • Anomaly Detection of Folding Operations for Origami Instruction with Single Camera

    Hiroshi SHIMANUKI  Toyohide WATANABE  Koichi ASAKURA  Hideki SATO  Taketoshi USHIAMA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2020/02/25
      Vol:
    E103-D No:5
      Page(s):
    1088-1098

    When people learn a handicraft with instructional contents such as books, videos, and web pages, many of them often give up halfway because the contents do not always assure how to make it. This study aims to provide origami learners, especially beginners, with feedbacks on their folding operations. An approach for recognizing the state of the learner by using a single top-view camera, and pointing out the mistakes made during the origami folding operation is proposed. First, an instruction model that stores easy-to-follow folding operations is defined. Second, a method for recognizing the state of the learner's origami paper sheet is proposed. Third, a method for detecting mistakes made by the learner by means of anomaly detection using a one-class support vector machine (one-class SVM) classifier (using the folding progress and the difference between the learner's origami shape and the correct shape) is proposed. Because noises exist in the camera images due to shadows and occlusions caused by the learner's hands, the shapes of the origami sheet are not always extracted accurately. To train the one-class SVM classifier with high accuracy, a data cleansing method that automatically sifts out video frames with noises is proposed. Moreover, using the statistics of features extracted from the frames in a sliding window makes it possible to reduce the influence by the noises. The proposed method was experimentally demonstrated to be sufficiently accurate and robust against noises, and its false alarm rate (false positive rate) can be reduced to zero. Requiring only a single camera and common origami paper, the proposed method makes it possible to monitor mistakes made by origami learners and support their self-learning.

  • Composition Proposal Generation for Manga Creation Support

    Hironori ITO  Yasuhito ASANO  

     
    PAPER

      Pubricized:
    2019/12/27
      Vol:
    E103-D No:5
      Page(s):
    949-957

    In recent years, cognition and use of manga pervade, and people who use manga for various purposes such as entertainment, study, marketing are increasing more and more. However, when people who do not specialize in it create it for these purposes, they can write plots expressing what they want to convey but the technique of the composition which arranges elements in manga such as characters or balloons corresponding to the plot create obstacles to using its merits for comprehensibility based on high flexibility of its expression. Therefore, we consider that support of this composition technique is necessary for amateurs to use manga while taking advantage of its benefits. We propose a method of generating composition proposal to support manga creation by amateurs. For the method, we also define new manga metadata model which summarize and extend metadata models by earlier studies. It represents the compostion and the plot in manga. We apply a neural machine translation mechanism for learing the relation between the composition and the plot. It considers that the plot annotation is the source of the composition annotation that is the target, and learns from the annotation dataset based on the metadata model. We conducted experiments to evaluate how the composition proposal generated by our method helps amateur manga creation, and demonstrated that it is useful.

  • FOREWORD Open Access

    Hiroaki MYOREN  

     
    FOREWORD

      Vol:
    E103-C No:5
      Page(s):
    197-197
  • Mimicking Lombard Effect: An Analysis and Reconstruction

    Thuan Van NGO  Rieko KUBO  Masato AKAGI  

     
    PAPER-Speech and Hearing

      Pubricized:
    2020/02/13
      Vol:
    E103-D No:5
      Page(s):
    1108-1117

    Lombard speech is produced in noisy environments due to the Lombard effect and is intelligible in adverse environments. To adaptively control the intelligibility of transmitted speech for public announcement systems, in this study, we focus on perceptually mimicking Lombard speech under backgrounds with varying noise levels. Other approaches map corresponding neutral speech features to Lombard speech features, but as this can only be applied to one noise level at a time, it is unsuitable for varying noise levels because the characteristics of Lombard speech are varied according to noise level. Instead, we utilize a rule-based method that automatically generates rules and flexibly controls features with any change of noise level. Specifically, we conduct a feature tendency analysis and propose a continuous rule generation model to estimate the effect of varying noise levels on features. The proposed techniques, which are based on a coarticulation model, MRTD, and spectral-GMM, can easily modify neutral speech features by following the generated rules. Voices having these features are then synthesized by STRAIGHT to obtain Lombard speech fitting to noises with varying levels. To validate our proposed method, the quality of mimicking speech is evaluated in subjective listening experiments on similarity, intelligibility, and naturalness. In varying noise levels, the results show equal similarity with Lombard speech between the proposed method and a state-of-the-art method. Intelligibility and naturalness are comparable with some feature modifications.

  • A New Upper Bound for Finding Defective Samples in Group Testing

    Jin-Taek SEONG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2020/02/17
      Vol:
    E103-D No:5
      Page(s):
    1164-1167

    The aim of this paper is to show an upper bound for finding defective samples in a group testing framework. To this end, we exploit minimization of Hamming weights in coding theory and define probability of error for our decoding scheme. We derive a new upper bound on the probability of error. We show that both upper and lower bounds coincide with each other at an optimal density ratio of a group matrix. We conclude that as defective rate increases, a group matrix should be sparser to find defective samples with only a small number of tests.

  • Time Dependent Percolation Analysis of the Degradation of Coherent Tunneling in Ultra-Thin CoFeB/MgO/CoFeB Magnetic Tunneling Junctions

    Keiji HOSOTANI  Makoto NAGAMINE  Ryu HASUNUMA  

     
    PAPER-Semiconductor Materials and Devices

      Pubricized:
    2019/12/06
      Vol:
    E103-C No:5
      Page(s):
    254-262

    We performed a time dependent percolation analysis of the degradation phenomena in ultra-thin CoFeB/MgO/CoFeB magnetic tunneling junctions. The objective was to understand the microscopic degradation physics of coherent tunneling and the thickness limitation of the MgO barrier. We propose two models: a trap assisted tunneling (TAL) model and a filamentary defect assisted leakage (FAL) model. The correlation between resistance drift behavior and barrier lifetime was then calculated and compared with real data based on these models. The relationship between the resistance drift behavior and barrier lifetime was found to be well explained by the TAL model, the random trap formation in the barrier and the percolation path formation which lead to barrier breakdown. Based on the TAL model, the measured TDDB Weibull slope (β) was smaller than the value estimated by the model. By removing the effect of some initial defects in the barrier, an ultra-thin MgO tunneling barrier in MTJ has the potential for a much better lifetime with a better Weibull slope even at 3ML thickness. This method is rather simple but useful to deeply understand the microscopic degradation physics in dielectric films under TDDB stress.

  • Contrast Enhancement of 76.5 GHz-Band Millimeter-Wave Images Using Near-Field Scattering for Non-Destructive Detection of Concrete Surface Cracks

    Akihiko HIRATA  Makoto NAKASHIZUKA  Koji SUIZU  Yoshikazu SUDO  

     
    PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2019/12/06
      Vol:
    E103-C No:5
      Page(s):
    216-224

    This paper presents non-destructive millimeter-wave (MMW) imaging of sub-millimeter-wide cracks on a concrete surface covered with paper. We measured the near-field scattering of 76.5 GHz-MMW signals at concrete surface cracks for detection of the sub-millimeter-wide cracks. A decrease in the received signal magnitude by near-field scattering at the fine concrete surface crack was slight, which yielded an unclear MMW image contrast of fine cracks at the concrete surface. We have found that the received signal magnitude at concrete surface crack is larger than that at the surface without a crack, when the paper thickness is almost equal to n/4 of the effective wavelength of the MMW signal in the paper (n=1, 3, 5 ...), thus, making MMW image contrast at the surface crack reversed. By calculating the difference of two MMW images obtained from different paper thickness, we were able to improve the MMW image contrast at the surface crack by up to 3.3 dB.

  • Superconducting Neutron Detectors and Their Application to Imaging Open Access

    Takekazu ISHIDA  

     
    INVITED PAPER-Superconducting Electronics

      Vol:
    E103-C No:5
      Page(s):
    198-203

    Superconducting detectors have been shown to be superior to other techniques in some applications. However, superconducting devices have not been used for detecting neutrons often in the past decades. We have been developing various superconducting neutron detectors. In this paper, we review our attempts to measure neutrons using superconducting stripline detectors with DC bias currents. These include attempts with a MgB2-based detector and a Nb-based detector with a 10B converter.

  • Adaptive Balanced Allocation for Peer Assessments

    Hideaki OHASHI  Yasuhito ASANO  Toshiyuki SHIMIZU  Masatoshi YOSHIKAWA  

     
    PAPER

      Pubricized:
    2019/12/26
      Vol:
    E103-D No:5
      Page(s):
    939-948

    Peer assessments, in which people review the works of peers and have their own works reviewed by peers, are useful for assessing homework. In conventional peer assessment systems, works are usually allocated to people before the assessment begins; therefore, if people drop out (abandoning reviews) during an assessment period, an imbalance occurs between the number of works a person reviews and that of peers who have reviewed the work. When the total imbalance increases, some people who diligently complete reviews may suffer from a lack of reviews and be discouraged to participate in future peer assessments. Therefore, in this study, we adopt a new adaptive allocation approach in which people are allocated review works only when requested and propose an algorithm for allocating works to people, which reduces the total imbalance. To show the effectiveness of the proposed algorithm, we provide an upper bound of the total imbalance that the proposed algorithm yields. In addition, we extend the above algorithm to consider reviewing ability. The extended algorithm avoids the problem that only unskilled (or skilled) reviewers are allocated to a given work. We show the effectiveness of the proposed two algorithms compared to the existing algorithms through experiments using simulation data.

  • Detecting Reinforcement Learning-Based Grey Hole Attack in Mobile Wireless Sensor Networks

    Boqi GAO  Takuya MAEKAWA  Daichi AMAGATA  Takahiro HARA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/11/21
      Vol:
    E103-B No:5
      Page(s):
    504-516

    Mobile wireless sensor networks (WSNs) are facing threats from malicious nodes that disturb packet transmissions, leading to poor mobile WSN performance. Existing studies have proposed a number of methods, such as decision tree-based classification methods and reputation based methods, to detect these malicious nodes. These methods assume that the malicious nodes follow only pre-defined attack models and have no learning ability. However, this underestimation of the capability of malicious node is inappropriate due to recent rapid progresses in machine learning technologies. In this study, we design reinforcement learning-based malicious nodes, and define a novel observation space and sparse reward function for the reinforcement learning. We also design an adaptive learning method to detect these smart malicious nodes. We construct a robust classifier, which is frequently updated, to detect these smart malicious nodes. Extensive experiments show that, in contrast to existing attack models, the developed malicious nodes can degrade network performance without being detected. We also investigate the performance of our detection method, and confirm that the method significantly outperforms the state-of-the-art methods in terms of detection accuracy and false detection rate.

  • Development of MOOC Service Framework for Life Long Learning: A Case Study of Thai MOOC

    Sila CHUNWIJITRA  Phondanai KHANTI  Supphachoke SUNTIWICHAYA  Kamthorn KRAIRAKSA  Pornchai TUMMARATTANANONT  Marut BURANARACH  Chai WUTIWIWATCHAI  

     
    PAPER-Educational Technology

      Pubricized:
    2020/02/18
      Vol:
    E103-D No:5
      Page(s):
    1078-1087

    Massive open online course (MOOC) is an online course aimed at unlimited participation and open access via the web. Although there are many MOOC providers, they typically focus on the online course providing and typically do not link with traditional education and business sector requirements. This paper presents a MOOC service framework that focuses on adopting MOOC to provide additional services to support students in traditional education and to provide credit bank consisting of student academic credentials for business sector demand. Particularly, it extends typical MOOC to support academic/ credential record and transcript issuance. The MOOC service framework consists of five layers: authentication, resources, learning, assessment and credential layers. We discuss the adoption of the framework in Thai MOOC, the national MOOC system for Thai universities. Several main issues related to the framework adoption are discussed, including the service strategy and model as well as infrastructure design for large-scale MOOC service.

  • Low Complexity Soft Input Decoding in an Iterative Linear Receiver for Overloaded MIMO Open Access

    Satoshi DENNO  Tsubasa INOUE  Yuta KAWAGUCHI  Takuya FUJIWARA  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/11/06
      Vol:
    E103-B No:5
      Page(s):
    600-608

    This paper proposes a low complexity soft input decoding in an iterative linear receiver for overloaded MIMO. The proposed soft input decoding applies two types of lattice reduction-aided linear filters to estimate log-likelihood ratio (LLR) in order to reduce the computational complexity. A lattice reduction-aided linear with whitening filter is introduced for the LLR estimation in the proposed decoding. The equivalent noise caused by the linear filter is mitigated with the decoder output stream and the LLR is re-estimated after the equivalent noise mitigation. Furthermore, LLR clipping is introduced in the proposed decoding to avoid the performance degradation due to the incorrect LLRs. The performance of the proposed decoding is evaluated by computer simulation. The proposed decoding achieves about 2dB better BER performance than soft decoding with the exhaustive search algorithm, so called the MLD, at the BER of 10-4, even though the complexity of the proposed decoding is 1/10 as small as that of soft decoding with the exhaustive search.

  • Design and SNR Optimization for Multi-Relay Compress-and-Forward System Based on CEO Theory

    Junwei BAO  Dazhuan XU  Hao LUO  Ruidan ZHANG  Fei WANG  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2020/01/23
      Vol:
    E103-D No:5
      Page(s):
    1006-1012

    A novel compress-and-forward (CF) system based on multi-relay network is proposed. In this system, two networks are linked, wherein one is a sensor network connecting the analog source and the relays, and the other is a communication network between the relays and the destination. At several parallel relay nodes, the analog signals are transformed into digital signals after quantization and encoding and then the digital signals are transmitted to the destination. Based on the Chief Executive Officer (CEO) theory, we calculate the minimum transmission rate of every source-relay link and we propose a system model by combining sensor network with communication network according to Shannon channel capacity theory. Furthermore, we obtain the best possible system performance under system power constraint, which is measured by signal-to-noise ratio (SNR) rather than bit error rate (BER). Numerical simulation results show that the proposed CF outperforms the traditional amplify-and-forward (AF) system in the performance versus SNR.

  • Leveraging Entity-Type Properties in the Relational Context for Knowledge Graph Embedding

    Md Mostafizur RAHMAN  Atsuhiro TAKASU  

     
    PAPER

      Pubricized:
    2020/02/03
      Vol:
    E103-D No:5
      Page(s):
    958-968

    Knowledge graph embedding aims to embed entities and relations of multi-relational data in low dimensional vector spaces. Knowledge graphs are useful for numerous artificial intelligence (AI) applications. However, they (KGs) are far from completeness and hence KG embedding models have quickly gained massive attention. Nevertheless, the state-of-the-art KG embedding models ignore the category specific projection of entities and the impact of entity types in relational aspect. For example, the entity “Washington” could belong to the person or location category depending on its appearance in a specific relation. In a KG, an entity usually holds many type properties. It leads us to a very interesting question: are all the type properties of an entity are meaningful for a specific relation? In this paper, we propose a KG embedding model TPRC that leverages entity-type properties in the relational context. To show the effectiveness of our model, we apply our idea to the TransE, TransR and TransD. Our approach outperforms other state-of-the-art approaches as TransE, TransD, DistMult and ComplEx. Another, important observation is: introducing entity type properties in the relational context can improve the performances of the original translation distance based models.

  • Design and Implementation of Sensor-Embedded Chair for Continuous Sitting Posture Recognition

    Teruhiro MIZUMOTO  Yasuhiro OTODA  Chihiro NAKAJIMA  Mitsuhiro KOHANA  Motohiro UENISHI  Keiichi YASUMOTO  Yutaka ARAKAWA  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2020/02/05
      Vol:
    E103-D No:5
      Page(s):
    1067-1077

    In this paper, we design and develop a sensor-embedded office chair that can measure the posture of the office worker continuously without disturbing their job. In our system, eight accelerometers, that are attached at the back side of the fabric surface of the chair, are used for recognizing the posture. We propose three sitting posture recognition algorithms by considering the initial position of the chair and the difference of physique. Through the experiment with 28 participants, we confirm that our proposed chair can recognize the sitting posture by 75.4% (algorithm 1), 83.7% (algorithm 2), and 85.6% (algorithm 3) respectively.

  • Security Evaluation of Negative Iris Recognition

    Osama OUDA  Slim CHAOUI  Norimichi TSUMURA  

     
    PAPER-Biological Engineering

      Pubricized:
    2020/01/29
      Vol:
    E103-D No:5
      Page(s):
    1144-1152

    Biometric template protection techniques have been proposed to address security and privacy issues inherent to biometric-based authentication systems. However, it has been shown that the robustness of most of such techniques against reversibility and linkability attacks are overestimated. Thus, a thorough security analysis of recently proposed template protection schemes has to be carried out. Negative iris recognition is an interesting iris template protection scheme based on the concept of negative databases. In this paper, we present a comprehensive security analysis of this scheme in order to validate its practical usefulness. Although the authors of negative iris recognition claim that their scheme possesses both irreversibility and unlinkability, we demonstrate that more than 75% of the original iris-code bits can be recovered using a single protected template. Moreover, we show that the negative iris recognition scheme is vulnerable to attacks via record multiplicity where an adversary can combine several transformed templates to recover more proportion of the original iris-code. Finally, we demonstrate that the scheme does not possess unlinkability. The experimental results, on the CASIA-IrisV3 Interval public database, support our theory and confirm that the negative iris recognition scheme is susceptible to reversibility, linkability, and record multiplicity attacks.

  • Continuous Noise Masking Based Vocoder for Statistical Parametric Speech Synthesis

    Mohammed Salah AL-RADHI  Tamás Gábor CSAPÓ  Géza NÉMETH  

     
    PAPER-Speech and Hearing

      Pubricized:
    2020/02/10
      Vol:
    E103-D No:5
      Page(s):
    1099-1107

    In this article, we propose a method called “continuous noise masking (cNM)” that allows eliminating residual buzziness in a continuous vocoder, i.e. of which all parameters are continuous and offers a simple and flexible speech analysis and synthesis system. Traditional parametric vocoders generally show a perceptible deterioration in the quality of the synthesized speech due to different processing algorithms. Furthermore, an inaccurate noise resynthesis (e.g. in breathiness or hoarseness) is also considered to be one of the main underlying causes of performance degradation, leading to noisy transients and temporal discontinuity in the synthesized speech. To overcome these issues, a new cNM is developed based on the phase distortion deviation in order to reduce the perceptual effect of the residual noise, allowing a proper reconstruction of noise characteristics, and model better the creaky voice segments that may happen in natural speech. To this end, the cNM is designed to keep only voice components under a condition of the cNM threshold while discarding others. We evaluate the proposed approach and compare with state-of-the-art vocoders using objective and subjective listening tests. Experimental results show that the proposed method can reduce the effect of residual noise and can reach the quality of other sophisticated approaches like STRAIGHT and log domain pulse model (PML).

3161-3180hit(42807hit)