The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42756hit)

37741-37760hit(42756hit)

  • Structure Recovery from Multiple Images by Directly Estimating the Intersections in 3-D Space

    Shinjiro KAWATO  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    966-972

    This paper presents a new approach to the recovery of 3-D structure from multiple pairs of images from different viewpoints. Searching for the corresponding points between images, which is common in stereopsis, is avoided. Extracted edges from input images are projected back into 3-D space, and their intersections are calculated directly. Many false intersections may appear, but if we have many pair images, true intersections are extracted by appropriate thresholding. Octree representation of the intersections enables this approach. We consider a way to treat adjacent edge piexels as a line segment rather than as individual points, which differs from previous works and leads to a new algorithm. Experimental results using both synthetic and actual images are also described.

  • YBaCuO Thick Films Prepared by Screen Printing Method on YSZ and MgO Substrates

    Milos SOMORA  Miroslav VRANA  Vlastimil BODÁK  Ivan BAT'KO  Karol FLACHBART  

     
    PAPER-Superconductive Electronics

      Vol:
    E77-C No:9
      Page(s):
    1496-1499

    The paper discusses properties of YBaCuO thick films produced by screen printing method and followed sintering of a paste made from pre-annealed powder on Yttrium Stabilized Zirconia (YSZ) and MgO substrates. The prepared films have been studied by X-ray diffraction, scanning electron microscopy (SEM) and resistance vs. temperature measurements.

  • Some Two-Person Game is Complete for ACk Under Many-One NC1 Reducibility

    Shigeki IWATA  

     
    PAPER-Automata, Languages and Theory of Computing

      Vol:
    E77-D No:9
      Page(s):
    1022-1026

    ACk is the class of problems solvable by an alternating Turing machine in space O(log n) and alternation depth O(logk n) [S. A. Cook, A taxonomy of problems with fast parallel algorithms, Inform. Contr. vol. 64]. We consider a game played by two persons: each player alternately moves a marker along an edge of a given digraph, and the first palyer who cannot move loses the game. It is shown that the problem to determine whether the first player can win the game on a digraph with n nodes exactly after logk n moves is complete for ACk nuder NC1 reducibility.

  • FOREWORD

    Tatsuo HIGUCHI  

     
    FOREWORD

      Vol:
    E77-A No:9
      Page(s):
    1415-1416
  • Fast Convergent Genetic-Type Search for Multi-Layered Network

    Shu-Hung LEUNG  Andrew LUK  Sin-Chun NG  

     
    PAPER-Neural Networks

      Vol:
    E77-A No:9
      Page(s):
    1484-1492

    The classical supervised learning algorithms for optimizing multi-layered feedforward neural networks, such at the original back-propagation algorithm, suffer from several weaknesses. First, they have the possibility of being trapped at local minima during learning, which may lead to failure in finding the global optimal solution. Second, the convergence rate is typically too slow even if the learning can be achieved. This paper introduces a new learning algorithm which employs a genetic-type search during the learning phase of back-propagation algorithm so that the above problems can be overcome. The basic idea is to evolve the network weights in a controlled manner so as to jump to the regions of smaller mean squared error whenever the back-propagation stops at a local minimum. By this, the local minima can always be escaped and a much faster learning with global optimal solution can be achieved. A mathematical framework on the weight evolution of the new algorithm in also presented in this paper, which gives a careful analysis on the requirements of weight evolution (or perturbation) during learning in order to achieve a better error performance in the weights between different hidden layers. Simulation results on three typical problems including XOR, 3-bit parity and the counting problem are described to illustrate the fast learning behaviour and the global search capability of the new algorithm in improving the performance of back-propagated network.

  • European R & D Activities in Mobile Multimedia Communications and Expectations on Future Services

    Ralf SCHÄFER  

     
    INVITED PAPER

      Vol:
    E77-B No:9
      Page(s):
    1083-1088

    Mobile telecommunication is a rapidly growing market. Second generation systems such as GSM, DECT and ERMES, which are actually in an evolving status will be replaced by the third generation UMTS from the beginning of the next century on. While UMTS will allow data communication with up to 2Mbit/s, the fourth generation system MBS will provide up to 155Mbit/s. In several European R & D projects of the ESPRIT, DRIVE, COST and RACE programmes investigations concerning network planning, network operation, signalling, access techniques, security, terminal development and image and voice compression are carried out in order to create the scientific and technological bases for future UMTS and MBS. Some of these projects are described in more detail and an outlook toward future R & D activities is given. Finally some considerations are made concerning expectations of future services and questions concerning the development of wide band versus narrow band solutions are put.

  • A New Cost Function for System Identification Utilizing an Alias Free Parallel Adaptive Filter

    Shigenori KINJO  Yoji YAMADA  Hiroshi OCHI  

     
    PAPER-Adaptive Digital Filters

      Vol:
    E77-A No:9
      Page(s):
    1426-1431

    An alias free parallel structure for adaptive digital filters (ADF's) is considered. The method utilizes the properties of the Frequency-Sampling Filter (FSF) banks to obtain alias free points in the frequency domain. We propose a new cost function for parallel ADF's. The limiting value analysis of system identification using proposed cost function is given in stochastic sense. It is also shown by simulation examples that we can carry out precise system identification. The cost function is defined in each bin; accordingly, it enables the parallel processing of ADF's.

  • Buffer Sharing in Conflict-Free WDMA Networks

    Ming CHEN  Tak-Shing Peter YUM  

     
    PAPER-Optical Communication

      Vol:
    E77-B No:9
      Page(s):
    1144-1151

    A Wavelength Division Multiaccess (WDMA) network with buffer sharing among stations is studied. All stations in the network are connected to a passive optical star coupler and each station has a different fixed wavelength laser for transmitting packets. Each station in the network reports its packet backlog to a scheduler which computes and then broadcasts a transmission schedule to all the stations through a control channel in each time slot. A transmission schedule includes two types of assignments: 1) assign a maximum number of stations for conflict-free transmissions, and 2) assign the relocation of packets from congested stations to uncongested relaying stations through idling transceivers for distributed buffer sharing. The first assignment aims at maximizing throughput and the second assignment aims at minimizing packet loss. Simulation results show that as much as 75% of the buffers can be saved with the use of buffer sharing when 50% of the packets are of the non-sequenced type.

  • A Method of 3D Object Reconstruction from a Series of Cross-Sectional Images

    Ee-Taek LEE  Young-Kyu CHOI  Kyu Ho PARK  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    996-1004

    This paper addresses a method for constructing surface representation of 3D structures from a sequence of cross-sectional images. Firstly, we propose cell-boundary representation, which is a generalization of PVP method proposed by Yun and Park, and develop an efficient surface construction algorithm from a cell-boundary. Cell-boundary consists of a set of boundary cells with their 1-voxel configurations, and can compactly describe binary volumetric data. Secondly, to produce external surface from the cell-boundary representation, we define 19 modeling primitives (MP) including volumetric, planar and linear groups. Surface polygons are created from those modeling primitives using a simple table look-up operation. Since a cell-boundary can be obtained using only topological information of neighboring voxels, there is no ambiguity in determining modeling primitives which may arise in PVP method. Since our algorithm has data locality and is very simple to implement, it is very appropriate for parallel processing.

  • Data Compression and Interpolation of Multi-View Image Set

    Toshiaki FUJII  Hiroshi HARASHIMA  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    987-995

    This paper is concerned with the data compression and interpolation of multi-view image set. In this paper, we propose a novel disparity compensation scheme based on geometric relationship. We first investigate the geometric relationship between a point in the object space and its projection onto view images. Then, we propose the disparity compensation scheme which utilize the geometric constraints between view images. This scheme is used to compress the multi-view image into the structure of the triangular patches and the texture data on the surface of patches. This scheme not only compresses the multi-view image but also synthesize the view images from any viewpoints in the viewing zone. Also, this scheme is fast and have compatibility with 2-D interframe coding. Finally, we report the experiment, where two sets multi-view image were used as original images and the amount of data was reduced to 1/19 and 1/20 with SNR 34 dB and 20 dB, respectively.

  • A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp

    Min-Shiang HWANG  Wen-Guey TZENG  Wei-Pang YANG  

     
    PAPER-Information Security

      Vol:
    E77-D No:9
      Page(s):
    1042-1046

    Many methods, based on the concept of key-lock-pair have been proposed for access control in computer protection systems. However, the proposed methods still either lack of dynamic ability or need quite a lot of computation in performing requests of deleting users/files, inserting users/files, or updating access rights of users to files. In this paper we propose a two-key-lock-pair access control method that is based on the unique factorization theorem and a time stamp mechanism. Our method is dynamic and needs a minimum amount of computation in the sense that it only updates at most one key/lock for each access request, which has not been achieved before.

  • The Number of Permutations Realizable in Fault-Tolerant Multistage Interconnection Networks

    Hiroshi MASUYAMA  Tetsuo ICHIMORI  

     
    PAPER-Computer Networks

      Vol:
    E77-D No:9
      Page(s):
    1032-1041

    In this paper we estimate the number of permutations realizable in fault-tolerant multistage interconnection networks designed to tolerate faults on any switching element. The Parallel Omega network and the INDRA network are representative types of fault-tolerate multistage interconnection networks designed to tolerate a single fault. In order to evaluate the enhancement in the function of network by preparing the hardware redundancy for fault-tolerance, we estimate the number of permutations realizable in fault-tolerant networks. This result enables us to set up a standard to evaluate the hardware redundancy required to tolerate multifaults from the viewpoint of the enhancement of network function. This paper concludes that in the case where the number of inputs is up to 32 the increase ratio of the number of realizable permutations is no more than 1/0.73 even if the tolerance to multifaults is prepared instead of the tolerance to a single fault.

  • Reverse Distance Transformation and Skeletons Based upon the Euclidean Metric for n-Dimensional Digital Binary Pictures

    Toyofumi SAITO  Jun-ichiro TORIWAKI  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    1005-1016

    In this paper, we present new algorithms to calculate the reverse distance transformation and to extract the skeleton based upon the Euclidean metric for an arbitrary binary picture. The presented algorithms are applicable to an arbitrary picture in all of n-dimensional spaces (n2) and a digitized picture sampled with the different sampling interval in each coordinate axis. The reconstruction algorithm presented in this paper is resolved to serial one-dimensional operations and efficiently executed by general purpose computer. The memory requirement is very small including only one picture array and single one-dimensional work space array for n-dimensional pictures. We introduce two different definitions of skeletons, both of them allow us to reconstruct the original binary picture exactly, and present algorithms to extract those skeltons from the result of the squared Euclidean distance transformation.

  • A Method for Solving Configuration Problem in Scene Reconstruction Based on Coplanarity

    Seiichiro DAN  Toshiyasu NAKAO  Tadahiro KITAHASHI  

     
    PAPER

      Vol:
    E77-D No:9
      Page(s):
    958-965

    We can understand and recover a scene even from a picture or a line drawing. A number of methods have been developed for solving this problem. They have scarcely aimed to deal with scenes of multiple objects although they have ability to recognize three-dimensional shapes of every object. In this paper, challenging to solve this problem, we describe a method for deciding configurations of multiple objects. This method employs the assumption of coplanarity and the constraint of occlusion. The assumption of coplanarity generates the candidates of configurations of multiple objects and the constraint of occlusion prunes impossible configurations. By combining this method with a method of shape recovery for individual objects, we have implemented a system acquirig a three-dimensional information of scene including multiple objects from a monocular image.

  • Performance Degradation of a Subband Adaptive Digital Filter with Critical Sampling

    Hiroshi YASUKAWA  

     
    LETTER

      Vol:
    E77-A No:9
      Page(s):
    1497-1501

    A method for evaluating the degradation of subband adaptive digital filters (ADF) is presented. The performance of a simple ADF that uses critical sampling is mainly influenced by the subband filter bank's characteristics and the finite precision arithmetic operations used. This paper considers a two-channel mirror filter bank and a normalized least mean square algorithm with floating point arithmetic. The theoretical ERLE (Echo Return Loss Enhancement) and the theoretical relationships between the output error of the ADF and the circuit parameters considering finite precision A/D conversion and finite word length effects in floating point arithmetic operation are obtained using an equivalent noise model. Simulation results are found to be in good agreement to analytical values; the difference is only 3 to 5 dB.

  • Single-Mode Separation for Mode-Division Multiplexing by Holographic Filter

    Manabu YOSHIKAWA  Kazuyuki KAMEDA  

     
    LETTER-Opto-Electronics

      Vol:
    E77-C No:9
      Page(s):
    1526-1527

    Mode separation of a multiplex mode in a mode-division multiplexing system is studied. The clear, desired single-mode pattern, which is separated from the multiplex mode by using a holographic filter, is observed in the experiment.

  • Design of a 1 W, Single Filament Laser Diode

    Iulian B. PETRESCU-PRAHOVA  Manuela BUDA  Theo G. van de ROER  

     
    PAPER-Opto-Electronics

      Vol:
    E77-C No:9
      Page(s):
    1472-1478

    A design of a high power laser structure is presented which is based on an increase of the cavity length as well as a maximization of the stripe width. This requires a low value for the modal attenuation coefficent and a low optical confinement factor. A model is presented from which the modal gain, the confinement factor, the active region thickness, the stripe width, the length and the reflection coefficients can be calculated. A variant for all design parameters needed to reach 1 W emission in the fundamental lateral mode is given. These values are used to design the epitaxial structure.

  • A Fault Model for Multiple-Valued PLA's and Its Equivalences

    Yasunori NAGATA  Masao MUKAIDONO  

     
    PAPER-Computer Aided Design (CAD)

      Vol:
    E77-A No:9
      Page(s):
    1527-1534

    In this paper, a fault model for multiple-valued programmable logic arrays (MV-PLAs) is proposed and the equivalences of faults of MV-PLA's are discussed. In a supposed multiple-valued NOR/TSUM PLA model, it is shown that multiple-valued stuck-at faults, multiple-valued bridging faults, multiple-valued threshold shift faults and other some faults in a literal generator circuit are equivalent or subequivalent to a multiple crosspoint fault in the NOR plane or a multiple fault of weights in the TSUM plane. These results lead the fact that multiple-valued test vector set which indicates all multiple crosspoint fault and all multiple fault of weights also detects above equivalent or subequivalent faults in a MV-PLA.

  • A WDM Channel Sharing Scheme for Multihop Lightwave Networks Using Logically Bidirectional Perfect Shuffle Interconnection Pattern

    Hong-Ki HAN  Yoon-Kyoo JHEE  

     
    PAPER-Optical Communication

      Vol:
    E77-B No:9
      Page(s):
    1152-1161

    Optical WDM (Wavelength Division Multiplexing) technology is a method of exploiting the huge bandwidth of optical fibers. Local lightwave networks which use fixed wavelength transmitters and receivers can be built in a multihop fashion. In multihop local lightwave networks, packets arrive at their destination by hopping a number of intermediate nodes. The channel sharing schemes for multihop lightwave networks have been proposed for efficient channel utilization, but those schemes result in the degradation of network capacity and the user throughput. In this paper, we propose an improved WDM channel sharing scheme using the logically bidirectional perfect shuffle interconnection pattern, achieving smaller number of average hops for transmission and better channel utilization efficiency. Better channel utilization efficiency is obtained without much deteriorating the network capacity and the user throughput. TDMA (Time Division Multiple Access) protocol can be used to control the sharing of channels, and time delay and lost packet probability analysis based on TDMA is performed.

  • Piecewise-Linear Radial Basis Functions in Signal Processing

    Carlos J. PANTALEÓN-PRIETO  Aníbal R. FIGUEIRAS-VIDAL  

     
    LETTER

      Vol:
    E77-A No:9
      Page(s):
    1493-1496

    In this paper we introduce the Piecewise Linear Radial Basis Function Model (PWL-RBFM), a new nonlinear model that uses the well known RBF framework to build a PWL functional approximation by combining an l1 norm with a linear RBF function. A smooth generalization of the PWL-RBF is proposed: it is obtained by substituting the modulus function with the logistic function. These models are applied to several time series prediction tasks.

37741-37760hit(42756hit)