The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

4681-4700hit(42807hit)

  • Decomposed Vector Histograms of Oriented Gradients for Efficient Hardware Implementation

    Koichi MITSUNARI  Yoshinori TAKEUCHI  Masaharu IMAI  Jaehoon YU  

     
    PAPER-Vision

      Vol:
    E101-A No:11
      Page(s):
    1766-1775

    A significant portion of computational resources of embedded systems for visual detection is dedicated to feature extraction, and this severely affects the detection accuracy and processing performance of the system. To solve this problem, we propose a feature descriptor based on histograms of oriented gradients (HOG) consisting of simple linear algebra that can extract equivalent information to the conventional HOG feature descriptor at a low computational cost. In an evaluation, a leading-edge detection algorithm with this decomposed vector HOG (DV-HOG) achieved equivalent or better detection accuracy compared with conventional HOG feature descriptors. A hardware implementation of DV-HOG occupies approximately 14.2 times smaller cell area than that of a conventional HOG implementation.

  • Secure and Fast Near-Field Acoustic Communication Using Acoustic and Vibrational Signals

    Saki NISHIHARA  Tadashi EBIHARA  Koichi MIZUTANI  Naoto WAKATSUKI  

     
    PAPER-Communication Theory and Signals, Digital Signal Processing

      Vol:
    E101-A No:11
      Page(s):
    1841-1848

    In this paper, we propose a secure near-field communication (NFC) for smartphones by combining acoustic and vibrational communication. In our hybrid system, a transmitter transmits an encrypted message and encryption key from a loudspeaker and vibration motor, respectively. While the sound emitted from the loudspeaker propagates through the air, the vibration emitted by the vibration motor propagates through the body of smartphones. Hence, only receivers touching the transmitter can receive both the encrypted message and the key, resulting in secure communication. We designed a software modulator and demodulator suitable for the vibrational communication by using return-to-zero (RZ) code. Then we established a hybrid communication system by combining acoustic and vibrational communication modems, and evaluated its performance in experiments. The results indicate that our hybrid system achieved a secure (among physically contacted devices) and fast (800kbps) NFC for smartphones.

  • Optimal Design of Adaptive Intra Predictors Based on Sparsity Constraint

    Yukihiro BANDOH  Yuichi SAYAMA  Seishi TAKAMURA  Atsushi SHIMIZU  

     
    PAPER-Image

      Vol:
    E101-A No:11
      Page(s):
    1795-1805

    It is essential to improve intra prediction performance to raise the efficiency of video coding. In video coding standards such as H.265/HEVC, intra prediction is seen as an extension of directional prediction schemes, examples include refinement of directions, planar extension, filtering reference sampling, and so on. From the view point of reducing prediction error, some improvements on intra prediction for standardized schemes have been suggested. However, on the assumption that the correlation between neighboring pixels are static, these conventional methods use pre-defined predictors regardless of the image being encoded. Therefore, these conventional methods cannot reduce prediction error if the images break the assumption made in prediction design. On the other hand, adaptive predictors that change the image being encoded may offer poor coding efficiency due to the overhead of the additional information needed for adaptivity. This paper proposes an adaptive intra prediction scheme that resolves the trade-off between prediction error and adaptivity overhead. The proposed scheme is formulated as a constrained optimization problem that minimizes prediction error under sparsity constraints on the prediction coefficients. In order to solve this problem, a novel solver is introduced as an extension of LARS for multi-class support. Experiments show that the proposed scheme can reduce the amount of encoded bits by 1.21% to 3.24% on average compared to HM16.7.

  • Cube-Based Encryption-then-Compression System for Video Sequences

    Kosuke SHIMIZU  Taizo SUZUKI  Keisuke KAMEYAMA  

     
    PAPER-Image

      Vol:
    E101-A No:11
      Page(s):
    1815-1822

    We propose the cube-based perceptual encryption (C-PE), which consists of cube scrambling, cube rotation, cube negative/positive transformation, and cube color component shuffling, and describe its application to the encryption-then-compression (ETC) system of Motion JPEG (MJPEG). Especially, cube rotation replaces the blocks in the original frames with ones in not only the other frames but also the depth-wise cube sides (spatiotemporal sides) unlike conventional block-based perceptual encryption (B-PE). Since it makes intra-block observation more difficult and prevents unauthorized decryption from only a single frame, it is more robust than B-PE against attack methods without any decryption key. However, because the encrypted frames including the blocks from the spatiotemporal sides affect the MJPEG compression performance slightly, we also devise a version of C-PE with no spatiotemporal sides (NSS-C-PE) that hardly affects compression performance. C-PE makes the encrypted video sequence robust against the only single frame-based algorithmic brute force (ABF) attack with only 21 cubes. The experimental results show the compression efficiency and encryption robustness of the C-PE/NSS-C-PE-based ETC system. C-PE-based ETC system shows mixed results depending on videos, whereas NSS-C-PE-based ETC system shows that the BD-PSNR can be suppressed to about -0.03dB not depending on videos.

  • Gain Relaxation: A Solution to Overlooked Performance Degradation in Speech Recognition with Signal Enhancement

    Ryoji MIYAHARA  Akihiko SUGIYAMA  

     
    PAPER-Digital Signal Processing, Speech and Hearing

      Vol:
    E101-A No:11
      Page(s):
    1832-1840

    This paper proposes gain relaxation in signal enhancement designed for speech recognition. Gain relaxation selectively applies softer enhancement of a target signal to eliminate potential degradation in speech recognition caused by small undesirable distortion in the target signal components. The softer enhancement is a solution to overlooked performance degradation in signal enhancement combined with speech recognition which is encountered in commercial products with an unaware small local noise source. Evaluation of directional interference suppression with signals recorded by a commercial PC (personal computer) demonstrates that signal enhancement over the input is achieved without sacrificing the performance for clean speech.

  • Optimization of the Window Function in an Adaptive Noise Canceller

    Yusuke MATSUBARA  Naohiro TODA  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:11
      Page(s):
    1854-1860

    Adaptive noise cancellation using adaptive filters is a known method for removing noise that interferes with signal measurements. The adaptive noise canceller performs filtering based on the current situation through a windowing process. The shape of the window function determines the tracking performance of the adaptive noise canceller with respect to the fluctuation of the property of the unknown system that noise (reference signal) passes. However, the shape of the window function in the field of adaptive filtering has not yet been considered in detail. This study mathematically treats the effect of the window function on the adaptive noise canceller and proposes an optimization method for the window function in situations where offline processing can be performed, such as biomedical signal measurements. We also demonstrate the validity of the optimized window function through numerical experiments.

  • Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities

    Hiroki NAKANO  Fumihiro KANEI  Yuta TAKATA  Mitsuaki AKIYAMA  Katsunari YOSHIOKA  

     
    PAPER-Mobile Application and Web Security

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2576-2583

    Android app developers sometimes copy code snippets posted on a question-and-answer (Q&A) website and use them in their apps. However, if a code snippet has vulnerabilities, Android apps containing the vulnerable snippet could also have the same vulnerabilities. Despite this, the effect of such vulnerable snippets on the Android apps has not been investigated in depth. In this paper, we investigate the correspondence between the vulnerable code snippets and vulnerable apps. we collect code snippets from a Q&A website, extract possibly vulnerable snippets, and calculate similarity between those snippets and bytecode on vulnerable apps. Our experimental results show that 15.8% of all evaluated apps that have SSL implementation vulnerabilities (Improper host name verification), 31.7% that have SSL certificate verification vulnerabilities, and 3.8% that have WEBVIEW remote code execution vulnerabilities contain possibly vulnerable code snippets from Stack Overflow. In the worst case, a single problematic snippet has caused 4,844 apps to contain a vulnerability, accounting for 31.2% of all collected apps with that vulnerability.

  • Non-Cooperative Detection Method of MIMO-LFM Signals with FRFT Based on Entropy of Slice

    Yifei LIU  Jun ZHU  Bin TANG  Qi ZHANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:11
      Page(s):
    1940-1943

    To improve detection performance for a reconnaissance receiver, which is designed to detect the non-cooperative MIMO-LFM radar signal under low SNR condition, this letter proposed a novel signal detection method. This method is based on Fractional Fourier Transform with entropy weight (FRFTE) and autocorrelation algorithm. In addition, the flow chart and feasibility of the proposed algorithm are analyzed. Finally, applying our method to Wigner Hough Transform (WHT), we demonstrate the superiority of this method by simulation results.

  • A Modulus Factorization Algorithm for Self-Orthogonal and Self-Dual Integer Codes

    Hajime MATSUI  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:11
      Page(s):
    1952-1956

    Integer codes are defined by error-correcting codes over integers modulo a fixed positive integer. In this paper, we show that the construction of integer codes can be reduced into the cases of prime-power moduli. We can efficiently search integer codes with small prime-power moduli and can construct target integer codes with a large composite-number modulus. Moreover, we also show that this prime-factorization reduction is useful for the construction of self-orthogonal and self-dual integer codes, i.e., these properties in the prime-power moduli are preserved in the composite-number modulus. Numerical examples of integer codes and generator matrices demonstrate these facts and processes.

  • Deterministic Constructions of Compressed Sensing Matrices Based on Affine Singular Linear Space over Finite Fields

    Gang WANG  Min-Yao NIU  Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:11
      Page(s):
    1957-1963

    Compressed sensing theory provides a new approach to acquire data as a sampling technique and makes sure that a sparse signal can be reconstructed from few measurements. The construction of compressed sensing matrices is a main problem in compressed sensing theory (CS). In this paper, the deterministic constructions of compressed sensing matrices based on affine singular linear space over finite fields are presented and a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields. By choosing appropriate parameters, our sparse compressed sensing matrices are superior to the DeVore's matrices. Then we use a new formulation of support recovery to recover the support sets of signals with sparsity no more than k on account of binary compressed sensing matrices satisfying disjunct and inclusive properties.

  • Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:11
      Page(s):
    1970-1974

    This letter studies physical-layer security in a cognitive radio (CR) network, where a primary user (PU) is eavesdropped by multiple collusive eavesdroppers. Under the PU secrecy outage constraint to protect the PU, the secondary users (SUs) are assumed to be allowed to transmit. The problem of joint SU scheduling and power control to maximize the SU ergodic transmission rate is investigated for both the scenarios of perfect and imperfect channel state information (CSI). It is shown that, although collusive eavesdroppers degrade the PU performance compared to non-collusive eavesdroppers, the SU performance is actually improved when the number of eavesdroppers is large. It is also shown that our proposed scheme with imperfect CSI can guarantee that the PU performance is unaffected by imperfect CSI.

  • Dynamic Channel Assignment with Consideration of Interference and Fairness for Dense Small-Cell Networks

    Se-Jin KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:11
      Page(s):
    1984-1987

    This letter proposes a novel dynamic channel assignment (DCA) scheme with consideration of interference and fairness for the downlink of dense small-cell networks based on orthogonal frequency division multiple access-frequency division duplex. In the proposed scheme, a small-cell gateway fairly assigns subchannels to the small-cell user equipment (SUE) according to the co-tier interference from neighboring small-cell access points. From the simulation results, it is shown that the proposed DCA scheme outperforms other DCA schemes in terms of the fairness of each SUE capacity.

  • A Novel Supervised Bimodal Emotion Recognition Approach Based on Facial Expression and Body Gesture

    Jingjie YAN  Guanming LU  Xiaodong BAI  Haibo LI  Ning SUN  Ruiyu LIANG  

     
    LETTER-Image

      Vol:
    E101-A No:11
      Page(s):
    2003-2006

    In this letter, we propose a supervised bimodal emotion recognition approach based on two important human emotion modalities including facial expression and body gesture. A effectively supervised feature fusion algorithms named supervised multiset canonical correlation analysis (SMCCA) is presented to established the linear connection between three sets of matrices, which contain the feature matrix of two modalities and their concurrent category matrix. The test results in the bimodal emotion recognition of the FABO database show that the SMCCA algorithm can get better or considerable efficiency than unsupervised feature fusion algorithm covering canonical correlation analysis (CCA), sparse canonical correlation analysis (SCCA), multiset canonical correlation analysis (MCCA) and so on.

  • End-to-End Redundancy and Maintenance Condition Design for Nationwide Optical Transport Network

    Yoshihiko UEMATSU  Shohei KAMAMURA  Hiroshi YAMAMOTO  Aki FUKUDA  Rie HAYASHI  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2018/05/22
      Vol:
    E101-B No:11
      Page(s):
    2267-2276

    To achieve high end-to-end availability in nationwide optical transport network across thousands of office buildings, it is important to properly make each function redundant, and execute protection switching, repair failed functions and recover redundancy to prevent multiple simultaneous failures. High redundancy leads to high system cost and high power consumption, and tight conditions for recovery leads to high maintenance cost. Therefore it is important to optimize the balance between redundancy and maintenance condition based on appropriate availability indicators. We previously proposed a resource-pool control mechanism for a nationwide optical transport network that can optimize the balance. This paper proposes an end-to-end availability evaluation scheme for a nationwide optical transport network with our mechanism, by which network operators can design the pool-resource amount of each function and the maintenance conditions for each network area properly to satisfy the end-to-end availability requirement. Although the maintenance conditions are usually discussed based on failure-recovery times, they should be discussed based on cost- or load-based volumes for this design. This paper proposes a maintenance-operation-load evaluation scheme, which derives the required number of maintenance staff members from failure-recovery times. We also discuss the design of the pool-resource amount and maintenance conditions for each network area of a nationwide network based on the proposed evaluation schemes.

  • Characterization of Broadband Mobile Communication Channel in 200MHz Band Based on Saleh-Valenzuela Model

    Hiroki OHARA  Hirokazu SAWADA  Masayuki OODO  Fumihide KOJIMA  Hiroshi HARADA  Kentaro SAITO  Jun-ichi TAKADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/05/11
      Vol:
    E101-B No:11
      Page(s):
    2277-2288

    Digitization of analog terrestrial TV broadcasting has recently been accelerated in many countries, and the effective utilization of vacant frequencies has also been investigated for new systems in each country. In Japan, a portion of vacant frequencies in the VHF-high band was allocated to the public broadband mobile communication (PBB) system. To evaluate the current PBB system and develop future broadband communication systems in this band, it is important to analyze the propagation channel more accurately. In this study, we characterize the propagation channel for 200MHz band broadband mobile communication systems, using measured channel impulse responses (CIRs). In the characterization process, the Saleh-Valenzuela (S-V) model is utilized to extract channel model parameters statistically. When evaluating the fluctuation of path power gain, we also propose to model the fluctuation of path power gain using the generalized extreme value distribution instead of the conventional log-normal distribution. The extracted CIR model parameters are validated by cumulative distribution function of root-means-square delay spread and maximum excess delay, comparing simulation result to measurement result. From the extracted CIR model parameters, we clarified the characteristics of 200MHz band broadband mobile communication systems in non-line-of-sight environments based on S-V model with the proposed channel model.

  • Pilot Cluster ICI Suppression in OFDM Systems Based on Coded Symbols

    Yong DING  Shan OUYANG  Yue-Lei XIE  Xiao-Mao CHEN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/04/27
      Vol:
    E101-B No:11
      Page(s):
    2320-2330

    When trying to estimate time-varying multipath channels by applying a basis expansion model (BEM) in orthogonal frequency division multiplexing (OFDM) systems, pilot clusters are contaminated by inter-carrier interference (ICI). The pilot cluster ICI (PC-ICI) degrades the estimation accuracy of BEM coefficients, which degrades system performance. In this paper, a PC-ICI suppression scheme is proposed, in which two coded symbols defined as weighted sums of data symbols are inserted on both sides of each pilot cluster. Under the assumption that the channel has Flat Doppler spectrum, the optimized weight coefficients are obtained by an alternating iterative optimization algorithm, so that the sum of the PC-ICI generated by the encoded symbols and the data symbols is minimized. By approximating the optimized weight coefficients, they are independent of the channel tap power. Furthermore, it is verified that the proposed scheme is robust to the estimation error of the normalized Doppler frequency offset and can be applied to channels with other types of Doppler spectra. Numerical simulation results show that, compared with the conventional schemes, the proposed scheme achieves significant improvements in the performance of PC-ICI suppression, channel estimation and system bit-error-ratio (BER).

  • Resource Allocation in Multi-Cell Massive MIMO System with Time-Splitting Wireless Power Transfer

    Jia-Cheng ZHU  Dong-Hua CHEN  Yu-Cheng HE  Lin ZHOU  Jian-Jun MU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/05/16
      Vol:
    E101-B No:11
      Page(s):
    2331-2339

    Wireless information and power transfer technology is a promising means of supplying power for remote terminals in future communication systems. This paper investigates time-splitting (TS) recource allocation schemes for multi-cell massive MIMO systems with downlink (DL) wireless power transfer and uplink (UL) user information transmission under a harvest-then-transmit protocol. In order to jointly optimize the power and time allocation, two power minimization problems are formulated under different constraints on the minimal quality-of-service (QoS) requirement. Then, these original non-convex problems are transformed into their convex approximated ones which can be solved iteratively by successive convex approximation. Simulation results show that by exploiting the diversity effect of large-scale antenna arrays, the complexity-reduced asymptotic recourse allocation scheme almost match the power efficiency of the nonasymptotic scheme.

  • Low-Complexity Detection Based on Landweber Method in the Uplink of Massive MIMO Systems

    Xu BAO  Wence ZHANG  Jisheng DAI  Jianxin DAI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/05/16
      Vol:
    E101-B No:11
      Page(s):
    2340-2347

    In this paper, we devise low-complexity uplink detection algorithms for Massive MIMO systems. We treat the uplink detection as an ill-posed problem and adopt the Landweber Method to solve it. In order to reduce the computational complexity and increase the convergence rate, we propose improved Landweber Method with optimal relax factor (ILM-O) algorithm. In addition, to reduce the order of Landweber Method by introducing a set of coefficients, we propose reduced order Landweber Method (ROLM) algorithm. An analysis on the convergence and the complexity is provided. Numerical results demonstrate that the proposed algorithms outperform the existing algorithm.

  • A New Classification-Like Scheme for Spectrum Sensing Using Spectral Correlation and Stacked Denoising Autoencoders

    Hang LIU  Xu ZHU  Takeo FUJII  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/04/25
      Vol:
    E101-B No:11
      Page(s):
    2348-2361

    In this paper, we propose a novel primary user detection scheme for spectrum sensing in cognitive radio. Inspired by the conventional signal classification approach, the spectrum sensing is translated into a classification problem. On the basis of feature-based classification, the spectral correlation of a second-order cyclostationary analysis is applied as the feature extraction method, whereas a stacked denoising autoencoders network is applied as the classifier. Two training methods for signal detection, interception-based detection and simulation-based detection, are considered, for different prior information and implementation conditions. In an interception-based detection method, inspired by the two-step sensing, we obtain training data from the interception of actual signals after a sophisticated sensing procedure, to achieve detection without priori information. In addition, benefiting from practical training data, this interception-based detection is superior under actual transmission environment conditions. The alternative, a simulation-based detection method utilizes some undisguised parameters of the primary user in the spectrum of interest. Owing to the diversified predetermined training data, simulation-based detection exhibits transcendental robustness against harsh noise environments, although it demands a more complicated classifier network structure. Additionally, for the above-described training methods, we discuss the classifier complexity over implementation conditions and the trade-off between robustness and detection performance. The simulation results show the advantages of the proposed method over conventional spectrum-sensing schemes.

  • Advanced Top-Down Fabrication Process of A-IGZO TFT for Roll-to-Roll Backplane Open Access

    Sung Jin KIM  Jong Hoon CHOI  Hyung Tae KIM  Hee Nam CHAE  Sung Min CHO  

     
    INVITED PAPER

      Vol:
    E101-C No:11
      Page(s):
    874-879

    Amorphous indium-gallium-zinc-oxide (a-IGZO) thin film transistor (TFT) was fabricated by an advanced self-aligned imprint lithography (ASAIL) method with a hybrid etching process. The SAIL is a top-down method to fabricate a TFT using a three-dimensional multilayer etch mask having all pattern information for the TFT. The hybrid etching process was newly applied in the original SAIL process for the purpose of reducing plasma damage of a-IGZO channel layer during plasma etching in the ASAIL process. This research demonstrated that the a-IGZO TFT could be successfully fabricated by the ASAIL process. In particular, the hybrid etching process applied in this paper can be utilized for the back-channel-etch type a-IGZO TFT and further extended for the roll-to-roll backplane process.

4681-4700hit(42807hit)