The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

7001-7020hit(42807hit)

  • Periodic-Like Trajectories in Master-Slave Coupled Piecewise Constant Spiking Oscillators

    Yusuke MATSUOKA  

     
    PAPER-Nonlinear Problems

      Vol:
    E99-A No:11
      Page(s):
    2049-2059

    This paper considers the behavior of a master-slave system of two coupled piecewise constant spiking oscillators (PWCSOs). The master of this system exhibits chaos and outputs a chaotic sequence of spikes, which are used as input to the slave. The slave exhibits a periodic-like trajectory (PLT) that is chaotic but that appears to be periodic in the phase plane. We theoretically investigate the generating region of the PLT in the parameter space. Using a test circuit, we confirm the typical phenomena of this coupled system.

  • Adaptive Local Thresholding for Co-Localization Detection in Multi-Channel Fluorescence Microscopic Images

    Eisuke ITO  Yusuke TOMARU  Akira IIZUKA  Hirokazu HIRAI  Tsuyoshi KATO  

     
    LETTER-Biological Engineering

      Pubricized:
    2016/07/27
      Vol:
    E99-D No:11
      Page(s):
    2851-2855

    Automatic detection of immunoreactive areas in fluorescence microscopic images is becoming a key technique in the field of biology including neuroscience, although it is still challenging because of several reasons such as low signal-to-noise ratio and contrast variation within an image. In this study, we developed a new algorithm that exhaustively detects co-localized areas in multi-channel fluorescence images, where shapes of target objects may differ among channels. Different adaptive binarization thresholds for different local regions in different channels are introduced and the condition of each segment is assessed to recognize the target objects. The proposed method was applied to detect immunoreactive spots that labeled membrane receptors on dendritic spines of mouse cerebellar Purkinje cells. Our method achieved the best detection performance over five pre-existing methods.

  • RBM-LBP: Joint Distribution of Multiple Local Binary Patterns for Texture Classification

    Chao LIANG  Wenming YANG  Fei ZHOU  Qingmin LIAO  

     
    LETTER-Pattern Recognition

      Pubricized:
    2016/08/19
      Vol:
    E99-D No:11
      Page(s):
    2828-2831

    In this letter, we propose a novel framework to estimate the joint distribution of multiple Local Binary Patterns (LBPs). Multiple LBPs extracted from the same central pixel are first encoded using handcrafted encoding schemes to achieve rotation invariance, and the outputs are further encoded through a pre-trained Restricted Boltzmann Machine (RBM) to reduce the dimension of features. RBM has been successfully used as binary feature detectors and the binary-valued units of RBM seamlessly adapt to LBP. The proposed feature is called RBM-LBP. Experiments on the CUReT and Outex databases show that RBM-LBP is superior to conventional handcrafted encodings and more powerful in estimating the joint distribution of multiple LBPs.

  • Distributed Optimization in Transportation and Logistics Networks Open Access

    K. Y. Michael WONG  David SAAD  Chi Ho YEUNG  

     
    INVITED PAPER

      Vol:
    E99-B No:11
      Page(s):
    2237-2246

    Many important problems in communication networks, transportation networks, and logistics networks are solved by the minimization of cost functions. In general, these can be complex optimization problems involving many variables. However, physicists noted that in a network, a node variable (such as the amount of resources of the nodes) is connected to a set of link variables (such as the flow connecting the node), and similarly each link variable is connected to a number of (usually two) node variables. This enables one to break the problem into local components, often arriving at distributive algorithms to solve the problems. Compared with centralized algorithms, distributed algorithms have the advantages of lower computational complexity, and lower communication overhead. Since they have a faster response to local changes of the environment, they are especially useful for networks with evolving conditions. This review will cover message-passing algorithms in applications such as resource allocation, transportation networks, facility location, traffic routing, and stability of power grids.

  • Statistical Measurement of Electromagnetic Noise Characteristics of ESD in Wireless Frequency Bands and Influence Evaluation on Communication Performance

    Ryo NAKAYA  Hidenawo ANDO  Daisuke ANZAI  Jianqing WANG  Osamu FUJIWARA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2016/05/25
      Vol:
    E99-B No:11
      Page(s):
    2399-2405

    Wireless body area networks (BANs) are attracting much attention due to their suitable for healthcare and medical applications. Unfortunately, electrostatic discharge (ESD) is a major electromagnetic (EM) noise source that can degrade wireless communication performance. In this study, we measure EM noise power in the 2.4GHz and 30MHz bands for indirect ESD testing specified in IEC 61000-4-2 standard, and derived a statistical ESD noise model from the measurement results. The ESD noise power was found to follow a lognormal distribution in both 2.4GHz and 30MHz bands. We use this ESD noise model to conduct bit error rate (BER) simulations in a communication channel with additive white Gaussian noise (AWGN) plus ESD noise at 2.4GHz and 30MHz bands. The result is that the BER performance is virtually the same in both bands, and decreases with the signal to noise power ratio (SNR). It is also shown that an error floor exists in the BER performances at both frequencies, which, if the ESD noise power is larger than the Gaussian noise, cannot be improved by increasing the SNR. Although the ESD noise power at 2.4GHz band is nearly 30dB smaller than that at 30MHz band, the signal attenuation along the human body at 2.4GHz band is much larger compared to 30MHz band. This may yield a similar SNR level at 30MHz and 2.4GHz bands in an ESD-dominated environment, so that the 2.4GHz band does not have an obvious merit for BAN applications. Since there are so many in-band interference sources at 2.4GHz band, the 30MHz band seems more promising for vital data transmission in a BAN scenario even in an ESD-dominated environment.

  • A Built-in Test Circuit for Electrical Interconnect Testing of Open Defects in Assembled PCBs

    Widiant  Masaki HASHIZUME  Shohei SUENAGA  Hiroyuki YOTSUYANAGI  Akira ONO  Shyue-Kung LU  Zvi ROTH  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/08/16
      Vol:
    E99-D No:11
      Page(s):
    2723-2733

    In this paper, a built-in test circuit for an electrical interconnect test method is proposed to detect an open defect occurring at an interconnect between an IC and a printed circuit board. The test method is based on measuring the supply current of an inverter gate in the test circuit. A time-varying signal is provided to an interconnect as a test signal by the built-in test circuit. In this paper, the test circuit is evaluated by SPICE simulation and by experiments with a prototyping IC. The experimental results reveal that a hard open defect is detectable by the test method in addition to a resistive open defect and a capacitive open one at a test speed of 400 kHz.

  • Set-to-Set Disjoint Paths Routing in Torus-Connected Cycles

    Antoine BOSSARD  Keiichi KANEKO  

     
    LETTER-Dependable Computing

      Pubricized:
    2016/08/10
      Vol:
    E99-D No:11
      Page(s):
    2821-2823

    Extending the very popular tori interconnection networks[1]-[3], Torus-Connected Cycles (TCC) have been proposed as a novel network topology for massively parallel systems [5]. Here, the set-to-set disjoint paths routing problem in a TCC is solved. In a TCC(k,n), it is proved that paths of lengths at most kn2+2n can be selected in O(kn2) time.

  • FOREWORD

    Takayuki NAKACHI  Makoto NAKASHIZUKA  

     
    FOREWORD

      Vol:
    E99-A No:11
      Page(s):
    1907-1908
  • Vote Distribution Model for Hough-Based Action Detection

    Kensho HARA  Takatsugu HIRAYAMA  Kenji MASE  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/08/18
      Vol:
    E99-D No:11
      Page(s):
    2796-2808

    Hough-based voting approaches have been widely used to solve many detection problems such as object and action detection. These approaches for action detection cast votes for action classes and positions based on the local spatio-temporal features of given videos. The voting process of each local feature is performed independently of the other local features. This independence enables the method to be robust to occlusions because votes based on visible local features are not influenced by occluded local features. However, such independence makes discrimination of similar motions between different classes difficult and causes the method to cast many false votes. We propose a novel Hough-based action detection method to overcome the problem of false votes. The false votes do not occur randomly such that they depend on relevant action classes. We introduce vote distributions, which represent the number of votes for each action class. We assume that the distribution of false votes include important information necessary to improving action detection. These distributions are used to build a model that represents the characteristics of Hough voting that include false votes. The method estimates the likelihood using the model and reduces the influence of false votes. In experiments, we confirmed that the proposed method reduces false positive detection and improves action detection accuracy when using the IXMAS dataset and the UT-Interaction dataset.

  • On-Line Rigid Object Tracking via Discriminative Feature Classification

    Quan MIAO  Chenbo SHI  Long MENG  Guang CHENG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2016/08/03
      Vol:
    E99-D No:11
      Page(s):
    2824-2827

    This paper proposes an on-line rigid object tracking framework via discriminative object appearance modeling and learning. Strong classifiers are combined with 2D scale-rotation invariant local features to treat tracking as a keypoint matching problem. For on-line boosting, we correspond a Gaussian mixture model (GMM) to each weak classifier and propose a GMM-based classifying mechanism. Meanwhile, self-organizing theory is applied to perform automatic clustering for sequential updating. Benefiting from the invariance of the SURF feature and the proposed on-line classifying technique, we can easily find reliable matching pairs and thus perform accurate and stable tracking. Experiments show that the proposed method achieves better performance than previously reported trackers.

  • Personalized Web Page Recommendation Based on Preference Footprint to Browsed Pages

    Kenta SERIZAWA  Sayaka KAMEI  Syuhei HAYASHI  Satoshi FUJITA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/08/08
      Vol:
    E99-D No:11
      Page(s):
    2705-2715

    In this paper, a new scheme for personalized web page recommendation using multi-user search engine query information is proposed. Our contribution is a scheme that improves the accuracy of personalization for various types of contents (e.g., documents, images and music) without increasing user burden. The proposed scheme combines “preference footprints” for browsed pages with collaborative filtering. We acquire user interest using words that are relevant to queries submitted by users, attach all user interests to a page as a footprint when it is browsed, and evaluate the relevance of web pages in relation to words in footprints. The performance of the scheme is evaluated experimentally. The results indicate that the proposed scheme improves the precision and recall of previous schemes by 1%-24% and 80%-107%, respectively.

  • Reseeding-Oriented Test Power Reduction for Linear-Decompression-Based Test Compression Architectures

    Tian CHEN  Dandan SHEN  Xin YI  Huaguo LIANG  Xiaoqing WEN  Wei WANG  

     
    PAPER-Computer System

      Pubricized:
    2016/07/25
      Vol:
    E99-D No:11
      Page(s):
    2672-2681

    Linear feedback shift register (LFSR) reseeding is an effective method for test data reduction. However, the test patterns generated by LFSR reseeding generally have high toggle rate and thus cause high test power. Therefore, it is feasible to fill X bits in deterministic test cubes with 0 or 1 properly before encoding the seed to reduce toggle rate. However, X-filling will increase the number of specified bits, thus increase the difficulty of seed encoding, what's more, the size of LFSR will increase as well. This paper presents a test frame which takes into consideration both compression ratio and power consumption simultaneously. In the first stage, the proposed reseeding-oriented X-filling proceeds for shift power (shift filling) and capture power (capture filling) reduction. Then, encode the filled test cubes using the proposed Compatible Block Code (CBC). The CBC can X-ize specified bits, namely turning specified bits into X bits, and can resolve the conflict between low-power filling and seed encoding. Experiments performed on ISCAS'89 benchmark circuits show that our scheme attains a compression ratio of 94.1% and reduces capture power by at least 15% and scan-in power by more than 79.5%.

  • A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks

    Dongxu CHENG  Jianwei LIU  Zhenyu GUAN  Tao SHANG  

     
    PAPER-Information Network

      Pubricized:
    2016/07/21
      Vol:
    E99-D No:11
      Page(s):
    2716-2722

    Established in self-organized mode between mobile terminals (MT), mobile Ad Hoc networks are characterized by a fast change of network topology, limited power dissipation of network node, limited network bandwidth and poor security of the network. Therefore, this paper proposes an efficient one round certificateless authenticated group key agreement (OR-CLAGKA) protocol to satisfy the security demand of mobile Ad Hoc networks. Based on elliptic curve public key cryptography (ECC), OR-CLAGKA protocol utilizes the assumption of elliptic curve discrete logarithm problems (ECDLP) to guarantee its security. In contrast with those certificateless authenticated group key agreement (GKA) protocols, OR-CLAGKA protocol can reduce protocol data interaction between group users and it is based on efficient ECC public key infrastructure without calculating bilinear pairings, which involves negligible computational overhead. Thus, it is particularly suitable to deploy OR-CLAGKA protocol on MT devices because of its limited computation capacity and power consumption. Also, under the premise of keeping the forward and backward security, OR-CLAGKA protocol has achieved appropriate optimization to improve the performance of Ad Hoc networks in terms of frequent communication interrupt and reconnection. In addition, it has reduced executive overheads of key agreement protocol to make the protocol more suitable for mobile Ad Hoc network applications.

  • Job Mapping and Scheduling on Free-Space Optical Networks

    Yao HU  Ikki FUJIWARA  Michihiro KOIBUCHI  

     
    PAPER-Computer System

      Pubricized:
    2016/08/16
      Vol:
    E99-D No:11
      Page(s):
    2694-2704

    A number of parallel applications run on a high-performance computing (HPC) system simultaneously. Job mapping and scheduling become crucial to improve system utilization, because fragmentation prevents an incoming job from being assigned even if there are enough compute nodes unused. Wireless supercomputers and datacenters with free-space optical (FSO) terminals have been proposed to replace the conventional wired interconnection so that a diverse application workload can be better supported by changing their network topologies. In this study we firstly present an efficient job mapping by swapping the endpoints of FSO links in a wireless HPC system. Our evaluation shows that an FSO-equipped wireless HPC system can achieve shorter average queuing length and queuing time for all the dispatched user jobs. Secondly, we consider the use of a more complicated and enhanced scheduling algorithm, which can further improve the system utilization over different host networks, as well as the average response time for all the dispatched user jobs. Finally, we present the performance advantages of the proposed wireless HPC system under more practical assumptions such as different cabinet capacities and diverse subtopology packings.

  • An Algorithm of Connecting Broken Objects Based on the Skeletons

    Chao XU  Dongxiang ZHOU  Yunhui LIU  

     
    LETTER-Pattern Recognition

      Pubricized:
    2016/08/10
      Vol:
    E99-D No:11
      Page(s):
    2832-2835

    The segmentation of Mycobacterium tuberculosis images forms the basis for the computer-aided diagnosis of tuberculosis. The segmented objects are often broken due to the low-contrast objects and the limits of segmentation method. This will result in decreasing the accuracy of segmentation and recognition. A simple and effective post-processing method is proposed to connect the broken objects. The broken objects in the segmented binary images are connected based on the information obtained from their skeletons. Experimental results demonstrate the effectiveness of our proposed method.

  • Fast Coding Unit Size Decision Based on Probabilistic Graphical Model in High Efficiency Video Coding Inter Prediction

    Xiantao JIANG  Tian SONG  Wen SHI  Takafumi KATAYAMA  Takashi SHIMAMOTO  Lisheng WANG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/08/08
      Vol:
    E99-D No:11
      Page(s):
    2836-2839

    In this work, a high efficiency coding unit (CU) size decision algorithm is proposed for high efficiency video coding (HEVC) inter coding. The CU splitting or non-splitting is modeled as a binary classification problem based on probability graphical model (PGM). This method incorporates two sub-methods: CU size termination decision and CU size skip decision. This method focuses on the trade-off between encoding efficiency and encoding complexity, and it has a good performance. Particularly in the high resolution application, simulation results demonstrate that the proposed algorithm can reduce encoding time by 53.62%-57.54%, while the increased BD-rate are only 1.27%-1.65%, compared to the HEVC software model.

  • A Morpheme-Based Weighting for Chinese-Mongolian Statistical Machine Translation

    Zhenxin YANG  Miao LI  Lei CHEN  Kai SUN  

     
    LETTER-Natural Language Processing

      Pubricized:
    2016/08/18
      Vol:
    E99-D No:11
      Page(s):
    2843-2846

    In this paper, a morpheme-based weighting and its integration method are proposed as a smoothing method to alleviate the data sparseness in Chinese-Mongolian statistical machine translation (SMT). Besides, we present source-side reordering as the pre-processing model to verify the extensibility of our method. Experi-mental results show that the morpheme-based weighting can substantially improve the translation quality.

  • Contrast Enhancement of Mycobacterium Tuberculosis Images Based on Improved Histogram Equalization

    Chao XU  Dongxiang ZHOU  Keju PENG  Weihong FAN  Yunhui LIU  

     
    LETTER-Biological Engineering

      Pubricized:
    2016/07/27
      Vol:
    E99-D No:11
      Page(s):
    2847-2850

    There are often low contrast Mycobacterium tuberculosis (MTB) objects in the MTB images. Based on improved histogram equalization (HE), a framework of contrast enhancement is proposed to increase the contrast of MTB images. Our proposed algorithm was compared with the traditional HE and the weighted thresholded HE. The experimental results demonstrate that our proposed algorithm has better performance in contrast enhancement, artifacts suppression, and brightness preserving for MTB images.

  • Revisiting the Regression between Raw Outputs of Image Quality Metrics and Ground Truth Measurements

    Chanho JUNG  Sanghyun JOO  Do-Won NAM  Wonjun KIM  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2016/08/08
      Vol:
    E99-D No:11
      Page(s):
    2778-2787

    In this paper, we aim to investigate the potential usefulness of machine learning in image quality assessment (IQA). Most previous studies have focused on designing effective image quality metrics (IQMs), and significant advances have been made in the development of IQMs over the last decade. Here, our goal is to improve prediction outcomes of “any” given image quality metric. We call this the “IQM's Outcome Improvement” problem, in order to distinguish the proposed approach from the existing IQA approaches. We propose a method that focuses on the underlying IQM and improves its prediction results by using machine learning techniques. Extensive experiments have been conducted on three different publicly available image databases. Particularly, through both 1) in-database and 2) cross-database validations, the generality and technological feasibility (in real-world applications) of our machine-learning-based algorithm have been evaluated. Our results demonstrate that the proposed framework improves prediction outcomes of various existing commonly used IQMs (e.g., MSE, PSNR, SSIM-based IQMs, etc.) in terms of not only prediction accuracy, but also prediction monotonicity.

  • Improving Performance of Heuristic Algorithms by Lebesgue Spectrum Filter Open Access

    Mikio HASEGAWA  

     
    INVITED PAPER

      Vol:
    E99-B No:11
      Page(s):
    2256-2262

    The previous researches on the chaotic CDMA have theoretically derived the chaotic sequences having the minimum asynchronous cross-correlation. To minimize the asynchronous cross-correlation, autocorrelation of each sequence have to be C(τ)≈C×rτ, r=-2+√3, dumped oscillation with increase of the lag τ. There are several methods to generate such sequences, using a chaotic map, using the Lebesgue spectrum filter (LSF) and so on. In this paper, such lowest cross-correlation found in the chaotic CDMA researches is applied to solution search algorithms for combinatorial optimization problems. In combinatorial optimization, effectiveness of the chaotic search has already been clarified. First, an importance of chaos and autocorrelation with dumped oscillation for combinatorial optimization is shown. Next, in order to realize ideal solution search, the LSF is applied to the Hopfield-Tank neural network, the 2-opt method and the 2-exchange method. Effectiveness of the LSF is clarified even for the large problems for the traveling salesman problems and the quadratic assignment problems.

7001-7020hit(42807hit)