The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8281-8300hit(42807hit)

  • Food Image Enhancement by Adjusting Intensity and Saturation in RGB Color Space

    Chiaki UEDA  Minami IBATA  Tadahiro AZETSU  Noriaki SUETAKE  Eiji UCHINO  

     
    PAPER

      Vol:
    E98-A No:11
      Page(s):
    2220-2228

    In a food image acquired by a digital camera, its intensity and saturation components are sometimes decreased depending on the illumination environment. In this case, the food image does not look delicious. In general, RGB components are transformed into hue, saturation and intensity components, and then the saturation and intensity components are enhanced so that the food image looks delicious. However, these processes are complex and involve a gamut problem. In this paper, we propose an intensity and saturation enhancement method while preserving the hue in the RGB color space for the food image. In this method, at first, the intensity components are enhanced avoiding the saturation deterioration. Then the saturation components of the regions having the hue components frequently appeared in foods are enhanced. In order to illustrate the effectiveness of the proposed method, the enhancement experiments using several food images are done.

  • FOREWORD

    Hirokazu TANAKA  Takao ONOYE  

     
    FOREWORD

      Vol:
    E98-A No:11
      Page(s):
    2209-2210
  • FOREWORD Open Access

    Atsushi HIRAMATSU  

     
    FOREWORD

      Vol:
    E98-B No:11
      Page(s):
    2098-2098
  • Implementation of Viterbi Decoder toward GPU-Based SDR Receiver

    Kosuke TOMITA  Masahide HATANAKA  Takao ONOYE  

     
    PAPER

      Vol:
    E98-A No:11
      Page(s):
    2246-2253

    Viterbi decoding is commonly used for several protocols, but computational cost is quite high and thus it is necessary to implement it effectively. This paper describes GPU implementation of Viterbi decoder utilizing three-point Viterbi decoding algorithm (TVDA), in which the received bits are divided into multiple chunks and several chunks are decoded simultaneously. Coalesced access and Warp Shuffle, which is new instruction introduced are also utilized in order to improve decoder performance. In addition, iterative execution of parallel chunks decoding reduces the latency of proposed Viterbi decoder in order to utilize the decoder as a part of GPU-based SDR transceiver. As the result, the throughput of proposed Viterbi decoder is improved by 23.1%.

  • Network Clock System that Ensures a High Level of Frequency Accuracy

    Shuichi FUJIKAWA  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E98-B No:11
      Page(s):
    2212-2226

    This paper proposes a network clock system that detects degradation in the frequency accuracy of network clocks distributed across a network and finds the sources of the degradation. This system uses two factors to identify degradation in frequency accuracy and an algorithm that finds degradation sources by integrating and analyzing the evaluation results gathered from the entire network. Many frequency stability measurement systems have been proposed, and most are based on time synchronization protocols. These systems also realize avoidance of frequency degradation and identification of the sources of the degradation. Unfortunately, the use of time synchronization protocols is impractical if the service provider, such as NTT, has already installed a frequency synchronization system; the provider must replace massive amounts of equipment with new devices that support the time synchronization protocols. Considering the expenditure of installment, this is an excessive burden on service providers. Therefore, a new system that can detect of frequency degradation in network clocks and identify the degradation causes without requiring new equipment is strongly demanded. The proposals made here are implemented by the installation of new circuit cards in current equipment and installing a server that runs the algorithm. This proposed system is currently being installed in NTT's network.

  • Ensemble and Multiple Kernel Regressors: Which Is Better?

    Akira TANAKA  Hirofumi TAKEBAYASHI  Ichigaku TAKIGAWA  Hideyuki IMAI  Mineichi KUDO  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E98-A No:11
      Page(s):
    2315-2324

    For the last few decades, learning with multiple kernels, represented by the ensemble kernel regressor and the multiple kernel regressor, has attracted much attention in the field of kernel-based machine learning. Although their efficacy was investigated numerically in many works, their theoretical ground is not investigated sufficiently, since we do not have a theoretical framework to evaluate them. In this paper, we introduce a unified framework for evaluating kernel regressors with multiple kernels. On the basis of the framework, we analyze the generalization errors of the ensemble kernel regressor and the multiple kernel regressor, and give a sufficient condition for the ensemble kernel regressor to outperform the multiple kernel regressor in terms of the generalization error in noise-free case. We also show that each kernel regressor can be better than the other without the sufficient condition by giving examples, which supports the importance of the sufficient condition.

  • Multi-Focus Image Fusion Based on Multiple Directional LOTs

    Zhiyu CHEN  Shogo MURAMATSU  

     
    LETTER-Image

      Vol:
    E98-A No:11
      Page(s):
    2360-2365

    This letter proposes an image fusion method which adopts a union of multiple directional lapped orthogonal transforms (DirLOTs). DirLOTs are used to generate symmetric orthogonal discrete wavelet transforms and then to construct a union of unitary transforms as a redundant dictionary with a multiple directional property. The multiple DirLOTs can overcome a disadvantage of separable wavelets to represent images which contain slant textures and edges. We analyse the characteristic of local luminance contrast, and propose a fusion rule based on interscale relation of wavelet coefficients. Relying on the above, a novel image fusion method is proposed. Some experimental results show that the proposed method is able to significantly improve the fusion performance from those with the conventional discrete wavelet transforms.

  • Posteriori Restoration of Turn-Taking and ASR Results for Incorrectly Segmented Utterances

    Kazunori KOMATANI  Naoki HOTTA  Satoshi SATO  Mikio NAKANO  

     
    PAPER-Speech and Hearing

      Pubricized:
    2015/07/24
      Vol:
    E98-D No:11
      Page(s):
    1923-1931

    Appropriate turn-taking is important in spoken dialogue systems as well as generating correct responses. Especially if the dialogue features quick responses, a user utterance is often incorrectly segmented due to short pauses within it by voice activity detection (VAD). Incorrectly segmented utterances cause problems both in the automatic speech recognition (ASR) results and turn-taking: i.e., an incorrect VAD result leads to ASR errors and causes the system to start responding though the user is still speaking. We develop a method that performs a posteriori restoration for incorrectly segmented utterances and implement it as a plug-in for the MMDAgent open-source software. A crucial part of the method is to classify whether the restoration is required or not. We cast it as a binary classification problem of detecting originally single utterances from pairs of utterance fragments. Various features are used representing timing, prosody, and ASR result information. Experiments show that the proposed method outperformed a baseline with manually-selected features by 4.8% and 3.9% in cross-domain evaluations with two domains. More detailed analysis revealed that the dominant and domain-independent features were utterance intervals and results from the Gaussian mixture model (GMM).

  • An Encryption-then-Compression System for JPEG/Motion JPEG Standard

    Kenta KURIHARA  Masanori KIKUCHI  Shoko IMAIZUMI  Sayaka SHIOTA  Hitoshi KIYA  

     
    PAPER

      Vol:
    E98-A No:11
      Page(s):
    2238-2245

    In many multimedia applications, image encryption has to be conducted prior to image compression. This paper proposes a JPEG-friendly perceptual encryption method, which enables to be conducted prior to JPEG and Motion JPEG compressions. The proposed encryption scheme can provides approximately the same compression performance as that of JPEG compression without any encryption, where both gray scale images and color ones are considered. It is also shown that the proposed scheme consists of four block-based encryption steps, and provide a reasonably high level of security. Most of conventional perceptual encryption schemes have not been designed for international compression standards, but this paper focuses on applying the JPEG and Motion JPEG standards, as one of the most widely used image compression standards. In addition, this paper considers an efficient key management scheme, which enables an encryption with multiple keys to be easy to manage its keys.

  • LTE/WiGig RAN-Level Interworking Architecture for 5G Millimeter-Wave Heterogeneous Networks

    Hailan PENG  Toshiaki YAMAMOTO  Yasuhiro SUEGARA  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1957-1968

    Heterogeneous networks (HetNet) with different radio access technologies have been deployed to support a range of communication services. To manage these HetNets efficiently, some interworking solutions such as MIH (media independent handover), ANQP (access network query protocol) or ANDSF (access network discovery and selection function) have been studied. Recently, the millimeter-wave (mm-wave) based HetNet has been explored to provide multi-gigabits-per-second data rates over short distances in the 60GHz frequency band for 5G wireless networks. WiGig (Wireless Gigabit Alliance) is one of the available radio access technologies using mm-wave. However, the conventional interworking solutions are not sufficient for the implementation of LTE (Long Term Evolution)/WiGig HetNets. Since the coverage area of WiGig is very small due to the high propagation loss of the mm-wave band signal, it is difficult for UEs to perform cell discovery and handover if using conventional LTE/WLAN (wireless local area networks) interworking solutions, which cannot support specific techniques of WiGig well, such as beamforming and new media access methods. To solve these problems and find solutions for LTE/WiGig interworking, RAN (radio access network)-level tightly coupled interworking architecture will be a promising solution. As a RAN-level tightly coupled interworking solution, this paper proposes to design a LTE/WiGig protocol adaptor above the protocol stacks of WiGig to process and transfer control signaling and user data traffic. The proposed extended control plane can assist UEs to discover and access mm-wave BSs successfully and support LTE macro cells to jointly control the radio resources of both LTE and WiGig, so as to improve spectrum efficiency. The effectiveness of the proposal is evaluated. Simulation results show that LTE/WiGig HetNets with the proposed interworking solution can decrease inter-cell handover and improve user throughput significantly. Moreover, the downlink backhaul throughput and energy efficiency of mm-wave HetNets are evaluated and compared with that of 3.5GHz LTE HetNets. Results indicate that 60GHz mm-wave HetNets have better energy efficiency but with much heavier backhaul overhead.

  • Overtime Replacement Policies with Finite Operating Interval and Number

    Satoshi MIZUTANI  Xufeng ZHAO  Toshio NAKAGAWA  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2069-2076

    The main purpose of this paper is to propose overtime replacement policies for the system which has a finite life cycle. The newly proposed overtime technique, where the system is replaced preventively at the first completion of some working cycle over a planned time T, is employed into modelings to avoid operational interruptions for successive jobs. We consider two overtime replacement model with finite operating interval which S is given as (i) constant interval, and (ii) random interval. The expected replacement costs per unit of time are obtained and their optimal solutions are discussed analytically. Further, numerical examples are given when the failure time has a Weibull distribution and working cycles are exponentially distributed.

  • Distributed Utility Maximization with Backward Physical Signaling in Interference-Limited Wireless Systems

    Hye J. KANG  Chung G. KANG  

     
    PAPER-Network

      Vol:
    E98-B No:10
      Page(s):
    2033-2039

    In this paper, we consider a distributed power control scheme that can maximize overall capacity of an interference-limited wireless system in which the same radio resource is spatially reused among different transmitter-receiver pairs. This power control scheme employs a gradient-descent method in each transmitter, which adapts its own transmit power to co-channel interference dynamically to maximize the total weighted sum rate (WSR) of the system over a given interval. The key contribution in this paper is to propose a common feedback channel, over which a backward physical signal is accumulated for computing the gradient of the transmit power in each transmitter, thereby significantly reducing signaling overhead for the distributed power control. We show that the proposed power control scheme can achieve almost 95% of its theoretical upper WSR bound, while outperforming the non-power-controlled system by roughly 63% on average.

  • Scalable Hardware Winner-Take-All Neural Network with DPLL

    Masaki AZUMA  Hiroomi HIKAWA  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2015/07/21
      Vol:
    E98-D No:10
      Page(s):
    1838-1846

    Neural networks are widely used in various fields due to their superior learning abilities. This paper proposes a hardware winner-take-all neural network (WTANN) that employs a new winner-take-all (WTA) circuit with phase-modulated pulse signals and digital phase-locked loops (DPLLs). The system uses DPLL as a computing element, so all input values are expressed by phases of rectangular signals. The proposed WTA circuit employs a simple winner search circuit. The proposed WTANN architecture is described by very high speed integrated circuit (VHSIC) hardware description language (VHDL), and its feasibility was tested and verified through simulations and experiments. Conventional WTA takes a global winner search approach, in which vector distances are collected from all neurons and compared. In contrast, the WTA in the proposed system is carried out locally by a distributed winner search circuit among neurons. Therefore, no global communication channels with a wide bandwidth between the winner search module and each neuron are required. Furthermore, the proposed WTANN can easily extend the system scale, merely by increasing the number of neurons. The circuit size and speed were then evaluated by applying the VHDL description to a logic synthesis tool and experiments using a field programmable gate array (FPGA). Vector classifications with WTANN using two kinds of data sets, Iris and Wine, were carried out in VHDL simulations. The results revealed that the proposed WTANN achieved valid learning.

  • An Improved Platform for Multi-Agent Based Stock Market Simulation in Distributed Environment

    Ce YU  Xiang CHEN  Chunyu WANG  Hutong WU  Jizhou SUN  Yuelei LI  Xiaotao ZHANG  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/06/25
      Vol:
    E98-D No:10
      Page(s):
    1727-1735

    Multi-agent based simulation has been widely used in behavior finance, and several single-processed simulation platforms with Agent-Based Modeling (ABM) have been proposed. However, traditional simulations of stock markets on single processed computers are limited by the computing capability since financial researchers need larger and larger number of agents and more and more rounds to evolve agents' intelligence and get more efficient data. This paper introduces a distributed multi-agent simulation platform, named PSSPAM, for stock market simulation focusing on large scale of parallel agents, communication system and simulation scheduling. A logical architecture for distributed artificial stock market simulation is proposed, containing four loosely coupled modules: agent module, market module, communication system and user interface. With the customizable trading strategies inside, agents are deployed to multiple computing nodes. Agents exchange messages with each other and with the market based on a customizable network topology through a uniform communication system. With a large number of agent threads, the round scheduling strategy is used during the simulation, and a worker pool is applied in the market module. Financial researchers can design their own financial models and run the simulation through the user interface, without caring about the complexity of parallelization and related problems. Two groups of experiments are conducted, one with internal communication between agents and the other without communication between agents, to verify PSSPAM to be compatible with the data from Euronext-NYSE. And the platform shows fair scalability and performance under different parallelism configurations.

  • Energy-Efficient and Throughput Maximization Scheme for Sensor-Aided Cognitive Radio Networks

    Hiep VU-VAN  Insoo KOO  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1996-2003

    A cognitive radio user (CU) can get assistance from sensor nodes (SN) to perform spectrum sensing. However, the SNs are often powered by a finite-capacity battery, which can maintain operations of the SNs over a short time. Therefore, energy-efficiency of the SNs becomes a crucial problem. In this paper, an SN is considered to be a device with an energy harvester that can harvest energy from a non-radio frequency (non-RF) energy resource while performing other actions concurrently. In any one time slot, in order to maintain the required sensing accuracy of the CR network and to conserve energy in the SNs, only a small number of SNs are required to sense the primary user (PU) signal, and other SNs are kept silent to save energy. For this, an algorithm to divide all SNs into groups that can satisfy the required sensing accuracy of the network, is proposed. In a time slot, each SN group can be assigned one of two actions: stay silent, or be active to perform sensing. The problem of determining the optimal action for all SN groups to maximize throughput of the CR network is formulated as a framework of a partially observable Markov decision process (POMDP), in which the effect of the current time slot's action on the throughput of future time slots is considered. The solution to the problem, that is the decision mode of the SN groups (i.e., active or silent), depends on the residual energy and belief of absence probability of the PU signal. The simulation results show that the proposed scheme can improve energy efficiency of CR networks compared with other conventional schemes.

  • Geo-Electrical Design of Wideband, Efficient Class-F Power Amplifiers

    Youngcheol PARK  Hyunchul KU  

     
    BRIEF PAPER-Electronic Components

      Vol:
    E98-C No:10
      Page(s):
    987-990

    For realizing wideband class-F power amplifiers (PA), geo-electrical analysis methods are introduced to determine the best design parameters in a simpler way than relying on computer-guided optimization. The fabricated class-F PA at 1.9 GHz demonstrated a peak efficiency of 80.5% and a bandwidth of 750 MHz for an efficiency of more than 63%. It is presumed that the optimization increased the bandwidth by 10%.

  • Manage the Tradeoff in Data Sanitization

    Peng CHENG  Chun-Wei LIN  Jeng-Shyang PAN  Ivan LEE  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/07/14
      Vol:
    E98-D No:10
      Page(s):
    1856-1860

    Sharing data might bring the risk of disclosing the sensitive knowledge in it. Usually, the data owner may choose to sanitize data by modifying some items in it to hide sensitive knowledge prior to sharing. This paper focuses on protecting sensitive knowledge in the form of frequent itemsets by data sanitization. The sanitization process may result in side effects, i.e., the data distortion and the damage to the non-sensitive frequent itemsets. How to minimize these side effects is a challenging problem faced by the research community. Actually, there is a trade-off when trying to minimize both side effects simultaneously. In view of this, we propose a data sanitization method based on evolutionary multi-objective optimization (EMO). This method can hide specified sensitive itemsets completely while minimizing the accompanying side effects. Experiments on real datasets show that the proposed approach is very effective in performing the hiding task with fewer damage to the original data and non-sensitive knowledge.

  • Software Reliability Assessment via Non-Parametric Maximum Likelihood Estimation

    Yasuhiro SAITO  Tadashi DOHI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2042-2050

    In this paper we consider two non-parametric estimation methods for software reliability assessment without specifying the fault-detection time distribution, where the underlying stochastic process to describe software fault-counts in the system testing is given by a non-homogeneous Poisson process. The resulting data-driven methodologies can give the useful probabilistic information on the software reliability assessment under the incomplete knowledge on fault-detection time distribution. Throughout examples with real software fault data, it is shown that the proposed methods provide more accurate estimation results than the common parametric approach.

  • Scaling Concolic Testing for the Environment-Intensive Program

    Xue LEI  Wei HUANG  Wenqing FAN  Yixian YANG  

     
    PAPER-Software System

      Pubricized:
    2015/06/30
      Vol:
    E98-D No:10
      Page(s):
    1755-1764

    Dynamic analysis is frail and insufficient to find hidden paths in environment-intensive program. By analyzing a broad spectrum of different concolic testing systems, we conclude that a number of them cannot handle programs that interact with the environment or require a complete working model. This paper addresses this problem by automatically identifying and modifying outputs of the data input interface function(DIIF). The approach is based on fine-grained taint analysis for detecting and updating the data that interacts with the environment to generate a new set of inputs to execute hidden paths. Moreover, we developed a prototype and conducted extensive experiments using a set of complex and environmentally intensive programs. Finally, the result demonstrates that our approach could identify the DIIF precisely and discover hidden path obviously.

  • Software Reliability Modeling Based on Burr XII Distributions

    Takahiro IMANAKA  Tadashi DOHI  

     
    LETTER

      Vol:
    E98-A No:10
      Page(s):
    2091-2095

    In this letter we develop a software reliability modeling framework by introducing the Burr XII distributions to software fault-detection time. An extension to deal with software metrics data characterizing the product size, program complexity or testing expenditure is also proposed. Finally, we investigate the goodness-of-fit performance and compare our new models with the existing ones through real data analyses.

8281-8300hit(42807hit)