The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8321-8340hit(42807hit)

  • A Synchronization and T-STD Model for 3D Video Distribution and Consumption over Hybrid Network

    Kugjin YUN  Won-sik CHEONG  Kyuheon KIM  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2015/07/13
      Vol:
    E98-D No:10
      Page(s):
    1884-1887

    Recently, standard organizations of ATSC, DVB and TTA have been working to design various immersive media broadcasting services such as the hybrid network-based 3D video, UHD video and multiple views. This letter focuses on providing a new synchronization and transport system target decoder (T-STD) model of 3D video distribution based on heterogeneous transmission protocol in a hybrid network environment, where a broadcasting network and broadband (IP) network are combined. On the basis of the experimental results, the proposed technology has been proved to be successfully used as a core element for synchronization and T-STD model in a hybrid network-based 3D broadcasting. It has been also found out that it could be used as a base technique for various IP associated hybrid broadcasting services.

  • Software Abnormal Behavior Detection Based on Function Semantic Tree

    Yingxu LAI  Wenwen ZHANG  Zhen YANG  

     
    PAPER-Software System

      Pubricized:
    2015/07/03
      Vol:
    E98-D No:10
      Page(s):
    1777-1787

    Current software behavior models lack the ability to conduct semantic analysis. We propose a new model to detect abnormal behaviors based on a function semantic tree. First, a software behavior model in terms of state graph and software function is developed. Next, anomaly detection based on the model is conducted in two main steps: calculating deviation density of suspicious behaviors by comparison with state graph and detecting function sequence by function semantic rules. Deviation density can well detect control flow attacks by a deviation factor and a period division. In addition, with the help of semantic analysis, function semantic rules can accurately detect application layer attacks that fail in traditional approaches. Finally, a case study of RSS software illustrates how our approach works. Case study and a contrast experiment have shown that our model has strong expressivity and detection ability, which outperforms traditional behavior models.

  • Robust Synchronization of Uncertain Fractional Order Chaotic Systems

    Junhai LUO  Heng LIU  Jiangfeng YANG  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:10
      Page(s):
    2109-2116

    In this paper, synchronization for uncertain fractional order chaotic systems is investigated. By using the fractional order extension of the Lyapunov stability criterion, a linear feedback controller and an adaptive controller are designed for synchronizing uncertain fractional order chaotic systems without and with unknown external disturbance, respectively. Quadratic Lyapunov functions are used in the stability analysis of fractional-order systems, and fractional order adaptation law is constructed to update design parameter. The proposed methods can guarantee that the synchronization error converges to zero asymptotically. Finally, illustrative examples are given to confirm the theoretical results.

  • Biometric Identification Using JPEG2000 Compressed ECG Signals

    Hung-Tsai WU  Yi-Ting WU  Wen-Whei CHANG  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/06/24
      Vol:
    E98-D No:10
      Page(s):
    1829-1837

    In wireless telecardiology applications, electrocardiogram (ECG) signals are often represented in compressed format for efficient transmission and storage purposes. Incorporation of compressed ECG based biometric enables faster person identification as it by-passes the full decompression. This study presents a new method to combine ECG biometrics with data compression within a common JPEG2000 framework. To this end, an ECG signal is considered as an image and the JPEG2000 standard is applied for data compression. Features relating to ECG morphology and heartbeat intervals are computed directly from the compressed ECG. Different classification approaches are used for person identification. Experiments on standard ECG databases demonstrate the validity of the proposed system for biometric identification with high accuracies on both healthy and diseased subjects.

  • FOREWORD Open Access

    Seiichi SAMPEI  

     
    FOREWORD

      Vol:
    E98-B No:10
      Page(s):
    1931-1931
  • Availability Analysis of a Multibase System with Lateral Resupply between Bases

    Naoki OKUDA  Nobuyuki TAMURA  Tetsushi YUGE  Shigeru YANAGI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2084-2090

    In this paper, we study on an availability analysis for a multibase system with lateral resupply of spare items between bases. We construct a basic model that a spare item of a base is transported for operation to another base without spare upon occurrence of failure, and simultaneously, the base that supplies the spare item receives the failed item of the other base for repair. We propose an approximation method to obtain the availability of the system and show the accuracy of the solution through numerical experiments. Also, two modified models are constructed to show the efficiency of the basic model. The two models modify the assumption on the lateral resupply of spare items between bases in the basic model. We numerically illustrate that the basic model can increase the availability of the system compared with the two modified models through Monte Carlo simulation.

  • Decentralized Multilevel Power Allocation for Random Access

    Huifa LIN  Koji ISHIBASHI  Won-Yong SHIN  Takeo FUJII  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1978-1987

    In this paper, we introduce a distributed power allocation strategy for random access, that has the capabilities of multipacket reception (MPR) and successive interference cancellation (SIC). The proposed random access scheme is suitable for machine-to-machine (M2M) communication application in fifth-generation (5G) cellular networks. A previous study optimized the probability distribution for discrete transmission power levels, with implicit limitations on the successful decoding of at most two packets from a single collision. We formulate the optimization problem for the general case, where a base station can decode multiple packets from a single collision, and this depends only on the signal-to-interference-plus-noise ratio (SINR). We also propose a feasible suboptimal iterative per-level optimization process; we do this by introducing relationships among the different discrete power levels. Compared with the conventional power allocation scheme with MPR and SIC, our method significantly improves the system throughput; this is confirmed by computer simulations.

  • Strongly Secure Scan Design Using Generalized Feed Forward Shift Registers

    Hideo FUJIWARA  Katsuya FUJIWARA  

     
    LETTER-Dependable Computing

      Pubricized:
    2015/06/24
      Vol:
    E98-D No:10
      Page(s):
    1852-1855

    In our previous work [12], [13], we introduced generalized feed-forward shift registers (GF2SR, for short) to apply them to secure and testable scan design, where we considered the security problem from the viewpoint of the complexity of identifying the structure of GF2SRs. Although the proposed scan design is secure in the sense that the structure of a GF2SR cannot be identified only from the primary input/output relation, it may not be secure if part of the contents of the circuit leak out. In this paper, we introduce a more secure concept called strong security such that no internal state of strongly secure circuits leaks out, and present how to design such strongly secure GF2SRs.

  • Collective Activity Recognition by Attribute-Based Spatio-Temporal Descriptor

    Changhong CHEN  Hehe DOU  Zongliang GAN  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/07/22
      Vol:
    E98-D No:10
      Page(s):
    1875-1878

    Collective activity recognition plays an important role in high-level video analysis. Most current feature representations look at contextual information extracted from the behaviour of nearby people. Every person needs to be detected and his pose should be estimated. After extracting the feature, hierarchical graphical models are always employed to model the spatio-temporal patterns of individuals and their interactions, and so can not avoid complex preprocessing and inference operations. To overcome these drawbacks, we present a new feature representation method, called attribute-based spatio-temporal (AST) descriptor. First, two types of information, spatio-temporal (ST) features and attribute features, are exploited. Attribute-based features are manually specified. An attribute classifier is trained to model the relationship between the ST features and attribute-based features, according to which the attribute features are refreshed. Then, the ST features, attribute features and the relationship between the attributes are combined to form the AST descriptor. An objective classifier can be specified on the AST descriptor and the weight parameters of the classifier are used for recognition. Experiments on standard collective activity benchmark sets show the effectiveness of the proposed descriptor.

  • Robust Subband Adaptive Filtering against Impulsive Noise

    Young-Seok CHOI  

     
    LETTER-Speech and Hearing

      Pubricized:
    2015/06/26
      Vol:
    E98-D No:10
      Page(s):
    1879-1883

    In this letter, a new subband adaptive filter (SAF) which is robust against impulsive noise in system identification is presented. To address the vulnerability of adaptive filters based on the L2-norm optimization criterion to impulsive noise, the robust SAF (R-SAF) comes from the L1-norm optimization criterion with a constraint on the energy of the weight update. Minimizing L1-norm of the a posteriori error in each subband with a constraint on minimum disturbance gives rise to robustness against impulsive noise and the capable convergence performance. Simulation results clearly demonstrate that the proposal, R-SAF, outperforms the classical adaptive filtering algorithms when impulsive noise as well as background noise exist.

  • Exploiting Social Relationship for Opportunistic Routing in Mobile Social Networks

    Zhenxiang GAO  Yan SHI  Shanzhi CHEN  Qihan LI  

     
    PAPER-Network

      Vol:
    E98-B No:10
      Page(s):
    2040-2048

    Routing is a challenging issue in mobile social networks (MSNs) because of time-varying links and intermittent connectivity. In order to enable nodes to make right decisions while forwarding messages, exploiting social relationship has become an important method for designing efficient routing protocols in MSNs. In this paper, we first use the temporal evolution graph model to accurately capture the dynamic topology of the MSN. Based on the model, we introduce the social relationship metric for detecting the quality of human social relationship from contact history records. Utilizing this metric, we propose social relationship based betweenness centrality metric to identify influential nodes to ensure messages forwarded by the nodes with stronger social relationship and higher likelihood of contacting other nodes. Then, we present SRBet, a novel social-based forwarding algorithm, which utilizes the aforementioned metric to enhance routing performance. Simulations have been conducted on two real world data sets and results demonstrate that the proposed forwarding algorithm achieves better performances than the existing algorithms.

  • Matrix Approach for the Seasonal Infectious Disease Spread Prediction

    Hideo HIROSE  Masakazu TOKUNAGA  Takenori SAKUMURA  Junaida SULAIMAN  Herdianti DARWIS  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2010-2017

    Prediction of seasonal infectious disease spread is traditionally dealt with as a function of time. Typical methods are time series analysis such as ARIMA (autoregressive, integrated, and moving average) or ANN (artificial neural networks). However, if we regard the time series data as the matrix form, e.g., consisting of yearly magnitude in row and weekly trend in column, we may expect to use a different method (matrix approach) to predict the disease spread when seasonality is dominant. The MD (matrix decomposition) method is the one method which is used in recommendation systems. The other is the IRT (item response theory) used in ability evaluation systems. In this paper, we apply these two methods to predict the disease spread in the case of infectious gastroenteritis caused by norovirus in Japan, and compare the results obtained by using two conventional methods in forecasting, ARIMA and ANN. We have found that the matrix approach is simple and useful in prediction for the seasonal infectious disease spread.

  • Algorithm for Obtaining Optimal Arrangement of a Connected-(r,s)-out-of-(m,n): F System — The Case of m=r and s=2 —

    Toru OMURA  Tomoaki AKIBA  Xiao XIAO  Hisashi YAMAMOTO  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2018-2024

    A connected-(r,s)-out-of-(m,n): F system is a kind of the connected-X-out-of-(m,n): F system defined by Boehme et al. [2]. A connected-(r,s)-out-of-(m,n): F system consists of m×n components arranged in (m,n)-matrix. This system fails if and only if there exists a grid of size r×s in which all components are failed. When m=r, this system can be regarded as a consecutive-s-out-of-n: F system, and then the optimal arrangement of this system satisfies theorem which stated by Malon [9] in the case of s=2. In this study, we proposed a new algorithm for obtaining optimal arrangement of the connected-(r,2)-out-of-(m,n): F system based on the above mentioned idea. We performed numerical experiments in order to compare the proposed algorithm with the algorithm of enumeration method, and calculated the order of the computation time of these two algorithms. The numerical experiments showed that the proposed algorithm was more efficiently than the algorithm of enumeration method.

  • Software Reliability Assessment with Multiple Changes of Testing-Environment

    Shinji INOUE  Shigeru YAMADA  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2031-2041

    We discuss software reliability assessment considering multiple changes of software fault-detection phenomenon. The testing-time when the characteristic of the software failure-occurrence or fault-detection phenomenon changes notably in the testing-phase of a software development process is called change-point. It is known that the occurrence of the change-point influences the accuracy for the software reliability assessment based on a software reliability growth models, which are mainly divided into software failure-occurrence time and fault counting models. This paper discusses software reliability growth modeling frameworks considering with the effect of the multiple change-point occurrence on the software reliability growth process in software failure-occurrence time and fault counting modeling. And we show numerical illustrations for the software reliability analyses based on our models by using actual data.

  • NHPP-Based Software Reliability Model with Marshall-Olkin Failure Time Distribution

    Xiao XIAO  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2060-2068

    A new modeling approach for the non-homogeneous Poisson processes (NHPPs) based software reliability modeling is proposed to describe the stochastic behavior of software fault-detection processes, of which the failure rate is not monotonic. The fundamental idea is to apply the Marshall-Olkin distribution to the software fault-detection time distribution. The applicability of Marshall-Olkin distribution in software reliability modeling is studied. The data fitting abilities of the proposed NHPP-based software reliability model is compared with the existing typical ones through real software project data analysis.

  • Improvement of Reliability Evaluation for 2-Unit Parallel System with Cascading Failures by Using Maximal Copula

    Shuhei OTA  Takao KAGEYAMA  Mitsuhiro KIMURA  

     
    LETTER

      Vol:
    E98-A No:10
      Page(s):
    2096-2100

    In this study, we investigate whether copula modeling contributes to the improvement of reliability evaluation in a cascading failure-occurrence environment. In particular, as a basic problem, we focus on a 2-unit parallel system whose units may fail dependently each other. As a result, the reliability assessment of the system by using the maximal copula provides more accurate evaluation than the traditional Weibull analysis, if the degree of dependency between two units are high. We show this result by using several simulation studies.

  • An Analysis of How User Random Walks Influence Information Diffusion in Social Networking Websites

    Qian XIAO  Haitao XIE  

     
    PAPER-Graphs and Networks

      Vol:
    E98-A No:10
      Page(s):
    2129-2138

    In social websites, users acquire information from adjacent neighbors as well as distant users by seeking along hyperlinks, and therefore, information diffusions, also seen as processes of “user infection”, show both cascading and jumping routes in social networks. Currently, existing analysis suffers from the difficulty in distinguishing between the impacts of information seeking behaviors, i.e. random walks, and other factors leading to user infections. To this end, we present a mechanism to recognize and measure influences of random walks on information diffusions. Firstly, we propose the concept of information propagation structure (IPS), which is also a directed acyclic graph, to represent frequent information diffusion routes in social networks. In IPS, we represent “jumping routes” as virtual arcs and regard them as the traces of random walks. Secondly, we design a frequent IPS mining algorithm (FIPS). By considering descendant node infections as a consequence of ancestor node infections in IPS, we can use a Bayesian network to model each IPS, and learn parameters based on the records of information diffusions passing through the IPS. Finally, we present a quantitative description method of random walks influence, the method is based on Bayesian probabilistic inferring in IPS, which is used to determine the ancestors, whose infection causes the infection of target users. We also employ betweenness centralities of arcs to evaluate contributions of random walks to certain infections. Experiments are carried out with real datasets and simulations. The results show random walks are influential in early and steady phases of information diffusions. They help diffusions pass through some topology limitations in social networks.

  • High CM Suppression Wideband Balanced BPF Using Dual-Mode Slotline Resonator

    Lina BAI  Danna YING  

     
    PAPER-Measurement Technology

      Vol:
    E98-A No:10
      Page(s):
    2171-2177

    A novel high common-mode (CM) suppression wideband balanced passband filter (BPF) is proposed using the stub centrally loaded slotline resonators (SCLSR) which have two resonant frequencies (odd- and even-modes) in the desired passband. The odd-mode resonant frequency of the slotline SCLSR can be flexibly controlled by the stub, whereas the even-mode one is fixed. Meanwhile, a transmission zero near the odd-mode resonant frequency can be generated due to the main path signal counteraction. First, the wideband single-ended BPF and corresponding balanced BPF are designed based on the slotline SCLSR with the parallel coupled microstrip line input/output (I/O). Ultra wideband high CM suppression that can be achieved for the slotline resonator structure has no resonant mode under CM excitation. Furthermore, by folding the parallel coupled microstrip line I/O, the source-load coupling is effectively decoupled to improve the CM suppression within the passband. The high suppression wideband balanced BPF is fabricated and measured, respectively. Good agreement between simulation and measurement results is obtained.

  • Power Allocation for Ergodic Capacity and Outage Probability Tradeoff in Cognitive Radio Networks

    Qun LI  Ding XU  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1988-1995

    The problem of power allocation for the secondary user (SU) in a cognitive radio (CR) network is investigated in this paper. The primary user (PU) is protected by the average interference power constraint. Besides the average interference power constraint at the PU, the transmit power of the SU is also subject to the peak or average transmit power constraint. The aim is to balance between the goal of maximizing the ergodic capacity and the goal of minimizing the outage probability of the SU. Power allocation schemes are then proposed under the aforementioned setups. It is shown that the proposed power allocation schemes can achieve high ergodic capacity while maintaining low outage probability, whereas existing schemes achieve either high ergodic capacity with high outage probability or low outage probability with low ergodic capacity.

  • Measurement-Based Spectrum Database for Flexible Spectrum Management

    Koya SATO  Masayuki KITAMURA  Kei INAGE  Takeo FUJII  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    2004-2013

    In this paper, we propose the novel concept of a spectrum database for improving the efficiency of spectrum utilization. In the current design of TV white space spectrum databases, a propagation model is utilized to determine the spectrum availability. However, this propagation model has poor accuracy for radio environment estimation because it requires a large interference margin for the PU coverage area to ensure protection of primary users (PUs); thus, it decreases the spectrum sharing efficiency. The proposed spectrum database consists of radio environment measurement results from sensors on mobile terminals such as vehicles and smart phones. In the proposed database, actual measurements of radio signals are used to estimate radio information regarding PUs. Because the sensors on mobile terminals can gather a large amount of data, accurate propagation information can be obtained, including information regarding propagation loss and shadowing. In this paper, we first introduce the architecture of the proposed spectrum database. Then, we present experimental results for the database construction using actual TV broadcast signals. Additionally, from the evaluation results, we discuss the extent to which the proposed database can mitigate the excess interference margin.

8321-8340hit(42807hit)