The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8361-8380hit(42807hit)

  • Optimal Maintenance Policy of a Multi-Unit One-Shot System with Minimal Repair

    Tomohiro KITAGAWA  Tetsushi YUGE  Shigeru YANAGI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2077-2083

    A one-shot system is a system that can be used only once during its life, and whose failures are detected only through inspections. In this paper, we discuss an inspection policy problem of one-shot system composed of multi-unit in series. Failed units are minimally repaired when failures are detected and all units in the system are replaced when the nth failure is detected after the last replacement. We derive the expected cost rate approximately. Our goal is to determine the optimal inspection policy that minimizes the expected cost rate.

  • Verifying OSEK/VDX Applications: A Sequentialization-Based Model Checking Approach

    Haitao ZHANG  Toshiaki AOKI  Yuki CHIBA  

     
    PAPER-Software System

      Pubricized:
    2015/07/06
      Vol:
    E98-D No:10
      Page(s):
    1765-1776

    OSEK/VDX, a standard for an automobile OS, has been widely adopted by many manufacturers to design and develop a vehicle-mounted OS. With the increasing functionalities in vehicles, more and more complex applications are be developed based on the OSEK/VDX OS. However, how to ensure the reliability of developed applications is becoming a challenge for developers. To ensure the reliability of developed applications, model checking as an exhaustive technique can be applied to discover subtle errors in the development process. Many model checkers have been successfully applied to verify sequential software and general multi-threaded software. However, it is hard to directly use existing model checkers to precisely verify OSEK/VDX applications, since the execution characteristics of OSEK/VDX applications are different from the sequential software and general multi-threaded software. In this paper, we describe and develop an approach to translate OSEK/VDX applications into sequential programs in order to employ existing model checkers to precisely verify OSEK/VDX applications. The value of our approach is that it can be considered as a front-end translator for enabling existing model checkers to verify OSEK/VDX applications.

  • Optimum Selection of Radio Access Technologies in a 5G Heterogeneous Multicomm Environment Open Access

    Markus MUECK  Majdi MSALLEM  Christian DREWES  Markus STINNER  

     
    INVITED PAPER

      Vol:
    E98-B No:10
      Page(s):
    1949-1956

    This contribution addresses optimum wireless link selection in a 5G heterogeneous Multicomm environment in which multiple distinct Radio Access Technologies can be operated simultaneously by a given Mobile Device. The related decision making mechanisms are proposed to be part of the Mobile Device User Equipment which identifies the preferred Radio Access Technologies to be operated as well as the preferred Modulation and Coding parameters and finally selects the optimum choice either independently or through negotiation with the Network Infrastructure Equipment. In this context, the concerned Mobile Device is able to manage the bandwidth to be employed for communication — the bandwidth per Radio Access Technology is typically defined by the Network Infrastructure but the possibility for aggregating a multitude of distinct technologies introduces a new degree of freedom enabling the choice of the bandwidth selection. Simulation results demonstrate that the Mobile Device driven selection of a Multicomm configuration may either substantially reduce Mobile Device power consumption (75% in a typical example) or increase the aggregate throughput at an identical power consumption level compared to the single link case (a 3x factor in a typical example).

  • Speeding Up and Performance Evaluation of a Fully Automatic Radial Distortion Compensation Algorithm for Driving Assistance Cameras

    Yuta KANUKI  Naoya OHTA  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/07/03
      Vol:
    E98-D No:10
      Page(s):
    1892-1895

    Recently, cameras are equipped on cars in order to assist their drivers. These cameras often have a severe radial distortion because of their wide view angle, and sometimes it is necessary to compensate it in a fully automatic way in the field. We have proposed such a method, which uses the entropy of the histogram of oriented gradient (HOG) to evaluate the goodness of the compensation. Its performance was satisfactory, but the computational burden was too heavy to be executed by drive assistance devices. In this report, we discuss a method to speed up the algorithm, and obtain a new light algorithm feasible for such devices. We also show more comprehensive performance evaluation results then those in the previous reports.

  • High-Efficiency Sky-Blue Organic Light-Emitting Diodes Utilizing Thermally-Activated Delayed Fluorescence

    Yasuhide HIRAGA  Jun-ichi NISHIDE  Hajime NAKANOTANI  Masaki AONUMA  Chihaya ADACHI  

     
    PAPER-Electronic Materials

      Vol:
    E98-C No:10
      Page(s):
    971-976

    A highly efficient sky-blue organic light-emitting diode (OLED) based on a thermally-activated delayed fluorescence (TADF) molecule, 1,2-bis(carbazol-9-yl)-4,5-dicyanobenzene (2CzPN), was studied. The sky-blue OLED exhibited a maximum external electroluminescence quantum efficiency (ηEQE) of over 24.0%. In addition, a white OLED using 2CzPN combined with green and orange TADF emitters showed a high ηEQE of 17.3% with a maximum power efficiency of 52.3 lm/W and Commission Internationale de l'Eclairage coordinates of (0.32, 0.43).

  • Quantifying Resiliency of Virtualized System with Software Rejuvenation

    Hiroyuki OKAMURA  Jungang GUAN  Chao LUO  Tadashi DOHI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2051-2059

    This paper considers how to evaluate the resiliency for virtualized system with software rejuvenation. The software rejuvenation is a proactive technique to prevent the failure caused by aging phenomenon such as resource exhaustion. In particular, according to Gohsh et al. (2010), we compute a quantitative criterion to evaluate resiliency of system by using continuous-time Markov chains (CTMC). In addition, in order to convert general state-based models to CTMCs, we employ PH (phase-type) expansion technique. In numerical examples, we investigate the resiliency of virtualized system with software rejuvenation under two different rejuvenation policies.

  • Optimality of Tweak Functions in CLOC

    Hayato KOBAYASHI  Kazuhiko MINEMATSU  Tetsu IWATA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:10
      Page(s):
    2152-2164

    An Authenticated Encryption scheme is used to guarantee both privacy and authenticity of digital data. At FSE 2014, an authenticated encryption scheme called CLOC was proposed. CLOC is designed to handle short input data efficiently without needing heavy precomputation nor large memory. This is achieved by making various cases of different treatments in the encryption process depending on the input data. Five tweak functions are used to handle the conditional branches, and they are designed to satisfy 55 differential probability constraints, which are used in the security proof of CLOC. In this paper, we show that all these 55 constraints are necessary. This shows the design optimality of the tweak functions in CLOC in that the constraints cannot be relaxed, and hence the specification of the tweak functions cannot be simplified.

  • The Wear of Hot Switching Au/Cr-Au/MWCNT Contact Pairs for MEMS Contacts

    John W. McBRIDE  Hong LIU  Chamaporn CHIANRABUTRA  Adam P. LEWIS  

     
    PAPER

      Vol:
    E98-C No:9
      Page(s):
    912-918

    A gold coated carbon nanotubes composite was used as a contact material in Micro-Electrical-Mechanical-System (MEMS) switches. The switching contact was tested under typical conditions of MEMS relay applications: load voltage of 4 V, contact force of 1 mN, and load current varied between 20-200 mA. This paper focuses on the wear process over switching lifetime, and the dependence of the wear area on the current is discussed. It was shown that the contact was going to fail when the wear area approached the whole contact area, at which point the contact resistance increased sharply to three times the nominal resistance.

  • Statistics on Temporal Changes of Sparse Coding Coefficients in Spatial Pyramids for Human Action Recognition

    Yang LI  Junyong YE  Tongqing WANG  Shijian HUANG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/06/01
      Vol:
    E98-D No:9
      Page(s):
    1711-1714

    Traditional sparse representation-based methods for human action recognition usually pool over the entire video to form the final feature representation, neglecting any spatio-temporal information of features. To employ spatio-temporal information, we present a novel histogram representation obtained by statistics on temporal changes of sparse coding coefficients frame by frame in the spatial pyramids constructed from videos. The histograms are further fed into a support vector machine with a spatial pyramid matching kernel for final action classification. We validate our method on two benchmarks, KTH and UCF Sports, and experiment results show the effectiveness of our method in human action recognition.

  • Discovery of Regular and Irregular Spatio-Temporal Patterns from Location-Based SNS by Diffusion-Type Estimation

    Yoshitatsu MATSUDA  Kazunori YAMAGUCHI  Ken-ichiro NISHIOKA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/06/10
      Vol:
    E98-D No:9
      Page(s):
    1675-1682

    In this paper, a new approach is proposed for extracting the spatio-temporal patterns from a location-based social networking system (SNS) such as Foursquare. The proposed approach consists of the following procedures. First, the spatio-temporal behaviors of users in SNS are approximated as a probabilistic distribution by using a diffusion-type formula. Since the SNS datasets generally consist of sparse check-in's of users at some time points and locations, it is difficult to investigate the spatio-temporal patterns on a wide range of time and space scales. The proposed method can estimate such wide range patterns by smoothing the sparse datasets by a diffusion-type formula. It is crucial in this method to estimate robustly the scale parameter by giving a prior generative model on check-in's of users. The robust estimation enables the method to extract appropriate patterns even in small local areas. Next, the covariance matrix among the time points is calculated from the estimated distribution. Then, the principal eigenfunctions are approximately extracted as the spatio-temporal patterns by principal component analysis (PCA). The distribution is a mixture of various patterns, some of which are regular ones with a periodic cycle and some of which are irregular ones corresponding to transient events. Though it is generally difficult to separate such complicated mixtures, the experiments on an actual Foursquare dataset showed that the proposed method can extract many plausible and interesting spatio-temporal patterns.

  • Implementation of an Omnidirectional Human Motion Capture System Using Multiple Kinect Sensors

    Junghwan KIM  Inwoong LEE  Jongyoo KIM  Sanghoon LEE  

     
    LETTER-Measurement Technology

      Vol:
    E98-A No:9
      Page(s):
    2004-2008

    Due to ease of implementation for various user interactive applications, much research on motion recognition has been completed using Kinect. However, one drawback of Kinect is that the skeletal information obtained is provided under the assumption that the user faces Kinect. Thus, the skeletal information is likely incorrect when the user turns his back to Kinect, which may lead to difficulty in motion recognition from the application. In this paper, we implement a highly accurate human motion capture system by installing six Kinect sensors over 360 degrees. The proposed method enables skeleton to be obtained more accurately by assigning higher weights to skeletons captured by Kinect in which the user faces forward. Toward this goal, the front vector of the user is temporally traced to determine whether the user is facing Kinect. Then, more reliable joint information is utilized to construct a skeletal representation of each user.

  • FOREWORD Open Access

    Hidekazu MURATA  

     
    FOREWORD

      Vol:
    E98-B No:9
      Page(s):
    1732-1732
  • FOREWORD Open Access

    Moritoshi YASUNAGA  

     
    FOREWORD

      Vol:
    E98-D No:9
      Page(s):
    1621-1621
  • Track Pitch Design Considering Skew Angles and Adjacent Track Interference in HDD

    Masayoshi SHIMOKOSHI  Jay MOSBRUCKER  Kris SCHOUTERDEN  

     
    PAPER-Storage Technology

      Vol:
    E98-C No:9
      Page(s):
    946-951

    Two-track squeeze and adjacent track interference (ATI) are major barriers to increasing track density in hard disk drives (HDD). These depend on skew angles made by a magnetic head and circumferential direction on a magnetic disk. This paper describes relationships between the skew angle and the magnetic core width (MCW) which affects two-track squeeze and ATI performance. We propose a design concept of a track pitch profile at different skew angles considering MCW. Equivalent robustness of ATI performance on different skew angle conditions is obtained with the optimized track pitch.

  • Security Enhancement of Medical Imaging via Imperceptible and Robust Watermarking

    Manuel CEDILLO HERNANDEZ  Antonio CEDILLO HERNANDEZ  Francisco GARCIA UGALDE  Mariko NAKANO MIYATAKE  Hector PEREZ MEANA  

     
    LETTER-Information Network

      Pubricized:
    2015/05/28
      Vol:
    E98-D No:9
      Page(s):
    1702-1705

    In this letter we present an imperceptible and robust watermarking algorithm that uses a cryptographic hash function in the authentication application of digital medical imaging. In the proposed scheme we combine discrete Fourier transform (DFT) and local image masking to detect the watermark after a geometrical distortion and improve its imperceptibility. The image quality is measured by metrics currently used in digital image processing, such as VSNR, SSIM and PSNR.

  • Fast Estimation of Shadowing Effects in Millimeter-Wave Short Range Communication by Modified Edge Representation (MER)

    Maifuz ALI  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:9
      Page(s):
    1873-1881

    Radio channel modeling is fundamental for designing wireless communication systems. In millimeter or sub-millimeter wave short range communication, shadowing effect by electrically-large objects is one of the most important factors determining the field strength and thus the coverage. Unfortunately, numerical methods like MoM, FDTD, FEM are unable to compute the field scattered by large objects due to their excessive time and memory requirements. Ray theory like geometrical theory of diffraction (GTD) by Keller is an effective and popular solution but suffers various kinds of singularities at geometrical boundaries such as incidence shadow boundary (ISB) or reflection shadow boundary (RSB). Modified edge representation (MER) equivalent edge current (EEC) is an accurate and a fast high frequency diffraction technique which expresses the fields in terms of line integration. It adopts classical Keller-type knife-edge diffraction coefficients and still provides uniform and highly accurate fields everywhere including geometrical boundaries. MER is used here to compute the millimeter-wave field distribution in compact range communication systems where shadowing effects rather than multi-path ones dominate the radio environments. For further simplicity, trigonometric functions in Keller's diffraction coefficients are replaced by the path lengths of source to the observer via the edge point of integration of the scatterers in the form of Fresnel zone number (FZN). Complexity, Computation time and the memory were reduced drastically without degrading the accuracy. The dipole wave scattering from flat rectangular plates is discussed with numerical examples.

  • Comparisons on Arc Behavior and Contact Performance between Cu and Cu-Mo Alloys in a Bridge-Type Contact System

    Xue ZHOU  Mo CHEN  Guofu ZHAI  

     
    PAPER

      Vol:
    E98-C No:9
      Page(s):
    904-911

    Cu-Mo alloy carries forward not only high electrical conductivity and high thermal conductivity from Cu but also high hardness from Mo, which makes it a promising potential application in electrical contact fields. In this paper, arc characteristic and erosion characteristic of Cu-Mo contacts are studied with a bridge-type contact high speed break mechanism on DC270 V/200 A load condition. And in each experiment group, 2500 times break operations are carried out. During every break operation, a high-speed AD card is used to record voltage and current signal of the arc, a high-speed camera is applied to record arcing process, and the temperature of contacts and arc are acquired by thermocouple and spectrometer, respectively. The mass and contact resistance of contacts are measured before and after every group experiment. Besides, the photograph of contact surface is taken by SEM to help analyze the erosion characteristic. The comparison between Cu-Mo contacts and Cu contacts indicates that although Cu contacts have a better electrical conductivity and thermal conductivity, Cu-Mo contacts can decrease the temperature of arc to prevent thermal breakdown, and they are also harder to be ablated and have a longer life span.

  • Impact of Mode Filtering on the Performance of Femtosecond Pulse Amplification in a Large Mode Area Fiber

    Junichi HAMAZAKI  Housei MOGI  Norihiko SEKINE  Satoshi ASHIHARA  Akifumi KASAMATSU  Iwao HOSAKO  

     
    PAPER-Optoelectronics

      Vol:
    E98-C No:9
      Page(s):
    928-933

    We experimentally investigated the impact of the mode filtering technique on the performances of pulse amplification in a fiber with a large core diameter. The technique was applied to a femtosecond pulse amplifier, and was based on a large area double-clad Yb-doped fiber. The mode filtering enabled selective excitation of the lowest transverse mode with minimal contamination of higher order modes. The output pulses with 110 fs duration, > 30 nJ pulse energy (> 3 W average power), and clean spatial/temporal profiles were successfully generated. Benefits of this technique are also discussed.

  • Separation of Mass Spectra Based on Probabilistic Latent Component Analysis for Explosives Detection

    Yohei KAWAGUCHI  Masahito TOGAMI  Hisashi NAGANO  Yuichiro HASHIMOTO  Masuyuki SUGIYAMA  Yasuaki TAKADA  

     
    PAPER

      Vol:
    E98-A No:9
      Page(s):
    1888-1897

    A new algorithm for separating mass spectra into individual substances for explosives detection is proposed. In the field of mass spectrometry, separation methods, such as principal-component analysis (PCA) and independent-component analysis (ICA), are widely used. All components, however, have no negative values, and the orthogonality condition imposed on components also does not necessarily hold in the case of mass spectra. Because these methods allow negative values and PCA imposes an orthogonality condition, they are not suitable for separation of mass spectra. The proposed algorithm is based on probabilistic latent-component analysis (PLCA). PLCA is a statistical formulation of non-negative matrix factorization (NMF) using KL divergence. Because PLCA imposes the constraint of non-negativity but not orthogonality, the algorithm is effective for separating components of mass spectra. In addition, to estimate the components more accurately, a sparsity constraint is applied to PLCA for explosives detection. The main contribution is industrial application of the algorithm into an explosives-detection system. Results of an experimental evaluation of the algorithm with data obtained in a real railway station demonstrate that the proposed algorithm outperforms PCA and ICA. Also, results of calculation time demonstrate that the algorithm can work in real time.

  • Minimum Length of a Signal for Fundamental Frequency Estimation and Its Application

    Takahiro MURAKAMI  Hiroyuki YAMAGISHI  Yoshihisa ISHIDA  

     
    PAPER-Digital Signal Processing

      Vol:
    E98-A No:9
      Page(s):
    1914-1923

    The theoretically minimum length of a signal for fundamental frequency estimation in a noisy environment is discussed. Assuming that the noise is additive white Gaussian, it is known that a Cramér-Rao lower bound (CRLB) is given by the length and other parameters of the signal. In this paper, we define the minimum length as the length whose CRLB is less than or equal to the specific variance for any parameters of the signal. The specific variance is allowable variance of the estimate within an application of fundamental frequency estimation. By reformulating the CRLB with respect to the initial phase of the signal, the algorithms for determining the minimum length are proposed. In addition, we develop the methods of deciding the specific variance for general fundamental frequency estimation and pitch estimation. Simulation results in terms of both the fundamental frequency estimation and the pitch estimation show the validity of our approach.

8361-8380hit(42807hit)