The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8401-8420hit(42807hit)

  • Competition Avoidance Policy for Network Coding-Based Epidemic Routing

    Cheng ZHAO  Sha YAO  Yang YANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:9
      Page(s):
    1985-1989

    Network Coding-based Epidemic Routing (NCER) facilitates the reduction of data delivery delay in Delay Tolerant Networks (DTNs). The intrinsic reason lies in that the network coding paradigm avoids competitions for transmission opportunities between segmented packets of a large data file. In this paper, we focus on the impact of transmission competitions on the delay performance of NCER when multiple data files exist. We prove analytically that when competition occurs, transmitting the least propagated data file is optimal in the sense of minimizing the average data delivery delay. Based on such understanding, we propose a family of competition avoidance policies, namely the Least Propagated First (LPF) policies, which includes a centralized, a distributed, and a modified variants. Numerical results show that LPF policies can achieve at least 20% delay performance gain at different data traffic rates, compared with the policy currently available.

  • Generation of a Zoomed Stereo Video Using Two Synchronized Videos with Different Magnifications

    Yusuke HAYASHI  Norihiko KAWAI  Tomokazu SATO  Miyuki OKUMOTO  Naokazu YOKOYA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/06/17
      Vol:
    E98-D No:9
      Page(s):
    1691-1701

    This paper proposes a novel approach to generate stereo video in which the zoom magnification is not constant. Although this has been achieved mechanically in a conventional way, it is necessary for this approach to develop a mechanically complex system for each stereo camera system. Instead of a mechanical solution, we employ an approach from the software side: by using a pair of zoomed and non-zoomed video, a part of the non-zoomed video image is cut out and super-resolved for generating stereo video without a special hardware. To achieve this, (1) the zoom magnification parameter is automatically determined by using distributions of intensities, and (2) the cutout image is super-resolved by using optically zoomed images as exemplars. The effectiveness of the proposed method is quantitatively and qualitatively validated through experiments.

  • Mass Spectra Separation for Explosives Detection by Using an Attenuation Model

    Yohei KAWAGUCHI  Masahito TOGAMI  Hisashi NAGANO  Yuichiro HASHIMOTO  Masuyuki SUGIYAMA  Yasuaki TAKADA  

     
    PAPER

      Vol:
    E98-A No:9
      Page(s):
    1898-1905

    A new algorithm for separating mass spectra into individual substances is proposed for explosives detection. The conventional algorithm based on probabilistic latent component analysis (PLCA) is effective in many cases because it makes use of the fact that non-negativity and sparsity hold for mass spectra in explosives detection. The algorithm, however, fails to separate mass spectra in some cases because uncertainty can not be resolved only by non-negativity and sparsity constraints. To resolve the uncertainty, an algorithm based on shift-invariant PLCA (SIPLCA) utilizing temporal correlation of mass spectra is proposed in this paper. In addition, to prevent overfitting, the temporal correlation is modeled with a function representing attenuation by focusing on the fact that the amount of a substance is attenuated continuously and slowly with time. Results of an experimental evaluation of the algorithm with data obtained in a real railway station demonstrate that the proposed algorithm outperforms the PLCA-based conventional algorithm and the simple SIPLCA-based one. The main novelty of this paper is that an evaluation of the detection performance of explosives detection is demonstrated. Results of the evaluation indicate that the proposed separation algorithm can improve the detection performance.

  • A Direction Finding Method Based on Rotating Interferometer and Its Performance Analysis

    Dexiu HU  Zhen HUANG  Jianhua LU  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:9
      Page(s):
    1858-1864

    This paper proposes and analyses an improved direction finding (DF) method that uses a rotating interferometer. The minimum sampling frequency is deduced in order to eliminate the phase ambiguity associated with a long baseline, the influence of phase imbalance of receiver is quantitatively discussed and the Root Mean Square Error (RMSE) of both bearing angle and pitch angle are also demonstrated. The theoretical analysis of the rotating interferometer is verified by simulation results, which show that it achieves better RMSE performance than the conventional method.

  • Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing

    Yinfang HONG  Hui LI  Wenping MA  Xinmei WANG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:9
      Page(s):
    1824-1831

    In the log-likelihood ratio (LLR) domain, the belief propagation (BP) decoding algorithm for polar codes incurs high computation complexity due to the computation of the hyperbolic functions in the node update rules. In this paper, we propose a linear approximation method based on the principle of equal spacing to simplify the hyperbolic functions in the BP decoding algorithm. Our method replaces the computation of hyperbolic functions with addition and multiplication operations in the node update rules. Simulation results show that the performance of the modified BP decoding algorithm is almost the same as the original BP decoding algorithm in the low Signal to Noise Ratio (SNR) region, and in the high SNR region the performance of our method is slightly worse. The modified BP decoding algorithm is only implemented with addition and multiplication operations, which greatly reduces computation complexity, and simplifies hardware implementation.

  • RTT Estimation with Sampled Flow Data

    Qi SU  Jian GONG  Xiaoyan HU  

     
    PAPER-Network Management/Operation

      Vol:
    E98-B No:9
      Page(s):
    1848-1857

    Round-trip time (RTT) is an important performance metric. Traditional RTT estimation methods usually depend on the cooperation of other networks and particular active or passive measurement platforms, whose global deployments are costly and difficult. Thus a new RTT estimation algorithm, ME algorithm, is introduced. It can estimate the RTT of two hosts communicating through border routers by using TCP CUBIC bulk flow data from those routhers without the use of extra facilities, which makes the RTT estimation in large-scale high-speed networks more effective. In addition, a simpler and more accurate algorithm — AE algorithm — is presented and used when the link has large bandwidth and low packet loss rate. The two proposed algorithms suit sampled flow data because only duration and total packet number of a TCP CUBIC bulk flow are inputs to their calculations. Experimental results show that both algorithms work excellently in real situations. Moreover, they have the potential to be adapted to other TCP versions with slight modification as their basic idea is independent of the TCP congestion control mechanism.

  • Uniqueness Theorem of Complex-Valued Neural Networks with Polar-Represented Activation Function

    Masaki KOBAYASHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:9
      Page(s):
    1937-1943

    Several models of feed-forward complex-valued neural networks have been proposed, and those with split and polar-represented activation functions have been mainly studied. Neural networks with split activation functions are relatively easy to analyze, but complex-valued neural networks with polar-represented functions have many applications but are difficult to analyze. In previous research, Nitta proved the uniqueness theorem of complex-valued neural networks with split activation functions. Subsequently, he studied their critical points, which caused plateaus and local minima in their learning processes. Thus, the uniqueness theorem is closely related to the learning process. In the present work, we first define three types of reducibility for feed-forward complex-valued neural networks with polar-represented activation functions and prove that we can easily transform reducible complex-valued neural networks into irreducible ones. We then prove the uniqueness theorem of complex-valued neural networks with polar-represented activation functions.

  • A Combinatorial Aliasing-Based Sparse Fourier Transform

    Pengcheng QIU  Feng YU  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:9
      Page(s):
    1968-1972

    The sparse Fourier transform (SFT) seeks to recover k non-negligible Fourier coefficients from a k-sparse signal of length N (k«N). A single frequency signal can be recovered via the Chinese remainder theorem (CRT) with sub-sampled discrete Fourier transforms (DFTs). However, when there are multiple non-negligible coefficients, more of them may collide, and multiple stages of sub-sampled DFTs are needed to deal with such collisions. In this paper, we propose a combinatorial aliasing-based SFT (CASFT) algorithm that is robust to noise and greatly reduces the number of stages by iteratively recovering coefficients. First, CASFT detects collisions and recovers coefficients via the CRT in a single stage. These coefficients are then subtracted from each stage, and the process iterates through the other stages. With a computational complexity of O(klog klog 2N) and sample complexity of O(klog 2N), CASFT is a novel and efficient SFT algorithm.

  • A Practical Finite-Time Convergent Observer against Input Disturbance and Measurement Noise

    In Hyuk KIM  Young Ik SON  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:9
      Page(s):
    1973-1976

    A simple robust finite-time convergent observer is presented in the presence of unknown input disturbance and measurement noise. In order to achieve the robust estimation and ensure the finite-time convergence, the proposed observer is constructed by using a multiple integral observer scheme in a hybrid system framework. Comparative computer simulations and laboratory experiments have been performed to test the effectiveness of the proposed observer.

  • Cryptanalysis and Improvement of an Encoding Method for Private-Key Hidden Vector Encryptions

    Fu-Kuo TSENG  Rong-Jaye CHEN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:9
      Page(s):
    1982-1984

    A predicate encryption scheme enables the owner of the master key to enforce fine-grained access control on encrypted cloud data through the delegation of predicate tokens to cloud storages. In particular, Blundo et al. proposed a construction where a predicate token reveals partial information of the involved keywords to enable efficient operations on encrypted keywords. However, we found that a predicate token reveals more information than what was claimed because of the encoding scheme. In this letter, we not only analyze this extra information leakage but also present an improved encoding scheme for the Blundo et al's scheme and the other similar schemes to preserve predicate privacy.

  • Cooperative Communication Using the DF Protocol in the Hierarchical Modulation

    Sung-Bok CHOI  Eui-Hak LEE  Jung-In BAIK  Young-Hwan YOU  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:9
      Page(s):
    1990-1994

    To improve the BER performance of the conventional cooperative communication, this letter proposes an efficient method for the reliability, and it uses hierarchical modulation that has both the high priority (HP) layer and the low priority (LP) layer. To compensate more reliable transmission, the proposed method uses the error correction capability of Reed-Solomon (RS) codes additionally. The simulation results show that the proposed method can transmit data more reliably than the basic RS coded decode-and-forward (DF) method.

  • Ambient Sensor Network Technologies for Global Connectivity Support Open Access

    Masayoshi OHASHI  Nao KAWANISHI  

     
    INVITED PAPER

      Vol:
    E98-B No:9
      Page(s):
    1733-1740

    This paper discusses the core ambient sensor network (ASN) technologies in view of their support for global connectivity. First, we enumerate ASN services and use cases and then discuss the underlying core technologies, in particular, the importance of the RESTful approach for ensuring global accessibility to sensors and actuators. We also discuss several profile-handling technologies for context-aware services. Finally, we envisage the ASN trends, including our current work for cognitive behavior therapy (CBT) in mental healthcare. We strongly believe that ASN services will become widely available in the real world and an integral part of daily life and society in the near future.

  • Design of mm-Wave RLSAs with Lossy Waveguides by Slot Coupling Control Techniques Open Access

    Tung NGUYEN  Jiro HIROKAWA  Makoto ANDO  Manuel SIERRA CASTAÑER  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:9
      Page(s):
    1865-1872

    This paper discusses how to design a Radial Line Slot Antenna (RLSA) whose waveguide is filled with high loss dielectric materials. We introduce a new design for the aperture slot coupling synthesis to restrain the dielectric losses and improve the antenna gain. Based on a newly defined slot coupling, a number of RLSAs with different sizes and loss factors are analyzed and their performances are predicted. Theoretical calculations suggest that the gain is sensitive to the material losses in the radial lines. The gain enhancement by using the new coupling formula is notable for larger antenna size and higher loss factor of the dielectric material. Three prototype RLSAs are designed and fabricated at 60GHz following different slot coupling syntheses, and their measured performances consolidate our theory.

  • A Local Program Insertion Scheme with a Rotate-and-Forward Strategy for Video Broadcasting

    Guo LI  Feng-Kui GONG  Na YANG  Yong WANG  Mohamed A. FARAH  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:9
      Page(s):
    1882-1887

    A local program insertion (LPI) scheme for video broadcasting systems is proposed by using a novel rotate-and-forward strategy, which can be widely used when a local TV tower (LT) wants to insert its own TV signals into the signals from the main TV tower (MT) without any additional resources. In the proposed LPI scheme, the bit stream of MT is firstly modulated and transmitted through coordinated constellation mapping, Alamouti encoding and OFDM modulation. Then, the LT receives the MT signals and demodulates them into constellation symbols. Finally, the bit stream of LT is mapped as “rotate bit” to rotate the demodulated MT symbols and forward to the users. We show that our proposed LPI scheme does not require extra time or frequency resources and it is also a complexity-reduced scheme for the local TV tower (LT) since bit-level decoding is not required at the LT. In addition, it can increase the network exchanging capacity in term of bits per channel use (bpcu).

  • Unambiguous S-Curve Shaping for Multipath Mitigation for BOC(1,1) Modulated Signals in GNSS

    Zhe LIU  Yangbo HUANG  Xiaomei TANG  Feixue WANG  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E98-B No:9
      Page(s):
    1924-1930

    A novel multipath mitigation algorithm for binary offset carrier (BOC) signals in the global navigation satellite system (GNSS) is presented. Based on the W2 code correlation reference waveform (CCRW) structure, a series of bipolar reference waveforms (BRWs) is introduced to shape the unambiguous s-curve. The resulted s-curve has a single stable zero-crossing point such that the tracking unambiguity in BOC (1,1) can be solved. At the same time, multipath mitigation capability is improved as well. As verified by simulations, the proposed method matches the multipath mitigation performance of W2 CCRW, and is superior to conventional receiver correlation techniques. This method can be applied in GPS L1 and Galileo E1.

  • Foreground Segmentation Using Morphological Operator and Histogram Analysis for Indoor Applications

    Kyounghoon JANG  Geun-Jun KIM  Hosang CHO  Bongsoon KANG  

     
    LETTER-Vision

      Vol:
    E98-A No:9
      Page(s):
    1998-2003

    This paper proposes a foreground segmentation method for indoor environments using depth images only. It uses a morphological operator and histogram analysis to segment the foreground. In order to compare the accuracy for foreground segmentation, we use metric measurements of false positive rate (FPR), false negative rate (FNR), total error (TE), and a similarity measure (S). A series of experimental results using video sequences collected under various circumstances are discussed. The proposed system is also designed in a field-programmable gate array (FPGA) implementation with low hardware resources.

  • Proposal of Capacity Analysis in Wireless Sensor Networks with Multi-Hop Transmissions and Hidden Nodes

    Yun WEN  Kazuyuki OZAKI  Hiroshi FUJITA  Teruhisa NINOMIYA  Makoto YOSHIDA  

     
    PAPER

      Vol:
    E98-B No:9
      Page(s):
    1749-1757

    Wireless sensor networks play an important role in several industries. Ad-hoc networks with multi-hop transmissions are considered suitable for wireless sensor networks because of their high scalability and low construction cost. However, a lack of centralized control makes it difficult to respond to congestion when system capacity is exceeded. Therefore, the analysis of system capacity is a critical issue for system design. In this paper, we propose a novel zone division model to analyze the capacity of multi-hop wireless sensor networks using carrier sense multiple access with collision avoidance protocols. We divide the one-hop area to a gateway (GW) into two zones: an outer zone, where access nodes (ANs) can relay packets from multi-hop ANs, and an inner zone where ANs cannot relay packets. Using this approach, we calculate the packet loss for each zone to estimate the capacity, considering the difference in the communication range of the GW and ANs, as well as the collision with hidden nodes. Comparisons with simulation results and the conventional method show that our model achieves higher estimation accuracy.

  • Rate Adaptation Based on Exposure Assessment Using Rectenna Output for WLAN Station Powered with Microwave Power Transmission

    Shota YAMASHITA  Koichi SAKAGUCHI  Yong HUANG  Koji YAMAMOTO  Takayuki NISHIO  Masahiro MORIKURA  Naoki SHINOHARA  

     
    PAPER

      Vol:
    E98-B No:9
      Page(s):
    1785-1794

    This paper proposes a rate adaptation scheme (RAS) for a wireless local area network (WLAN) station powered with microwave power transmission (MPT). A WLAN station attempting to transmit data frames when exposed to microwave radiation for MPT, experiences a reduction in the physical (PHY) layer data rate because frames are lost even when the carrier sense mechanism is used. The key idea of the proposed scheme is to utilize the output of the rectenna used for receiving microwave power. Using rectenna output, a WLAN station based on the proposed scheme assesses whether the station is exposed to microwave radiation for MPT. Then, using historical data corresponding to the assessment result, the station selects an appropriate PHY data rate. The historical data are obtained from previous transmission results, e.g., historical data pertaining to the data frame loss ratio. The proposed scheme was implemented and verified through an experiment. Experimental results showed that the proposed scheme prevents the reduction in the PHY data rate, which is caused by the use of historical data stored in a single memory. Thus, the proposed scheme leads to an improvement in the WLAN throughput.

  • Motion of Break Arcs Occurring between Silver Electrical Contacts with Copper Arc Runners

    Haruki MIYAGAWA  Junya SEKIKAWA  

     
    BRIEF PAPER

      Vol:
    E98-C No:9
      Page(s):
    919-922

    Copper arc runners are fixed on silver electrical contacts. Break arcs are generated between the contacts in a DC resistive circuit. Circuit current when contacts are closed is 10A. Supply voltage is changed from 200V to 450V. The following results are shown. Cathode spots stay on the cathode surface but anode spots run on the runner when the supply voltage is 250V and over. In cases of the supply voltage is greater than 250V, the break arcs run on the runner when the arcs are successfully extinguished, and stays on the runner in cases of the failure of arc extinction. The arc lengths just before arc extinction with or without the runners are also investigated. The arc lengths are the same with or without the runners for each supply voltage.

  • Influences of Contact Opening Speeds on Break Arc Behaviors of AgSnO2 Contact Pairs in DC Inductive Load Conditions

    Makoto HASEGAWA  

     
    BRIEF PAPER

      Vol:
    E98-C No:9
      Page(s):
    923-927

    Break operations of DC inductive (L=20mH) load currents up to about 5A with 14V were conducted in air with AgSnO2 contact pairs under different contact opening speeds, first up to 20mm/s and then to 200mm/s. Average break arc duration at each current level was calculated under the respective opening speeds. While break arc durations became shorter with increases in the opening speeds at larger current levels, such reduction tendencies were less significant with an increase of the contact opening speed from 20mm/s to 200mm/s, even when operated to break a load current of 5A. Both load current levels and contact opening speed levels seem to exhibit certain roles for realizing arc shortening effects.

8401-8420hit(42807hit)