The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

8881-8900hit(42807hit)

  • Recovering Traceability Links between Requirements and Source Code Using the Configuration Management Log

    Ryosuke TSUCHIYA  Hironori WASHIZAKI  Yoshiaki FUKAZAWA  Tadahisa KATO  Masumi KAWAKAMI  Kentaro YOSHIMURA  

     
    PAPER-Software Engineering

      Pubricized:
    2015/01/06
      Vol:
    E98-D No:4
      Page(s):
    852-862

    Traceability links between requirements and source code are helpful in software reuse and maintenance tasks. However, manually recovering links in a large group of products requires significant costs and some links may be overlooked. Here, we propose a semi-automatic method to recover traceability links between requirements and source code in the same series of large software products. In order to support differences in representation between requirements and source code, we recover links by using the configuration management log as an intermediary. We refine the links by classifying requirements and code elements in terms of whether they are common to multiple products or specific to one. As a result of applying our method to real products that have 60KLOC, we have recovered valid traceability links within a reasonable amount of time. Automatic parts have taken 13 minutes 36 seconds, and non-automatic parts have taken about 3 hours, with a recall of 76.2% and a precision of 94.1%. Moreover, we recovered some links that were unknown to engineers. By recovering traceability links, software reusability and maintainability will be improved.

  • A Sector-Based Graphical Password Scheme with Resistance to Login-Recording Attacks

    Wei-Chi KU  Yu-Chang YEH  Bo-Ren CHENG  Chia-Ju CHANG  

     
    PAPER-Information Network

      Pubricized:
    2015/01/20
      Vol:
    E98-D No:4
      Page(s):
    894-901

    Since most password schemes are vulnerable to login-recording attacks, graphical password schemes that are resistant to such attacks have been proposed. However, none of existing graphical password schemes with resistance to login-recording attacks can provide both sufficient security and good usability. Herein, we design and implement a simple sector-based graphical password scheme, RiS, with dynamically adjustable resistance to login-recording attacks. RiS is a pure graphical password scheme by using the shape of the sector. In RiS, the user can dynamically choose the login mode with suitable resistance to login-recording attacks depending on the login environment. Hence, the user can efficiently complete the login process in an environment under low threat of login-recording attacks and securely complete the login process in an environment under high threat of login-recording attacks. Finally, we show that RiS can achieve both sufficient security and good usability.

  • Exemplar-Based Inpainting Driven by Feature Vectors and Region Segmentation

    Jinki PARK  Jaehwa PARK  Young-Bin KWON  Chan-Gun LEE  Ho-Hyun PARK  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2015/01/09
      Vol:
    E98-D No:4
      Page(s):
    972-975

    A new exemplar-based inpainting method which effectively preserves global structures and textures in the restored region driven by feature vectors is presented. Exemplars that belong to the source region are segmented based on their features. To express characteristics of exemplars such as shapes of structures and smoothness of textures, the Harris corner response and the variance of pixel values are employed as a feature vector. Enhancements on restoration plausibility and processing speedup are achieved as shown in the experiments.

  • A GPS Bit Synchronization Method Based on Frequency Compensation

    Xinning LIU  Yuxiang NIU  Jun YANG  Peng CAO  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E98-B No:4
      Page(s):
    746-753

    TTFF (Time-To-First-Fix) is an important indicator of GPS receiver performance, and must be reduced as much as possible. Bit synchronization is the pre-condition of positioning, which affects TTFF. The frequency error leads to power loss, which makes it difficult to find the bit edge. The conventional bit synchronization methods only work well when there is no or very small frequency error. The bit synchronization process is generally carried out after the pull-in stage, where the carrier loop is already stable. In this paper, a new bit synchronization method based on frequency compensation is proposed. Through compensating the frequency error, the new method reduces the signal power loss caused by the accumulation of coherent integration. The performances of the new method in different frequency error scenarios are compared. The parameters in the proposed method are analyzed and optimized to reduce the computational complexity. Simulation results show that the new method has good performance when the frequency error is less than 25Hz. Test results show that the new method can tolerate dynamic frequency errors, and it is possible to move the bit synchronization to the pull-in process to reduce the TTFF.

  • Prediction of Common-Mode Radiated Emission of PCB with an Attached Cable Using Imbalance Difference Model

    Nan ZHANG  Jong-hyeon KIM  Soo-jung RYU  Wansoo NAH  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E98-B No:4
      Page(s):
    638-645

    An imbalance difference model has been developed to estimate the common-mode radiated emission of a PCB with an attached cable. This model, however, requires significant computation time for full-wave simulation, especially if the attached cable is long, even with a powerful computer configuration. To solve this problem, a method that approximates the imbalance difference model as an equivalent asymmetrical dipole antenna is proposed in this paper. The common-mode radiated emission can be predicted using a line integration of the common-mode current distribution which is directly estimated by the asymmetrical antenna model. Unlike existing methods, the proposed method avoids the circuit construction normally used to measure the common-mode current, and is still able to accurately predict the maximum common-mode radiation. The effectiveness of the proposed method is verified by comparing the predicted results with the 3D full-wave simulation and the measured data gathered in an anechoic chamber.

  • FOREWORD Open Access

    Naoto SONE  

     
    FOREWORD

      Vol:
    E98-D No:4
      Page(s):
    749-749
  • A Primary-side Regulation AC–DC Constant Voltage Control Chip with Cable Compensation

    Changyuan CHANG  Penglin YANG  Yang XU  Yao CHEN  Bin BIAN  

     
    PAPER-Electronic Circuits

      Vol:
    E98-C No:4
      Page(s):
    349-355

    A primary-side regulation AC--DC constant voltage control chip is designed, which employs a novel cable compensation technique to improve the precision of the output voltage and pursue a wider load range for regulation. In the proposed controller, constant voltage (CV) is achieved by OSC charging current and current-limiting point adjustment. Meantime, according to different cable lengths, the sampled voltage is regulated by injecting current to pull-down resistance of the system to obtain an accurate output voltage. The proposed chip is implemented in TSMC 0.35,$mu $m 5,V/40,V BCD process, and a 12,V/1,A circuit prototype has been built to verify the proposed control method. Experimental results show that the maximum cable compensation current reaches 43,$mu $A, and the precision of the output voltage is within $pm$ 3% in a wide range of output current from 0 to 1,A.

  • OBDD Representation of Intersection Graphs

    Asahi TAKAOKA  Satoshi TAYU  Shuichi UENO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/01/16
      Vol:
    E98-D No:4
      Page(s):
    824-834

    Ordered Binary Decision Diagrams (OBDDs for short) are popular dynamic data structures for Boolean functions. In some modern applications, we have to handle such huge graphs that the usual explicit representations by adjacency lists or adjacency matrices are infeasible. To deal with such huge graphs, OBDD-based graph representations and algorithms have been investigated. Although the size of OBDD representations may be large in general, it is known to be small for some special classes of graphs. In this paper, we show upper bounds and lower bounds of the size of OBDDs representing some intersection graphs such as bipartite permutation graphs, biconvex graphs, convex graphs, (2-directional) orthogonal ray graphs, and permutation graphs.

  • Co-saliency Detection Linearly Combining Single-View Saliency and Foreground Correspondence

    Huiyun JING  Xin HE  Qi HAN  Xiamu NIU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/01/05
      Vol:
    E98-D No:4
      Page(s):
    985-988

    The research of detecting co-saliency over multiple images is just beginning. The existing methods multiply the saliency on single image by the correspondence over multiple images to estimate co-saliency. They have difficulty in highlighting the co-salient object that is not salient on single image. It is caused by two problems. (1) The correspondence computation lacks precision. (2) The co-saliency multiplication formulation does not fully consider the effect of correspondence for co-saliency. In this paper, we propose a novel co-saliency detection scheme linearly combining foreground correspondence and single-view saliency. The progressive graph matching based foreground correspondence method is proposed to improve the precision of correspondence computation. Then the foreground correspondence is linearly combined with single-view saliency to compute co-saliency. According to the linear combination formulation, high correspondence could bring about high co-saliency, even when single-view saliency is low. Experiments show that our method outperforms previous state-of-the-art co-saliency methods.

  • Multiple Access Interference-Free Multichannel Slotted Aloha Scheme for Time-Asynchronous OFDMA Systems

    Junwoo JUNG  Jaesung LIM  Haengik KANG  Hyungwon PARK  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:4
      Page(s):
    686-700

    Signals transmitted by multiple stations through different multiple subchannels may arrive at a particular station, such as an access point (AP), with different time delays. If the difference in arrival time delays exceeds the cyclic prefix duration, the orthogonality among the subchannels can be broken, which leads to multiple access interference (MAI) among the stations. In this paper, we propose a multichannel slotted Aloha scheme based on an MAI-free group for a simple orthogonal frequency division multiple access (OFDMA) wireless network. Each MAI-free group consists of stations whose signals arrive at the AP within the cyclic prefix duration. The proposed scheme outperforms a conventional scheme using a fast retrial algorithm in terms of throughput due to smaller cyclic prefix duration, lower collision probability, and lower block probability. While the proposed scheme has higher delay overhead in a low arrival rate region, its delay approaches that of the conventional scheme as the arrival rate increases.

  • Estimating Korean Residence Registration Numbers from Public Information on SNS

    Daeseon CHOI  Younho LEE  Yongsu PARK  Seokhyun KIM  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:4
      Page(s):
    565-574

    People expose their personal information on social network services (SNSs). This paper warns of the dangers of this practice by way of an example. We show that the residence registration numbers (RRNs) of many Koreans, which are very important and confidential personal information analogous to social security numbers in the United States, can be estimated solely from the information that they have made open to the public. In our study, we utilized machine learning algorithms to infer information that was then used to extract a part of the RRNs. Consequently, we were able to extract 45.5% of SNS users' RRNs using a machine learning algorithm and brute-force search that did not consume exorbitant amounts of resources.

  • A New Content-Oriented Traffic Engineering for Content Distribution: CAR (Content Aware Routing)

    Shigeyuki YAMASHITA  Daiki IMACHI  Miki YAMAMOTO  Takashi MIYAMURA  Shohei KAMAMURA  Koji SASAYAMA  

     
    PAPER-Network System

      Vol:
    E98-B No:4
      Page(s):
    575-584

    Large-scale content transfer, especially video transfer, is now a dominant traffic component in the Internet. Originally, content transfer had a content-oriented feature, i.e., “Users do not care where content is retrieved. Users only take care of what content they obtain.” Conventional traffic engineering (TE) aims to obtain optimal routes for traffic between ingress and egress router pairs, i.e., TE has focused on a location-oriented approach that takes care of where to connect. With increased demand for content-oriented features for content traffic, TE needs to focus on content-oriented routing design. In this study, we therefore propose a novel approach to content-oriented TE, called content aware routing (CAR). In CAR, routes are designed for content and egress router pairs, i.e., content traffic toward a receiver-side router. Content demand can be flexibly distributed to multiple servers (i.e., repositories) providing the same content, meaning that content can be obtained from anywhere. CAR solves the optimization problem of minimizing maximum link utilization. If there are multiple optimal solutions, CAR selects a solution in which resource usage is minimized. Using numerical examples formulated by the linear programming problem, we evaluated CAR by comparing it with combinations of conventional content delivery networks and TE, i.e., location-oriented designs. Our numerical results showed that CAR improved maximum link utilization by up to 15%, with only a 5% increase of network resource usage.

  • FOREWORD Open Access

    Masataka OHKUBO  

     
    FOREWORD

      Vol:
    E98-C No:3
      Page(s):
    166-166
  • Interference Mitigation Framework Based on Interference Alignment for Femtocell-Macrocell Two Tier Cellular Systems

    Mohamed RIHAN  Maha ELSABROUTY  Osamu MUTA  Hiroshi FURUKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    467-476

    This paper presents a downlink interference mitigation framework for two-tier heterogeneous networks, that consist of spectrum-sharing macrocells and femtocells*. This framework establishes cooperation between the two tiers through two algorithms, namely, the restricted waterfilling (RWF) algorithm and iterative reweighted least squares interference alignment (IRLS-IA) algorithm. The proposed framework models the macrocell-femtocell two-tier cellular system as an overlay cognitive radio system in which the macrocell system plays the role of the primary user (PU) while the femtocell networks play the role of the cognitive secondary users (SUs). Through the RWF algorithm, the macrocell basestation (MBS) cooperates with the femtocell basestations (FBSs) by releasing some of its eigenmodes to the FBSs to do their transmissions even if the traffic is heavy and the MBS's signal to noise power ratio (SNR) is high. Then, the FBSs are expected to achieve a near optimum sum rate through employing the IRLS-IA algorithm to mitigate both the co-tier and cross-tier interference at the femtocell users' (FUs) receivers. Simulation results show that the proposed IRLS-IA approach provides an improved sum rate for the femtocell users compared to the conventional IA techniques, such as the leakage minimization approach and the nuclear norm based rank constraint rank minimization approach. Additionally, the proposed framework involving both IRLS-IA and RWF algorithms provides an improved total system sum rate compared with the legacy approaches for the case of multiple femtocell networks.

  • Dual-Band Sensor Network for Accurate Device-Free Localization in Indoor Environment with WiFi Interference

    Manyi WANG  Zhonglei WANG  Enjie DING  Yun YANG  

     
    PAPER-Network Computing and Applications

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    596-606

    Radio Frequency based Device-Free Localization (RFDFL) is an emerging localization technique without requirements of attaching any electronic device to a target. The target can be localized by means of measuring the shadowing of received signal strength caused by the target. However, the accuracy of RFDFL deteriorates seriously in environment with WiFi interference. State-of-the-art methods do not efficiently solve this problem. In this paper, we propose a dual-band method to improve the accuracy of RFDFL in environment without/with severe WiFi interference. We introduce an algorithm of fusing dual-band images in order to obtain an enhanced image inferring more precise location and propose a timestamp-based synchronization method to associate the dual-band images to ensure their one-one correspondence. With real-world experiments, we show that our method outperforms traditional single-band localization methods and improves the localization accuracy by up to 40.4% in real indoor environment with high WiFi interference.

  • Low-Energy Optical-to-Electrical Converters Based on Superconducting Nanowire for Single-Flux-Quantum Circuits Open Access

    Kemmei KAJINO  Shigehito MIKI  Taro YAMASHITA  Hirotaka TERAI  

     
    INVITED PAPER

      Vol:
    E98-C No:3
      Page(s):
    227-231

    We report the energy-efficient optical input interface using NbN superconducting nanowire-based optical-to-electrical (SN-OE) converters for a single-flux-quantum (SFQ) data processing system. The SN-OE converters with small active areas ranging from 1$, imes,$1 to 10$, imes,$10,$mu$m$^2$ were fabricated to improve the recovery time by reducing the kinetic inductance of the nanowire. The SN-OE with the smallest area of 1$, imes,$1 $mu$m$^2$ showed the recovery time of around 0.3 ns, while its detection efficiency for a single photon was reduced below 0.1% due to insufficient coupling efficiency with a single-mode optical fiber. However, the optical power dependence of the error rate of this device showed that the required optical power to achieve the error rate below $10^{-12}$ at 10 GHz operation is as large as 70 $mu$W, which is still one order of magnitude lower than semiconductor photo diodes. We also demonstrated the operation of the SN-OE converters combined with the SFQ readout circuit and confirmed the operating speed up to 77~MHz.

  • Automatic Mura Detection for Display Film Using Mask Filtering in Wavelet Transform

    Jong-Seung PARK  Seung-Ho LEE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/11/21
      Vol:
    E98-D No:3
      Page(s):
    737-740

    In this letter, we present a method for automatic mura detection for display film using the efficient decision of cut-off frequency with DCT and mask filtering with wavelet transform. First, the background image including reflected light is estimated using DCT with adaptive cut-off frequency, and DWT is applied to background-removed images for generating mura mask. Then, a mura mask is generated by separating low-frequency noise in the approximation coefficients. Lastly, mura is detected by applying mura mask filtering to the detail coefficients. According to the comparison by Semu index, the results from the proposed method are superior to those from the existing methods. This indicates that the proposed method is high in reliability.

  • A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns

    Chae Chang LEE  Ji Won YOON  

     
    PAPER-Information Network

      Vol:
    E98-D No:3
      Page(s):
    649-660

    In this paper, we present new methods for learning the individual patterns of a card user's transaction amount and the region in which he or she uses the card, for a given period, and for determining whether the specified transaction is allowable in accordance with these learned user transaction patterns. Then, we classify legitimate transactions and fraudulent transactions by setting thresholds based on the learned individual patterns.

  • Faster Enumeration of All Maximal Cliques in Unit Disk Graphs Using Geometric Structure

    Taisuke IZUMI  Daisuke SUZUKI  

     
    PAPER

      Vol:
    E98-D No:3
      Page(s):
    490-496

    This paper considers the problem of enumerating all maximal cliques in unit disk graphs, which is a plausible setting for applications of finding similar data groups. Our primary interest is to develop a faster algorithm using the geometric structure about the metric space where the input unit disk graph is embedded. Assuming that the distance between any two vertices is available, we propose a new algorithm based on two well-known algorithms called Bron-Kerbosch and Tomita-Tanaka-Takahashi. The key idea of our algorithm is to find a good pivot quickly using geometric proximity. We validate the practical impact of our algorithm via experimental evaluations.

  • Extraction of Blood Vessels in Retinal Images Using Resampling High-Order Background Estimation

    Sukritta PARIPURANA  Werapon CHIRACHARIT  Kosin CHAMNONGTHAI  Hideo SAITO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2014/12/12
      Vol:
    E98-D No:3
      Page(s):
    692-703

    In retinal blood vessel extraction through background removal, the vessels in a fundus image which appear in a higher illumination variance area are often missing after the background is removed. This is because the intensity values of the vessel and the background are nearly the same. Thus, the estimated background should be robust to changes of the illumination intensity. This paper proposes retinal blood vessel extraction using background estimation. The estimated background is calculated by using a weight surface fitting method with a high degree polynomial. Bright pixels are defined as unwanted data and are set as zero in a weight matrix. To fit a retinal surface with a higher degree polynomial, fundus images are reduced in size by different scaling parameters in order to reduce the processing time and complexity in calculation. The estimated background is then removed from the original image. The candidate vessel pixels are extracted from the image by using the local threshold values. To identify the true vessel region, the candidate vessel pixels are dilated from the candidate. After that, the active contour without edge method is applied. The experimental results show that the efficiency of the proposed method is higher than the conventional low-pass filter and the conventional surface fitting method. Moreover, rescaling an image down using the scaling parameter at 0.25 before background estimation provides as good a result as a non-rescaled image does. The correlation value between the non-rescaled image and the rescaled image is 0.99. The results of the proposed method in the sensitivity, the specificity, the accuracy, the area under the receiver operating characteristic (ROC) curve (AUC) and the processing time per image are 0.7994, 0.9717, 0.9543, 0.9676 and 1.8320 seconds for the DRIVE database respectively.

8881-8900hit(42807hit)