The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

10941-10960hit(42807hit)

  • FOREWORD Open Access

    Hiroshi INOUE  

     
    FOREWORD

      Vol:
    E96-C No:9
      Page(s):
    1095-1096
  • Slack Space Recycling: Delaying On-Demand Cleaning in LFS for Performance and Endurance

    Yongseok OH  Jongmoo CHOI  Donghee LEE  Sam H. NOH  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E96-D No:9
      Page(s):
    2075-2086

    The Log-structured File System (LFS) transforms random writes to a huge sequential one to provide superior write performance on storage devices. However, LFS inherently suffers from overhead incurred by cleaning segments. Specifically, when file system utilization is high and the system is busy, write performance of LFS degenerates significantly due to high cleaning cost. Also, in the newer flash memory based SSD storage devices, cleaning leads to reduced SSD lifetime as it incurs more writes. In this paper, we propose an enhancement to the original LFS to alleviate the performance degeneration due to cleaning when the system is busy. The new scheme, which we call Slack Space Recycling (SSR), allows LFS to delay on-demand cleaning during busy hours such that cleaning may be done when the load is much lighter. Specifically, it writes modified data directly to invalid areas (slack space) of used segments instead of cleaning on-demand, pushing back cleaning for later. SSR also has the added benefit of increasing the lifetime of the now popular SSD storage devices. We implement the new SSR-LFS file system in Linux and perform a large set of experiments. The results of these experiments show that the SSR scheme significantly improves performance of LFS for a wide range of storage utilization settings and that the lifetime of SSDs is extended considerably.

  • A Fuzzy Geometric Active Contour Method for Image Segmentation

    Danyi LI  Weifeng LI  Qingmin LIAO  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E96-D No:9
      Page(s):
    2107-2114

    In this paper, we propose a hybrid fuzzy geometric active contour method, which embeds the spatial fuzzy clustering into the evolution of geometric active contour. In every iteration, the evolving curve works as a spatial constraint on the fuzzy clustering, and the clustering result is utilized to construct the fuzzy region force. On one hand, the fuzzy region force provides a powerful capability to avoid the leakages at weak boundaries and enhances the robustness to various noises. On the other hand, the local information obtained from the gradient feature map contributes to locating the object boundaries accurately and improves the performance on the images with heterogeneous foreground or background. Experimental results on synthetic and real images have shown that our model can precisely extract object boundaries and perform better than the existing representative hybrid active contour approaches.

  • A Capture-Safety Checking Metric Based on Transition-Time-Relation for At-Speed Scan Testing

    Kohei MIYASE  Ryota SAKAI  Xiaoqing WEN  Masao ASO  Hiroshi FURUKAWA  Yuta YAMATO  Seiji KAJIHARA  

     
    PAPER

      Vol:
    E96-D No:9
      Page(s):
    2003-2011

    Test power has become a critical issue, especially for low-power devices with deeply optimized functional power profiles. Particularly, excessive capture power in at-speed scan testing may cause timing failures that result in test-induced yield loss. This has made capture-safety checking mandatory for test vectors. However, previous capture-safety checking metrics suffer from inadequate accuracy since they ignore the time relations among different transitions caused by a test vector in a circuit. This paper presents a novel metric called the Transition-Time-Relation-based (TTR) metric which takes transition time relations into consideration in capture-safety checking. Detailed analysis done on an industrial circuit has demonstrated the advantages of the TTR metric. Capture-safety checking with the TTR metric greatly improves the accuracy of test vector sign-off and low-capture-power test generation.

  • Low Power Design of Asynchronous Datapath for LDPC Decoder

    XiaoBo JIANG  DeSheng YE  HongYuan LI  WenTao WU  XiangMin XU  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E96-A No:9
      Page(s):
    1857-1863

    We propose an asynchronous datapath for the low-density parity-check decoder to decrease power consumption. Glitches and redundant computations are decreased by the asynchronous design. Taking advantage of the statistical characteristics of the input data, we develop novel key arithmetic elements in the datapath to reduce redundant computations. Two other types of datapaths, including normal synchronous design and clock-gating design, are implemented for comparisons with the proposed design. The three designs use similar architectures and realize the same function by using the 0.18µm process of the Semiconductor Manufacturing International Corporation. Post-layout result shows that the proposed asynchronous design exhibits the lowest power consumption. The proposed asynchronous design saves 48.7% and 21.9% more power than the normal synchronous and clock-gating designs, respectively. The performance of the proposed datapath is slightly worse than the clock-gating design but is better than the synchronous design. The proposed design is approximately 7% larger than the other two designs.

  • MU-Type Multicore Fiber Connector

    Ryo NAGASE  Katsuyoshi SAKAIME  Kengo WATANABE  Tsunetoshi SAITO  

     
    PAPER

      Vol:
    E96-C No:9
      Page(s):
    1173-1177

    We have developed a 7-core-fiber connector. To maintain both the ferrule floating mechanism and precise alignment around the ferrule axis, we employed Oldham's coupling mechanism inside an MU-type connector plug housing and realized an average attenuation of 0.13dB and an average return loss of 48.2dB.

  • FOREWORD Open Access

    Hideharu AMANO  

     
    FOREWORD

      Vol:
    E96-D No:8
      Page(s):
    1581-1581
  • M-Shaped Dielectric Phase Shifter for Beam-Steerable Base-Station Antenna

    Kengo NISHIMOTO  Takeshi OSHIMA  Toru FUKASAWA  Hiroaki MIYASHITA  Yoshihiko KONISHI  Manabu KURIHARA  Yoshiyuki CHATANI  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:8
      Page(s):
    2095-2101

    We propose a simple and small phase shifter for a beam-steerable base-station antenna. This phase shifter has no metallic heterojunction, and the phase shift is controlled by moving an M-shaped dielectric plate between the strip conductor and the ground plane of a strip line. We derive a design equation from the condition that at the center frequency f0, the reflection coefficient = 0. In this phase shifter, the reflection coefficient becomes minimum at f0 regardless of the movement distance, r, of the dielectric plate, and the relationship between the phase shift and r is linear. These characteristics are verified by performing simulations and measurements. The size of the M-shaped dielectric phase shifter is 0.27λ00.12λ0, where λ0 is the free-space wavelength at f0. The insertion loss is smaller than about 0.2 dB within a fractional bandwidth of 10%, and the phase shift can vary from 0 to about 80 degrees.

  • Design and Measurement of the Plate Laminated Waveguide Slot Array Antenna and Its Feasibility for Wireless Link System in the 120 GHz Band

    Dongjin KIM  Jiro HIROKAWA  Kimio SAKURAI  Makoto ANDO  Takuma TAKADA  Tadao NAGATSUMA  Jun TAKEUCHI  Akihiko HIRATA  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:8
      Page(s):
    2102-2111

    We design and fabricate a double-layer hollow-waveguide slot array antenna with wide bandwidth and high antenna efficiency for the 120 GHz band. The antenna is fabricated by diffusion bonding of laminated thin metal plates for high precision and perfect electrical contact. The 1616-element antenna shows more than 70% antenna efficiency over a 13 GHz bandwidth. Furthermore, it realizes error-free data transmission in 2.5 m distance at up to 10 Gbit/s. To our knowledge, this is the first report of the design and fabrication of a high-efficiency wideband planar antenna for the 120 GHz band.

  • Sensor-Pattern-Noise Map Reconstruction in Source Camera Identification for Size-Reduced Images

    Joji WATANABE  Tadaaki HOSAKA  Takayuki HAMAMOTO  

     
    LETTER-Pattern Recognition

      Vol:
    E96-D No:8
      Page(s):
    1882-1885

    For source camera identification, we propose a method to reconstruct the sensor pattern noise map from a size-reduced query image by minimizing an objective function derived from the observation model. Our method can be applied to multiple queries, and can thus be further improved. Experiments demonstrate the superiority of the proposed method over conventional interpolation-based magnification algorithms.

  • Architecture of an Asynchronous FPGA for Handshake-Component-Based Design

    Yoshiya KOMATSU  Masanori HARIYAMA  Michitaka KAMEYAMA  

     
    PAPER-Architecture

      Vol:
    E96-D No:8
      Page(s):
    1632-1644

    This paper presents a novel architecture of an asynchronous FPGA for handshake-component-based design. The handshake-component-based design is suitable for large-scale, complex asynchronous circuit because of its understandability. This paper proposes an area-efficient architecture of an FPGA that is suitable for handshake-component-based asynchronous circuit. Moreover, the Four-Phase Dual-Rail encoding is employed to construct circuits robust to delay variation because the data paths are programmable in FPGA. The FPGA based on the proposed architecture is implemented in a 65 nm process. Its evaluation results show that the proposed FPGA can implement handshake components efficiently.

  • An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding

    Yuta KOSHIMIZU  Eiji OKAMOTO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:8
      Page(s):
    2119-2130

    In this paper, we propose an efficient channel estimation scheme in bi-directional wireless orthogonal frequency division multiplexing (OFDM) relay systems applying analog network coding (ANC). In the relay systems applying ANC, channel separation is needed to estimate each of the bi-directional channels simultaneously from the combined received signal. In the conventional channel estimation schemes, relatively higher-ratio pilots are needed to obtain accurate channels. In contrast, we propose a channel estimation scheme with sparse pilots, while maintaining high accuracy for channel estimation. In the proposed scheme, Walsh codes are inserted as the pilot symbols at both end nodes, and the individual channels are obtained by correlation processing from the combined signals. The improved bit error rate (BER) and throughput performances of the proposed scheme are shown through computer simulations.

  • Comparative Study on Required Bit Depth of Gamma Quantization for Digital Cinema Using Contrast and Color Difference Sensitivities

    Junji SUZUKI  Isao FURUKAWA  

     
    PAPER-Image

      Vol:
    E96-A No:8
      Page(s):
    1759-1767

    A specification for digital cinema systems which deal with movies digitally from production to delivery as well as projection on the screens is recommended by DCI (Digital Cinema Initiative), and the systems based on this specification have already been developed and installed in theaters. The parameters of the systems that play an important role in determining image quality include image resolution, quantization bit depth, color space, gamma characteristics, and data compression methods. This paper comparatively discusses a relation between required bit depth and gamma quantization using both of a human visual system for grayscale images and two color difference models for color images. The required bit depth obtained from a contrast sensitivity function against grayscale images monotonically decreases as the gamma value increases, while it has a minimum value when the gamma is 2.9 to 3.0 from both of the CIE 1976 L* a* b* and CIEDE2000 color difference models. It is also shown that the bit depth derived from the contrast sensitivity function is one bit greater than that derived from the color difference models at the gamma value of 2.6. Moreover, a comparison between the color differences computed with the CIE 1976 L* a* b* and CIEDE2000 leads to a same result from the view point of the required bit depth for digital cinema systems.

  • Stochastic Asymptotic Stabilizers for Deterministic Input-Affine Systems Based on Stochastic Control Lyapunov Functions

    Yuki NISHIMURA  Kanya TANAKA  Yuji WAKASA  Yuh YAMASHITA  

     
    PAPER-Systems and Control

      Vol:
    E96-A No:8
      Page(s):
    1695-1702

    In this paper, a stochastic asymptotic stabilization method is proposed for deterministic input-affine control systems, which are randomized by including Gaussian white noises in control inputs. The sufficient condition is derived for the diffusion coefficients so that there exist stochastic control Lyapunov functions for the systems. To illustrate the usefulness of the sufficient condition, the authors propose the stochastic continuous feedback law, which makes the origin of the Brockett integrator become globally asymptotically stable in probability.

  • Dynamic Fault Tree Analysis for Systems with Nonexponential Failure Components

    Tetsushi YUGE  Shigeru YANAGI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E96-A No:8
      Page(s):
    1730-1736

    A method of calculating the top event probability of a fault tree, where dynamic gates and repeated events are included and the occurrences of basic events follow nonexponential distributions, is proposed. The method is on the basis of the Bayesian network formulation for a DFT proposed by Yuge and Yanagi [1]. The formulation had a difficulty in calculating a sequence probability if components have nonexponential failure distributions. We propose an alternative method to obtain the sequence probability in this paper. First, a method in the case of the Erlang distribution is discussed. Then, Tijms's fitting procedure is applied to deal with a general distribution. The procedure gives a mixture of two Erlang distributions as an approximate distribution for a general distribution given the mean and standard deviation. A numerical example shows that our method works well for complex systems.

  • Bit-Plane Coding of Lattice Codevectors

    Wisarn PATCHOO  Thomas R. FISCHER  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:8
      Page(s):
    1817-1820

    In a sign-magnitude representation of binary lattice codevectors, only a few least significant bit-planes are constrained due to the structure of the lattice, while there is no restriction on other more significant bit-planes. Hence, any convenient bit-plane coding method can be used to encode the lattice codevectors, with modification required only for the lattice-defining, least-significant bit-planes. Simple encoding methods for the lattice-defining bit-planes of the D4, RE8, and Barnes-Wall 16-dimensional lattices are described. Simulation results for the encoding of a uniform source show that standard bit-plane coding together with the proposed encoding provide about the same performance as integer lattice vector quantization when the bit-stream is truncated. When the entire bit-stream is fully decoded, the granular gain of the lattice is realized.

  • Ray-Model-Based Routing for Underwater Acoustic Sensor Networks Accounting for Anisotropic Sound Propagation

    Ping WANG  Lin ZHANG  Victor O.K. LI  

     
    PAPER-Network

      Vol:
    E96-B No:8
      Page(s):
    2060-2068

    In classical routing protocols, geographical distances/locations are typically used as the metric to select the best route, under the assumption that shorter distances exhibit lower energy consumption and nodes within the communication range of the sender can receive packets with a certain success probability. However, in underwater acoustic sensor networks (UASNs), sound propagation in the ocean medium is more complex than that in the air due to many factors, including sound speed variations and the interaction of sound waves with the sea surface and floor, causing the sound rays to bend. Therefore, propagation of sound is anisotropic in water, and may cause a phenomenon called shadow zone where nodes in the communication range of the sender cannot hear any signal. This renders conventional routing protocols no longer energy-efficient. In this paper, we make use of the ray-model to account for the environment-dependent behavior of the underwater channel, re-define nodes' one-hop neighbors based on signal attenuation rather than geographical distance, and design a distributed energy-efficient routing protocol for UASNs. Results show that our ray-model-based routing policy consistently outperforms the shortest path policy, and performs very close to the optimal one in several scenarios.

  • Selective Check of Data-Path for Effective Fault Tolerance

    Tanvir AHMED  Jun YAO  Yuko HARA-AZUMI  Shigeru YAMASHITA  Yasuhiko NAKASHIMA  

     
    PAPER-Design Methodology

      Vol:
    E96-D No:8
      Page(s):
    1592-1601

    Nowadays, fault tolerance has been playing a progressively important role in covering increasing soft/hard error rates in electronic devices that accompany the advances of process technologies. Research shows that wear-out faults have a gradual onset, starting with a timing fault and then eventually leading to a permanent fault. Error detection is thus a required function to maintain execution correctness. Currently, however, many highly dependable methods to cover permanent faults are commonly over-designed by using very frequent checking, due to lack of awareness of the fault possibility in circuits used for the pending executions. In this research, to address the over-checking problem, we introduce a metric for permanent defects, as operation defective probability (ODP), to quantitatively instruct the check operations being placed only at critical positions. By using this selective checking approach, we can achieve a near-100% dependability by having about 53% less check operations, as compared to the ideal reliable method, which performs exhaustive checks to guarantee a zero-error propagation. By this means, we are able to reduce 21.7% power consumption by avoiding the non-critical checking inside the over-designed approach.

  • Synthesis of Configuration Change Procedure Using Model Finder

    Shinji KIKUCHI  Satoshi TSUCHIYA  Kunihiko HIRAISHI  

     
    PAPER-Software System

      Vol:
    E96-D No:8
      Page(s):
    1696-1706

    Managing the configurations of complex systems consisting of various components requires the combined efforts by multiple domain experts. These experts have extensive knowledge about different components in the system they need to manage but little understanding of the issues outside their individual areas of expertise. As a result, the configuration constraints, changes, and procedures specified by those involved in the management of a complex system are often interrelated with one another without being noticed, and their integration into a coherent procedure for configuration represents a major challenge. The method of synthesizing the configuration procedure introduced in this paper addresses this challenge using a combination of formal specification and model finding techniques. We express the knowledge on system management with this method, which is provided by domain experts as first-order logic formulas in the Alloy specification language, and combine it with system-configuration information and the resulting specification. We then employ the Alloy Analyzer to find a system model that satisfies all the formulas in this specification. The model obtained corresponds to a procedure for system configurations that satisfies all expert-specified constraints. In order to reduce the resources needed in the procedure synthesis, we reduce the length of procedures to be synthesized by defining and using intermediate goal states to divide operation procedures into shorter steps. Finally, we evaluate our method through a case study on a procedure to consolidate virtual machines.

  • Efficient Large-Scale Video Retrieval via Discriminative Signatures

    Pengyi HAO  Sei-ichiro KAMATA  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E96-D No:8
      Page(s):
    1800-1810

    The topic of retrieving videos containing a desired person from a dataset just using the content of faces without any help of textual information has many interesting applications like video surveillance, social network, video mining, etc. However, traditional face matching against a huge number of detected faces leads to an unacceptable response time and may also reduce the accuracy due to the large variations in facial expressions, poses, lighting, etc. Therefore, in this paper we propose a novel method to generate discriminative “signatures” for efficiently retrieving the videos containing the same person with a query. In this research, the signature is defined as a compact, discriminative and reduced dimensionality representation, which is generated from a set of high-dimensional feature vectors of an individual. The desired videos are retrieved based on the similarities between the signature of the query and those of individuals in the database. In particular, we make the following contributions. Firstly, we give an algorithm of two directional linear discriminant analysis with maximum correntropy criterion (2DLDA-MCC) as an extension to our recently proposed maximum correntropy criterion based linear discriminant analysis (LDA-MCC). Both algorithms are robust to outliers and noise. Secondly, we present an approach for transferring a set of exemplars to a fixed-length signature using LDA-MCC and 2DLDA-MCC, resulting in two kinds of signatures that are called 1D signature and 2D signature. Finally, a novel video retrieval scheme is given based on the signatures, which has low storage requirement and can achieve a fast search. Evaluations on a large dataset of videos show reliable measurement of similarities by using the proposed signatures to represent the identities generated from videos. Experimental results also demonstrate that the proposed video retrieval scheme has the potential to substantially reduce the response time and slightly increase the mean average precision of retrieval.

10941-10960hit(42807hit)