The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

12521-12540hit(42807hit)

  • A Statistical Model-Based Speech Enhancement Using Acoustic Noise Classification for Robust Speech Communication

    Jae-Hun CHOI  Joon-Hyuk CHANG  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E95-B No:7
      Page(s):
    2513-2516

    In this paper, we present a speech enhancement technique based on the ambient noise classification that incorporates the Gaussian mixture model (GMM). The principal parameters of the statistical model-based speech enhancement algorithm such as the weighting parameter in the decision-directed (DD) method and the long-term smoothing parameter of the noise estimation, are set according to the classified context to ensure best performance under each noise. For real-time context awareness, the noise classification is performed on a frame-by-frame basis using the GMM with the soft decision framework. The speech absence probability (SAP) is used in detecting the speech absence periods and updating the likelihood of the GMM.

  • A 0.5-V, 0.05-to-3.2 GHz LC-Based Clock Generator for Substituting Ring Oscillators under Low-Voltage Condition

    Wei DENG  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER-Electronic Circuits

      Vol:
    E95-C No:7
      Page(s):
    1285-1296

    This paper investigates a clock frequency generator for ultra-low-voltage sub-picosecond-jitter clock generation in future 0.5-V LSI and power aware LSI. To address the potential possible solution for ultra-low-voltage applications, a 0.5 V clock frequency generator is proposed and implemented. Significant performances, in terms of sub 1-ps jitter, 50 MHz-to-6.4 GHz frequency tuning range with 2 bands and sub 1-mW PDC, demonstrated the viable replacement of ring oscillators in low-voltage and low-jitter clock generator.

  • Efficient Graph Sequence Mining Using Reverse Search

    Akihiro INOKUCHI  Hiroaki IKUTA  Takashi WASHIO  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:7
      Page(s):
    1947-1958

    The mining of frequent subgraphs from labeled graph data has been studied extensively. Furthermore, much attention has recently been paid to frequent pattern mining from graph sequences. A method, called GTRACE, has been proposed to mine frequent patterns from graph sequences under the assumption that changes in graphs are gradual. Although GTRACE mines the frequent patterns efficiently, it still needs substantial computation time to mine the patterns from graph sequences containing large graphs and long sequences. In this paper, we propose a new version of GTRACE that permits efficient mining of frequent patterns based on the principle of a reverse search. The underlying concept of the reverse search is a general scheme for designing efficient algorithms for hard enumeration problems. Our performance study shows that the proposed method is efficient and scalable for mining both long and large graph sequence patterns and is several orders of magnitude faster than the original GTRACE.

  • Atom-Role-Based Access Control Model

    Weihong CAI  Richeng HUANG  Xiaoli HOU  Gang WEI  Shui XIAO  Yindong CHEN  

     
    PAPER-Information Network

      Vol:
    E95-D No:7
      Page(s):
    1908-1917

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  • Identification Schemes from Key Encapsulation Mechanisms

    Hiroaki ANADA  Seiko ARITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:7
      Page(s):
    1136-1155

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  • Group Secret Key Agreement Based on Radio Propagation Characteristics in Wireless Relaying Systems

    Takayuki SHIMIZU  Hisato IWAI  Hideichi SASAOKA  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:7
      Page(s):
    2266-2277

    We consider secret key agreement for multiple terminals based on radio propagation characteristics in a wireless relaying system where more than two terminals communicate with each other via a relay. In this system, the multiple terminals share a common secret key generated from their radio propagation characteristics with the help of the relay in the presence of an eavesdropper. In this paper, we present three secret key agreement schemes: an amplify-and-forward (AF) scheme, a signal-combining amplify-and-forward (SC-AF) scheme, and a multiple-access amplify-and-forward (MA-AF) scheme. The key idea of these schemes is that each terminal shares the fading coefficients between all terminals and the relay, and use them as the source of a secret key. The AF scheme is based on a conventional amplify-and-forward two-way relaying method, whereas in the SC-AF scheme and the MA-AF scheme, we apply the idea of analog network coding to secret key agreement. We analyze eavesdropping strategies and show that the AF scheme is not secure if the eavesdropper is located near the relay and can receive signals from the relay without multipath fading and noise. Simulation results show that the SC-AF and MA-AF schemes are effective.

  • Route Determination Method for Fast Network Restoration in Functionally Distributed Transport Networking

    Kouji SUGISONO  Hirofumi YAMAZAKI  Hideaki IWATA  Atsushi HIRAMATSU  

     
    PAPER-Network

      Vol:
    E95-B No:7
      Page(s):
    2315-2322

    A packet network architecture called “functionally distributed transport networking” is being studied, where control elements (CEs) are separated from the forwarding elements (FEs) of all routers in a network, and a centralized CE manages the control functions for all FEs. A crucial issue to be addressed in this network architecture is the occurrence of bottlenecks in the CE performance, and rapid network restoration after failures is the main problem to be solved. Thus, we propose here a fast backup route determination method suitable for this network architecture, and we also show the practicality of this architecture. Most failures can be categorized as single-node or single-link failures. The proposed method prepares backup routes for all possible single-node failures in advance and computes backup routes for single-link failures after the failure occurs. The number of possible single-node failures is much less than that of possible single-link failures, and the preparation of backup routes for single-node failures is practical under the memory requirements. Two techniques are used in computing backup routes for single-link failures in order to reduce the computation time. One is to calculate only the routes affected by the link failure. The other is to use an algorithm to compute backup routes for single-link failures based on preplanned backup routes for single-node failures. To demonstrate the practicality of our method, we evaluated the amount of memory and computation time needed to prepare backup routes for all single-node failures, and we carried out simulations with various network topologies to evaluate the route computation time required for a single-link failure.

  • Amplify-and-Forward Relay Filter Design with MIMO System for Two-Way Relay Channels

    Jeehwan NOH  Chungyong LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:7
      Page(s):
    2442-2445

    This letter considers a two-way relaying network where two nodes exchange their information based on the principle of physical layer network coding (PNC). We study the amplify-and-forward (AF) relay filter design with multiple-input multiple-output (MIMO) system. In order to maximize the sum-rate for information exchange, we propose a relay filter for two-way relaying network. Simulation results show that the proposed scheme performs better than the conventional schemes for two-way relay channel.

  • MU-MIMO Precoding Methods for Reducing the Transmit Normalization Factor by Perturbing Data of the Codebook

    Hyunwook YANG  Seungwon CHOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:7
      Page(s):
    2405-2413

    In this paper, we present an algorithm for reducing the transmit normalization factor by perturbing the transmit signal in a Multi-User Multiple Input Multiple Output (MU-MIMO) system which uses the channel inverse matrix as its precoding matrix. A base station must normalize unnormalized transmit signals due to the limitation of the constant transmit power. This paper defines the norm of the unnormalized transmit signal as the transmit normalization factor used to normalize the transmit signal. Recalling that the transmit normalization factor consists of a combination of the singular values from the channel inverse matrix, we provide a codebook that successively reduces the coefficients of these singular values. Through computer simulations, the proposed algorithm is compared to sphere encoding in terms of the Bit Error Rate (BER) and the outage probability in a MU-MIMO signal environment. Sphere encoding is known to be an optimal solution amongst the perturbation methods that reduce the transmit normalization factor [1]. This work demonstrates that the proposed algorithm is has very good performance, comparable to that of sphere encoding, while its computational load is nearly 200 times less. Since the codebook in our algorithm depends only on the given channel, the difference in the computational complexity becomes even greater when the channel state is not changed, because the codebook can be reused. Furthermore, the codebook exhibits the characteristic of robustness to the maximum Doppler shift.

  • Accurate Image Expansion Method Using Range Points Based Ellipse Fitting for UWB Imaging Radar

    Yoriaki ABE  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    PAPER-Sensing

      Vol:
    E95-B No:7
      Page(s):
    2424-2432

    Ultra-wideband (UWB) pulse radars have a definite advantage in high-range resolution imaging, and are suitable for short-range measurements, particularly at disaster sites or security scenes where optical sensors are rarely suitable because of dust or strong backlighting. Although we have already proposed an accurate imaging algorithm called Range Points Migration (RPM), its reconstructible area is too small to identify the shape of an object if it is far from the radar and the size of the aperture is inadequate. To resolve this problem, this paper proposes a novel image expansion method based on ellipse extrapolation; it enhances extrapolation accuracy by deriving direct estimates of the observed range points distributed in the data space. Numerical validation shows that the proposed method accurately extrapolates part of the target boundary, even if an extremely small region of the target boundary is obtained by RPM.

  • An Architecture and a MAC Protocol for Throughput Improvement in Light Trail Networks

    Wenjie CHEN  Yukinobu FUKUSHIMA  Tokumi YOKOHIRA  

     
    PAPER-Network

      Vol:
    E95-B No:7
      Page(s):
    2330-2343

    Light trail architecture is attracting attention as a new optical wavelength-division multiplexing network architecture that can be built with currently available devices and can achieve bandwidth allocation with granularity finer than a wavelength. Because a light trail is a shared medium, we need a medium access control (MAC) protocol to prevent collisions. Although MAC protocols using token passing can prevent collisions, the bandwidths of links that are located upstream of the token holding node are kept idle. We first propose a dynamic light trail splitting method for increasing throughput of a light trail by using such idle bandwidths. Our method splits a trail into upstream and downstream trails at the token holding node, and independent data transmission on the two trails are permitted. As a result, we expect that the split trail architecture will achieve higher throughput than the original non-split trail architecture. The degree of performance improvement with the split trail architecture depends on how appropriately we determine the upstream and downstream token holding times of every transmission node. Thus, we formulate a problem in which we optimize the token holding times to accommodate requested traffic volume as a linear programming problem. We then derive the throughput of the split trail architecture by solving the problem using the NUOPT solver and investigate the degree of improvement over the original architecture. In addition, we evaluate the end-to-end delay of the split trail architecture by simulation. According to numerical examples, the split trail architecture achieves 1) almost the same throughput as the original one for the worst-case traffic pattern where every transmission node sends data to the terminating node of the trail only, 2) about 1.6 times higher throughput for a uniform traffic pattern where every node pair requests the same traffic volume and an extremely unbalanced traffic pattern where only a few node pairs request huge traffic volume, 3) about 1.9 time higher throughput for the split trail architecture's good-case traffic pattern where every transmission node sends data to its adjacent downstream node only, and 4) the end-to-end delay enough to satisfy any application's QoS requirement according to ITU-T Recommendation Y.1541.

  • Reduction in Mutual Coupling Characteristics of Slot-Coupled Planar Antenna due to Rectangular Elements

    Huiling JIANG  Ryo YAMAGUCHI  Keizo CHO  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:7
      Page(s):
    2368-2376

    High frequency bands such as the 3-GHz band have received much attention as frequency resources for broadband mobile communication systems. Radio Frequency (RF) integrated antennas are considered to be useful as base station antennas in decreasing the feeding loss that is otherwise inevitable in high frequency bands and they ensure sufficient power for broadband transmission. One problem in actualizing RF integrated antennas is miniaturizing the duplexer, which is generally large, among the RF circuitry components. To downsize the duplexer, we consider separately locating the transmitter (Tx) and receiver (Rx) antennas. To suppress further the mutual coupling between the Tx and Rx antennas, we investigate a filter integrated antenna configuration. In this paper, we consider an aperture coupled patch antenna as the base antenna configuration and propose a new filter integrated antenna that comprises multiple rectangular elements installed between the coupling slot and radiation element of the Rx antenna. The simulation and measurement results confirm that the new antenna reduces the mutual coupling in the transmission frequency band up to 5.7 dB compared to the conventional slot coupled patch antenna configuration.

  • Asymptotic Performance Analysis of STBCs from Coordinate Interleaved Orthogonal Designs in Shadowed Rayleigh Fading Channels

    Chanho YOON  Hoojin LEE  Joonhyuk KANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:7
      Page(s):
    2501-2504

    In this letter, we provide an asymptotic error rate performance evaluation of space-time block codes from coordinate interleaved orthogonal designs (STBCs-CIODs), especially in shadowed Rayleigh fading channels. By evaluating a simplified probability density function (PDF) of Rayleigh and Rayleigh-lognormal channels affecting the STBC-CIOD system, we derive an accurate closed-form approximation for the tight upper and lower bounds on the symbol error rate (SER). We show that shadowing asymptotically affects coding gain only, and conclude that an increase in diversity order under shadowing causes slower convergence to asymptotic bound due to the relatively larger loss of coding gain. By comparing the derived formulas and Monte-Carlo simulations, we validate the accuracy of the theoretical results.

  • Energy-Efficient Boundary Monitoring for Large-Scale Continuous Objects

    Seung-Woo HONG  Euisin LEE  Ho-Yong RYU  Sang-Ha KIM  

     
    LETTER-Network

      Vol:
    E95-B No:7
      Page(s):
    2451-2454

    For monitoring of a large-scale continuous object, a large number of sensor nodes might be participated with object detection and tracking. In order to reduce huge quantities of data from the sensor nodes, previous studies focus on representative selection for data reporting to a sink. However, they simply choose representatives among a large number of candidates without consideration of node deployment environments and detection accuracy. Hence, this letter proposes a novel object tracking scheme that first makes a small set of candidates and then chooses a small number of representatives in the set. Also, since the scheme also considers object alteration for representative selection, it can provide high energy-efficiency despite reducing data reporting.

  • Security Condition for Exact Localization in Wireless Ad Hoc Networks

    Jin Seok KIM  Dae Hyun YUM  Sung Je HONG  Jong KIM  Pil Joong LEE  

     
    LETTER-Network

      Vol:
    E95-B No:7
      Page(s):
    2459-2462

    As deployment of wireless ad hoc networks for location-based services increases, accurate localization of mobile nodes is becoming more important. Localization of a mobile node is achieved by estimating its distances from a group of anchor nodes. If some anchors are malicious and colluding, localization accuracy cannot be guaranteed. In this article, we present the security conditions for exact localization in the presence of colluding malicious anchors. We first derive the minimum number of truthful anchors that are required for exact localization in 2-D Euclidean space where some anchors may be collinear. Second, we extend our security condition to 3-D localization where some anchors may be coplanar.

  • Design of Multilayer Dual-Band BPF and Diplexer with Zeros Implantation Using Suspended Stripline

    Min-Hua HO  Wei-Hong HSU  

     
    PAPER

      Vol:
    E95-C No:7
      Page(s):
    1195-1202

    In this paper, a dual-band bandpass filter (BPF) of multilayer suspended stripline (SSL) structure and an SSL diplexer composed of a low-pass filter (LPF) and a high-pass filter (HPF) are proposed. Bandstop structure creating transmission zeros is adopted in the BPF and diplexer, enhancing the signal selectivity of the former and increasing the isolation between the diverting ports of the latter. The dual-band BPF possesses two distinct bandpass structures and a bandstop circuit, all laid on different metallic layers. The metallic layers together with the supporting substrates are vertically stacked up to save the circuit dimension. The LPF and HPF used in the diplexer structure are designed by a quasi-lumped approach, which the LC lumped-elements circuit models are developed to analyze filters' characteristics and to emulate their frequency responses. Half-wavelength resonating slots are employed in the diplexer's structure to increase the isolation between its two signal diverting ports. Experiments are conducted to verify the multilayer dual-band BPF and the diplexer design. Agreements are observed between the simulation and the measurement.

  • Resonant-Mode Characteristics of a New Three-Mode Hybrid Microstrip/Slotline Resonator and Novel Realization of Compact Bandpass Filter with Four Transmission Zeros

    Masataka OHIRA  Zhewang MA  

     
    PAPER

      Vol:
    E95-C No:7
      Page(s):
    1203-1210

    This paper proposes a new three-mode resonator, which consists of a parallel-coupled microstrip line resonator embedded with a slotline resonator, and develops a compact low-loss bandpass filter (BPF) with a sharp roll-off response because of four transmission zeros (TZ) located very near the passband. Resonance mechanism and properties of the three modes are first analyzed by using an eigen-mode analysis, and then an equivalent circuit model is established for expressing a novel coupling scheme of the developed BPF. It is made clear from the results of circuit analysis that the four TZs are produced because of multiple paths between the input/output stub lines formed by the three resonant modes and the direct source/load coupling. The validity of the proposed resonator and filter is supported by the comparison between simulated and measured results.

  • Discovery of Predicate-Oriented Relations among Named Entities Extracted from Thai Texts

    Nattapong TONGTEP  Thanaruk THEERAMUNKONG  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:7
      Page(s):
    1932-1946

    Extracting named entities (NEs) and their relations is more difficult in Thai than in other languages due to several Thai specific characteristics, including no explicit boundaries for words, phrases and sentences; few case markers and modifier clues; high ambiguity in compound words and serial verbs; and flexible word orders. Unlike most previous works which focused on NE relations of specific actions, such as work_for, live_in, located_in, and kill, this paper proposes more general types of NE relations, called predicate-oriented relation (PoR), where an extracted action part (verb) is used as a core component to associate related named entities extracted from Thai Texts. Lacking a practical parser for the Thai language, we present three types of surface features, i.e. punctuation marks (such as token spaces), entity types and the number of entities and then apply five alternative commonly used learning schemes to investigate their performance on predicate-oriented relation extraction. The experimental results show that our approach achieves the F-measure of 97.76%, 99.19%, 95.00% and 93.50% on four different types of predicate-oriented relation (action-location, location-action, action-person and person-action) in crime-related news documents using a data set of 1,736 entity pairs. The effects of NE extraction techniques, feature sets and class unbalance on the performance of relation extraction are explored.

  • Training Convergence in Range-Based Cooperative Positioning with Stochastic Positional Knowledge

    Ziming HE  Yi MA  Rahim TAFAZOLLI  

     
    LETTER-Information Theory

      Vol:
    E95-A No:7
      Page(s):
    1200-1204

    This letter investigates the training convergence in range-based cooperative positioning with stochastic positional knowledge. Firstly, a closed-form of squared position-error bound (SPEB) is derived with error-free ranging. Using the derived closed-form, it is proved that the SPEB reaches its minimum when at least 2 out of N (> 2) agents send training sequences. Finally, numerical results are provided to elaborate the theoretical analysis with zero-mean Gaussian ranging errors.

  • NRD Guide Excited Millimeter Wave Narrow Bandpass Filter Using Sapphire Disk Resonators

    Takashi SHIMIZU  Yoshinori KOGAMI  

     
    BRIEF PAPER

      Vol:
    E95-C No:7
      Page(s):
    1226-1230

    Recent years, millimeter wave applications for wireless communication have attracted much attention and expected. We focused on an NRD guide and sapphire which have the excellent low loss characteristics in millimeter wave region. In this paper, an NRD guide excited sapphire disk resonator and millimeter wave bandpass filter with narrow bandwidth using proposed resonators were designed and fabricated. As a result, it was realized that the 3-pole bandpass filter with center frequency 58.64 GHz and 3 dB bandwidth 273 MHz. Moreover, its insertion loss was found to be about 1.5 dB.

12521-12540hit(42807hit)