The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AF(873hit)

161-180hit(873hit)

  • Maximum Likelihood Demodulators and Their Evaluations on Amplify-and-Forward Cooperative OFDM-Based Wireless LAN Systems

    Hayato FUKUZONO  Yusuke ASAI  Riichi KUDO  Koichi ISHIHARA  Masato MIZOGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:11
      Page(s):
    2435-2448

    In this paper, we propose demodulators for the Golden and Alamouti codes in amplify-and-forward (AF) cooperative communication with one relay. The proposed demodulators output exact log likelihood ratios (LLRs) with recursion based on the Jacobian logarithm. The cooperative system with the proposed demodulator for the Golden code has the benefit of efficient data transmission, while the system for the Alamouti code has low demodulation complexity. Quantitative analyses of computational complexity of the proposed demodulators are conducted. The transmission performance for various relay location and power settings is evaluated on cooperative orthogonal frequency division multiplexing (OFDM)-based wireless local area network (LAN) systems. In evaluations, the optimal relay location and power settings are found. The cooperative system with the proposed demodulators for the Golden and Alamouti codes offers 1.5 and 1.9 times larger areas where 10.8 and 5.4Mbit/s can be obtained than a non-cooperative (direct) system in a typical office environment, respectively.

  • A Lightweight Software Model for Signature-Based Application-Level Traffic Classification System

    Jun-Sang PARK  Sung-Ho YOON  Youngjoon WON  Myung-Sup KIM  

     
    PAPER-Information Network

      Vol:
    E97-D No:10
      Page(s):
    2697-2705

    Internet traffic classification is an essential step for stable service provision. The payload signature classifier is considered a reliable method for Internet traffic classification but is prohibitively computationally expensive for real-time handling of large amounts of traffic on high-speed networks. In this paper, we describe several design techniques to minimize the search space of traffic classification and improve the processing speed of the payload signature classifier. Our suggestions are (1) selective matching algorithms based on signature type, (2) signature reorganization using hierarchical structure and traffic locality, and (3) early packet sampling in flow. Each can be applied individually, or in any combination in sequence. The feasibility of our selections is proved via experimental evaluation on traffic traces of our campus and a commercial ISP. We observe 2 to 5 times improvement in processing speed against the untuned classification system and Snort Engine, while maintaining the same level of accuracy.

  • Discriminative Reference-Based Scene Image Categorization

    Qun LI  Ding XU  Le AN  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/07/22
      Vol:
    E97-D No:10
      Page(s):
    2823-2826

    A discriminative reference-based method for scene image categorization is presented in this letter. Reference-based image classification approach combined with K-SVD is approved to be a simple, efficient, and effective method for scene image categorization. It learns a subspace as a means of randomly selecting a reference-set and uses it to represent images. A good reference-set should be both representative and discriminative. More specifically, the reference-set subspace should well span the data space while maintaining low redundancy. To automatically select reference images, we adapt affinity propagation algorithm based on data similarity to gather a reference-set that is both representative and discriminative. We apply the discriminative reference-based method to the task of scene categorization on some benchmark datasets. Extensive experiment results demonstrate that the proposed scene categorization method with selected reference set achieves better performance and higher efficiency compared to the state-of-the-art methods.

  • Vertical Handover Strategy for Multi-Layered Real-Time Video Traffics

    Hyun-Ho CHOI  Hyunggon PARK  Jung-Ryun LEE  

     
    LETTER-Information Network

      Vol:
    E97-D No:10
      Page(s):
    2802-2805

    In this letter, we present a new method of alleviating the deterioration in the quality of real-time video service during vertical handover (VHO). The proposed method stochastically delays the starting time of the service disruption of VHO in order to reduce the number of lost frames caused by the inter-frame dependency of multi-layered video traffic. The results show that the proposed method significantly decreases the average frame loss time at the sacrifice of an increased handover execution time by one half of the group of picture (GOP) interval of the video traffic.

  • Efficient Algorithm for Tate Pairing of Composite Order

    Yutaro KIYOMURA  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:10
      Page(s):
    2055-2063

    Boneh et al. proposed the new idea of pairing-based cryptography by using the composite order group instead of prime order group. Recently, many cryptographic schemes using pairings of composite order group were proposed. Miller's algorithm is used to compute pairings, and the time of computing the pairings depends on the cost of calculating the Miller loop. As a method of speeding up calculations of the pairings of prime order, the number of iterations of the Miller loop can be reduced by choosing a prime order of low Hamming weight. However, it is difficult to choose a particular composite order that can speed up the pairings of composite order. Kobayashi et al. proposed an efficient algorithm for computing Miller's algorithm by using a window method, called Window Miller's algorithm. We can compute scalar multiplication of points on elliptic curves by using a window hybrid binary-ternary form (w-HBTF). In this paper, we propose a Miller's algorithm that uses w-HBTF to compute Tate pairing efficiently. This algorithm needs a precomputation both of the points on an elliptic curve and rational functions. The proposed algorithm was implemented in Java on a PC and compared with Window Miller's Algorithm in terms of the time and memory needed to make their precomputed tables. We used the supersingular elliptic curve y2=x3+x with embedding degree 2 and a composite order of size of 2048-bit. We denote w as window width. The proposed algorithm with w=6=2·3 was about 12.9% faster than Window Miller's Algorithm with w=2 although the memory size of these algorithms is the same. Moreover, the proposed algorithm with w=162=2·34 was about 12.2% faster than Window Miller's algorithm with w=7.

  • Power Saving Efficiency Analysis of QoS Scheduling in the LTE Network Featuring Discontinuous Reception Operation

    Yen-Wen CHEN  Meng-Hsien LIN  Yung-Ta SU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:10
      Page(s):
    2212-2221

    To lengthen the operational time of mobile devices, power must be managed effectively. To achieve this objective, a Discontinuous Reception (DRX) mechanism is proposed for use in the long-term evolution (LTE) network to enable user equipment (UE) to consume power efficiently. The DRX mechanism provides parameters related to base stations such as evolved Node B (eNB) to configure and manage the transition of UEs between idle (sleep) and active states. Although these parameters can be adjusted dynamically in cooperation with the traffic scheduler, a high signaling overhead and processing load might be introduced in practical deployment if the parameters are adjusted too frequently. In this study, to examine power-saving efficiency, distinct traffic types were scheduled that were constrained by various quality of service (QoS) factors without dynamically changing the DRX parameters. The concept of burst-based scheduling is proposed, based on considering the state transitions and channel conditions of each UE, to increase power-saving efficiency while concurrently satisfying the desired QoS. Both Hypertext Transfer Protocol (HTTP) and video-stream traffic models were exhaustively simulated to examine the performance of the proposed scheme and numerous scheduling alternatives were tested to compare the proposed scheme with other schemes. The simulation results indicate that video-streaming traffic is more sensitive to the scheduling schemes than HTTP traffic. The simulation results were further analyzed in terms of traffic scheduling and parameter adjustment and the analysis results can help design future studies on power management in the LTE network.

  • Fuzzy Multiple Subspace Fitting for Anomaly Detection

    Raissa RELATOR  Tsuyoshi KATO  Takuma TOMARU  Naoya OHTA  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:10
      Page(s):
    2730-2738

    Anomaly detection has several practical applications in different areas, including intrusion detection, image processing, and behavior analysis among others. Several approaches have been developed for this task such as detection by classification, nearest neighbor approach, and clustering. This paper proposes alternative clustering algorithms for the task of anomaly detection. By employing a weighted kernel extension of the least squares fitting of linear manifolds, we develop fuzzy clustering algorithms for kernel manifolds. Experimental results show that the proposed algorithms achieve promising performances compared to hard clustering techniques.

  • A Low-Complexity Complementary Pair Affine Projection Adaptive Filter

    Kwang-Hoon KIM  Young-Seok CHOI  Seong-Eun KIM  Woo-Jin SONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E97-A No:10
      Page(s):
    2074-2078

    We present a low-complexity complementary pair affine projection (CP-AP) adaptive filter which employs the intermittent update of the filter coefficients. To achieve both a fast convergence rate and a small residual error, we use a scheme combining fast and slow AP filters, while significantly reducing the computational complexity. By employing an evolutionary method which automatically determines the update intervals, the update frequencies of the two constituent filters are significantly decreased. Experimental results show that the proposed CP-AP adaptive filter has an advantage over conventional adaptive filters with a parallel structure in that it has a similar convergence performance with a substantial reduction in the total number of updates.

  • A Modified FTA Approach to Achieve Runtime Safety Analysis of Critical Systems

    Guoqi LI  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E97-A No:10
      Page(s):
    2083-2085

    Runtime analysis is to enhance the safety of critical systems by monitoring the change of corresponding external environments. In this paper, a modified FTA approach, making full utilization of the existing safety analysis result, is put forward to achieve runtime safety analysis. The procedures of the approach are given in detail. This approach could be widely used in safety engineering of critical systems.

  • A Dynamic Hyper-Heuristic Based on Scatter Search for the Aircraft Landing Scheduling Problem

    Wen SHI  Xueyan SONG  Jizhou SUN  

     
    LETTER-Intelligent Transport System

      Vol:
    E97-A No:10
      Page(s):
    2090-2094

    Aircraft Landing Scheduling (ALS) attempts to determine the landing time for each aircraft. The objective of ALS is to minimise the deviations of the landing time of each aircraft from its target landing time. In this paper, we propose a dynamic hyper-heuristic algorithm for the ALS problem. In our approach, the Scatter Search algorithm is chosen as the high level heuristic to build a chain of intensification and diversification priority rules, which are applied to generate the landing sequence by different priority rules, which are low level heuristics in the hyper-heuristic framework. The landing time for each aircraft can be calculated efficiently based on the landing sequence. Simulation studies demonstrate that the proposed algorithm can obtain high quality solutions for ALS.

  • On Achieving Capture Power Safety in At-Speed Scan-Based Logic BIST

    Akihiro TOMITA  Xiaoqing WEN  Yasuo SATO  Seiji KAJIHARA  Kohei MIYASE  Stefan HOLST  Patrick GIRARD  Mohammad TEHRANIPOOR  Laung-Terng WANG  

     
    PAPER-Dependable Computing

      Vol:
    E97-D No:10
      Page(s):
    2706-2718

    The applicability of at-speed scan-based logic built-in self-test (BIST) is being severely challenged by excessive capture power that may cause erroneous test responses even for good circuits. Different from conventional low-power BIST, this paper is the first to explicitly focus on achieving capture power safety with a novel and practical scheme, called capture-power-safe logic BIST (CPS-LBIST). The basic idea is to identify all possibly-erroneous test responses caused by excessive capture power and use the well-known approach of masking (bit-masking, slice-masking,vector-masking) to block them from reaching the multiple-input signature register(MISR). Experiments with large benchmark circuits and a large industrial circuit demonstrate that CPS-LBIST can achieve capture power safety with negligible impact on test quality and circuit overhead.

  • Traffic Pattern Based Data Recovery Scheme for Cyber-Physical Systems

    Naushin NOWER  Yasuo TAN  Azman Osman LIM  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:9
      Page(s):
    1926-1936

    Feedback data loss can severely degrade overall system performance. In addition, it can affect the control and computation of the Cyber-physical Systems (CPS). CPS hold enormous potential for a wide range of emerging applications that include different data traffic patterns. These data traffic patterns have wide varieties of diversities. To recover various traffic patterns we need to know the nature of their underlying property. In this paper, we propose a data recovery framework for different traffic patterns of CPS, which comprises data pre-processing step. In the proposed framework, we designed a Data Pattern Analyzer to classify the different patterns and built a model based on the pattern as a data pre-processing step. Inside the framework, we propose a data recovery scheme, called Efficient Temporal and Spatial Data Recovery (ETSDR) algorithm to recover the incomplete feedback for CPS to maintain real time control. In this algorithm, we utilize the temporal model based on the traffic pattern and consider the spatial correlation of the nearest neighbor sensors. Numerical results reveal that the proposed ETSDR outperforms both the weighted prediction (WP) and the exponentially weighted moving average (EWMA) algorithms regardless of the increment percentage of missing data in terms of the root mean square error, the mean absolute error, and the integral of absolute error.

  • Functional Safety Assessment of Safety-Related Systems with Non-perfect Proof-Tests

    Hitoshi MUTA  Yoshinobu SATO  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E97-A No:8
      Page(s):
    1739-1746

    The second edition of the international standard of IEC 61508, functional safety of electrical/electronic/programmable electronic safety-related system (SRS), was published in 2010. This international standard adopts a risk-based approach by which safety integrity requirements can be determined. It presents a formula to estimate the hazardous event rate taking account of non-perfect proof-tests. But it is not clear how to derive the formula. In the present paper, firstly, taking account of non-perfect proof-tests, the relationship between the dangerous undetected failure of SRS, the demand on the SRS and hazardous event is modeled by a fault tree and state-transition diagrams. Next, the hazardous event rate is formulated by use of the state-transition diagrams for the determination of the safety integrity requirements. Then, a comparison is made between the formulas obtained by this paper and given in the standard, and it is found that the latter does not always present rational formulation.

  • A Personality Model Based on NEO PI-R for Emotion Simulation

    Yi ZHANG  Ling LI  

     
    PAPER-Affective Computing

      Vol:
    E97-D No:8
      Page(s):
    2000-2007

    The last decade has witnessed an explosion of interest in research on human emotion modeling for generating intelligent virtual agents. This paper proposes a novel personality model based on the Revised NEO Personality Inventory (NEO PI-R). Compared to the popular Big-Five-Personality Factors (Big5) model, our proposed model is more capable than Big5 on describing a variety of personalities. Combining with emotion models it helps to produce more reasonable emotional reactions to external stimuli. A novel Resistant formulation is also proposed to effectively simulate the complicated negative emotions. Emotional reactions towards multiple stimuli are also effectively simulated with the proposed personality model.

  • Efficient Indoor Fingerprinting Localization Technique Using Regional Propagation Model

    Genming DING  Zhenhui TAN  Jinsong WU  Jinbao ZHANG  

     
    PAPER-Sensing

      Vol:
    E97-B No:8
      Page(s):
    1728-1741

    The increasing demand of indoor location based service (LBS) has promoted the development of localization techniques. As an important alternative, fingerprinting localization technique can achieve higher localization accuracy than traditional trilateration and triangulation algorithms. However, it is computational expensive to construct the fingerprint database in the offline phase, which limits its applications. In this paper, we propose an efficient indoor positioning system that uses a new empirical propagation model, called regional propagation model (RPM), which is based on the cluster based propagation model theory. The system first collects the sparse fingerprints at some certain reference points (RPs) in the whole testing scenario. Then affinity propagation clustering algorithm operates on the sparse fingerprints to automatically divide the whole scenario into several clusters or sub-regions. The parameters of RPM are obtained in the next step and are further used to recover the entire fingerprint database. Finally, the location estimation is obtained through the weighted k-nearest neighbor algorithm (WkNN) in the online localization phase. We also theoretically analyze the localization accuracy of the proposed algorithm. The numerical results demonstrate that the proposed propagation model can predict the received signal strength (RSS) values more accurately than other models. Furthermore, experiments also show that the proposed positioning system achieves higher localization accuracy than other existing systems while cutting workload of fingerprint calibration by more than 50% in the offline phase.

  • Performance Analysis of Multiuser Relay Networks with Feedback Delay

    Jie YANG  Xiaofei ZHANG  Kai YANG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:8
      Page(s):
    1770-1779

    In this paper, we analyze the performance of a dual-hop multiuser amplify-and-forward (AF) relay network with the effect of the feedback delay, where the source and each of the K destinations are equipped with Nt and Nr antennas respectively, and the relay is equipped with a single antenna. In the relay network, multi-antenna and multiuser diversities are guaranteed via beamforming and opportunistic scheduling, respectively. To examine the impact of delayed feedback, the new exact analytical expressions for the outage probability (OP) and symbol error rate (SER) are derived in closed-form over Rayleigh fading channel, which are useful for a large number of modulation schemes. In addition, we present the asymptotic expressions for OP and SER in the high signal-to-noise ratio (SNR) regime, from which we gain an insight into the system performance with deriving the diversity order and array gain. Moreover, based on the asymptotic expressions, we determine power allocation among the network nodes such that the OP is minimized. The analytical expressions are validated by Monte-Carlo simulations.

  • A Variable Step-Size Feedback Cancellation Algorithm Based on GSAP for Digital Hearing Aids

    Hongsub AN  Hyeonmin SHIM  Jangwoo KWON  Sangmin LEE  

     
    LETTER-Digital Signal Processing

      Vol:
    E97-A No:7
      Page(s):
    1615-1618

    Acoustic feedback is a major complaint of hearing aid users. Adaptive filters are a common method for suppressing acoustic feedback in digital hearing aids. In this letter, we propose a new variable step-size algorithm for normalized least mean square and an affine projection algorithm to combine with a variable step-size affine projection algorithm and global speech absence probability in an adaptive filter. The computer simulation used to test the proposed algorithm results in a lower misalignment error than the comparison algorithm at a similar convergence rate. Therefore, the proposed algorithm suggests an effective solution for the feedback suppression system of digital hearing aids.

  • Opportunistic Decouple-and-Forward Relaying: Harnessing Distributed Antennas

    Jaeyoung LEE  Hyundong SHIN  Jun HEO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:6
      Page(s):
    1148-1156

    In this paper, we consider decouple-and-forward (DCF) relaying, where the relay encodes and amplifies decoupled data using orthogonal space-time block codes (OSTBCs), to achieve the maximum diversity gain of multiple-input multiple-output (MIMO) amplify-and-forward (AF) relaying. Since the channel status of all antennas is generally unknown and time-varying for cooperation in multi-antenna multiple-relay systems, we investigate an opportunistic relaying scheme for DCF relaying to harness distributed antennas and minimize the cooperation overheads by not using the global channel state information (CSI). In addition, for realistic wireless channels which have spatial fading correlation due to closely-spaced antenna configurations and poor scattering environments, we analyze the exact and lower bound on the symbol error probability (SEP) of the opportunistic DCF relaying over spatially correlated MIMO Rayleigh fading channels. Numerical results show that, even in the presence of spatial fading correlation, the proposed opportunistic relaying scheme is efficient and achieves additional performance gain with low overhead.

  • Fingerprint Verification and Identification Based on Local Geometric Invariants Constructed from Minutiae Points and Augmented with Global Directional Filterbank Features

    Chuchart PINTAVIROOJ  Fernand S. COHEN  Woranut IAMPA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E97-D No:6
      Page(s):
    1599-1613

    This paper addresses the problems of fingerprint identification and verification when a query fingerprint is taken under conditions that differ from those under which the fingerprint of the same person stored in a database was constructed. This occurs when using a different fingerprint scanner with a different pressure, resulting in a fingerprint impression that is smeared and distorted in accordance with a geometric transformation (e.g., affine or even non-linear). Minutiae points on a query fingerprint are matched and aligned to those on one of the fingerprints in the database, using a set of absolute invariants constructed from the shape and/or size of minutiae triangles depending on the assumed map. Once the best candidate match is declared and the corresponding minutiae points are flagged, the query fingerprint image is warped against the candidate fingerprint image in accordance with the estimated warping map. An identification/verification cost function using a combination of distance map and global directional filterbank (DFB) features is then utilized to verify and identify a query fingerprint against candidate fingerprint(s). Performance of the algorithm yields an area of 0.99967 (perfect classification is a value of 1) under the receiver operating characteristic (ROC) curve based on a database consisting of a total of 1680 fingerprint images captured from 240 fingers. The average probability of error was found to be 0.713%. Our algorithm also yields the smallest false non-match rate (FNMR) for a comparable false match rate (FMR) when compared to the well-known technique of DFB features and triangulation-based matching integrated with modeling non-linear deformation. This work represents an advance in resolving the fingerprint identification problem beyond the state-of-the-art approaches in both performance and robustness.

  • TESLA Source Authentication Protocol Verification Experiment in the Timed OTS/CafeOBJ Method: Experiences and Lessons Learned

    Iakovos OURANOS  Kazuhiro OGATA  Petros STEFANEAS  

     
    PAPER-Formal Verification

      Vol:
    E97-D No:5
      Page(s):
    1160-1170

    In this paper we report on experiences gained and lessons learned by the use of the Timed OTS/CafeOBJ method in the formal verification of TESLA source authentication protocol. These experiences can be a useful guide for the users of the OTS/CafeOBJ, especially when dealing with such complex systems and protocols.

161-180hit(873hit)