The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ALG(2355hit)

901-920hit(2355hit)

  • 2-Dimensional Imaging of Human Bodies with UWB Radar Using Approximately Uniform Walking Motion along a Straight Line with the SEABED Algorithm

    Takuya SAKAMOTO  Toru SATO  

     
    PAPER-Sensing

      Vol:
    E91-B No:11
      Page(s):
    3695-3703

    UWB (Ultra Wide-Band) pulse radar is a promising candidate for surveillance systems designed to prevent crimes and terror-related activities. The high-speed SEABED (Shape Estimation Algorithm based on BST and Extraction of Directly scattered waves) imaging algorithm, is used in the application of UWB pulse radar in fields that require realtime operations. The SEABED algorithm assumes that omni-directional antennas are scanned to observe the scattered electric field in each location. However, for surveillance systems, antenna scanning is impractical because it restricts the setting places of the devices. In this paper, movement of a body is used to replace antenna scanning. The instantaneous velocity of any given motion is an unknown variable that changes as a function of time. A pair of antennas is used to analyze delay time to estimate the unknown motion. We propose a new algorithm to estimate the shape of a human body using data obtained from a human body passing stationary antennas.

  • Optimal Sensor Deployment for Wireless Surveillance Sensor Networks by a Hybrid Steady-State Genetic Algorithm

    Jae-Hyun SEO  Yong-Hyuk KIM  Hwang-Bin RYOU  Si-Ho CHA  Minho JO  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3534-3543

    An important objective of surveillance sensor networks is to effectively monitor the environment, and detect, localize, and classify targets of interest. The optimal sensor placement enables us to minimize manpower and time, to acquire accurate information on target situation and movement, and to rapidly change tactics in the dynamic field. Most of previous researches regarding the sensor deployment have been conducted without considering practical input factors. Thus in this paper, we apply more real-world input factors such as sensor capabilities, terrain features, target identification, and direction of target movements to the sensor placement problem. We propose a novel and efficient hybrid steady-state genetic algorithm giving low computational overhead as well as optimal sensor placement for enhancing surveillance capability to monitor and locate target vehicles. The proposed algorithm introduces new two-dimensional geographic crossover and mutation. By using a new simulator adopting the proposed genetic algorithm developed in this paper, we demonstrate successful applications to the wireless real-world surveillance sensor placement problem giving very high detection and classification rates, 97.5% and 87.4%, respectively.

  • Precise DOA Estimation Using SAGE Algorithm with a Cylindrical Array

    Masaki TAKANASHI  Toshihiko NISHIMURA  Yasutaka OGAWA  Takeo OHGANE  

     
    LETTER-Antennas and Propagation

      Vol:
    E91-B No:11
      Page(s):
    3784-3787

    A uniform circular array (UCA) is a well-known array configuration which can accomplish estimation of 360 field of view with identical accuracy. However, a UCA cannot estimate coherent signals because we cannot apply the SSP owing to the structure of UCA. Although a variety of studies on UCA in coherent multipath environments have been done, it is impossible to estimate the DOA of coherent signals with different incident polar angles. Then, we have proposed Root-MUSIC algorithm with a cylindrical array. However, the estimation performance is degraded when incident signals arrive with close polar angles. To solve this problem, in the letter, we propose to use SAGE algorithm with a cylindrical array. Here, we adopt a CLA Root-MUSIC for the initial estimation and decompose two-dimensional search to double one-dimensional search to reduce the calculation load. The results show that the proposal achieves high resolution with low complexity.

  • Design of an Area-Efficient and Low-Power NoC Architecture Using a Hybrid Network Topology

    Woo Joo KIM  Sun Young HWANG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E91-A No:11
      Page(s):
    3297-3303

    This paper proposes a novel hybrid NoC structure and a dynamic job distribution algorithm which can reduce system area and power consumption by reducing packet drop rate for various multimedia applications. The proposed NoC adopts different network structures between sub-clusters. Network structure is determined by profiling application program so that packet drop rate can be minimized. The proposed job distribution algorithm assigns every job to the sub-cluster where packet drop rate can be minimized for each multimedia application program. The proposed scheme targets multimedia applications frequently used in modern embedded systems, such as MPEG4 and MP3 decoders, GPS positioning systems, and OFDM demodulators. Experimental results show that packet drop rate was reduced by 31.6% on the average, when compared to complex network structure topologies consisting of sub-clusters of same topology. Chip area and power consumption were reduced by 16.0% and 34.0%, respectively.

  • Recursive Computation of Static Output Feedback Stochastic Nash Games for Weakly-Coupled Large-Scale Systems

    Muneomi SAGARA  Hiroaki MUKAIDANI  Toru YAMAMOTO  

     
    PAPER-Systems and Control

      Vol:
    E91-A No:10
      Page(s):
    3022-3029

    This paper discusses the infinite horizon static output feedback stochastic Nash games involving state-dependent noise in weakly coupled large-scale systems. In order to construct the strategy, the conditions for the existence of equilibria have been derived from the solutions of the sets of cross-coupled stochastic algebraic Riccati equations (CSAREs). After establishing the asymptotic structure along with the positive semidefiniteness for the solutions of CSAREs, recursive algorithm for solving CSAREs is derived. As a result, it is shown that the proposed algorithm attains the reduced-order computations and the reduction of the CPU time. As another important contribution, the uniqueness of the strategy set is proved for the sufficiently small parameter ε. Finally, in order to demonstrate the efficiency of the proposed algorithm, numerical example is given.

  • An Efficient Signature Matching Scheme for Mobile Security

    Ruhui ZHANG  Makoto IWATA  

     
    PAPER-Network Management/Operation

      Vol:
    E91-B No:10
      Page(s):
    3251-3261

    The development of network technology reveals the clear trend that mobile devices will soon be equipped with more and more network-based functions and services. This increase also results in more intrusions and attacks on mobile devices; therefore, mobile security mechanisms are becoming indispensable. In this paper, we propose a novel signature matching scheme for mobile security. This scheme not only emphasizes a small resource requirement and an optimal scan speed, which are both important for resource-limited mobile devices, but also focuses on practical features such as stable performance, fast signature set updates and hardware implementation. This scheme is based on the finite state machine (FSM) approach widely used for string matching. An SRAM-based two-level finite state machine (TFSM) solution is introduced to utilize the unbalanced transition distribution in the original FSM to decrease the memory requirement, and to shorten the critical path of the single-FSM solution. By adjusting the boundary of the two FSMs, optimum memory usage and throughput are obtainable. The hardware circuit of our scheme is designed and evaluated by both FPGA and ASIC technology. The result of FPGA evaluation shows that 2,168 unique patterns with a total of 32,776 characters are stored in 177.75 KB SelectRAM blocks of Xilinx XC4VLX40 FPGA and a 3.0 Gbps throughput is achieved. The result of ASIC evaluation with 180 nm-CMOS library shows a throughput of over 4.5 Gbps with 132 KB of SRAM. Because of the small amount of memory and logic cell requirements, as well as the scalability of our scheme, higher performance is achieved by instantiating several signature matching engines when more resources are provided.

  • Complexity Oscillations in Random Reals

    ChenGuang LIU  Kazuyuki TANAKA  

     
    LETTER-Complexity Theory

      Vol:
    E91-D No:10
      Page(s):
    2517-2518

    The C-oscillation due to Martin-Löf shows that {α| ∀ n [C(α n)≥ n-O(1)]=, which also follows {α| ∀ n [K(α n)≥ n+K(n)-O(1)]=. By generalizing them, we show that there does not exist a real α such that ∀ n (K(α n)≥ n+λ K(n)-O(1)) for any λ>0.

  • Arithmetic Circuit Verification Based on Symbolic Computer Algebra

    Yuki WATANABE  Naofumi HOMMA  Takafumi AOKI  Tatsuo HIGUCHI  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E91-A No:10
      Page(s):
    3038-3046

    This paper presents a formal approach to verify arithmetic circuits using symbolic computer algebra. Our method describes arithmetic circuits directly with high-level mathematical objects based on weighted number systems and arithmetic formulae. Such circuit description can be effectively verified by polynomial reduction techniques using Grobner Bases. In this paper, we describe how the symbolic computer algebra can be used to describe and verify arithmetic circuits. The advantageous effects of the proposed approach are demonstrated through experimental verification of some arithmetic circuits such as multiply-accumulator and FIR filter. The result shows that the proposed approach has a definite possibility of verifying practical arithmetic circuits.

  • Finding Frequent Closed Itemsets in Sliding Window in Linear Time

    Junbo CHEN  Bo ZHOU  Lu CHEN  Xinyu WANG  Yiqun DING  

     
    PAPER-Data Mining

      Vol:
    E91-D No:10
      Page(s):
    2406-2418

    One of the most well-studied problems in data mining is computing the collection of frequent itemsets in large transactional databases. Since the introduction of the famous Apriori algorithm [14], many others have been proposed to find the frequent itemsets. Among such algorithms, the approach of mining closed itemsets has raised much interest in data mining community. The algorithms taking this approach include TITANIC [8], CLOSET+ [6], DCI-Closed [4], FCI-Stream [3], GC-Tree [5], TGC-Tree [16] etc. Among these algorithms, FCI-Stream, GC-Tree and TGC-Tree are online algorithms work under sliding window environments. By the performance evaluation in [16], GC-Tree [15] is the fastest one. In this paper, an improved algorithm based on GC-Tree is proposed, the computational complexity of which is proved to be a linear combination of the average transaction size and the average closed itemset size. The algorithm is based on the essential theorem presented in Sect. 4.2. Empirically, the new algorithm is several orders of magnitude faster than the state of art algorithm, GC-Tree.

  • Design and Implementation of a Non-pipelined MD5 Hardware Architecture Using a New Functional Description

    Ignacio ALGREDO-BADILLO  Claudia FEREGRINO-URIBE  Rene CUMPLIDO  Miguel MORALES-SANDOVAL  

     
    LETTER-VLSI Systems

      Vol:
    E91-D No:10
      Page(s):
    2519-2523

    MD5 is a cryptographic algorithm used for authentication. When implemented in hardware, the performance is affected by the data dependency of the iterative compression function. In this paper, a new functional description is proposed with the aim of achieving higher throughput by mean of reducing the critical path and latency. This description can be used in similar structures of other hash algorithms, such as SHA-1, SHA-2 and RIPEMD-160, which have comparable data dependence. The proposed MD5 hardware architecture achieves a high throughput/area ratio, results of implementation in an FPGA are presented and discussed, as well as comparisons against related works.

  • Variable Block Size Motion Vector Retrieval Schemes for H.264 Inter Frame Error Concealment

    Lei WANG  Jun WANG  Satoshi GOTO  Takeshi IKENAGA  

     
    PAPER-Video Coding

      Vol:
    E91-A No:10
      Page(s):
    2945-2953

    With the ubiquitous application of Internet and wireless networks, H.264 video communication becomes more and more common. However, due to the high-efficiently predictive coding and the variable length entropy coding, it is more sensitive to transmission errors. The current error concealment (EC) scheme, which utilizes the spatial and temporal correlations to conceal the corrupted region, produces unsatisfied boundary artifacts. In this paper, first we propose variable block size error concealment (VBSEC) scheme inspired by variable block size motion estimation (VBSME) in H.264. This scheme provides four EC modes and four sub-block partitions. The whole corrupted macro-block (MB) will be divided into variable block size adaptively according to the actual motion. More precise motion vectors (MV) will be predicted for each sub-block. Then MV refinement (MVR) scheme is proposed to refine the MV of the heterogeneous sub-block by utilizing three step search (TSS) algorithm adaptively. Both VBSEC and MVR are based on our directional spatio-temporal boundary matching algorithm (DSTBMA). By utilizing these schemes, we can reconstruct the corrupted MB in the inter frame more accurately. The experimental results show that our proposed scheme can obtain better objective and subjective EC quality, respectively compared with the boundary matching algorithm (BMA) adopted in the JM11.0 reference software, spatio-temporal boundary matching algorithm (STBMA) and other comparable EC methods.

  • Detailed Evolution of Degree Distributions in Residual Graphs with Joint Degree Distributions

    Takayuki NOZAKI  Kenta KASAI  Tomoharu SHIBUYA  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Vol:
    E91-A No:10
      Page(s):
    2737-2744

    Luby et al. derived evolution of degree distributions in residual graphs for irregular LDPC code ensembles. Evolution of degree distributions in residual graphs is important characteristic which is used for finite-length analysis of the expected block and bit error probability over the binary erasure channel. In this paper, we derive detailed evolution of degree distributions in residual graphs for irregular LDPC code ensembles with joint degree distributions.

  • An Efficient Uplink Scheduling Algorithm with Variable Grant-Interval for VoIP Service in BWA Systems

    Sung-Min OH  Sunghyun CHO  Jae-Hyun KIM  Jonghyung KWUN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3379-3382

    This letter proposes an efficient uplink scheduling algorithm for the voice over Internet protocol (VoIP) service with variable frame-duration according to the voice activity in IEEE 802.16e/m systems. The proposed algorithm dynamically changes the grant-interval to save the uplink bandwidth, and it uses the random access scheme when the voice activity changes from silent-period to talk-spurt. Numerical results show that the proposed algorithm can increase the VoIP capacity by 26 percent compared to the conventional extended real-time polling service (ertPS).

  • An Algebraic Approach to Guarantee Harmonic Balance Method Using Grobner Base

    Masakazu YAGI  Takashi HISAKADO  Kohshi OKUMURA  

     
    PAPER-Analysis, Modelng and Simulation

      Vol:
    E91-A No:9
      Page(s):
    2442-2449

    Harmonic balance (HB) method is well known principle for analyzing periodic oscillations on nonlinear networks and systems. Because the HB method has a truncation error, approximated solutions have been guaranteed by error bounds. However, its numerical computation is very time-consuming compared with solving the HB equation. This paper proposes an algebraic representation of the error bound using Grobner base. The algebraic representation enables to decrease the computational cost of the error bound considerably. Moreover, using singular points of the algebraic representation, we can obtain accurate break points of the error bound by collisions.

  • Performance Analysis of a Collision Detection Algorithm of Spheres Based on Slab Partitioning

    Takashi IMAMICHI  Hiroshi NAGAMOCHI  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2308-2313

    In this paper, we consider a collision detection problem of spheres which asks to detect all pairs of colliding spheres in a set of n spheres located in d-dimensional space. We propose a collision detection algorithm for spheres based on slab partitioning technique and a plane sweep method. We derive a theoretical upper bound on the time complexity of the algorithm. Our bound tells that if both the dimension and the maximum ratio of radii of two spheres are bounded, then our algorithm runs in O(n log n + K) time with O(n + K) space, where K denotes the number of pairs of colliding spheres.

  • An Optimal Parallel Algorithm for Constructing a Spanning Forest on Trapezoid Graphs

    Hirotoshi HONMA  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2296-2300

    Given a simple graph G with n vertices, m edges and k connected components. The spanning forest problem is to find a spanning tree for each connected component of G. This problem has applications to the electrical power demand problem, computer network design, circuit analysis, etc. An optimal parallel algorithm for finding a spanning tree on the trapezoid graph is given by Bera et al., it takes O(log n) time with O(n/log n) processors on the EREW (Exclusive-Read Exclusive-Write) PRAM. Bera et al.'s algorithm is very simple and elegant. Moreover, it can correctly construct a spanning tree when the graph is connected. However, their algorithm can not accept a disconnected graph as an input. Applying their algorithm to a disconnected graph, Concurrent-Write occurs once for each connected component, thus this can not be achieved on EREW PRAM. In this paper we present an O(log n) time parallel algorithm with O(n/log n) processors for constructing a spanning forest on trapezoid graph G on EREW PRAM even if G is a disconnected graph.

  • A Compact Encoding of Rectangular Drawings with Efficient Query Supports

    Katsuhisa YAMANAKA  Shin-ichi NAKANO  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2284-2291

    A rectangular drawing is a plane drawing in which every face is a rectangle. In this paper we give a simple encoding scheme for rectangular drawings. Given a rectangular drawing R with maximum degree 3, our scheme encodes R with m + o(n) bits where n is the number of vertices of R and m is the number of edges of R. Also we give an algorithm to supports a rich set of queries, including adjacency and degree queries on the faces, in constant time.

  • An EM-Based Time-Domain Channel Estimation Algorithm Using a priori Information

    Feng YANG  Yu ZHANG  Jian SONG  Changyong PAN  Zhixing YANG  

     
    LETTER-Broadcast Systems

      Vol:
    E91-B No:9
      Page(s):
    3041-3044

    Based on the expectation-maximization (EM) algorithm, an iterative time-domain channel estimation approach capable of using a priori information is proposed for orthogonal frequency division multiplexing (OFDM) systems in this letter: it outperforms its noniterative counterpart in terms of estimation accuracy as well as bit error rate (BER) performance. Numerical simulations demonstrate that an SNR gain of 1 dB at BER=10-4 with only one iteration and estimation mean square error (MSE) which nearly coincides with the Cramer-Rao bound (CRB) in the low SNR region can be obtained, thanks to the efficient use of a priori information.

  • Sensitivity Analysis and Optimization Algorithm --- Based on Nonlinear Programming ---

    Masayoshi ODA  Yoshihiro YAMAGAMI  Junji KAWATA  Yoshifumi NISHIO  Akio USHIDA  

     
    PAPER-Analysis, Modelng and Simulation

      Vol:
    E91-A No:9
      Page(s):
    2426-2434

    We propose here a fully Spice-oriented design algorithm of op-amps for attaining the maximum gains under low power consumptions and assigned slew-rates. Our optimization algorithm is based on a well-known steepest descent method combining with nonlinear programming. The algorithm is realized by equivalent RC circuits with ABMs (analog behavior models) of Spice. The gradient direction is decided by the analysis of sensitivity circuits. The optimum parameters can be found at the equilibrium point in the transient response of the RC circuit. Although the optimization time is much faster than the other design tools, the results might be rough because of the simple transistor models. If much better parameter values are required, they can be improved with Spice simulator and/or other tools.

  • Generating Stochastic Processes Based on the Finitary Interval Algorithm

    Hiroshi FUJISAKI  

     
    PAPER-Communications and Sequences

      Vol:
    E91-A No:9
      Page(s):
    2482-2488

    We point out that the interval algorithm can be expressed in the form of a shift on the sequence space. Then we clarify that, by using a Bernoulli process, the interval algorithm can generate only a block of Markov chains or a sequence of independent blocks of Markov chains but not a stationary Markov process. By virtue of the finitary coding constructed by Hamachi and Keane, we obtain the procedure, called the finitary interval algorithm, to generate a Markov process by using the interval algorithm. The finitary interval algorithm also gives maps, defined almost everywhere, which transform a Markov measure to a Bernoulli measure.

901-920hit(2355hit)