The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ASE(2849hit)

801-820hit(2849hit)

  • Advanced Content Authoring and Viewing Tools Using Aggregated Video and Slide Synchronization by Key Marking for Web-Based e-Learning System in Higher Education

    Sila CHUNWIJITRA  Arjulie JOHN BERENA  Hitoshi OKADA  Haruki UENO  

     
    PAPER-Educational Technology

      Vol:
    E96-D No:8
      Page(s):
    1754-1765

    In this paper, we propose a new online authoring tool for e-Learning system to meet the social demands for internationalized higher education. The tool includes two functions – an authoring function for creating video-based content by the instructor, and a viewing function for self-learning by students. In the authoring function, an instructor creates key markings onto the raw video stream to produce virtual video clips related to each slide. With key markings, some parts of the raw video stream can be easily skipped. The virtual video clips form an aggregated video stream that is used to synchronize with the slide presentation to create learning content. The synchronized content can be previewed immediately at the client computer prior to saving at the server. The aggregated video becomes the baseline for the viewing function. Based on aggregated video stream methodology, content editing requires only the changing of key markings without editing the raw video file. Furthermore, video and pointer synchronization is also proposed for enhancing the students' learning efficiency. In viewing function, video quality control and an adaptive video buffering method are implemented to support usage in various network environments. The total system is optimized to support cross-platform and cloud computing to break the limitation of various usages. The proposed method can provide simple authoring processes with clear user interface design for instructors, and help students utilize learning contents effectively and efficiently. In the user acceptance evaluation, most respondents agree with the usefulness, ease-of-use, and user satisfaction of the proposed system. The overall results show that the proposed authoring and viewing tools have higher user acceptance as a tool for e-Learning.

  • Heuristic and Exact Resource Binding Algorithms for Storage Optimization Using Flip-Flops and Latches

    Keisuke INOUE  Mineo KANEKO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E96-A No:8
      Page(s):
    1712-1722

    A mixed storage-type design using flip-flops and latches (FF/latch-based design) has advantages on such as area and power compared to single storage-type design (only flip-flops or latches). Considering FF/latch-based design at high-level synthesis is necessary, because resource binding process significantly affects the quality of resulting circuits. One of the fundamental aspects in FF/latch-based design is that different resource binding solutions could lead to the different numbers of latch-replacable registers. Therefore, as a first step, this paper addresses a datapath design problem in which resource binding and selecting storage-types of registers are simultaneously optimized for datapath area minimization (i.e., latch replacement maximization). An efficient algorithm based on the compatibility path decomposition and an integer linear programming-based exact approach are presented. Experiments confirm the effectiveness of the proposed approaches.

  • M-Shaped Dielectric Phase Shifter for Beam-Steerable Base-Station Antenna

    Kengo NISHIMOTO  Takeshi OSHIMA  Toru FUKASAWA  Hiroaki MIYASHITA  Yoshihiko KONISHI  Manabu KURIHARA  Yoshiyuki CHATANI  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:8
      Page(s):
    2095-2101

    We propose a simple and small phase shifter for a beam-steerable base-station antenna. This phase shifter has no metallic heterojunction, and the phase shift is controlled by moving an M-shaped dielectric plate between the strip conductor and the ground plane of a strip line. We derive a design equation from the condition that at the center frequency f0, the reflection coefficient = 0. In this phase shifter, the reflection coefficient becomes minimum at f0 regardless of the movement distance, r, of the dielectric plate, and the relationship between the phase shift and r is linear. These characteristics are verified by performing simulations and measurements. The size of the M-shaped dielectric phase shifter is 0.27λ00.12λ0, where λ0 is the free-space wavelength at f0. The insertion loss is smaller than about 0.2 dB within a fractional bandwidth of 10%, and the phase shift can vary from 0 to about 80 degrees.

  • Efficient Large-Scale Video Retrieval via Discriminative Signatures

    Pengyi HAO  Sei-ichiro KAMATA  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E96-D No:8
      Page(s):
    1800-1810

    The topic of retrieving videos containing a desired person from a dataset just using the content of faces without any help of textual information has many interesting applications like video surveillance, social network, video mining, etc. However, traditional face matching against a huge number of detected faces leads to an unacceptable response time and may also reduce the accuracy due to the large variations in facial expressions, poses, lighting, etc. Therefore, in this paper we propose a novel method to generate discriminative “signatures” for efficiently retrieving the videos containing the same person with a query. In this research, the signature is defined as a compact, discriminative and reduced dimensionality representation, which is generated from a set of high-dimensional feature vectors of an individual. The desired videos are retrieved based on the similarities between the signature of the query and those of individuals in the database. In particular, we make the following contributions. Firstly, we give an algorithm of two directional linear discriminant analysis with maximum correntropy criterion (2DLDA-MCC) as an extension to our recently proposed maximum correntropy criterion based linear discriminant analysis (LDA-MCC). Both algorithms are robust to outliers and noise. Secondly, we present an approach for transferring a set of exemplars to a fixed-length signature using LDA-MCC and 2DLDA-MCC, resulting in two kinds of signatures that are called 1D signature and 2D signature. Finally, a novel video retrieval scheme is given based on the signatures, which has low storage requirement and can achieve a fast search. Evaluations on a large dataset of videos show reliable measurement of similarities by using the proposed signatures to represent the identities generated from videos. Experimental results also demonstrate that the proposed video retrieval scheme has the potential to substantially reduce the response time and slightly increase the mean average precision of retrieval.

  • Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway

    Yong XIE  Gang ZENG  Yang CHEN  Ryo KURACHI  Hiroaki TAKADA  Renfa LI  

     
    PAPER-Software System

      Vol:
    E96-D No:7
      Page(s):
    1467-1477

    In modern automobiles, Controller Area Network (CAN) has been widely used in different sub systems that are connected by using gateway. While a gateway is necessary to integrate different electronic sub systems, it brings challenges for the analysis of Worst Case Response Time (WCRT) for CAN messages, which is critical from the safety point of view. In this paper, we first analyzed the challenges for WCRT analysis of messages in gateway-interconnected CANs. Then, based on the existing WCRT analysis method proposed for one single CAN, a new WCRT analysis method that uses two new definitions to analyze the interfering delay of sporadically arriving gateway messages is proposed for non-gateway messages. Furthermore, a division approach, where the end-to-end WCRT analysis of gateway messages is transformed into the similar situation with that of non-gateway messages, is adopted for gateway messages. Finally, the proposed method is extended to include CANs with different bandwidths. The proposed method is proved to be safe, and experimental results demonstrated its effectiveness by comparing it with a full space searching based simulator and applying it to a real message set.

  • Characterization of Silicon Mach-Zehnder Modulator in 20-Gbps NRZ-BPSK Transmission

    Kazuhiro GOI  Kenji ODA  Hiroyuki KUSAKA  Akira OKA  Yoshihiro TERADA  Kensuke OGAWA  Tsung-Yang LIOW  Xiaoguang TU  Guo-Qiang LO  Dim-Lee KWONG  

     
    PAPER

      Vol:
    E96-C No:7
      Page(s):
    974-980

    20-Gbps non return-to-zero (NRZ) – binary phase shift keying (BPSK) using the silicon Mach-Zehnder modulator is demonstrated and characterized. Measurement of a constellation diagram confirms successful modulation of 20-Gbps BPSK with the silicon modulator. Transmission performance is characterized in the measurement of bit-error-rate in accumulated dispersion range from -347 ps/nm to +334 ps/nm using SMF and a dispersion compensating fiber module. Optical signal-to-noise ratio required for bit-error-rate of 10-3 is 10.1 dB at back-to-back condition. It is 1.2-dB difference from simulated value. Obtained dispersion tolerance less than 2-dB power penalty for bit-error-rate of 10-3 is -220 ps/nm to +230 ps/nm. The symmetric dispersion tolerance indicates chirp-free modulation. Frequency chirp inherent in the modulation mechanism of the silicon MZM is also discussed with the simulation. The effect caused by the frequency chirp is limited to 3% shift in the chromatic dispersion range of 2 dB power penalty for BER 10-3. The effect inherent in the silicon modulation mechanism is confirmed to be very limited and not to cause any significant degradation in the transmission performance.

  • Bayesian Word Alignment and Phrase Table Training for Statistical Machine Translation

    Zezhong LI  Hideto IKEDA  Junichi FUKUMOTO  

     
    PAPER-Natural Language Processing

      Vol:
    E96-D No:7
      Page(s):
    1536-1543

    In most phrase-based statistical machine translation (SMT) systems, the translation model relies on word alignment, which serves as a constraint for the subsequent building of a phrase table. Word alignment is usually inferred by GIZA++, which implements all the IBM models and HMM model in the framework of Expectation Maximum (EM). In this paper, we present a fully Bayesian inference for word alignment. Different from the EM approach, the Bayesian inference makes use of all possible parameter values rather than estimating a single parameter value, from which we expect a more robust inference. After inferring the word alignment, current SMT systems usually train the phrase table from Viterbi word alignment, which is prone to learn incorrect phrases due to the word alignment mistakes. To overcome this drawback, a new phrase extraction method is proposed based on multiple Gibbs samples from Bayesian inference for word alignment. Empirical results show promising improvements over baselines in alignment quality as well as the translation performance.

  • Performance Evaluation of Network-Based Global Mobility Management Protocol in Proxy Mobile IPv6

    Van Hanh NGUYEN  Soonghwan RO  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1886-1895

    Proxy Mobile IPv6 (PMIPv6) is a network-based localized mobility management protocol that is independent of global mobility management protocols. In a single local mobility domain, the mobile node (MN) is not involved in any IP mobility-related signaling, but when the MN moves into another local mobility domain, the MN must change its PMIPv6 home address. In this case, host-based mobility signaling is activated, and PMIPv6's network-based mobility cannot be retained. Additionally, if the MN does not support global mobility, it cannot maintain its communication sessions with its correspondent node. In this paper, we propose a solution for network-based global mobility support in PMIPv6 networks, which allows the MN to maintain active communication sessions without mobility protocol stacks when the MN moves into another local mobility domain. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. The proposed protocol provides for global mobility while retaining the advantages of the network-based localized mobility in the Proxy Mobile IPv6 protocol. In this paper, we propose a solution for global mobility support in PMIPv6 networks by which the MAG (Mobile Access Gateway) can maintain the MN's communication sessions during inter-domain handover. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. We evaluate and compare network performance between our proposed solution and PMIPv6 and the main host-based mobility protocol. We evaluate and compare handover delays, and packet loss cost of the two protocols.

  • 10 Gb/s BOSA Employing Low-Cost TO CAN Package and Impedance Matching Circuits in Transmitter

    Kota ASAKA  Atsushi KANDA  Akira OHKI  Takeshi KUROSAKI  Ryoko YOSHIMURA  Hiroaki SANJOH  Toshio ITO  Makoto NAKAMURA  Mikio YONEYAMA  

     
    PAPER

      Vol:
    E96-C No:7
      Page(s):
    989-995

    By using impedance (Z) matching circuits in a low-cost transistor outline (TO) CAN package for a 10 Gb/s transmitter, we achieve a cost-effective and small bidirectional optical subassembly (BOSA) with excellent optical transmission waveforms and a > 40% mask margin over a wide temperature range (-10 to 85). We describe a design for Z matching circuits and simulation results, and discuss the advantage of the cost-effective compensation technique.

  • A Resilient Forest-Based Application Level Multicast for Real-Time Streaming

    Kazuya TAKAHASHI  Tatsuya MORI  Yusuke HIROTA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1874-1885

    In recent years, real-time streaming has become widespread as a major service on the Internet. However, real-time streaming has a strict playback deadline. Application level multicasts using multiple distribution trees, which are known as forests, are an effective approach for reducing delay and jitter. However, the failure or departure of nodes during forest-based multicast transfer can severely affect the performance of other nodes. Thus, the multimedia data quality is degraded until the distribution trees are repaired. This means that increasing the speed of recovery from isolation is very important, especially in real-time streaming services. In this paper, we propose three methods for resolving this problem. The first method is a random-based proactive method that achieves rapid recovery from isolation and gives efficient “Randomized Forwarding” via cooperation among distribution trees. Each node forwards the data it receives to child nodes in its tree, and then, the node randomly transferring it to other trees with a predetermined probability. The second method is a reactive method, which provides a reliable isolation recovery method with low overheads. In this method, an isolated node requests “Continuous Forwarding” from other nodes if it detects a problem with a parent node. Forwarding to the nearest nodes in the IP network ensures that this method is efficient. The third method is a hybrid method that combines these two methods to achieve further performance improvements. We evaluated the performances of these proposed methods using computer simulations. The simulation results demonstrated that our proposed methods delivered isolation recovery and that the hybrid method was the most suitable for real-time streaming.

  • Transformation of a Relational Database to RDF/RDFS with ER2iDM

    Mi-Young CHOI  Chang-Joo MOON  Doo-Kwon BAIK  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E96-D No:7
      Page(s):
    1478-1488

    The Semantic Web uses RDF/RDFS, which can enable a machine to understand web data without human interference. But most web data is not available in RDF/RDFS documents because most web data is still stored in databases. It is much more favorable to use stored data in a database to build the Semantic Web. This paper proposes an enhanced relational RDF/RDFS interoperable data model (ER2iDM) and a transformation procedure from relational data model (RDM) to RDF/RDFS based on ER2iDM. The ER2iDM is a data model that plays the role of an inter-mediator between RDM and RDF/RDFS during a transformation procedure. The data and schema information in the database are migrated to the ER2iDM according to the proposed translation procedures without incurring loss of meaning of the entities, relationships, and data. The RDF/RDFS generation tool makes a RDF/RDFS XML document automatically from the ER2iDM. The proposed ER2iDM and transformation procedure provides detailed guidelines for transformation from RDM to RDF/RDFS unlike existing studies; therefore, we can more efficiently build up the Semantic Web using database stored data.

  • Throughput Capacity of MANETs with Group-Based Scheduling and General Transmission Range

    Juntao GAO  Jiajia LIU  Xiaohong JIANG  Osamu TAKAHASHI  Norio SHIRATORI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:7
      Page(s):
    1791-1802

    The capacity of general mobile ad hoc networks (MANETs) remains largely unknown up to now, which significantly hinders the development and commercialization of such networks. Available throughput capacity studies of MANETs mainly focus on either the order sense capacity scaling laws, the exact throughput capacity under a specific algorithm, or the exact throughput capacity without a careful consideration of critical wireless interference and transmission range issues. In this paper, we explore the exact throughput capacity for a class of MANETs, where we adopt group-based scheduling to schedule simultaneous link transmissions for interference avoidance and allow the transmission range of each node to be adjusted. We first determine a general throughput capacity upper bound for the concerned MANETs, which holds for any feasible packet delivery algorithm in such networks. We then prove that the upper bound we determined is just the exact throughput capacity for this class of MANETs by showing that for any traffic input rate within the throughput capacity upper bound, there exists a corresponding two-hop relay algorithm to stabilize such networks. A closed-form upper bound for packet delay is further derived under any traffic input rate within the throughput capacity. Finally, based on the network capacity result, we examine the impacts of transmission range and node density upon network capacity.

  • Skew Estimation by Parts

    Soma SHIRAISHI  Yaokai FENG  Seiichi UCHIDA  

     
    PAPER-Pattern Recognition

      Vol:
    E96-D No:7
      Page(s):
    1503-1512

    This paper proposes a new part-based approach for skew estimation of document images. The proposed method first estimates skew angles on rather small areas, which are the local parts of characters, and subsequently determines the global skew angle by aggregating those local estimations. A local skew estimation on a part of a skewed character is performed by finding an identical part from prepared upright character images and calculating the angular difference. Specifically, a keypoint detector (e.g. SURF) is used to determine the local parts of characters, and once the parts are described as feature vectors, a nearest neighbor search is conducted in the instance database to identify the parts. Finally, a local skew estimation is acquired by calculating the difference of the dominant angles of brightness gradient of the parts. After the local skew estimation, the global skew angle is estimated by the majority voting of those local estimations, disregarding some noisy estimations. Our experiments have shown that the proposed method is more robust to short and sparse text lines and non-text backgrounds in document images compared to conventional methods.

  • A 20 GHz Push-Push Voltage-Controlled Oscillator Using Second-Harmonic Peaking Technique for a 60 GHz Frequency Synthesizer

    Teerachot SIRIBURANON  Takahiro SATO  Ahmed MUSA  Wei DENG  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER

      Vol:
    E96-C No:6
      Page(s):
    804-812

    This paper presents a 20 GHz push-push VCO realized by a 10 GHz super-harmonic coupled quadrature oscillator for a quadrature 60 GHz frequency synthesizer. The output nodes are peaked by a tunable second harmonic resonator. The proposed VCO is implemented in 65 nm CMOS process. It achieves a tuning range of 3.5 GHz from 16.1 GHz to 19.6 GHz with a phase noise of -106 dBc/Hz at 1 MHz offset. The power consumption of the core oscillators is 10.3 mW and an FoM of -181.3 dBc/Hz is achieved.

  • On the Zeta Function of a Periodic-Finite-Type Shift

    Akiko MANADA  Navin KASHYAP  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1024-1031

    Periodic-finite-type shifts (PFT's) are sofic shifts which forbid the appearance of finitely many pre-specified words in a periodic manner. The class of PFT's strictly includes the class of shifts of finite type (SFT's). The zeta function of a PFT is a generating function for the number of periodic sequences in the shift. For a general sofic shift, there exists a formula, attributed to Manning and Bowen, which computes the zeta function of the shift from certain auxiliary graphs constructed from a presentation of the shift. In this paper, we derive an interesting alternative formula computable from certain “word-based graphs” constructed from the periodically-forbidden word description of the PFT. The advantages of our formula over the Manning-Bowen formula are discussed.

  • An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection

    Shenchuan LIU  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1245-1252

    This paper introduces amplitude-only images to image trading systems in which not only the copyright of images but also the privacy of consumers are protected. In the latest framework for image trading systems, an image is divided into an unrecognizable piece and a recognizable but distorted piece to simultaneously protect the privacy of a consumer and the copyright of the image. The proposed scheme uses amplitude-only images which are completely unrecognizable as the former piece, whereas the conventional schemes leave recognizable parts to the piece which degrades privacy protection performance. Moreover, the proposed scheme improves the robustness against copyright violation regardless of the used digital fingerprinting technique, because an amplitude-only image is larger than the piece in the conventional scheme. In addition, phase-only image is used as the second piece in the proposed scheme, the consumer can confirm what he/she bought. Experimental results show the effectiveness of the proposed scheme.

  • id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing

    Atsushi FUJIOKA  Fumitaka HOSHINO  Tetsutaro KOBAYASHI  Koutarou SUZUKI  Berkant USTAOLU  Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1139-1155

    In this paper, we propose an identity-based authenticated key exchange (ID-AKE) protocol that is secure in the identity-based extended Canetti-Krawczyk (id-eCK) model in the random oracle model under the gap Bilinear Diffie-Hellman assumption. The proposed ID-AKE protocol is the most efficient among the existing ID-AKE protocols that is id-eCK secure, and it can be extended to use in asymmetric pairing.

  • Deciding Schema k-Secrecy for XML Databases

    Chittaphone PHONHARATH  Kenji HASHIMOTO  Hiroyuki SEKI  

     
    PAPER-Static Analysis

      Vol:
    E96-D No:6
      Page(s):
    1268-1277

    We study a static analysis problem on k-secrecy, which is a metric for the security against inference attacks on XML databases. Intuitively, k-secrecy means that the number of candidates of sensitive data of a given database instance or the result of unauthorized query cannot be narrowed down to k-1 by using available information such as authorized queries and their results. In this paper, we investigate the decidability of the schema k-secrecy problem defined as follows: for a given XML database schema, an authorized query and an unauthorized query, decide whether every database instance conforming to the given schema is k-secret. We first show that the schema k-secrecy problem is undecidable for any finite k>1 even when queries are represented by a simple subclass of linear deterministic top-down tree transducers (LDTT). We next show that the schema ∞-secrecy problem is decidable for queries represented by LDTT. We give an algorithm for deciding the schema ∞-secrecy problem and analyze its time complexity. We show the schema ∞-secrecy problem is EXPTIME-complete for LDTT. Moreover, we show similar results LDTT with regular look-ahead.

  • Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles

    Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E96-A No:6
      Page(s):
    1112-1123

    In this paper, we propose a generic construction of one-round attribute-based (implicitly) authenticated key exchange (ABAKE). The construction is based on a chosen-ciphertext (CCA) secure attribute-based KEM and the decisional Diffie-Hellman (DDH) assumption. If an underlying attribute-based KEM scheme allows expressive access controls and is secure in the standard model (StdM), an instantiated ABAKE scheme also achieves them. Our scheme enjoys the best of both worlds: efficiency and security. The number of rounds is one (optimal) while the known secure scheme in the StdM is not one-round protocol. Our scheme is comparable in communication complexity with the most efficient known scheme that is not proved in the StdM. Also, our scheme is proved to satisfy security against advanced attacks like key compromise impersonation.

  • Selection of Component Carriers Using Centralized Baseband Pooling for LTE-Advanced Heterogeneous Networks

    Hiroyuki SEKI  Takaharu KOBAYASHI  Dai KIMURA  

     
    PAPER

      Vol:
    E96-B No:6
      Page(s):
    1288-1296

    Bandwidth expansion in Long Term Evolution (LTE)-Advanced is supported via carrier aggregation (CA), which aggregates multiple component carriers (CCs) to accomplish very high data rate communications. Heterogeneous networks (HetNets), which set pico-base stations in macrocells are also a key feature of LTE-Advanced to achieve substantial gains in coverage and capacity compared to macro-only cells. When CA is applied in HetNets, transmission on all CCs may not always be the best solution due to the extremely high levels of inter-cell interference experienced by HetNets. Activated CCs that are used for transmission should be selected depending on inter-cell interference conditions and the traffic offered in the cells. This paper presents a scheme to select CCs through centralized control assuming a centralized baseband unit (C-BBU) configuration. A C-BBU involves pooling tens or hundreds of baseband resources where one baseband resource can be connected to any CC installed in remote radio heads (RRHs) via optical fibers. Fewer baseband resources can be prepared in a C-BBU than those of CCs in RRHs to reduce the cost of equipment. Our proposed scheme selects the activated CCs by considering the user equipment (UE) assigned to CCs under the criterion of maximizing the proportional fairness (PF) utility function. Convex optimization using the Karush-Kuhn-Tucker (KKT) conditions is applied to solve the resource allocation ratio that enables user throughput to be estimated. We present results from system level simulations of the downlink to demonstrate that the proposed algorithm to select CCs can outperform the conventional one that selects activated CCs based on the received signal strength. We also demonstrate that our proposed algorithm to select CCs can provide a good balance in traffic load between CCs and achieve better user throughput with fewer baseband resources.

801-820hit(2849hit)