The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ASE(2849hit)

881-900hit(2849hit)

  • Low Complexity Weighted Reliability-Based Iterative Decoding of LDPC Codes

    Zhiliang HUANG  Ming CHEN  Chunjuan DIAO  Jiamin LI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:11
      Page(s):
    3572-3575

    This letter presents a novel weighted reliability-based (WRB) algorithm for decoding low-density parity-check (LDPC) codes. Viewing the well-known normalized min sum (NMS) algorithm as reliability-based, the WRB algorithm can be seen as a simplified version of the NMS algorithm. Unlike the NMS algorithm, the WRB algorithm does not update the soft information sent between the variable nodes and check nodes, which greatly reduces the decoding complexity. For finite geometry LDPC codes with larger row redundancy and column weights, simulation results show that the WRB algorithm almost matches the error performance of the NMS algorithm.

  • Improving the Efficiency in Halftone Image Generation Based on Structure Similarity Index Measurement

    Aroba KHAN  Hernan AGUIRRE  Kiyoshi TANAKA  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E95-D No:10
      Page(s):
    2495-2504

    This paper presents two halftoning methods to improve efficiency in generating structurally similar halftone images using Structure Similarity Index Measurement (SSIM). Proposed Method I reduces the pixel evaluation area by applying pixel-swapping algorithm within inter-correlated blocks followed by phase block-shifting. The effect of various initial pixel arrangements is also investigated. Proposed Method II further improves efficiency by applying bit-climbing algorithm within inter-correlated blocks of the image. Simulation results show that proposed Method I improves efficiency as well as image quality by using an appropriate initial pixel arrangement. Proposed Method II reaches a better image quality with fewer evaluations than pixel-swapping algorithm used in Method I and the conventional structure aware halftone methods.

  • Performance Improvement of IMR-Based NLOS Detection in Indoor Ultra Wide-Band TOA Localization

    Kazutaka FUKUDA  Eiji OKAMOTO  

     
    PAPER-Sensor Network

      Vol:
    E95-A No:10
      Page(s):
    1658-1666

    Sensor networks, in which many small terminals are wirelessly connected, have recently received considerable interest according to the development of wireless technology and electronic circuit. To provide advanced applications and services by the sensor networks, data collection including node location is essential. Hence the location estimation is important and many localization schemes have been proposed. Time of arrival (TOA) localization is one of the popular schemes because of its high estimation accuracy in ultra wide-band (UWB) sensor networks. However, a non-line-of-sight (NLOS) environment between the target and the anchor nodes causes a serious estimation error because the time is delayed more than its true one. Thus, the NLOS nodes should be detected and eliminated for estimation. As a well-known NLOS detection scheme, an iterative minimum residual (IMR) scheme which has low calculation complexity is used for detection. However, the detection error exists in IMR scheme due to the measurement error. Therefore, in this paper, we propose a new IMR-based NLOS detection scheme and show its performance improvement by computer simulations.

  • A 60 GHz CMOS Transceiver IC for a Short-Range Wireless System with Amplitude/Phase Imbalance Cancellation Technique

    Koji TAKINAMI  Junji SATO  Takahiro SHIMA  Mitsuhiro IWAMOTO  Taiji AKIZUKI  Masashi KOBAYASHI  Masaki KANEMARU  Yohei MORISHITA  Ryo KITAMURA  Takayuki TSUKIZAWA  Koichi MIZUNO  Noriaki SAITO  Kazuaki TAKAHASHI  

     
    PAPER

      Vol:
    E95-C No:10
      Page(s):
    1598-1609

    A 60 GHz direct conversion transceiver which employs amplitude/phase imbalance cancellation technique is newly proposed. By using the proposed technique, the receive path of the transceiver achieves less than 0.2 dB of amplitude error and less than 3 of phase error at 60 GHz bands over a 10 GHz bandwidth, which relaxes the design accuracy required for baluns used in the transceiver. It also employs a simple and fast calibration algorithm to adjust the locking range of the divide-by-3 injection locked divider in the phase locked loop. Fabricated in 90 nm CMOS technology, the transceiver achieves a low power consumption of 230 mW in transmit mode and 173 mW in receive mode. The output spectrum of 1.76 Gsps π/2-BPSK/QPSK modulation shows the excellent distortion and spurious suppression that meet the IEEE802.11ad draft standard.

  • An Efficient Route Optimization Scheme for Multiple LMAs in PMIPv6 Domain

    Won-Kyeong SEO  Kang-Won LEE  Jae-In CHOI  You-Ze CHO  

     
    PAPER-Network

      Vol:
    E95-B No:10
      Page(s):
    3149-3157

    PMIPv6 is the IETF standard for a network-based localized mobility management protocol. In PMIPv6, MNs are topologically anchored at an LMA, which forwards all data for registered MNs. However, since all data packets destined for MNs always traverse the MNs' LMA, the end-to-end packet delay is increased. Therefore, this paper proposes an RO scheme in single and multiple LMA environments. For efficient RO possibility detection, an IPv6 RO extension header and initial RO procedure are proposed. Plus, an effective post-handover RO procedure is presented, along with a packet forwarding scheme to avoid the race condition problem during an RO operation. A Performance evaluation confirms that the proposed scheme can significantly reduce the end-to-end delay, signaling overhead, and RO latency when compared with existing RO schemes.

  • TL-Rank: A Blend of Text and Link Information for Measuring Similarity in Scientific Literature Databases

    Seok-Ho YOON  Ji-Su KIM  Sang-Wook KIM  Choonhwa LEE  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:10
      Page(s):
    2556-2559

    This paper presents a novel similarity measure that computes similarity scores among scientific research papers. The text of a given paper in online scientific literature is often found to be incomplete in terms of its potential to be compared with others, which likely leads to inaccurate results. Our solution to this problem makes use of both text and link information of a paper in question for similarity scores in that the comparison text of the paper is strengthened by adding that of papers related to it. More accurate similarity scores can be computed by reinforcing the input with the citations of the paper as well as the citations included within the paper. The efficacy of the proposed measure is validated through our extensive performance evaluation study which demonstrates a substantial gain.

  • Feeding Matrix Placed on a Single Layer with Hybrid Coupler Controlling Beams in Three Directions Including Boresight

    Masatoshi TSUJI  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:10
      Page(s):
    3324-3327

    This paper proposes an easy-to-design, theory-consistent compact feeding circuit, with a single input and four outputs, being comprised of two hybrid circuits that are capable of switching a beam in three directions. The circuits that determine the phase differences between the antennas are present on the same single layer, and thus there is no effect of vias and the design agrees well with the underlying theory. In addition, the vertically and horizontally symmetrical circuit pattern contributes to a substantial reduction in design time. The circuit is designed for use in the ISM band and its properties are evaluated using an RF circuit simulator. A prototype is fabricated and evaluated. The results of the simulation and measurement agree well with the theoretical values. The dimensions of the feeding circuit are 75 (H)55 (W)3.0 (T) mm.

  • Batch Logical Protocols for Efficient Multi-Party Computation

    Naoto KIRIBUCHI  Ryo KATO  Tsukasa ENDO  Takashi NISHIDE  Hiroshi YOSHIURA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:10
      Page(s):
    1718-1728

    It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is secure multi-party computation (MPC). It enables multiple parties, each given a snippet of a secret s, to compute a function f(s) by communicating with each other without revealing s. However, one of the biggest problems with MPC is that it requires a vast amount of communication. Much research has gone into making each protocol (equality testing, interval testing, etc.) more efficient. In this work, we make a set of multiple protocols more efficient by transforming them into their equivalent batch processing form and propose two protocols: “Batch Logical OR” and “Batch Logical AND.” Using proposed protocols recursively, we also propose “Batch Logical OR-AND” and “Batch Logical AND-OR,” and show arbitrary formula consisting of Boolean protocols, OR gates, and AND gates can be batched. Existing logical OR and logical AND protocols consisting of t equality testing invocations have a communication complexity of O(t), where is the bit length of the secrets. Our batched versions of these protocols reduce it to O( + t). For t interval testing invocations, they reduce both communication and round complexity. Thus they can make the queries on a secret shared database more efficient. For example, the use of the proposed protocols reduces the communication complexity for a query consisting of equality testing and interval testing by approximately 70% compared to the use of the corresponding existing protocols. The concept of the proposed protocols is versatile and can be applied to logical formulae consisting of protocols other than equality testing and interval testing, thereby making them more efficient as well.

  • Fabrication of Polarization-Maintaining Photonic Crystal Fiber Coupler with Air Hole State Control Using CO2 Laser Irradiation Technique

    Hirohisa YOKOTA  Yusuke ITO  Hiroki KAWASHIRI  Hideyuki KIUE  Hideo TOBITA  Yoh IMAI  Yutaka SASAKI  

     
    BRIEF PAPER-Optoelectronics

      Vol:
    E95-C No:10
      Page(s):
    1689-1691

    Polarization-maintaining photonic crystal fiber couplers (PM-PCFCs) were fabricated using a CO2 laser irradiation technique. We could control the states of air holes in the tapered region of couplers by adjusting the laser power density in the fusion and the elongation processes. It was demonstrated that the air hole remaining PM-PCFC exhibited polarization-splitting characteristics and that the air hole collapsed PM-PCFC had polarization insensitive coupling characteristics.

  • Model-Based Mutation Testing Using Pushdown Automata

    Fevzi BELL  Mutlu BEYAZIT  Tomohiko TAKAGI  Zengo FURUKAWA  

     
    PAPER

      Vol:
    E95-D No:9
      Page(s):
    2211-2218

    A model-based mutation testing (MBMT) approach enables to perform negative testing where test cases are generated using mutant models containing intentional faults. This paper introduces an alternative MBMT framework using pushdown automata (PDA) that relate to context-free (type-2) languages. There are two key ideas in this study. One is to gain stronger representational power to capture the features whose behavior depends on previous states of software under test (SUT). The other is to make use of a relatively small test set and concentrate on suspicious parts of the SUT by using MBMT approach. Thus, the proposed framework includes (1) a novel usage of PDA for modeling SUT, (2) novel mutation operators for generating PDA mutants, (3) a novel coverage criterion, and an algorithm to generate negative test cases from mutant PDA. A case study validates the approach, and discusses its characteristics and limitations.

  • Bandwidth Enhanced Operation of Single Mode Semiconductor Laser by Intensity Modulated Signal Light Injection

    Hiroki ISHIHARA  Yosuke SAITO  Wataru KOBAYASHI  Hiroshi YASAKA  

     
    BRIEF PAPER-Lasers, Quantum Electronics

      Vol:
    E95-C No:9
      Page(s):
    1549-1551

    3 dB bandwidth enhancement of single mode semiconductor lasers is confirmed numerically and experimentally when they are operated by intensity modulated signal light injection. 3 dB bandwidth is enlarged to 2.5 times of resonant frequency. The numerical analysis of rate equations predicts that the bandwidth enhancement is accomplished by the modal gain control of semiconductor lasers with injected intensity modulated signal light through non-linear gain coefficient term.

  • Effect of Lubricant on Lifetime of Au-Plated Slip-Ring and Ag-Pd-Cu Brush System for Small Electric Power

    Koichiro SAWA  Yasunori SUZUKI  Noboru MORITA  Kaoru ENDO  Takahiro UENO  

     
    PAPER

      Vol:
    E95-C No:9
      Page(s):
    1465-1472

    The authors have been investigating degradation process of Au plated slip ring and Ag-Pd-Cu brush system. In almost all cases the lifetime of the sliding system ends, when Au plating layer is worn out, the ring surface is oxidized to be black in color and contact resistance becomes very high. Further, the lifetime is very short without lubricant. So, the lubricant is very effective to make the lifetime longer. However, even with lubricant the lifetime is varied from about 1000 hours to almost 7000 hours in the past experiments. It is an important issue how the lubricant works on the lifetime of the system. In this paper the effect of lubricant on the degradation process of contact resistance is focused on. In the past tests the lubricant is supplied only once before the test. In this test the lubricant is regularly supplied almost every 900 operation hours. Consequently, the operation more than 8000 hours is realized, which is the longest among tests so far. In addition the contact voltage drop increase gradually until 2600 hours and after that it stays almost constant around 70 mV. According to the Element Analysis after the test the Ni base plating layer is totally exposed in many tracks. It means that the Au plating layer is gradually worn out probably at the stage of increasing voltage drop. In the previous tests the lifetime ended even when the Ni plating layer remained. So, the reason of long operation in this test is guessed to be that the lubricant not only decreases wear of ring and brush, but also suppresses oxidation of the Ni layer.

  • Attacker Detection Based on Dissimilarity of Local Reports in Collaborative Spectrum Sensing

    Junnan YAO  Qihui WU  Jinlong WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3024-3027

    In this letter, we propose a dissimilarity metric (DM) to measure the deviation of a cognitive radio from the network in terms of local sensing reports. Utilizing the probability mass function of the DM, we present a dissimilarity-based attacker detection algorithm to distinguish Byzantine attackers from honest users. The proposed algorithm is able to identify the attackers without a priori information of the attacking styles and is robust against both independent and dependent attacks.

  • An Adaptive Method to Acquire QoS Class Allocation Policy Based on Reinforcement Learning

    Nagao OGINO  Hajime NAKAMURA  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2828-2837

    For real-time services, such as VoIP and videoconferencing supplied through a multi-domain MPLS network, it is vital to guarantee end-to-end QoS of the inter-domain paths. Thus, it is important to allocate an appropriate QoS class to the inter-domain paths in each transit domain. Because each domain has its own policy for QoS class allocation, each domain must then allocate an appropriate QoS class adaptively based on the estimation of the QoS class allocation policies adopted in other domains. This paper proposes an adaptive method for acquiring a QoS class allocation policy through the use of reinforcement learning. This method learns the appropriate policy through experience in the actual QoS class allocation process. Thus, the method can adapt to a complex environment where the arrival of inter-domain path requests does not follow a simple Poisson process and where the various QoS class allocation policies are adopted in other domains. The proposed method updates the allocation policy whenever a QoS class is actually allocated to an inter-domain path. Moreover, some of the allocation policies often utilized in the real operational environment can be updated and refined more frequently. For these reasons, the proposed method is designed to adapt rapidly to variances in the surrounding environment. Simulation results verify that the proposed method can quickly adapt to variations in the arrival process of inter-domain path requests and the QoS class allocation policies in other domains.

  • An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks

    Ren Junn HWANG  Yu-Kai HSIAO  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2718-2727

    This study proposes an efficient identity-based secure routing protocol based on Weil pairing, that considers symmetric and asymmetric links for Wireless Mesh Networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several types of wireless devices (or nodes). Individual nodes cooperate by forwarding packets to each other, allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric communication is a special feature of WMNs because of the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Ensuring security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in WMNs. This study proposes a novel distributed routing protocol that considers symmetric and asymmetric links. The proposed protocol guarantees the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior studies. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. Using the proposed protocol, mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access. The proposed protocol enhances wireless mesh network coverage and assures security.

  • Throughput Scaling of Ultra-Wide Band Ad Hoc Networks with Infrastructure

    Won-Yong SHIN  Koji ISHIBASHI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2918-2921

    The impact and benefits of infrastructure support are shown by introducing an achievable throughput scaling law of a ultra-wide band (UWB) ad hoc network in which m base stations (BSs) are regularly located. The existing multi-hop scheme consisting of two variants, with and without BS help, is utilized with a slight modification. Our result indicates that the derived throughput scaling depends on the path-loss exponent due to the power-limited characteristics for all operating regimes examined. Furthermore, it is shown that the total throughput scales linearly with parameter m as m is larger than a certain level. It thus turns out the use of infrastructure is also helpful in improving the throughput scaling of UWB networks in some conditions.

  • Exact Modeling and Performance Analysis of Distance-Based Registration Considering the Implicit Registration Effect of Outgoing Calls

    Janghyun BAEK  Taehan LEE  Chesoong KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3019-3023

    We consider distance-based registration (DBR). DBR causes a mobile station (MS) to reregister when the distance between the current base station (BS) and the BS with which it last registered exceeds a distance threshold. The addition of implicit registration to DBR (DBIR) was proposed to improve the performance of DBR, and its performance has also been presented using a continuous-time Markov chain. In this study, we point out some problems of the previous DBIR performance analysis, and we propose a new model of the DBIR to analyze its exact performance. Using the new method, we show that DBIR is always superior to DBR, and the extent of the improvement is generally greater than what is currently known.

  • 3-Way Software Testing with Budget Constraints

    Soumen MAITY  

     
    LETTER

      Vol:
    E95-D No:9
      Page(s):
    2227-2231

    In most software development environments, time, computing and human resources needed to perform the testing of a component is strictly limited. In order to deal with such situations, this paper proposes a method of creating the best possible test suite (covering the maximum number of 3-tuples) within a fixed number of test cases.

  • Outlier Detection and Removal for HMM-Based Speech Synthesis with an Insufficient Speech Database

    Doo Hwa HONG  June Sig SUNG  Kyung Hwan OH  Nam Soo KIM  

     
    LETTER-Speech and Hearing

      Vol:
    E95-D No:9
      Page(s):
    2351-2354

    Decision tree-based clustering and parameter estimation are essential steps in the training part of an HMM-based speech synthesis system. These two steps are usually performed based on the maximum likelihood (ML) criterion. However, one of the drawbacks of the ML criterion is that it is sensitive to outliers which usually result in quality degradation of the synthesized speech. In this letter, we propose an approach to detect and remove outliers for HMM-based speech synthesis. Experimental results show that the proposed approach can improve the synthetic speech, particularly when the available training speech database is insufficient.

  • Class-Based N-Gram Language Model for New Words Using Out-of-Vocabulary to In-Vocabulary Similarity

    Welly NAPTALI  Masatoshi TSUCHIYA  Seiichi NAKAGAWA  

     
    PAPER-Speech and Hearing

      Vol:
    E95-D No:9
      Page(s):
    2308-2317

    Out-of-vocabulary (OOV) words create serious problems for automatic speech recognition (ASR) systems. Not only are they miss-recognized as in-vocabulary (IV) words with similar phonetics, but the error also causes further errors in nearby words. Language models (LMs) for most open vocabulary ASR systems treat OOV words as a single entity, ignoring the linguistic information. In this paper we present a class-based n-gram LM that is able to deal with OOV words by treating each of them individually without retraining all the LM parameters. OOV words are assigned to IV classes consisting of similar semantic meanings for IV words. The World Wide Web is used to acquire additional data for finding the relation between the OOV and IV words. An evaluation based on adjusted perplexity and word-error-rate was carried out on the Wall Street Journal corpus. The result suggests the preference of the use of multiple classes for OOV words, instead of one unknown class.

881-900hit(2849hit)