The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

3901-3920hit(18690hit)

  • Single Image Super Resolution by l2 Approximation with Random Sampled Dictionary

    Takanori FUJISAWA  Taichi YOSHIDA  Kazu MISHIBA  Masaaki IKEHARA  

     
    PAPER-Image

      Vol:
    E99-A No:2
      Page(s):
    612-620

    In this paper, we propose an example-based single image super resolution (SR) method by l2 approximation with self-sampled image patches. Example-based super resolution methods can reconstruct high resolution image patches by a linear combination of atoms in an overcomplete dictionary. This reconstruction requires a pair of two dictionaries created by tremendous low and high resolution image pairs from the prepared image databases. In our method, we introduce the dictionary by random sampling patches from just an input image and eliminate its training process. This dictionary exploits the self-similarity of images and it will no more depend on external image sets, which consern the storage space or the accuracy of referred image sets. In addition, we modified the approximation of input image to an l2-norm minimization problem, instead of commonly used sparse approximation such as l1-norm regularization. The l2 approximation has an advantage of computational cost by only solving an inverse problem. Through some experiments, the proposed method drastically reduces the computational time for the SR, and it provides a comparable performance to the conventional example-based SR methods with an l1 approximation and dictionary training.

  • Simple Primary User Signal Area Estimation for Spectrum Measurement

    Kenta UMEBAYASHI  Kazuki MORIWAKI  Riki MIZUCHI  Hiroki IWATA  Samuli TIIRO  Janne J. LEHTOMÄKI  Miguel LÓPEZ-BENÍTEZ  Yasuo SUZUKI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:2
      Page(s):
    523-532

    This paper investigates a signal area (SA) estimation method for wideband and long time duration spectrum measurements for dynamic spectrum access. SA denotes the area (in time/frequency domain) occupied by the primary user's signal. The traditional approach, which utilizes only Fourier transform (FT) and energy detector (ED) for SA estimation, can achieve low complexity, but its estimation performance is not very high. Against this issue, we apply post-processing to improve the performance of the FT-based ED. Our proposed method, simple SA (S-SA) estimation, exploits the correlation of the spectrum states among the neighboring tiles and the fact that SA typically has a rectangular shape to estimate SA with high accuracy and relatively low complexity compared to a conventional method, contour tracing SA (CT-SA) estimation. Numerical results will show that the S-SA estimation method can achieve better detection performance. The SA estimation and processing can reduce the number of bits needed to store/transmit the observed information compared to the FT-based ED. Thus, in addition to improved detection performance it also compresses the data.

  • Frequency-Domain Differential Coding Schemes under Frequency-Selective Fading Environment in Adaptive Baseband Radio

    Jin NAKAZATO  Daiki OKUYAMA  Yuki MORIMOTO  Yoshio KARASAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:2
      Page(s):
    488-498

    In our previous paper, we presented a concept of “Baseband Radio” as an ideal of future wireless communication scheme. Furthermore, for enhancing the adaptability of baseband radio, the adaptive baseband radio was discussed as the ultimate communication system; it integrates the functions of cognitive radio and software-defined radio. In this paper, two transmission schemes that take advantage of adaptive baseband radio are introduced and the results of a performance evaluation are presented. The first one is a scheme based on DSFBC for realizing higher reliability; it allows the flexible use of frequency bands over a wide range of white space. The second one is a low-power-density communication scheme with spectrum-spreading by means of frequency-domain differential coding so that the secondary system does not seriously interfere with primary-user systems that have been assigned the same frequency band.

  • Optical Layer 2 Switch Network with Bufferless Optical TDM and Dynamic Bandwidth Allocation

    Kyota HATTORI  Toru HOMEMOTO  Masahiro NAKAGAWA  Naoki KIMISHIMA  Masaru KATAYAMA  Akira MISAWA  

     
    PAPER

      Vol:
    E99-C No:2
      Page(s):
    189-202

    The traffic of the future aggregation network will dynamically change not only in volume but also destination to support the application of virtualization technology to network edge equipment to achieve cost-effectiveness. Therefore, future aggregation network will have to accommodate this traffic cost-effectively, despite dynamic changes in both volume and destination. To correspond to this trend, in this paper, we propose an optical layer 2 switch network based on bufferless optical time division multiplexing (TDM) and dynamic bandwidth allocation to achieve a future aggregation network cost-effectively. We show here that our proposed network architecture effectively reduced the number of wavelengths and optical interfaces by application of bufferless optical TDM technology and dynamic bandwidth allocation to the aggregation network.

  • Energy-Efficient Distributed Spectrum Sensing with Combined Censoring in Cognitive Radios

    Li FENG  Yujun KUANG  Binwei WU  Zeyang DAI  Qin YU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:2
      Page(s):
    455-464

    In this paper, we propose a novel censor-based cooperative spectrum sensing strategy, called adaptive energy-efficient sensing (AES), in which both sequential sensing and censoring report mechanism are employed, aiming to reduce the sensing energy consumption of secondary user relays (SRs). In AES, an anchor secondary user (SU) requires cooperative sensing only when it does not detect the presence of PU by itself, and the cooperative SR adopts decision censoring report only if the sensing result differs from its previous one. We derive the generalized-form expressions false alarm and detection probabilities over Rayleigh fading channels for AES. The sensing energy consumption is also analyzed. Then, we study sensing energy overhead minimization problem and show that the sensing time allocation can be optimized to minimize the miss detection probability and sensing energy overhead. Finally, numerical results show that the proposed strategy can remarkably reduce the sensing energy consumption while only slightly degrading the detection performance compared with traditional scheme.

  • Using Trust of Social Ties for Recommendation

    Liang CHEN  Chengcheng SHAO  Peidong ZHU  Haoyang ZHU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2015/10/30
      Vol:
    E99-D No:2
      Page(s):
    397-405

    Nowadays, with the development of online social networks (OSN), a mass of online social information has been generated in OSN, which has triggered research on social recommendation. Collaborative filtering, as one of the most popular techniques in social recommendation, faces several challenges, such as data sparsity, cold-start users and prediction quality. The motivation of our work is to deal with the above challenges by effectively combining collaborative filtering technology with social information. The trust relationship has been identified as a useful means of using social information to improve the quality of recommendation. In this paper, we propose a trust-based recommendation approach which uses GlobalTrust (GT) to represent the trust value among users as neighboring nodes. A matrix factorization based on singular value decomposition is used to get a trust network built on the GT value. The recommendation results are obtained through a modified random walk algorithm called GlobalTrustWalker. Through experiments on a real-world sparser dataset, we demonstrate that the proposed approach can better utilize users' social trust information and improve the recommendation accuracy on cold-start users.

  • An Integrative Modelling Language for Agent-Based Simulation of Traffic

    Alberto FERNÁNDEZ-ISABEL  Rubén FUENTES-FERNÁNDEZ  

     
    PAPER-Information Network

      Pubricized:
    2015/10/27
      Vol:
    E99-D No:2
      Page(s):
    406-414

    Traffic is a key aspect of everyday life. Its study, as it happens with other complex phenomena, has found in simulation a basic tool. However, the use of simulations faces important limitations. Building them requires considering different aspects of traffic (e.g. urbanism, car features, and individual drivers) with their specific theories, that must be integrated to provide a coherent model. There is also a variety of simulation platforms with different requirements. Many of these problems demand multi-disciplinary teams, where the different backgrounds can hinder the communication and validation of simulations. The Model-Driven Engineering (MDE) of simulations has been proposed in other fields to address these issues. Such approaches develop graphical Modelling Languages (MLs) that researchers use to model their problems, and then semi-automatically generate simulations from those models. Working in this way promotes communication, platform independence, incremental development, and reutilisation. This paper presents the first steps for a MDE framework for traffic simulations. It introduces a tailored extensible ML for domain experts. The ML is focused on human actions, so it adopts an Agent-Based Modelling perspective. Regarding traffic aspects, it includes concepts commonly found in related literature following the Driver-Vehicle-Environment model. The language is also suitable to accommodate additional theories using its extension mechanisms. The approach is supported by an infrastructure developed using Eclipse MDE projects: the ML is specified with Ecore, and a model editor and a code generator tools are provided. A case study illustrates how to develop a simulation based on a driver's behaviour theory for a specific target platform using these elements.

  • Proof Test of Chaos-Based Hierarchical Network Control Using Packet-Level Network Simulation

    Yusuke SAKUMOTO  Chisa TAKANO  Masaki AIDA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E99-B No:2
      Page(s):
    402-411

    Computer networks require sophisticated control mechanisms to realize fair resource allocation among users in conjunction with efficient resource usage. To successfully realize fair resource allocation in a network, someone should control the behavior of each user by considering fairness. To provide efficient resource utilization, someone should control the behavior of all users by considering efficiency. To realize both control goals with different granularities at the same time, a hierarchical network control mechanism that combines microscopic control (i.e., fairness control) and macroscopic control (i.e., efficiency control) is required. In previous works, Aida proposed the concept of chaos-based hierarchical network control. Next, as an application of the chaos-based concept, Aida designed a fundamental framework of hierarchical transmission rate control based on the chaos of coupled relaxation oscillators. To clarify the realization of the chaos-based concept, one should specify the chaos-based hierarchical transmission rate control in enough detail to work in an actual network, and confirm that it works as intended. In this study, we implement the chaos-based hierarchical transmission rate control in a popular network simulator, ns-2, and confirm its operation through our experimentation. Results verify that the chaos-based concept can be successfully realized in TCP/IP networks.

  • An Effective Carrier Frequency and Phase Offset Tracking Scheme in the Case of Symbol Rate Sampling

    Yunhua LI  Bin TIAN  Ke-Chu YI  Quan YU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:2
      Page(s):
    337-346

    In modern communication systems, it is a critical and challenging issue for existing carrier tracking techniques to achieve near-ideal carrier synchronization without the help of pilot signals in the case of symbol rate sampling and low signal-to-noise ratio (SNR). To overcome this issue, this paper proposes an effective carrier frequency and phase offset tracking scheme which has a robust confluent synchronization architecture whose main components are a digital frequency-locked loop (FLL), a digital phase-locked loop (PLL), a modified symbol hard decision block and some sampling rate conversion blocks. As received signals are sampled at symbol baud rate, this carrier tracking scheme is still able to obtain precise estimated values of carrier synchronization parameters under the condition of very low SNRs. The performance of the proposed carrier synchronization scheme is also evaluated by using Monte-Carlo method. Simulation results confirm the feasibility of this carrier tracking scheme and demonstrate that it ensures that both the rate-3/4 irregular low-density parity-code (LDPC) coded system and the military voice transmission system utilizing the direct sequence spread spectrum (DSSS) technique achieve satisfactory bit-error rate (BER) performance at correspondingly low SNRs.

  • Contour-Based Binary Image Orientation Detection by Orientation Context and Roulette Distance

    Jian ZHOU  Takafumi MATSUMARU  

     
    PAPER-Image

      Vol:
    E99-A No:2
      Page(s):
    621-633

    This paper proposes a novel technology to detect the orientation of an image relying on its contour which is noised to varying degrees. For the image orientation detection, most methods regard to the landscape image and the image taken of a single object. In these cases, the contours of these images are supposed to be immune to the noise. This paper focuses on the the contour noised after image segmentation. A polar orientation descriptor Orientation Context is viewed as a feature to describe the coarse distribution of the contour points. This descriptor is verified to be independent of translation, isotropic scaling, and rotation transformation by theory and experiment. The relative orientation depends on the minimum distance Roulette Distance between the descriptor of a template image and that of a test image. The proposed method is capable of detecting the direction on the interval from 0 to 359 degrees which is wider than the former contour-based means (Distance Phase [1], from 0 to 179 degrees). What's more, the results of experiments show that not only the normal binary image (Noise-0, Accuracy-1: 84.8%) (defined later) achieves more accurate orientation but also the binary image with slight contour noise (Noise-1, Accuracy-1: 73.5%) could obtain more precise orientation compared to Distance Phase (Noise-0, Accuracy-1: 56.3%; Noise-1, Accuracy-1: 27.5%). Although the proposed method (O(op2)) takes more time to detect the orientation than Distance Phase (O(st)), it could be realized including the preprocessing in real time test with a frame rate of 30.

  • Dynamic Subwavelength Protection Using High-Speed Optical Switches for Optical Metro Networks

    Masahiro NAKAGAWA  Kyota HATTORI  Toshiya MATSUDA  Masaru KATAYAMA  Katsutoshi KODA  

     
    PAPER

      Vol:
    E99-C No:2
      Page(s):
    203-211

    Flexible resource utilization in terms of adaptive use of optical bandwidth with agile reconfigurability is key for future metro networks. To address this issue, we focus on optical subwavelength switched network architectures that leverage high-speed optical switching technologies and can accommodate dynamic traffic cost-effectively. Although optical subwavelength switched networks have been attracting attention, most conventional studies apply static (pre-planned) protection scenarios in the networks of limited sizes. In this paper, we discuss optical switch requirements, the use of transceivers, and protection schemes to cost-effectively create large-scale reliable metro networks. We also propose a cost-effective adaptive protection scheme appropriate for optical subwavelength switched networks using our fast time-slot allocation algorithm. The proposed scheme periodically re-optimizes the bandwidth of both working and protection paths to prevent bandwidth resources from being wasted. The numerical examples verify the feasibility of our proposed scheme and the impact on network resources.

  • Temperature Analysis of Liver Tissue in Microwave Coagulation Therapy Considering Tissue Dehydration by Heating

    Yuta ENDO  Kazuyuki SAITO  Koichi ITO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E99-C No:2
      Page(s):
    257-265

    In this study, to obtain a more accurate analysis of the temperature in microwave coagulation therapy (MCT) for liver cancer, the water content ratios of dehydrated liver tissue and the dependencies of the dielectric and thermal constants of the tissue on the water content ratios were investigated in tissue heated at 2.45GHz. Swine liver tissues were heated and dehydrated under various conditions, and the water content ratios and dielectric and thermal constants were measured. The results indicated that the water content ratio of the tissue depended on the heating temperature and that the dielectric constants (relative permittivity and electrical conductivity) and thermal constants (specific heat and thermal conductivity) of the dehydrated tissues strongly depended on the water content ratio. Based on these results, numerical analyses of the electromagnetic field and temperature inside the liver tissue heated with a coaxial-slot antenna were conducted. Incorporating information on the water content ratio improved the accuracy of temperature calculations in MCT.

  • A SOI Cache-Tag Memory with Dual-Rail Wordline Scheme

    Nobutaro SHIBATA  Takako ISHIHARA  

     
    PAPER-Integrated Electronics

      Vol:
    E99-C No:2
      Page(s):
    316-330

    Cache memories are the major application of high-speed SRAMs, and they are frequently installed in high performance logic VLSIs including microprocessors. This paper presents a 4-way set-associative, SOI cache-tag memory. To obtain higher operating speed with less power dissipation, we devised an I/O-separated memory cell with a dual-rail wordline, which is used to transmit complementary selection signals. The address decoding delay was shortened using CMOS dual-rail logic. To enhance the maximum operating frequency, bitline's recovery operations after writing data were eliminated using a memory array configuration without half-selected cells. Moreover, conventional, sensitive but slow differential amplifiers were successfully removed from the data I/O circuitry with a hierarchical bitline scheme. As regards the stored data management, we devised a new hardware-oriented LRU-data replacement algorithm on the basis of 6-bit directed graph. With the experimental results obtained with a test chip fabricated with a 0.25-µm CMOS/SIMOX process, the core of the cache-tag memory with a 1024-set configuration can achieve a 1.5-ns address access time under typical conditions of a 2-V power supply and 25°C. The power dissipation during standby was less than 14 µW, and that at the 500-MHz operation was 13-83 mW, depending on the bit-stream data pattern.

  • QP Selection Optimization for Intra-Frame Encoding Based on Constant Perceptual Quality

    Chao WANG  Xuanqin MOU  Lei ZHANG  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2015/11/17
      Vol:
    E99-D No:2
      Page(s):
    443-453

    In lossy image/video encoding, there is a compromise between the number of bits and the extent of distortion. Optimizing the allocation of bits to different sources, such as frames or blocks, can improve the encoding performance. In intra-frame encoding, due to the dependency among macro blocks (MBs) introduced by intra prediction, the optimization of bit allocation to the MBs usually has high complexity. So far, no practical optimal bit allocation methods for intra-frame encoding exist, and the commonly used method for intra-frame encoding is the fixed-QP method. We suggest that the QP selection inside an image/a frame can be optimized by aiming at the constant perceptual quality (CPQ). We proposed an iteration-based bit allocation scheme for H.264/AVC intra-frame encoding, in which all the local areas (which is defined by a group of MBs (GOMBs) in this paper) in the frame are encoded to have approximately the same perceptual quality. The SSIM index is used to measure the perceptual quality of the GOMBs. The experimental results show that the encoding performance on intra-frames can be improved greatly by the proposed method compared with the fixed-QP method. Furthermore, we show that the optimization on the intra-frame can bring benefits to the whole sequence encoding, since a better reference frame can improve the encoding of the subsequent frames. The proposed method has acceptable encoding complexity for offline applications.

  • Application Authentication System with Efficiently Updatable Signature

    Kazuto OGAWA  Go OHTAKE  

     
    PAPER

      Pubricized:
    2015/10/21
      Vol:
    E99-D No:1
      Page(s):
    69-82

    Broadcasting and communications networks can be used together to offer hybrid broadcasting services that incorporate a variety of personalized information from communications networks in TV programs. To enable these services, many different applications have to be run on a user terminal, and it is necessary to establish an environment where any service provider can create applications and distribute them to users. The danger is that malicious service providers might distribute applications which may cause user terminals to take undesirable actions. To prevent such applications from being distributed, we propose an application authentication protocol for hybrid broadcasting and communications services. Concretely, we modify a key-insulated signature scheme and apply it to this protocol. In the protocol, a broadcaster distributes a distinct signing key to each service provider that the broadcaster trusts. As a result, users can verify that an application is reliable. If a signed application causes an undesirable action, a broadcaster can revoke the privileges and permissions of the service provider. In addition, the broadcaster can update the signing key. That is, our protocol is secure against leakage of the signing key by the broadcaster and service providers. Moreover, a user terminal uses only one verification key for verifying a signature, so the memory needed for storing the verification key in the user terminal is very small. With our protocol, users can securely receive hybrid services from broadcasting and communications networks.

  • Electromagnetic Scattering Analysis from Rectangular Dielectric Cuboids - TE Polarization -

    An Ngoc NGUYEN  Hiroshi SHIRAI  

     
    PAPER

      Vol:
    E99-C No:1
      Page(s):
    11-17

    A high frequency approximation method is proposed to obtain the scattering from rectangular dielectric cuboids. Our formulation is based on a Kirchhoff type aperture integration of the equivalent current sources over the surface of the scattering bodies. The derived formulae have been used to get the radar cross section of cuboids, and the results are compared with those by other methods, such as physical optics, geometrical theory of diffraction, the HFSS simulation and measurements. Good agreement has been observed to confirm the validity of our method.

  • Left-Handed Waveguide Using Cutoff TM-Mode

    Mitsuyoshi KISHIHARA  Yuki MIZUTANI  Isao OHTA  Kensuke OKUBO  Hironori TAKIMOTO  

     
    PAPER

      Vol:
    E99-C No:1
      Page(s):
    61-67

    It has been reported that a left-handed waveguide can be constituted using cutoff TE10 mode of rectangular waveguide. Because the cutoff TE10 mode shows effectively negative permittivity, the left-handed mode propagates by adding series capacitance in the form of short- or open-stubs. This paper suggests a constitution method of left-handed waveguides using cutoff TM mode. In this case, the cutoff TM mode shows effectively negative permeability. Therefore, a left-handed waveguide can be constituted by adding parallel inductance. In this paper, two types of the left-handed waveguides are designed using circular TM01 mode and rectangular TM11 mode, and the dispersion characteristics are numerically investigated. The validity of the constituting principle is confirmed by an experiment.

  • A Precise Model for Cross-Point Memory Array

    Yoshiaki ASAO  Fumio HORIGUCHI  

     
    PAPER-Integrated Electronics

      Vol:
    E99-C No:1
      Page(s):
    119-128

    A simplified circuit has been utilized for fast computation of the current flowing in the cross-point memory array. However, the circuit has a constraint in that the selected cell is located farthest from current drivers so as to estimate the current degraded by metal wire resistance. This is because the length of the current path along the metal wire varies with the selected address in the cross-point memory array. In this paper, a new simplified circuit is proposed for calculating the current at every address in order to take account of the metal wire resistance. By employing the Monte Carlo simulation to solve the proposed simplified circuit, the current distribution across the array is obtained, so that failure rates of read disturbance and write error are estimated precisely. By comparing the conventional and the proposed simplified circuits, it was found that the conventional simplified circuit estimated optimistic failure rates for read disturbance and for write error when the wire resistance was prominent enough as a parasitic resistance.

  • A 60GHz-Band High-Efficiency Antenna with a Thick Resin Layer and Differentially Fed through a Hole in a Silicon Chip

    Naoya OIKAWA  Jiro HIROKAWA  Hiroshi NAKANO  Yasutake HIRACHI  Hiroshi ISONO  Atsushi ISHII  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:1
      Page(s):
    27-32

    For the realization of a high-efficiency antenna for 60GHz-band wireless personal area network, we propose placing a CMOS RF circuit and an antenna on opposing sides of a silicon chip. They are connected with low loss by a coaxial-line structure using a hole opening in the chip. Since the CMOS circuit is driven differentially, a differential-feed antenna is used. In this paper, we design and measure a differential-feed square patch antenna on a silicon chip. To enhance the radiation efficiency, it is placed on a 200µm thick resin layer. The calculated radiation efficiency of 79% includes the connection loss. A prototype antenna is measured in a reverberation chamber, and its radiation efficiency is estimated to be about 81±3%.

  • Distance Estimation Based on Statistical Models of Received Signal Strength

    Masahiro FUJII  Yuma HIROTA  Hiroyuki HATANO  Atsushi ITO  Yu WATANABE  

     
    LETTER

      Vol:
    E99-A No:1
      Page(s):
    199-203

    In this letter, we propose a new distance estimation method based on statistical models of a Received Signal Strength (RSS) at the receiver. The conventional distance estimator estimates the distance between the transmitter and the receiver based on the statistical average of the RSS when the receiver obtains instantaneous RSS and an estimate of the hyperparameters which consists of the path loss exponent and so on. However, it is well-known that instantaneous RSS does not always correspond to the average RSS because the RSS varies in accordance with a statistical model. Although the statistical model has been introduced for the hyperparameters estimation and the localization system, the conventional distance estimator has not yet utilized it. We introduce the statistical model to the distance estimator whose expected value of the estimate corresponds to true distance. Our theoretical analysis establishes that the proposed distance estimator is preferable to the conventional one in order to improve accuracy in the expected value of the distance estimate. Moreover, we evaluate the Mean Square Error (MSE) between true distance and the estimate. We provide evidence that the MSE is always proportional to the square of the distance if the estimate of the hyperparameters is ideally obtained.

3901-3920hit(18690hit)