The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

4441-4460hit(18690hit)

  • On the Cross-Correlation between Two Decimated p-Ary m-Sequences by 2 and 4pn/2-2

    Ji-Youp KIM  Chang-Min CHO  Wijik LEE  Jong-Seon NO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:3
      Page(s):
    415-421

    Based on the work by Helleseth [1], for an odd prime p and an even integer n=2m, the cross-correlation values between two decimated m-sequences by the decimation factors 2 and 4pn/2-2 are derived. Their cross-correlation function is at most 4-valued, that is, $igg { rac{-1 pm p^{n/2}}{2}, rac{-1 + 3p^{n/2}}{2}, rac{-1 + 5p^{n/2}}{2} igg }$. From this result, for pm ≠ 2 mod 3, a new sequence family with family size 4N and the maximum correlation magnitude upper bounded by $ rac{-1 + 5p^{n/2}}{2} simeq rac{5}{sqrt{2}}sqrt{N}$ is constructed, where $N = rac{p^n-1}{2}$ is the period of sequences in the family.

  • A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures

    Yoon-Ho CHOI  Han-You JEONG  Seung-Woo SEO  

     
    PAPER-Information Network

      Vol:
    E98-D No:3
      Page(s):
    637-648

    During the investment process for enhancing the level of IT security, organizations typically rely on two kinds of security countermeasures, i.e., proactive security countermeasures (PSCs) and reactive security countermeasures (RSCs). The PSCs are known to prevent security incidents before their occurrence, while the RSCs identify security incidents and recover the damaged hardware and software during or after their occurrence. Some researchers studied the effect of the integration of PSCs and RSCs, and showed that the integration can control unwanted incidents better than a single type of security countermeasure. However, the studies were made mostly in a qualitative manner, not in a quantitative manner. In this paper, we focus on deriving a quantitative model that analyzes the influence of different conditions on the efficiency of the integrated security countermeasures. Using the proposed model, we analyze for the first time how vulnerability and the potential exploits resulting from such vulnerability can affect the efficiency of the integrated security countermeasures; furthermore, we analytically verify that as the efficiency of PSCs increases, the burden of RSCs decreases, and vice versa. Also, we describe how to select possibly optimal configurations of the integrated security countermeasures.

  • An Efficient Filtering Method for Scalable Face Image Retrieval

    Deokmin HAAM  Hyeon-Gyu KIM  Myoung-Ho KIM  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    733-736

    This paper presents a filtering method for efficient face image retrieval over large volume of face databases. The proposed method employs a new face image descriptor, called a cell-orientation vector (COV). It has a simple form: a 72-dimensional vector of integers from 0 to 8. Despite of its simplicity, it achieves high accuracy and efficiency. Our experimental results show that the proposed method based on COVs provides better performance than a recent approach based on identity-based quantization in terms of both accuracy and efficiency.

  • Improved Direction-of-Arrival Estimation for Uncorrelated and Coherent Signals in the Presence of Multipath Propagation

    Xiao Yu LUO  Ping WEI  Lu GAN  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:3
      Page(s):
    881-884

    Recently, Gan and Luo have proposed a direction-of-arrival estimation method for uncorrelated and coherent signals in the presence of multipath propagation [3]. In their method, uncorrelated and coherent signals are distinguished by rotational invariance techniques and the property of the moduli of eigenvalues. However, due to the limitation of finite number of sensors, the pseudo-inverse matrix derived in this method is an approximate one. When the number of sensors is small, the approximation error is large, which adversely affects the property of the moduli of eigenvalues. Consequently, the method in [3] performs poorly in identifying uncorrelated signals under such circumstance. Moreover, in cases of small number of snapshots and low signal to noise ratio, the performance of their method is poor as well. Therefore, in this letter we first study the approximation in [3] and then propose an improved method that performs better in distinguishing between uncorrelated signals and coherent signals and in the aforementioned two cases. The simulation results demonstrate the effectiveness and efficiency of the proposed method.

  • Discrete-Time Linear Quadratic Optimal Control via Double Generating Functions

    Dijian CHEN  Zhiwei HAO  Kenji FUJIMOTO  Tatsuya SUZUKI  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:3
      Page(s):
    833-842

    This paper develops the double generating function method for the discrete-time linear quadratic optimal control problem. This method can give generators for optimal solutions only in terms of pre-computed coefficients and boundary conditions, which is useful for the on-line repetitive computation for different boundary conditions. Moreover, since each generator contains inverse terms, the invertibility analysis is also performed to conclude that the terms in the generators constructed by double generating functions with opposite time directions are invertible under some mild conditions, while the terms with the same time directions will become singular when the time goes infinity which may cause instability in numerical computations. Examples demonstrate the effectiveness of the developed method.

  • Superconducting On-Chip Spectrometery for Millimeter-submillimeter Wave Astronomy Open Access

    Akira ENDO  

     
    INVITED PAPER

      Vol:
    E98-C No:3
      Page(s):
    219-226

    Since the birth of astrophysics, astronomers have been using free-space optics to analyze light falling on Earth. In the future however, thanks to the advances in photonics and nanoscience/nanotechnology, much of the manipulation of light might be carried out using not optics but confined waveguides, or circuits, on a chip. This new generation of instruments will be not only extremely compact, but also powerful in performance because the integration enables a greater degree of multiplexing. The benefit is especially profound for space- or air-borne observatories, where size, weight, and mechanical reliability are of top priority. Recently, several groups around the world are trying to integrate ultra-wideband (UWB), low-resolution spectrometers for millimeter-submillimeter waves onto microchips, using superconducting microelectronics. The scope of this Paper is to provide a general introduction and a review of the state-of-the-art of this rapidly advancing field.

  • A Weighted Max-Min Ant Colony Algorithm for TSP Instances

    Yun BU  Tian Qian LI  Qiang ZHANG  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E98-A No:3
      Page(s):
    894-897

    It is very difficult to know evolution state of ACO in its working. To solve the problem, we propose using colony entropy and mean colony entropy to monitor the algorithm. The two functions show fluctuation and declining trends depended on time t in a tour and iteration number. According to the principle, that each updated edge will get the same increment is improper. Then a weighted algorithm is proposed to calculate each arc's increment based on its selected probability. The strategy can provide more exploration to help to find the global optimum value, and experiments show its improved performance.

  • Sum-Rate Analysis for Centralized and Distributed Antenna Systems with Spatial Correlation and Inter-Cell Interference

    Ou ZHAO  Hidekazu MURATA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    449-455

    In order to verify the channel sum-rate improvement by multi-user multiple-input multiple-output (MU-MIMO) transmission in distributed antenna systems (DASs), we investigate and compare the characteristics of channel sum-rates in both centralized antenna systems (CASs) and DASs under the effects of path loss, spatially correlated shadowing, correlated multi-path fading, and inter-cell interference. In this paper, we introduce two different types of functions to model the shadowing, auto-correlation and cross-correlation, and a typical exponential decay function to model the multi-path fading correlation. Thus, we obtain the distribution of the channel sum-rate and investigate its characteristics. Computer simulation results indicate that DAS can improve the performance of the channel sum-rate compared to CAS, even in the case under consideration. However, this improvement decreases as interference power increases. Moreover, the decrease in the channel sum-rate due to the increase in the interference power becomes slow under the effect of shadowing correlation. In addition, some other analyses on the shadowing correlation that occurs on both the transmit and receiver sides are provided. These analysis results show that the average channel sum-rate in a DAS without inter-cell interference considerably decreases because of the shadowing correlation. In contrast, there appears to be no change in the CAS. Furthermore, there are two different types of sum-rate changes in a DAS because of the difference in shadowing auto-correlation and cross-correlation.

  • Non-orthogonal Multiple Access (NOMA) with Successive Interference Cancellation for Future Radio Access Open Access

    Kenichi HIGUCHI  Anass BENJEBBOUR  

     
    Invited Survey Paper-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    403-414

    This paper presents our investigation of non-orthogonal multiple access (NOMA) as a novel and promising power-domain user multiplexing scheme for future radio access. Based on information theory, we can expect that NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes especially significant when the channel conditions among the non-orthogonally multiplexed users are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect experienced in cellular environments. In this paper, we describe the basic principle of NOMA in both the downlink and uplink and then present our proposed NOMA scheme for the scenario where the base station is equipped with multiple antennas. Simulation results show the potential system-level throughput gains of NOMA relative to OMA.

  • Node Query Preservation for Deterministic Linear Top-Down Tree Transducers

    Kazuki MIYAHARA  Kenji HASHIMOTO  Hiroyuki SEKI  

     
    PAPER

      Vol:
    E98-D No:3
      Page(s):
    512-523

    This paper discusses the decidability of node query preservation problems for tree transducers. We assume a transformation given by a deterministic linear top-down data tree transducer (abbreviated as DLTV) and an n-ary query based on runs of a tree automaton. We say that a DLTV Tr strongly preserves a query Q if there is a query Q' such that for every tree t, the answer set of Q' for Tr(t) is equal to the answer set of Q for t. We also say that Tr weakly preserves Q if there is a query Q' such that for every t, the answer set of Q' for Tr(t) includes the answer set of Q for t. We show that the weak preservation problem is coNP-complete and the strong preservation problem is in 2-EXPTIME. We also show that the problems are decidable when a given transducer is a functional extended linear top-down data tree transducer with regular look-ahead, which is a more expressive transducer than DLTV.

  • Discriminative Pronunciation Modeling Using the MPE Criterion

    Meixu SONG  Jielin PAN  Qingwei ZHAO  Yonghong YAN  

     
    LETTER-Speech and Hearing

      Pubricized:
    2014/12/02
      Vol:
    E98-D No:3
      Page(s):
    717-720

    Introducing pronunciation models into decoding has been proven to be benefit to LVCSR. In this paper, a discriminative pronunciation modeling method is presented, within the framework of the Minimum Phone Error (MPE) training for HMM/GMM. In order to bring the pronunciation models into the MPE training, the auxiliary function is rewritten at word level and decomposes into two parts. One is for co-training the acoustic models, and the other is for discriminatively training the pronunciation models. On Mandarin conversational telephone speech recognition task, compared to the baseline using a canonical lexicon, the discriminative pronunciation models reduced the absolute Character Error Rate (CER) by 0.7% on LDC test set, and with the acoustic model co-training, 0.8% additional CER decrease had been achieved.

  • Analysis of Noteworthy Issues in Illumination Processing for Face Recognition

    Min YAO  Hiroshi NAGAHASHI  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E98-D No:3
      Page(s):
    681-691

    Face recognition under variable illumination conditions is a challenging task. Numbers of approaches have been developed for solving the illumination problem. In this paper, we summarize and analyze some noteworthy issues in illumination processing for face recognition by reviewing various representative approaches. These issues include a principle that associates various approaches with a commonly used reflectance model and the shared considerations like contribution of basic processing methods, processing domain, feature scale, and a common problem. We also address a more essential question-what to actually normalize. Through the discussion on these issues, we also provide suggestions on potential directions for future research. In addition, we conduct evaluation experiments on 1) contribution of fundamental illumination correction to illumination insensitive face recognition and 2) comparative performance of various approaches. Experimental results show that the approaches with fundamental illumination correction methods are more insensitive to extreme illumination than without them. Tan and Triggs' method (TT) using L1 norm achieves the best results among nine tested approaches.

  • A High Performance FPGA Implementation of 256-bit Elliptic Curve Cryptography Processor Over GF(p)

    Xiang FENG  Shuguo LI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    863-869

    Field Programmable Gate Array (FPGA) implementation of Elliptic Curve Cryptography (ECC) over GF(p) is commonly not fast enough to meet the request of high-performance applications. There are three critical factors to determine the performance of ECC processor over GF(p): multiplication structure, modular multiplication algorithm, and scalar point multiplication scheduling. This work proposes a novel multiplication structure which is a two-stage pipeline on the basis of Karatsuba-Ofman algorithm. With the proposed multiplication structure, we design a 256-bit modular multiplier based on Improved Barret Modular Multiplication algorithm. Upon the modular multiplier, we finish the scalar point multiplication scheduling and implement a high-performance ECC processor on FPGA. Compared with the previous modular multipliers, our modular multiplier reduces the 256-bit modular multiplication time by 28% at least. Synthesis result on Altera Stratix II shows that our ECC processor can complete a 256-bit ECC scalar point multiplication in 0.51ms, which is at least 1.3 times faster than the currently reported FPGA ECC processors over GF(p).

  • Resonant Tunneling Super Regenerative Detectors Detecting Higher Frequency Signals than Their Free-Running Oscillation Frequency

    Jie PAN  Yuichiro KAKUTANI  Taishu NAKAYAMA  Masayuki MORI  Koichi MAEZAWA  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E98-C No:3
      Page(s):
    260-266

    Super regenerative detectors using a resonant tunneling diode (RTD) were fabricated and investigated for ultra-high frequency detectors. A key point is to use the RTD super regenerative detector for detecting much higher frequencies than the free-running oscillation frequency of the detector. This is possible owing to the superior high frequency characteristics of the RTDs. This has various advantages, such as circuit simplicity, easy design, and low power consumption. Clear detection of 50,GHz signal was demonstrated with a super regenerative detector which has 1.5,GHz free-running frequency. Moreover, detailed experiments revealed that the frequency dependence of the detection efficiency is smooth, and the harmonic frequencies have no effect. This is advantageous for high frequency detection.

  • Spatial Channel Mapping Matrix Design in Single-Relay System

    ChaoYi ZHANG  YanDong ZHAO  DongYang WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    477-484

    Multi-antenna relay transport protocols are analysed, the transmitting matrix of relay node can split into a forward and a backward filters, and these two filters are cascade connection. Based on the zero-forcing relaying protocol, a spatial channel mapping matrix is added between these two filters, and a unified framework of spatial channel mapping matrix is proposed. Then, various linear system designs are summarized, the spatial channel mapping matrix is used to reduce destination noise, so that the relaying noise is suppressed in destination node, and the transmitting power of relay is efficiently utilized. Meanwhile, source node preprocessing operation and destination node equalizer are considered. Simulation results show that the spatial channel mapping matrix has an advantage in terms of system outage probability and capacity performance, and the result is consistent with theoretical analysis.

  • Adaptive TTL Control to Minimize Resource Cost in Hierarchical Caching Networks

    Satoshi IMAI  Kenji LEIBNITZ  Masayuki MURATA  

     
    PAPER-Internet Architecture and Protocols

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    565-577

    Content caching networks like Information-Centric Networking (ICN) are beneficial to reduce the network traffic by storing content data on routers near to users. In ICN, it becomes an important issue to manage system resources, such as storage and network bandwidth, which are influenced by cache characteristics of each cache node. Meanwhile, cache aging techniques based on Time-To-Live (TTL) of content facilitate analyzing cache characteristics and can realize appropriate resource management by setting efficient TTLs. However, it is difficult to search for the efficient TTLs in a distributed cache system connected by multiple cache nodes. Therefore, we propose an adaptive control mechanism of the TTL value of content in distributed cache systems by using predictive models which can estimate the impact of the TTL values on network resources and cache performance. Furthermore, we show the effectiveness of the proposed mechanism.

  • Extraction of Blood Vessels in Retinal Images Using Resampling High-Order Background Estimation

    Sukritta PARIPURANA  Werapon CHIRACHARIT  Kosin CHAMNONGTHAI  Hideo SAITO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2014/12/12
      Vol:
    E98-D No:3
      Page(s):
    692-703

    In retinal blood vessel extraction through background removal, the vessels in a fundus image which appear in a higher illumination variance area are often missing after the background is removed. This is because the intensity values of the vessel and the background are nearly the same. Thus, the estimated background should be robust to changes of the illumination intensity. This paper proposes retinal blood vessel extraction using background estimation. The estimated background is calculated by using a weight surface fitting method with a high degree polynomial. Bright pixels are defined as unwanted data and are set as zero in a weight matrix. To fit a retinal surface with a higher degree polynomial, fundus images are reduced in size by different scaling parameters in order to reduce the processing time and complexity in calculation. The estimated background is then removed from the original image. The candidate vessel pixels are extracted from the image by using the local threshold values. To identify the true vessel region, the candidate vessel pixels are dilated from the candidate. After that, the active contour without edge method is applied. The experimental results show that the efficiency of the proposed method is higher than the conventional low-pass filter and the conventional surface fitting method. Moreover, rescaling an image down using the scaling parameter at 0.25 before background estimation provides as good a result as a non-rescaled image does. The correlation value between the non-rescaled image and the rescaled image is 0.99. The results of the proposed method in the sensitivity, the specificity, the accuracy, the area under the receiver operating characteristic (ROC) curve (AUC) and the processing time per image are 0.7994, 0.9717, 0.9543, 0.9676 and 1.8320 seconds for the DRIVE database respectively.

  • Efficient Partial Single Relay Selection Scheme for Wireless Communications

    Sung-Bok CHOI  Young-Hwan YOU  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:3
      Page(s):
    923-926

    Many wireless communication systems use a relay station for cooperative diversity or cell coverage extension. In this letter, an efficient partial single relay selection scheme is proposed for wireless communications. The conventional schemes such as the best harmonic mean and the threshold-based relay selection should know channel state informaion (CSI), or noise variance at all stations in advance. But the proposed scheme does not require any priori information. It uses a characteristic of the repeated signal pattern at candidates of the relay station. Simulation results show that the performance of proposed scheme is very close to the best harmonic mean relay selection scheme as one of the optimal relay selection schemes.

  • Interference Mitigation Framework Based on Interference Alignment for Femtocell-Macrocell Two Tier Cellular Systems

    Mohamed RIHAN  Maha ELSABROUTY  Osamu MUTA  Hiroshi FURUKAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    467-476

    This paper presents a downlink interference mitigation framework for two-tier heterogeneous networks, that consist of spectrum-sharing macrocells and femtocells*. This framework establishes cooperation between the two tiers through two algorithms, namely, the restricted waterfilling (RWF) algorithm and iterative reweighted least squares interference alignment (IRLS-IA) algorithm. The proposed framework models the macrocell-femtocell two-tier cellular system as an overlay cognitive radio system in which the macrocell system plays the role of the primary user (PU) while the femtocell networks play the role of the cognitive secondary users (SUs). Through the RWF algorithm, the macrocell basestation (MBS) cooperates with the femtocell basestations (FBSs) by releasing some of its eigenmodes to the FBSs to do their transmissions even if the traffic is heavy and the MBS's signal to noise power ratio (SNR) is high. Then, the FBSs are expected to achieve a near optimum sum rate through employing the IRLS-IA algorithm to mitigate both the co-tier and cross-tier interference at the femtocell users' (FUs) receivers. Simulation results show that the proposed IRLS-IA approach provides an improved sum rate for the femtocell users compared to the conventional IA techniques, such as the leakage minimization approach and the nuclear norm based rank constraint rank minimization approach. Additionally, the proposed framework involving both IRLS-IA and RWF algorithms provides an improved total system sum rate compared with the legacy approaches for the case of multiple femtocell networks.

  • Virtual Network Embedding across Multiple Domains with Secure Multi-Party Computation

    Toru MANO  Takeru INOUE  Kimihiro MIZUTANI  Osamu AKASHI  

     
    PAPER-Network

      Vol:
    E98-B No:3
      Page(s):
    437-448

    Network virtualization is one of the promising technologies that can increase flexibility, diversity, and manageability of networks. Building optimal virtual networks across multiple domains is getting much attention, but existing studies were based on an unrealistic assumption, that is, providers' private information can be disclosed; as is well known, providers never actually do that. In this paper, we propose a new method that solves this multi-domain problem without revealing providers' private information. Our method uses an advanced secure computation technique called multi-party computation (MPC). Although MPC enables existing unsecured methods to optimize virtual networks securely, it requires very large time to finish the optimization due to the MPC's complex distributed protocols. Our method, in contrast, is designed to involve only a small number of MPC operations to find the optimal solution, and it allows providers to execute a large part of the optimization process independently without heavy distributed protocols. Evaluation results show that our method is faster than an existing method enhanced with MPC by several orders of magnitude. We also unveil that our method has the same level of embedding cost.

4441-4460hit(18690hit)