The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

5301-5320hit(18690hit)

  • Asterisk and Star 16-QAM Golay Complementary Sequence Mates

    Fanxin ZENG  Xiaoping ZENG  Zhenyu ZHANG  Guixin XUAN  

     
    LETTER-Information Theory

      Vol:
    E96-A No:11
      Page(s):
    2294-2298

    In an orthogonal frequency division multiplexing (OFDM) communication system, two users use the same frequencies and number of sub-carriers so as to increase spectrum efficiency. When the codewords employed by them form a Golay complementary sequence (CS) mate, this system enjoys the upper bound of peak-to-mean envelope power ratio (PMEPR) as low as 4. This letter presents a construction method for producing S16-QAM and A16-QAM Golay CS mates, which arrives at the upper bound 4 of PMEPR. And when used as a Golay CS pair, they have an upper bound 2 of PMEPR, which is the same ones in both [18] and [17]. However, both cannot produce such mates.

  • Personalized Emotion Recognition Considering Situational Information and Time Variance of Emotion

    Yong-Soo SEOL  Han-Woo KIM  

     
    PAPER-Human-computer Interaction

      Vol:
    E96-D No:11
      Page(s):
    2409-2416

    To understand human emotion, it is necessary to be aware of the surrounding situation and individual personalities. In most previous studies, however, these important aspects were not considered. Emotion recognition has been considered as a classification problem. In this paper, we attempt new approaches to utilize a person's situational information and personality for use in understanding emotion. We propose a method of extracting situational information and building a personalized emotion model for reflecting the personality of each character in the text. To extract and utilize situational information, we propose a situation model using lexical and syntactic information. In addition, to reflect the personality of an individual, we propose a personalized emotion model using KBANN (Knowledge-based Artificial Neural Network). Our proposed system has the advantage of using a traditional keyword-spotting algorithm. In addition, we also reflect the fact that the strength of emotion decreases over time. Experimental results show that the proposed system can more accurately and intelligently recognize a person's emotion than previous methods.

  • F0 Estimation of Speech Using SRH Based on TV-CAR Speech Analysis

    Keiichi FUNAKI  Takehito HIGA  

     
    LETTER-Engineering Acoustics

      Vol:
    E96-A No:11
      Page(s):
    2187-2190

    This paper proposes novel robust speech F0 estimation using Summation Residual Harmonics (SRH) based on TV-CAR (Time-Varying Complex AR) analysis. The SRH-based F0 estimation was proposed by A. Alwan, in which the criterion is calculated from LP residual signals. The criterion is summation of residual spectrum value for harmonics. In this paper, we propose SRH-based F0 estimation based on the TV-CAR analysis, in which the criterion is calculated from the complex AR residual. Since complex AR residual provides higher resolution of spectrum, it can be considered that the criterion is effective for F0 estimation. The experimental results demonstrate that the proposed method performs better than conventional methods; weighted auto-correlation and YIN.

  • A VLSI Design of a Tomlinson-Harashima Precoder for MU-MIMO Systems Using Arrayed Pipelined Processing

    Kosuke SHIMAZAKI  Shingo YOSHIZAWA  Yasuyuki HATAKAWA  Tomoko MATSUMOTO  Satoshi KONISHI  Yoshikazu MIYANAGA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E96-A No:11
      Page(s):
    2114-2119

    This paper presents a VLSI design of a Tomlinson-Harashima (TH) precoder for multi-user MIMO (MU-MIMO) systems. The TH precoder consists of LQ decomposition (LQD), interference cancellation (IC), and weight coefficient multiplication (WCM) units. The LQ decomposition unit is based on an application specific instruction-set processor (ASIP) architecture with floating-point arithmetic for high accuracy operations. In the IC and WCM units with fixed-point arithmetic, the proposed architecture uses an arrayed pipeline structure to shorten a circuit critical path delay. The implementation result shows that the proposed architecture reduces circuit area and power consumption by 11% and 15%, respectively.

  • A Single Tooth Segmentation Using PCA-Stacked Gabor Filter and Active Contour

    Pramual CHOORAT  Werapon CHIRACHARIT  Kosin CHAMNONGTHAI  Takao ONOYE  

     
    PAPER-Image Processing

      Vol:
    E96-A No:11
      Page(s):
    2169-2178

    In tooth contour extraction there is insufficient intensity difference in x-ray images between the tooth and dental bone. This difference must be enhanced in order to improve the accuracy of tooth segmentation. This paper proposes a method to improve the intensity between the tooth and dental bone. This method consists of an estimation of tooth orientation (intensity projection, smoothing filter, and peak detection) and PCA-Stacked Gabor with ellipse Gabor banks. Tooth orientation estimation is performed to determine the angle of a single oriented tooth. PCA-Stacked Gabor with ellipse Gabor banks is then used, in particular to enhance the border between the tooth and dental bone. Finally, active contour extraction is performed in order to determine tooth contour. In the experiment, in comparison with the conventional active contour without edge (ACWE) method, the average mean square error (MSE) values of extracted tooth contour points are reduced from 26.93% and 16.02% to 19.07% and 13.42% for tooth x-ray type I and type H images, respectively.

  • On Minimum Feedback Vertex Sets in Bipartite Graphs and Degree-Constraint Graphs

    Asahi TAKAOKA  Satoshi TAYU  Shuichi UENO  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:11
      Page(s):
    2327-2332

    We consider the minimum feedback vertex set problem for some bipartite graphs and degree-constrained graphs. We show that the problem is linear time solvable for bipartite permutation graphs and NP-hard for grid intersection graphs. We also show that the problem is solvable in O(n2log 6n) time for n-vertex graphs with maximum degree at most three.

  • Discriminative Approach to Build Hybrid Vocabulary for Conversational Telephone Speech Recognition of Agglutinative Languages

    Xin LI  Jielin PAN  Qingwei ZHAO  Yonghong YAN  

     
    LETTER-Speech and Hearing

      Vol:
    E96-D No:11
      Page(s):
    2478-2482

    Morphemes, which are obtained from morphological parsing, and statistical sub-words, which are derived from data-driven splitting, are commonly used as the recognition units for speech recognition of agglutinative languages. In this letter, we propose a discriminative approach to select the splitting result, which is more likely to improve the recognizer's performance, for each distinct word type. An objective function which involves the unigram language model (LM) probability and the count of misrecognized phones on the acoustic training data is defined and minimized. After determining the splitting result for each word in the text corpus, we select the frequent units to build a hybrid vocabulary including morphemes and statistical sub-words. Compared to a statistical sub-word based system, the hybrid system achieves 0.8% letter error rates (LERs) reduction on the test set.

  • Dynamically Constrained Vector Field Convolution for Active Contour Model

    Guoqi LIU  Zhiheng ZHOU  Shengli XIE  Dongcheng WU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E96-D No:11
      Page(s):
    2500-2503

    Vector field convolution (VFC) provides a successful external force for an active contour model. However, it fails to extract the complex geometries, especially the deep concavity when the initial contour is set outside the object or the concave region. In this letter, dynamically constrained vector field convolution (DCVFC) external force is proposed to solve this problem. In DCVFC, the indicator function with respect to the evolving contour is introduced to restrain the correlation of external forces generated by different edges, and the forces dynamically generated by complex concave edges gradually make the contour move to the object. On the other hand, traditional vector field, a component of the proposed DCVFC, makes the evolving contour stop at the object boundary. The connections between VFC and DCVFC are also analyzed. DCVFC maintains desirable properties of VFC, such as robustness to initialization. Experimental results demonstrate that DCVFC snake provides a much better segmentation than VFC snake.

  • New Perfect Gaussian Integer Sequences of Period pq

    Xiuwen MA  Qiaoyan WEN  Jie ZHANG  Huijuan ZUO  

     
    LETTER-Information Theory

      Vol:
    E96-A No:11
      Page(s):
    2290-2293

    In this letter, by using Whiteman's generalized cyclotomy of order 2 over Zpq, where p, q are twin primes, we construct new perfect Gaussian integer sequences of period pq.

  • Cheating Detectable Secret Sharing Schemes for Random Bit Strings

    Wakaha OGATA  Toshinori ARAKI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:11
      Page(s):
    2230-2234

    In secret sharing scheme, Tompa and Woll considered a problem of cheaters who try to make another participant reconstruct an invalid secret. Later, some models of such cheating were formalized and lower bounds of the size of shares were shown in the situation of fixing the minimum successful cheating probability. Under the assumption that cheaters do not know the distributed secret, no efficient scheme is known which can distribute bit strings. In this paper, we propose an efficient scheme for distributing bit strings with an arbitrary access structure. When distributing a random bit string with threshold access structures, the bit length of shares in the proposed scheme is only a few bits longer than the lower bound.

  • Enhanced Film Grain Noise Removal and Synthesis for High Fidelity Video Coding

    Inseong HWANG  Jinwoo JEONG  Sungjei KIM  Jangwon CHOI  Yoonsik CHOE  

     
    PAPER-Image

      Vol:
    E96-A No:11
      Page(s):
    2253-2264

    In this paper, we propose a novel technique for film grain noise removal and synthesis that can be adopted in high fidelity video coding. Film grain noise enhances the natural appearance of high fidelity video, therefore, it should be preserved. However, film grain noise is a burden to typical video compression systems because it has relatively large energy levels in the high frequency region. In order to improve the coding performance while preserving film grain noise, we propose film grain noise removal in the pre-processing step and film grain noise synthesis in the post processing step. In the pre-processing step, the film grain noise is removed by using temporal and inter-color correlations. Specifically, color image denoisng using inter color prediction provides good denoising performance in the noise-concentrated B plane, because film grain noise has inter-color correlation in the RGB domain. In the post-processing step, we present a noise model to generate noise that is close to the actual noise in terms of a couple of observed statistical properties, such as the inter-color correlation and power of the film grain noise. The results show that the coding gain of the denoised video is higher than for previous works, while the visual quality of the final reconstructed video is well preserved.

  • Auto-Tuning of Thread Assignment for Matrix-Vector Multiplication on GPUs

    Jinwei WANG  Xirong MA  Yuanping ZHU  Jizhou SUN  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:11
      Page(s):
    2319-2326

    Modern GPUs have evolved to become a more general processor capable of executing scientific and engineering computations. It provides a highly parallel computing environment due to its large number of computing cores, which are suitable for numerous data parallel arithmetic computations, particularly linear algebra operations. The matrix-vector multiplication is one of the most important dense linear algebraic operations. It is applied to a diverse set of applications in many fields and must therefore be fully optimized to achieve a high-performance. In this paper, we proposed a novel auto-tuning method for matrix-vector multiplication on GPUs, where the number of assigned threads that are used to compute one element of the result vector can be auto-tuned according to the size of matrix. On the Nvidia's GPU GTX 650 with the most recent Kepler architecture, we developed an auto-tuner that can automatically select the optimal number of assigned threads for calculation. Based on the auto-tuner's result, we developed a versatile generic matrix-vector multiplication kernel with the CUDA programming model. A series of experiments on different shapes and sizes of matrices were conducted for comparing the performance of our kernel with that of the kernels from CUBLAS 5.0, MAGMA 1.3 and a warp method. The experiments results show that the performance of our matrix-vector multiplication kernel is close to the optimal behavior with increasing of the size of the matrix and has very little dependency on the shape of the matrix, which is a significant improvement compared to the other three kernels that exhibit unstable performance behavior for different shapes of matrices.

  • Tracking Analysis of Adaptive Filters with Data Normalization and Error Nonlinearities

    WemerM. WEE  Isao YAMADA  

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:11
      Page(s):
    2198-2208

    This paper presents a unified treatment of the tracking analysis of adaptive filters with data normalization and error nonlinearities. The approach we develop is based on the celebrated energy-conservation framework, which investigates the energy flow through each iteration of an adaptive filter. Aside from deriving earlier results in a unified manner, we obtain new performance results for more general filters without restricting the regression data to a particular distribution. Simulations show good agreement with the theoretical findings.

  • EM Wave Propagation Analysis and Channel Modeling in Aircraft Cabin with Finite Integration Technique

    Chao ZHANG  Junzhou YU  

     
    BRIEF PAPER-Microwaves, Millimeter-Waves

      Vol:
    E96-C No:11
      Page(s):
    1444-1446

    Channel modeling, which is quite important for wireless communications system design, is difficult to be statistically generated from experimental results due to the expense and time constraints. However, with the computational electromagnetics method, the Electro-Magnetic (EM) field can be emulated and the corresponding EM wave propagation scenario can be analyzed. In this letter, the Finite Integration Technique (FIT) method is utilized to calculate the EM wave propagation of the onboard mobile communications in the cabin of an aircraft. With the simulation results, the channel model is established. Compared with Finite-Difference Time-Domain (FDTD), the proposed scheme is more accurate, which is promising to be used in the cabin channel modeling for onboard mobile system design.

  • Color Removal Considering Differences of Colors and Achromatic Color Preservation

    Go TANAKA  Noriaki SUETAKE  Eiji UCHINO  

     
    LETTER-Image

      Vol:
    E96-A No:11
      Page(s):
    2315-2317

    In this letter, a novel color removal method considering differences of colors in an input color image and achromatic color preservation is proposed. The achromatic color preservation is assigning lightness values to gray-levels concerning achromatic pixels for natural impression. The effectiveness and validity of the proposed method are verified by experiments.

  • Generalized Pyramid is NP-Complete

    Chuzo IWAMOTO  Yuta MATSUI  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E96-D No:11
      Page(s):
    2462-2465

    Pyramid is a solitaire game, where the object is to remove all cards from both a pyramidal layout and a stock of cards. Two exposed cards can be matched and removed if their values total 13. Any exposed card of value 13 and the top card of the stock can be discarded immediately. We prove that the generalized version of Pyramid is NP-complete.

  • Basics of Counting Statistics Open Access

    Jun OHKUBO  

     
    INVITED PAPER

      Vol:
    E96-B No:11
      Page(s):
    2733-2740

    In this paper, we briefly review the scheme of counting statistics, in which a probability of the number of monitored or target transitions in a Markov jump process is evaluated. It is generally easy to construct a master equation for the Markov jump process, and the counting statistics enables us to straightforwardly obtain basic equations of the counting statistics from the master equation; the basic equation is used to calculate the cumulant generating function of the probability of the number of target transitions. For stationary cases, the probability is evaluated from the eigenvalue analysis. As for the nonstationary cases, we review a numerical integration scheme to calculate the statistics of the number of transitions.

  • A Resilient Video Streaming System Based on Location-Aware Overlapped Cluster Trees

    Tomoki MOTOHASHI  Akihiro FUJIMOTO  Yusuke HIROTA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Network

      Vol:
    E96-B No:11
      Page(s):
    2865-2874

    For real-time video streaming, tree-based Application Level Multicasts (ALMs) are effective with respect to transmission delay and jitter. In particular, multiple-tree ALMs can alleviate the inefficient use of upload bandwidth among the nodes. However, most conventional multiple-tree ALMs are constructed using a Distributed Hash Table (DHT). This causes considerable delay and consumes substantial network resources because the DHT, generally, does not take distances in the IP network into account. In addition, the network constructed by a DHT has poor churn resilience because the network needs to reconstruct all the substreams of the tree network. In this paper, we propose a construction method involving overlapped cluster trees for delivering streamed data that are churn resilient. In addition, these overlapped cluster trees can decrease both the delay and the consumption of network resources because the node-connecting process takes IP network distances into account. In the proposed method, clusters are divided or merged using their numbers of members to optimize cluster size. We evaluated the performance of the proposed method via extensive computer simulations. The results show that the proposed method is more effective than conventional multiple-tree ALMs.

  • A Jointly Optimized Predictive-Adaptive Partitioned Block Transform for Video Coding

    Di WU  Xiaohai HE  

     
    PAPER-Image Processing

      Vol:
    E96-A No:11
      Page(s):
    2161-2168

    In this paper, we propose a jointly optimized predictive-adaptive partitioned block transform to exploit the spatial characteristics of intra residuals and improve video coding performance. Under the assumptions of traditional Markov representations, the asymmetric discrete sine transform (ADST) can be combined with a discrete cosine transform (DCT) for video coding. In comparison, the interpolative Markov representation has a lower mean-square error for images or regions that have relatively high contrast, and is insensitive to changes in image statistics. Hence, we derive an even discrete sine transform (EDST) from the interpolative Markov model, and use a coding scheme to switch between EDST and DCT, depending on the prediction direction and boundary information. To obtain an implementation independent of multipliers, we also propose an orthogonal 4-point integer EDST, which consists solely of adds and bit-shifts. We implement our hybrid transform coding scheme within the H.264/AVC intra-mode framework. Experimental results show that the proposed scheme significantly outperforms standard DCT and ADST. It also greatly reduces the blocking artifacts typically observed around block edges, because the new transform is more adaptable to the characteristics of intra-prediction residuals.

  • Fixed-Rate Resource Exchange for Multi-Operator Pico eNodeB

    Tomohiko MIMURA  Koji YAMAMOTO  Masahiro MORIKURA  Ayako IWATA  Takashi TAMURA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:11
      Page(s):
    2913-2922

    In this paper, we introduce a new multi-operator pico eNodeB (eNB) concept for cellular networks. It is expected that mobile data offloading will be performed effectively after installing the pico eNBs in cellular networks, owing to the rapid increase in mobile traffic. However, when several different operators independently install the pico eNBs, high costs and large amounts of space will be required for the installation. In addition, when several different operators accommodate their own user equipments (UEs) in the pico eNBs, not enough UEs can be accommodated. This is because the UEs are not evenly distributed in the coverage area of the pico eNBs. In this paper, the accommodation of the UEs of different operators in co-sited pico eNB is discussed as one of the solutions to these problems. For the accommodation of the UEs of different operators, wireless resources should be allocated to them. However, when each operator independently controls his wireless resources, the operator is not provided with an incentive to accommodate the UEs of the other operators in his pico eNBs. For this reason, an appropriate rule for appropriate allocation of the wireless resources to the UEs of different operators should be established. In this paper, by using the concepts of game theory and mechanism design, a resource allocation rule where each operator is provided with an incentive to allocate the wireless resources to the UEs of different operators is proposed. With the proposed rule, each operator is not required to disclose the control information like link quality and the number of UEs to the other operators. Furthermore, the results of a throughput performance evaluation confirm that the proposed scheme improves the total throughput as compared with individual resource allocation.

5301-5320hit(18690hit)