The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

6641-6660hit(18690hit)

  • Simulation-Based Tactics Generation for Warship Combat Using the Genetic Algorithm

    Yong-Jun YOU  Sung-Do CHI  Jae-Ick KIM  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E94-D No:12
      Page(s):
    2533-2536

    In most existing warships combat simulation system, the tactics of a warship is manipulated by human operators. For this reason, the simulation results are restricted due to the capabilities of human operators. To deal with this, we have employed the genetic algorithm for supporting the evolutionary simulation environment. In which, the tactical decision by human operators is replaced by the human model with a rule-based chromosome for representing tactics so that the population of simulations are created and hundreds of simulation runs are continued on the basis of the genetic algorithm without any human intervention until finding emergent tactics which shows the best performance throughout the simulation. Several simulation tests demonstrate the techniques.

  • A Simplified 3D Localization Scheme Using Flying Anchors

    Quan Trung HOANG  Yoan SHIN  

     
    LETTER-Network

      Vol:
    E94-B No:12
      Page(s):
    3588-3591

    WSNs (Wireless Sensor Networks) are becoming more widely used in various fields, and localization is a crucial and essential issue for sensor network applications. In this letter, we propose a low-complexity localization mechanism for WSNs that operate in 3D (three-dimensional) space. The basic idea is to use aerial vehicles that are deliberately equipped with anchor nodes. These anchors periodically broadcast beacon signals containing their current locations, and unknown nodes receive these signals as soon as the anchors enter their communication range. We estimate the locations of the unknown nodes based on the proposed scheme that transforms the 3D problem into 2D computations to reduce the complexity of 3D localization. Simulated results show that our approach is an effective scheme for 3D self-positioning in WSNs.

  • Option-Based Monte Carlo Algorithm with Conditioned Updating to Learn Conflict-Free Task Allocation in Transport Applications

    Alex VALDIVIELSO  Toshiyuki MIYAMOTO  

     
    PAPER

      Vol:
    E94-A No:12
      Page(s):
    2810-2820

    In automated transport applications, the design of a task allocation policy becomes a complex problem when there are several agents in the system and conflicts between them may arise, affecting the system's performance. In this situation, to achieve a globally optimal result would require the complete knowledge of the system's model, which is infeasible for real systems with huge state spaces and unknown state-transition probabilities. Reinforcement Learning (RL) methods have done well approximating optimal results in the processing of tasks, without requiring previous knowledge of the system's model. However, to our knowledge, there are not many RL methods focused on the task allocation problem in transportation systems, and even fewer directly used to allocate tasks, considering the risk of conflicts between agents. In this paper, we propose an option-based RL algorithm with conditioned updating to make agents learn a task allocation policy to complete tasks while preventing conflicts between them. We use a multicar elevator (MCE) system as test application. Simulation results show that with our algorithm, elevator cars in the same shaft effectively learn to respond to service calls without interfering with each other, under different passenger arrival rates, and system configurations.

  • Verifying Structurally Weakly Persistent Net Is Co-NP Complete

    Atsushi OHTA  Kohkichi TSUJI  

     
    LETTER

      Vol:
    E94-A No:12
      Page(s):
    2832-2835

    Petri net is a powerful modeling tool for concurrent systems. Subclasses of Petri net are suggested to model certain realistic applications with less computational cost. Structurally weakly persistent net (SWPN) is one of such subclasses where liveness is verified in deterministic polynomial time. This paper studies the computational complexity to verify whether a give net is SWPN. 3UNSAT problem is reduced to the problem to verify whether a net is not SWPN. This implies co-NP completeness of verification problem of SWPN.

  • Approximate Bayesian Estimation of Varying Binomial Process

    Kazuho WATANABE  Masato OKADA  

     
    PAPER-General Fundamentals and Boundaries

      Vol:
    E94-A No:12
      Page(s):
    2879-2885

    Bayesian methods are often applied for estimating the event rate from a series of event occurrences. However, the Bayesian posterior distribution requires the computation of the marginal likelihood which generally involves an analytically intractable integration. As an event rate is defined in a very high dimensional space, it is computationally demanding to obtain the Bayesian posterior distribution for the rate. We estimate the rate underlying a sequence of event counts by deriving an approximate Bayesian inference algorithm for the time-varying binomial process. This enables us to calculate the posterior distribution analytically. We also provide a method for estimating the prior hyperparameter, which determines the smoothness of the estimated event rate. Moreover, we provide an efficient method to compute the upper and lower bounds of the marginal likelihood, which evaluate the approximation accuracy. Numerical experiments demonstrate the effectiveness of the proposed method in terms of the estimation accuracy.

  • Acceleration of FDTD Method Using a Novel Algorithm on the Cell B.E.

    Sho ENDO  Jun SONODA  Motoyuki SATO  Takafumi AOKI  

     
    PAPER

      Vol:
    E94-D No:12
      Page(s):
    2338-2344

    Finite difference time domain (FDTD) method has been accelerated on the Cell Broadband Engine (Cell B.E.). However the problem has arisen that speedup is limited by the bandwidth of the main memory on large-scale analysis. As described in this paper, we propose a novel algorithm and implement FDTD using it. We compared the novel algorithm with results obtained using region segmentation, thereby demonstrating that the proposed algorithm has shorter calculation time than that provided by region segmentation.

  • A Scheme for GNSS ISL Ranging and Time Synchronization under a New Time Division Duplex Mode

    Yong XU  Qing CHANG  Zhijian YU  

     
    LETTER-Navigation, Guidance and Control Systems

      Vol:
    E94-B No:12
      Page(s):
    3627-3630

    Inter-satellite link (ISL) is an important part of the next generation global navigation satellite system (GNSS). In this paper, key technologies of GNSS ISL ranging and time synchronization are researched. Considering that Ka frequency band is used for ISL, a fixed topology is designed and a new time division duplex (TDD) mode is proposed after analyzing the characteristics of GNSS constellations. A novel method called Non-coherent Dual One-way Measuring (NC-DOWM) is applied to this TDD mode. In addition, relevant mathematical formulas, error models and error compensation are discussed in detail. It is found that the proposed NC-DOWM method for GNSS ISL ranging and time synchronization outperforms the current method for GPS in terms of channel utilization efficiency and measuring precision. Furthermore, the presented method has excellent anti-interference capability and engineering feasibility, which can provide a strong technical support for the ISL of the next generation GNSS.

  • Hybrid Test Application in Partial Skewed-Load Scan Design

    Yuki YOSHIKAWA  Tomomi NUWA  Hideyuki ICHIHARA  Tomoo INOUE  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E94-A No:12
      Page(s):
    2571-2578

    In this paper, we propose a hybrid test application in partial skewed-load (PSL) scan design. The PSL scan design in which some flip-flops (FFs) are controlled as skewed-load FFs and the others are controlled as broad-side FFs was proposed in [1]. We notice that the PSL scan design potentially has a capability of two test application modes: one is the broad-side test mode, and the other is the hybrid test mode which corresponds to the test application considered in [1]. According to this observation, we present a hybrid test application of the two test modes in the PSL scan design. In addition, we also address a way of skewed-load FF selection based on propagation dominance of FFs in order to take advantage of the hybrid test application. Experimental results for ITC'99 benchmark circuits show that the hybrid test application in the proposed PSL scan design can achieve higher fault coverage than the design based on the skewed-load FF selection [1] does.

  • Compact Architecture for ASIC and FPGA Implementation of the KASUMI Block Cipher

    Dai YAMAMOTO  Kouichi ITOH  Jun YAJIMA  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E94-A No:12
      Page(s):
    2628-2638

    Compact design is very important for embedded systems such as wireless sensor nodes, RFID tags and mobile devices because of their limited hardware (H/W) resources. This paper proposes a compact H/W implementation for the KASUMI block cipher, which is the 3GPP standard encryption algorithm. In [8] and [9], Yamamoto et al. proposed a method of reducing the register size for the MISTY1 FO function (YYI-08), and implemented very compact MISTY1 H/W. In this paper we aim to implement the smallest KASUMI H/W to date by applying a YYI-08 configuration to KASUMI, whose FO function has a similar structure to that of MISTY1. However, we discovered that straightforward application of YYI-08 raises problems. We therefore propose a new YYI-08 configuration improved for KASUMI and the compact H/W architecture. The new YYI-08 configuration consists of new FL function calculation schemes and a suitable calculation order. According to our logic synthesis on a 0.11-µm ASIC process, the gate size is 2.99 K gates, which, to our knowledge, is the smallest to date.

  • Decoupled 3-D Near-Field Source Localization with UCA via Centrosymmetric Subarrays

    Bum-Soo KWON  Tae-Jin JUNG  Chang-Hong SHIN  Kyun-Kyung LEE  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:11
      Page(s):
    3143-3146

    A novel algorithm is presented for estimating the 3-D location (azimuth angle, elevation angle, and range) of multiple sources with a uniform circular array (UCA). Based on its centrosymmetric property, a UCA is divided into two subarrays. The steering vectors for these subarrays then yield a 2-D direction of arrival (DOA)-related rotational invariance property in the signal subspace, which enables 2-D DOA estimations using a generalized-ESPRIT algorithm. Based on the estimated 2-D DOAs, a range estimation can then be obtained for each source by defining the 1-D MUSIC spectrum. Despite its low computational complexity, the proposed algorithm can almost match the performance of the benchmark estimator 3-D MUSIC.

  • BER Analysis for a QPSK DS-CDMA System over Rayleigh Channel with a NBI Suppression Complex Adaptive IIR Notch Filter

    Aloys MVUMA  Shotaro NISHIMURA  Takao HINAMOTO  

     
    PAPER-Digital Signal Processing

      Vol:
    E94-A No:11
      Page(s):
    2369-2375

    In this paper, analysis of average bit error ratio (BER) performance of a quadriphase shift keying (QPSK) direct-sequence code-division multiple-access (DS-CDMA) system with narrow-band interference (NBI) suppression complex adaptive infinite-impulse response (IIR) notch filter is presented. QPSK DS-CDMA signal is transmitted over a Rayleigh frequency-nonselective fading channel and the NBI has a randomly-varying frequency. A closed-form expression that relates BER with complex coefficient IIR notch filter parameters, received signal-to-noise ratio (SNR), number of DS-CDMA active users and processing gain is derived. The derivation is based on the Standard Gaussian Approximation (SGA) method. Accuracy of the BER expression is confirmed by computer simulation results.

  • Adaptive Interference Mitigation for Multilevel Flash Memory Devices

    Myeongwoon JEON  Kyungchul KIM  Sungkyu CHUNG  Seungjae CHUNG  Beomju SHIN  Jungwoo LEE  

     
    LETTER-Analog Signal Processing

      Vol:
    E94-A No:11
      Page(s):
    2453-2457

    NAND multilevel cell flash memory devices are gaining popularity because they can increase the memory capacity by storing two or more bits to a single cell. However, when the number of levels of a cell increases, the inter-cell interference which shifts threshold voltage becomes more critical. There are two approaches to alleviate the errors caused by the voltage shift. One is the error correcting codes, and the other is the signal processing methods. In this paper, we focus on signal processing methods to reduce the inter-cell interference which causes the voltage shift, and propose two algorithms which reduce the voltage shift effects by adjusting read voltages. The simulation results show that the proposed algorithms are effective for interference mitigation.

  • Parallel Implementation Strategy for CoHOG-Based Pedestrian Detection Using a Multi-Core Processor

    Ryusuke MIYAMOTO  Hiroki SUGANO  

     
    PAPER-Image Processing

      Vol:
    E94-A No:11
      Page(s):
    2315-2322

    Pedestrian detection from visual images, which is used for driver assistance or video surveillance, is a recent challenging problem. Co-occurrence histograms of oriented gradients (CoHOG) is a powerful feature descriptor for pedestrian detection and achieves the highest detection accuracy. However, its calculation cost is too large to calculate it in real-time on state-of-the-art processors. In this paper, to obtain optimal parallel implementation for an NVIDIA GPU, several kinds of parallelism of CoHOG-based detection are shown and evaluated suitability for implementation. The experimental result shows that the detection process can be performed at 16.5 fps in QVGA images on NVIDIA Tesla C1060 by optimized parallel implementation. By our evaluation, it is shown that the optimal strategy of parallel implementation for an NVIDIA GPU is different from that of FPGA. We discuss about the reason and show the advantages of each device. To show the scalability and portability of GPU implementation, the same object code is executed on other NVIDA GPUs. The experimental result shows that GTX570 can perform the CoHOG-based pedestiran detection 21.3 fps in QVGA images.

  • Power Dissipation Analysis of IEEE 802.15.4 Distributed Multi-Hop Wireless Sensor Networks

    Muhammad TARIQ  Zhenyu ZHOU  Yong-Jin PARK  Takuro SATO  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E94-A No:11
      Page(s):
    2279-2286

    The involvement of IEEE 802.15.4 Wireless Sensor Networks (WSNs) in diverse applications has made the realistic analysis of sensor power dissipation in distributed network environments an essential research issue. In this paper, we propose and thoroughly analyze a power dissipation model for Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) based IEEE 802.15.4 distributed multi-hop WSNs. Our model takes the loss rate of frames, neighbor sensors density in communication range of a sensor, number of hops, distance of source to the sink, and density of the network into account. We evaluate the impact of these factors on overall power dissipation. We also perform comprehensive analysis of overheads caused by message routing through multi-hop distributed networks. We validate our proposed model through Monte Carlo simulations. Results show that our power dissipation model is more realistic compared to other proposed models in terms of accuracy and multiplicity of the environments.

  • Complexity Reduced Transmit Diversity Scheme for Time Domain Synchronous OFDM Systems

    Zhaocheng WANG  Jintao WANG  Linglong DAI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:11
      Page(s):
    3116-3124

    This paper proposes a novel scheme to reduce the complexity of existing transmit diversity solutions to time domain synchronous OFDM (TDS-OFDM). The space shifted constant amplitude zero autocorrelation (CAZAC) sequence based preamble is proposed for channel estimation. Two flexible frame structures are proposed for adaptive system design as well as cyclicity reconstruction of the received inverse discrete Fourier transform (IDFT) block. With regard to channel estimation and cyclicity reconstruction, the complexity of the proposed scheme is only around 7.20% of that of the conventional solutions. Simulation results demonstrate that better bit error rate (BER) performance can be achieved over doubly selective channels.

  • A Model of Luminance-Adaptation for Quantifying Brightness in Mixed Visual Adapting Conditions

    Sung-Hak LEE  Kyu-Ik SOHNG  

     
    BRIEF PAPER

      Vol:
    E94-C No:11
      Page(s):
    1768-1772

    The color appearance model gives us the proper brightness information and optimized display conditions for various viewing surroundings. However on conditions of low-level illumination or low background reflectivity, the performance of brightness estimation is relatively poor. Therefore, through our psychophysical experiments, we investigated the state of visual luminance adaptation for comparing single adaptations and mixed adaptations under a complex viewing field, and we also investigated background adaptation degrees and exponential nonlinearity factors for mixed adaptation models. It provides more accurate brightness predictions according to different adapting luminance, which is decided from object and background luminance.

  • Assessment of Building Damage in 2008 Wenchuan Earthquake from Multi-Temporal SAR Images Using Getis Statistic

    Haipeng WANG  Tianlin WANG  Feng XU  Kazuo OUCHI  

     
    LETTER

      Vol:
    E94-B No:11
      Page(s):
    2983-2986

    In this paper, the Getis statistic is applied to ALOS- PALSAR (Advanced Land Ovserving Satellite-Phased Array L-band Synthetic Aperture Radar) images for assessing the building damage caused by the Wenchuan earthquake in 2008. As a proposed image analysis, a simulated building image using mapping and projection algorithm is first presented for analysis of the Getis statistic. The results show the high accuracy of the assessment of the proposed approach. The Getis statistic is then applied to two ALOS-PALSAR images acquired before and after the Wenchuan earthquake to assess the level of building damage. Results of the Getis statistic show that the damage level is approximately 81%.

  • FPGA-Specific Custom VLIW Architecture for Arbitrary Precision Floating-Point Arithmetic

    Yuanwu LEI  Yong DOU  Jie ZHOU  

     
    PAPER-Computer System

      Vol:
    E94-D No:11
      Page(s):
    2173-2183

    Many scientific applications require efficient variable-precision floating-point arithmetic. This paper presents a special-purpose Very Large Instruction Word (VLIW) architecture for variable precision floating-point arithmetic (VV-Processor) on FPGA. The proposed processor uses a unified hardware structure, equipped with multiple custom variable-precision arithmetic units, to implement various variable-precision algebraic and transcendental functions. The performance is improved through the explicitly parallel technology of VLIW instruction and by dynamically varying the precision of intermediate computation. We take division and exponential function as examples to illustrate the design of variable-precision elementary algorithms in VV-Processor. Finally, we create a prototype of VV-Processor unit on a Xilinx XC6VLX760-2FF1760 FPGA chip. The experimental results show that one VV-Processor unit, running at 253 MHz, outperforms the approach of a software-based library running on an Intel Core i3 530 CPU at 2.93 GHz by a factor of 5X-37X for basic variable-precision arithmetic operations and elementary functions.

  • An Improved Authenticated Encryption Scheme

    Fagen LI  Jiang DENG  Tsuyoshi TAKAGI  

     
    LETTER

      Vol:
    E94-D No:11
      Page(s):
    2171-2172

    Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.

  • Color Saturation Compensation in iCAM06 for High-Chroma HDR Imaging

    Hwi-Gang KIM  Sung-Hak LEE  Tae-Wuk BAE  Kyu-Ik SOHNG  

     
    LETTER-Image Processing

      Vol:
    E94-A No:11
      Page(s):
    2353-2357

    An image appearance model called iCAM06 was designed for high dynamic range (HDR) image rendering. The dynamic range of an HDR image needs to be mapped on output devices, which is called tone compression or tone mapping. The iCAM06, the representative HDR rendering algorithm, uses tone compression for image reproduction on the low dynamic range of output devices. However, color saturation reduction occurs during its tone compression process. We propose a saturation correction method using the inverse compensation in order to recover the saturation reduction in the iCAM06. Experimental results show that the proposed method has better performance than the iCAM06 from the viewpoint of saturation accuracy and rendering preference.

6641-6660hit(18690hit)