The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

7361-7380hit(18690hit)

  • Lower Bounds on the Maximum Partial Correlations of Frequency Hopping Sequence Set with Low Hit Zone

    Xianhua NIU  Daiyuan PENG  Fang LIU  Xing LIU  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2227-2231

    In order to evaluate the goodness of frequency hopping sequence design, the periodic Hamming correlation function is used as an important measure. Usually, the length of correlation window is shorter than the period of the chosen frequency hopping sequence, so the study of the partial Hamming correlation of frequency hopping sequence is particularly important. In this paper, the maximum partial Hamming correlation lower bounds of frequency hopping sequences with low hit zone, with respect to the size of the frequency slot set, the length of correlation window, the family size, the low hit zone, the maximum partial Hamming autocorrelation and the maximum partial Hamming crosscorrelation are established. It is shown that the new bounds include the known Lempel-Greenberger bound, Peng-Fan bounds, Eun-Jin-Hong-Song bound and Peng-Fan-Lee bounds as special cases.

  • Co-occurrence Matrix-Based Image Segmentation

    Suk Tae SEO  In Keun LEE  Seo Ho SON  Hyong Gun LEE  Soon Hak KWON  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E93-D No:11
      Page(s):
    3128-3131

    We propose a simple but effective image segmentation method not based on thresholding but on a merging strategy by evaluating joint probability of gray levels on co-occurrence matrix. The effectiveness of the proposed method is shown through a segmentation experiment.

  • Architecture and Circuit Optimization of Hardwired Integer Motion Estimation Engine for H.264/AVC

    Zhenyu LIU  Dongsheng WANG  Takeshi IKENAGA  

     
    PAPER-Image Processing

      Vol:
    E93-A No:11
      Page(s):
    2065-2073

    Variable block size motion estimation developed by the latest video coding standard H.264/AVC is the efficient approach to reduce the temporal redundancies. The intensive computational complexity coming from the variable block size technique makes the hardwired accelerator essential, for real-time applications. Propagate partial sums of absolute differences (Propagate Partial SAD) and SAD Tree hardwired engines outperform other counterparts, especially considering the impact of supporting variable block size technique. In this paper, the authors apply the architecture-level and the circuit-level approaches to improve the maximum operating frequency and reduce the hardware overhead of Propagate Partial SAD and SAD Tree, while other metrics, in terms of latency, memory bandwidth and hardware utilization, of the original architectures are maintained. Experiments demonstrate that by using the proposed approaches, at 110.8 MHz operating frequency, compared with the original architectures, 14.7% and 18.0% gate count can be saved for Propagate Partial SAD and SAD Tree, respectively. With TSMC 0.18 µm 1P6M CMOS technology, the proposed Propagate Partial SAD architecture achieves 231.6 MHz operating frequency at a cost of 84.1 k gates. Correspondingly, the maximum work frequency of the optimized SAD Tree architecture is improved to 204.8 MHz, which is almost two times of the original one, while its hardware overhead is merely 88.5 k-gate.

  • Development of a 2D Communication Sensor Network Using a Single-Carrier Frequency for both Power and Data Transmission

    Bing ZHANG  Toshifumi OOTA  Azman-Osman LIM  Youiti KADO  

     
    PAPER

      Vol:
    E93-B No:11
      Page(s):
    2945-2955

    Two-dimensional (2D) communication is a novel physical communication form that utilizes the surface as a communication medium to provide both data and power transmission service to the sensor devices placed on the surface's top. In previous works, we developed 2D communication systems that utilize separated channels for data and power transmission. Though this assignment of different channels can achieve strong network performance, the sensor devices must be equipped with two or more interfaces to simultaneously receive the power and data signals, which significantly complicates and enlarges those devices. Moreover, when a channel is used for the power supply, it not only continually monopolizes the wireless frequency resource, it is also likely to cause interference with the other signal source in the case of the input power continually being sent out above a certain level. In this paper, we develop a novel 2D communication sensor system by using a single-carrier frequency for both power and data transmission, equipped with the wireless module for the two together in a compact body. To enable a sensor node that concurrently receives energy and data communication, we propose an enhancement scheme based on the IEEE802.15.4 MAC protocol standard. Through both computer simulation and actual measurement of the output power, we evaluate the performance of power supply and data transmission over the developed 2D communication sensor system.

  • Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

    Shun WATANABE  Yasutada OOHAMA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:11
      Page(s):
    1976-1983

    We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential difference between the key agreement from discrete sources and that from continuous sources.

  • No-Hit-Zone Frequency-Hopping Sequence Sets with Optimal Hamming Autocorrelation

    Jin-Ho CHUNG  Yun Kyoung HAN  Kyeongcheol YANG  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2239-2244

    In quasi-synchronous frequency-hopping multiple access (QS-FHMA) systems, no-hit-zone frequency-hopping sequence (NHZ-FHS) sets are commonly employed to minimize multiple access interference. Several new constructions for optimal NHZ-FHS sets are presented in this paper, which are based on interleaving techniques. Two types of NHZ-FHS sets of length 2N for any integer N ≥ 3 are constructed, whose NHZ sizes are some even integers. An optimal NHZ-FHS set of length 2N with odd NHZ size for any integer N ≥ 6 is also presented. And then, optimal NHZ-FHS sets of length kN are given by generalizing one of the proposed constructions for NHZ-FHS sets of length 2N, where k and N are any positive integers such that 2 ≤ k < N. All the FHSs in the new NHZ-FHS sets are non-repeating FHSs which are optimal with respect to the Lempel-Greenberger bound. Our constructions give new parameters which are flexible in the selection of NHZ size and set size.

  • Characterization of Host-Level Application Traffic with Multi-Scale Gamma Model

    Yosuke HIMURA  Kensuke FUKUDA  Patrice ABRY  Kenjiro CHO  Hiroshi ESAKI  

     
    PAPER-Internet

      Vol:
    E93-B No:11
      Page(s):
    3048-3057

    In this paper, we discuss the validity of the multi-scale gamma model and characterize the differences in host-level application traffic with this model by using a real traffic trace collected on a 150-Mbps transpacific link. First, we investigate the dependency of the model (parameters α and β, and fitting accuracy ε) on time scale Δ, then find suitable time scales for the model. Second, we inspect the relations among α, β, and ε, in order to characterize the differences in the types of applications. The main findings of the paper are as follows. (1) Different types of applications show different dependencies of α, β, and ε on Δ, and display different suitable Δs for the model. The model is more accurate if the traffic consists of intermittently-sent packets than other. (2) More appropriate models are obtained with specific α and β values (e.g., 0.1 < α < 1, and β < 2 for Δ = 500 ms). Also, application-specific traffic presents specific ranges of α, β, and ε for each Δ, so that these characteristics can be used in application identification methods such as anomaly detection and other machine learning methods.

  • PAW: A Pattern-Aware Write Policy for a Flash Non-volatile Cache

    Young-Jin KIM  Jihong KIM  Jeong-Bae LEE  Kee-Wook RIM  

     
    PAPER-Software System

      Vol:
    E93-D No:11
      Page(s):
    3017-3026

    In disk-based storage systems, non-volatile write caches have been widely used to reduce write latency as well as to ensure data consistency at the level of a storage controller. Write cache policies should basically consider which data is important to cache and evict, and they should also take into account the real I/O features of a non-volatile device. However, existing work has mainly focused on improving basic cache operations, but has not considered the I/O cost of a non-volatile device properly. In this paper, we propose a pattern-aware write cache policy, PAW for a NAND flash memory in disk-based mobile storage systems. PAW is designed to face a mix of a number of sequential accesses and fewer non-sequential ones in mobile storage systems by redirecting the latter to a NAND flash memory and the former to a disk. In addition, PAW employs the synergistic effect of combining a pattern-aware write cache policy and an I/O clustering-based queuing method to strengthen the sequentiality with the aim of reducing the overall system I/O latency. For evaluations, we have built a practical hard disk simulator with a non-volatile cache of a NAND flash memory. Experimental results show that our policy significantly improves the overall I/O performance by reducing the overhead from a non-volatile cache considerably over a traditional one, achieving a high efficiency in energy consumption.

  • A Novel PN Complementary Pair for Synchronization and Channel Estimation

    Lifeng HE  Fang YANG  Kewu PENG  Jian SONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3189-3192

    In this paper, a novel pseudo-random noise complementary pair (PNCP) is proposed and adopted as the guard intervals in the time-domain synchronous OFDM (TDS-OFDM) system. The proposed PNCP has nearly ideal aperiodic auto-correlation property and inherits the differential property of the PN sequence. Simulations demonstrate the proposed TDS-OFDM system padded with PNCP could achieve better performance in both synchronization and channel estimation than the conventional TDS-OFDM system.

  • NP-Hard and k-EXPSPACE-Hard Cast Puzzles

    Chuzo IWAMOTO  Kento SASAKI  Kenji NISHIO  Kenichi MORITA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:11
      Page(s):
    2995-3004

    A disentanglement puzzle consists of mechanically interlinked pieces, and the puzzle is solved by disentangling one piece from another set of pieces. A cast puzzle is a type of disentanglement puzzle, where each piece is a zinc die-casting alloy. In this paper, we consider the generalized cast puzzle problem whose input is the layout of a finite number of pieces (polyhedrons) in the 3-dimensional Euclidean space. For every integer k ≥ 0, we present a polynomial-time transformation from an arbitrary k-exponential-space Turing machine M and its input x to a cast puzzle c1 of size k-exponential in |x| such that M accepts x if and only if c1 is solvable. Here, the layout of c1 is encoded as a string of length polynomial (even if c1 has size k-exponential). Therefore, the cast puzzle problem of size k-exponential is k-EXPSPACE-hard for every integer k ≥ 0. We also present a polynomial-time transformation from an arbitrary instance f of the SAT problem to a cast puzzle c2 such that f is satisfiable if and only if c2 is solvable.

  • A Robust Security Mechanism for Mobile Commerce Transactions

    Eun-Jun YOON  Kee-Young YOO  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2898-2906

    In 2006, Yeh and Tsai proposed a mobile commerce security mechanism. However, in 2008, Yum et al. pointed out that Yeh-Tsai security mechanism is not secure against malicious WAP gateways and then proposed a simple countermeasure against the attack is to use a cryptographic hash function instead of the addition operation. Nevertheless, this paper shows that both Yeh-Tsai's and Yum et al.'s security mechanisms still do not provide perfect forward secrecy and are susceptible to an off-line guessing attack and Denning-Sacco attack. In addition, we propose a new security mechanism to overcome the weaknesses of the previous related security mechanisms.

  • Peak-to-Average Power Ratio (PAPR) Reduction by Pulse Shaping Using the K-Exponential Filter

    Yi-De WEI  Yung-Fang CHEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3180-3183

    A K-exponential filter is derived and utilized for pulse shaping to reduce peak to average power ratio (PAPR) without intersymbol interference (ISI). While keeping the same bandwidth, the frequency responses of the filters vary with different values of the parameter k. The minimum PAPR is associated with a value of the parameter k when the roll-off factor α is specified. Simulations show that the PAPR can be reduced compared with the raised cosine (RC) filter in various systems. The derived pulse shaping filters also provide better performance in PAPR reduction compared with the existing filters.

  • Multiplier-less and Table-less Linear Approximation for Square-Related Functions

    In-Cheol PARK  Tae-Hwan KIM  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:11
      Page(s):
    2979-2988

    Square-related functions such as square, inverse square, square-root and inverse square-root operations are widely used in digital signal processing and digital communication algorithms, and their efficient realizations are commonly required to reduce the hardware complexity. In the implementation point of view, approximate realizations are often desired if they do not degrade performance significantly. In this paper, we propose new linear approximations for the square-related functions. The traditional linear approximations need multipliers to calculate slope offsets and tables to store initial offset values and slope values, whereas the proposed approximations exploit the inherent properties of square-related functions to linearly interpolate with only simple operations, such as shift, concatenation and addition, which are usually supported in modern VLSI systems. Regardless of the bit-width of the number system, more importantly, the maximum relative errors of the proposed approximations are bounded to 6.25% and 3.13% for square and square-root functions, respectively. For inverse square and inverse square-root functions, the maximum relative errors are bounded to 12.5% and 6.25% if the input operands are represented in 20 bits, respectively.

  • Binary Sequence Pairs with Two-Level Correlation and Cyclic Difference Pairs

    Seok-Yong JIN  Hong-Yeop SONG  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2266-2271

    We investigate binary sequence pairs with two-level correlation in terms of their corresponding cyclic difference pairs (CDPs). We define multipliers of a cyclic difference pair and present an existence theorem for multipliers, which could be applied to check the existence/nonexistence of certain hypothetical cyclic difference pairs. Then, we focus on the ideal case where all the out-of-phase correlation coefficients are zero. It is known that such an ideal binary sequence pair exists for length υ = 4u for every u ≥ 1. Using the techniques developed here on the theory of multipliers of a CDP and some exhaustive search, we are able to determine that, for lengths υ ≤ 30, (1) there does not exist "any other" ideal/ binary sequence pair and (2) every example in this range is equivalent to the one of length υ = 4u above. We conjecture that if there is a binary sequence pair with an ideal two-level correlation then its in-phase correlation must be 4. This implies so called the circulant Hadamard matrix conjecture.

  • The Unification Problem for Confluent Semi-Constructor TRSs

    Ichiro MITSUHASHI  Michio OYAMAGUCHI  Kunihiro MATSUURA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:11
      Page(s):
    2962-2978

    The unification problem for term rewriting systems (TRSs) is the problem of deciding, for a TRS R and two terms s and t, whether s and t are unifiable modulo R. We have shown that the problem is decidable for confluent simple TRSs. Here, a simple TRS means one where the right-hand side of every rewrite rule is a ground term or a variable. In this paper, we extend this result and show that the unification problem for confluent semi-constructor TRSs is decidable. Here, a semi-constructor TRS means one where all defined symbols appearing in the right-hand side of each rewrite rule occur only in its ground subterms.

  • Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol

    Heru SUKOCO  Yoshiaki HORI  Hendrawan   Kouichi SAKURAI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2953-2961

    The distribution of streaming multicast and real time audio/video applications in the Internet has been quickly increased in the Internet. Commonly, these applications rarely use congestion control and do not fairly share provided network capacity with TCP-based applications such as HTTP, FTP and emails. Therefore, Internet communities will be threatened by the increase of non-TCP-based applications that likely cause a significant increase of traffics congestion and starvation. This paper proposes a set of mechanisms, such as providing various data rates, background traffics, and various scenarios, to act friendly with TCP when sending multicast traffics. By using 8 scenarios of simulations, we use 6 layered multicast transmissions with background traffic Pareto with the shape factor 1.5 to evaluate performance metrics such as throughput, delay/latency, jitter, TCP friendliness, packet loss ratio, and convergence time. Our study shows that non TCP traffics behave fairly and respectful of the co-existent TCP-based applications that run on shared link transmissions even with background traffic. Another result shows that the simulation has low values on throughput, vary in jitter (0-10 ms), and packet loss ratio > 3%. It was also difficult to reach convergence time quickly when involving only non TCP traffics.

  • On Binary Sequence Pairs with Two-Level Periodic Autocorrelation Function

    Kai LIU  Chengqian XU  

     
    PAPER-Sequences

      Vol:
    E93-A No:11
      Page(s):
    2278-2285

    Binary sequence pairs as a class of mismatched filtering of binary sequences can be applied in radar, sonar, and spread spectrum communication system. Binary sequence pairs with two-level periodic autocorrelation function (BSPT) are considered as the extension of usual binary sequences with two-level periodic autocorrelation function. Each of BSPT consists of two binary sequences of which all out-phase periodic crosscorrelation functions, also called periodic autocorrelation functions of sequence pairs, are the same constant. BSPT have an equivalent relationship with difference set pairs (DSP), a new concept of combinatorial mathematics, which means that difference set pairs can be used to research BSPT as a kind of important tool. Based on the equivalent relationship between BSPT and DSP, several families of BSPT including perfect binary sequence pairs are constructed by recursively constructing DSP on the integer ring. The discrete Fourier transform spectrum property of BSPT reveals a necessary condition of BSPT. By interleaving perfect binary sequence pairs and Hadamard matrix, a new family of binary sequence pairs with zero correlation zone used in quasi-synchronous code multiple division address is constructed, which is close to the upper theoretical bound with sequence length increasing.

  • Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and AR Mode

    Bonhyun KOO  Taeshik SHON  

     
    LETTER

      Vol:
    E93-B No:11
      Page(s):
    2963-2966

    Recently wireless sensor networks (WSN) has risen as one of the advanced candidate technologies in order to provide more efficient structure health monitoring (SHM) solution in construction sites. In this paper, we proposed WSN monitoring framework in building sites based on 3D visualization and Augmented Reality (AR) in mobile devices. The proposed system applies 3D visualization and AR technology to camera-enabled mobile devices in WSN environment in order to gather much more information than before. Based on the proposed system, we made an experiment to validate the effectiveness of 3D and AR mode using collected data in IEEE 802.15.4-based WSN.

  • Closed-Loop Quasi-Orthogonal Space-Time Block Codes with Power Scaling and Low-Rate Feedback Information

    Hoojin LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3211-3214

    Recently, novel full-diversity full-rate quasi-orthogonal space-time block codes (QSTBCs) with power scaling and double-symbol maximum likelihood (ML) decoding was proposed. Specifically, the codes can achieve full-diversity through linearly combining two adequately power scaled orthogonal space-time block codes (OSTBCs). In this letter, we derive expressions for mutual information and post-processing signal-to-noise ratio (SNR) for a system with four transmit antennas. By exploiting these formulas, we propose three transmit antenna grouping (TAG) methods for a closed-loop system with low-rate feedback information. The TAG methods make it possible to provide an excellent error-rate performance even with a low-complexity zero-forcing (ZF) detection, especially in spatially correlated fading channels.

  • A Structured Codebook with Various Codeword Configurations for Downlink MIMO Systems

    Hyunil KWON  Myeongcheol SHIN  Chungyong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3193-3196

    A structured codebook with various codeword configurations is proposed to overcome the sum capacity limitation in a region with finite number of users. Specifically, based on multi-user MIMO platform with a codebook of multiple orthonormal sets, called as per user unitary rate control (PU2RC), we diversify the codeword configuration of each orthonormal set and expand the corresponding codeword configuration. Numerical experiments with respect to several system parameters, such as user density and received signal to noise ratio, show that the proposed codebook offers throughput gains over the conventional system in a small to moderate number of user region.

7361-7380hit(18690hit)